Types of Digital forensics

12345678
Across
  1. 5. Collecting evidence from computer networks or devices.
  2. 6. It collects raw data from system memory (RAM, cache, and system registers).
  3. 7. Deals with the inspection and evaluation of phones and smartphones and aids in retrieving contacts, call logs, incoming and outgoing SMS, and other available data.
  4. 8. Focuses on researching and analyzing databases and the associated metadata.
Down
  1. 1. Monitoring and examining computer network traffic.
  2. 2. It is concerned with locating suspicious code and researching viruses, worms, etc.
  3. 3. Emails, including deleted emails, calendars, and contacts, are discussed along with their recovery and analysis.
  4. 4. Deals with locating active, updated, or deleted files in order to extract raw data from the device's primary or secondary storage.