Types of Digital forensics
Across
- 5. Collecting evidence from computer networks or devices.
- 6. It collects raw data from system memory (RAM, cache, and system registers).
- 7. Deals with the inspection and evaluation of phones and smartphones and aids in retrieving contacts, call logs, incoming and outgoing SMS, and other available data.
- 8. Focuses on researching and analyzing databases and the associated metadata.
Down
- 1. Monitoring and examining computer network traffic.
- 2. It is concerned with locating suspicious code and researching viruses, worms, etc.
- 3. Emails, including deleted emails, calendars, and contacts, are discussed along with their recovery and analysis.
- 4. Deals with locating active, updated, or deleted files in order to extract raw data from the device's primary or secondary storage.