Navigating cyber investigations: strategies and tools for forensic data acquisition
Abstract
The rapid proliferation of cybercrimes has underscored the critical importance of robust data acquisition methodologies in the field of digital forensics. This research publication explores various aspects of forensic data acquisition, focusing on techniques, tools, and best practices employed by forensic investigators to collect and preserve digital evidence effectively. Beginning with an overview of the escalating cyber threat landscape and the consequential need for forensic investigations, the publication delves into the fundamental concepts of data acquisition, emphasizing the significance of ensuring data integrity and admissibility in legal proceedings. It examines the process of acquiring both volatile and non-volatile data from diverse sources, including hard drives, RAM, and other digital storage media. Furthermore, evaluates a range of forensic imaging and validation methods, encompassing tools such as Belkasoft live RAM capturer, AccessData FTK Imager, and ProDiscover, alongside validation techniques using PowerShell utility and commercial forensic software. Through comprehensive analysis and discussion, this study serves as a valuable resource for forensic practitioners, researchers, and legal professionals seeking to enhance their understanding of forensic data acquisition methodologies in the ever-evolving landscape of cybercrime investigation.
Keywords
Civil litigations; Computer forensics; Cybercrimes; Data acquisition; Data automation; Digital evidence; Forensic investigation
Full Text:
PDFDOI: http://doi.org/10.11591/ijece.v15i4.pp4022-4030
Copyright (c) 2025 Srinivas Kanakala, Vempaty Prashanthi, K. V. Sharada
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
International Journal of Electrical and Computer Engineering (IJECE)
p-ISSN 2088-8708, e-ISSN 2722-2578
This journal is published by theĀ Institute of Advanced Engineering and Science (IAES).