Cyber Unit 4
Cyber Unit 4
This refers to all hardware and digital media that can store electronic data, which may
serve as evidence in forensic investigations.
1. Computers and Laptops: Store user files, system logs, and sensitive data.
2. Storage Devices: Includes hard drives, SSDs, USB drives, and memory cards.
3. Mobile Devices: Smartphones and tablets store personal data, messages, and
app logs.
4. Network Devices: Routers, switches, and servers store configuration and traffic
data.
5. Cloud Storage: Online platforms like Google Drive or Dropbox hold user files.
1. Evidence Collection: Gather data from devices like computers, phones, and
networks.
2. Preservation: Ensure evidence is not tampered with or corrupted.
3. Analysis: Use tools to extract relevant information (e.g., logs, files).
4. Reporting: Create reports that detail findings in a way understandable to
non-technical audiences.
5. Legal Support: Present evidence in court and testify as an expert witness.
1. Identify Sources: Look for routers, firewalls, and intrusion detection systems
(IDS).
2. Packet Capturing: Use tools like Wireshark to capture live network traffic.
3. Log Analysis: Analyze logs from servers, firewalls, and network devices.
4. Extract Metadata: Metadata such as timestamps and IP addresses help trace
activities.
5. Preserve Evidence: Ensure network data is stored securely and is not altered.
7. Auditing
Types of Audits: