Professional Documents
Culture Documents
Project Propasal
Project Propasal
Project Propasal
NAIROBI CAMPUS
DIPLOMA IN COMPUTER FORENSIC
RESEARCH PROPASAL
RESEARCH QUESTIONS
Resource Limitations:
Data Encryption:
INTRODUCTION
In our days, all digital devices such as cell phones, tablets, laptops and
desktop computers can be used for criminal activities such as fraud,
drug trafficking, homicide, hacking, forgery, terrorism,against these
criminal activities, digital forensics is used to help investigate
cybercrimes and to identify the device-assisted crime and the
authors.There are many definitions of digital forensics but, the one that
describe it properly is “Digital forensics is the discipline that combines
elements of law and computer science to collect and analyze data from
computer systems, networks, wireless communications, and storage
devices in a way that is admissible as evidence in a court of law.
Disk Forensics:
It deals with extracting data from storage media by searching active,
modified, or deleted files.
Network Forensics:
It is a sub-branch of digital forensics. It is related to monitoring and
analysis of computer network traffic to collect important information and
legal evidence.
Wireless Forensics:
It is a division of network forensics. The main aim of wireless forensics is
to offers the tools need to collect and analyze the data from wireless
network traffic.
Database Forensics:
It is a branch of digital forensics relating to the study and examination of
databases and their related metadata.
Malware Forensics:
This branch deals with the identification of malicious code, to study their
payload, viruses, worms.
Memory Forensics:
It deals with collecting data from system memory (system registers,
cache, RAM) in raw form and then carving the data from Raw dump.