Full Paper View Go Back

Evidence Recovery using EnCase and FTK in Forensic Computing Investigation

Narayan P. Bhosale1

Section:Research Paper, Product Type: Journal-Paper
Vol.9 , Issue.4 , pp.8-13, Aug-2021


Online published on Aug 31, 2021


Copyright © Narayan P. Bhosale . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Narayan P. Bhosale, “Evidence Recovery using EnCase and FTK in Forensic Computing Investigation,” International Journal of Scientific Research in Computer Science and Engineering, Vol.9, Issue.4, pp.8-13, 2021.

MLA Style Citation: Narayan P. Bhosale "Evidence Recovery using EnCase and FTK in Forensic Computing Investigation." International Journal of Scientific Research in Computer Science and Engineering 9.4 (2021): 8-13.

APA Style Citation: Narayan P. Bhosale, (2021). Evidence Recovery using EnCase and FTK in Forensic Computing Investigation. International Journal of Scientific Research in Computer Science and Engineering, 9(4), 8-13.

BibTex Style Citation:
@article{Bhosale_2021,
author = {Narayan P. Bhosale},
title = {Evidence Recovery using EnCase and FTK in Forensic Computing Investigation},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {8 2021},
volume = {9},
Issue = {4},
month = {8},
year = {2021},
issn = {2347-2693},
pages = {8-13},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2457},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2457
TI - Evidence Recovery using EnCase and FTK in Forensic Computing Investigation
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Narayan P. Bhosale
PY - 2021
DA - 2021/08/31
PB - IJCSE, Indore, INDIA
SP - 8-13
IS - 4
VL - 9
SN - 2347-2693
ER -

415 Views    380 Downloads    74 Downloads
  
  

Abstract :
Evidence retrieval from digital devices using tools of forensic computing is always challenging job and an exciting new frontier awaits criminologists in the cyberspace age. The forensic tools such as EnCase and FTK that have been frequently utilized to examine cybercrime are the topic of this research. There are always digital traces of every contact. It is difficult to uncover evidence in cyber-evidence investigations. The recovery of numerous types of files and photos has been achieved after using FTK and EnCase. If AccessData FTK 7.1.0 is used in conjunction with EnCase v8.08, then the accuracy of carving evidence is improved over a demo version of FTK. In this way, both tools are useful to cyber investigators for minimal data acquisition, which is applicable to potential evidence recovery from digital media. Cyber Forensics or Forensic Computing, then, is a combination of methodology and technical knowledge for early bird investigators with legal obligations.

Key-Words / Index Term :
Forensic Computing, Digital Evidence, FTK, Encase.

References :
[1] Albert Marcella Jr., Doug Menendez, “Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes,” Auerbach Publications, Taylor & Francis, 2nd Edition, ISBN-10 : 0849383285, pp.1-528, 2007.
[2] Hanan Hibshi, Timothy Vidas, Lorrie Cranor, “Usability of Forensics Tools: A User Study,” ixth International Conference on IT Security Incident Management and IT Forensics, IEEE, ISBN: 978-0-7695-4403-8, Germany, pp.-81-91, 2011.
[3] Kambiz Ghazinour et al., “A study on digital forensic tools,” IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), USA, pp.1-7, 2017. DOI:10.1109/ICPCSI.2017.8392304.
[4] Samuel Norris, “Digital Evidence and Computer Crime,” 3rd edition, Elsevier, pp.-1-244, 2011.
[5] Vedanta Kapoor et al.,“Digital Forensics Tools,” International Journal of Engineering and Advanced Technology (IJEAT), ISSN: 2249 – 8958, Volume-9, Issue-2, pp.3965-3969, 2019.
[6] Hailye Tekleselase Woldemichael, “Emerging Cyber Security Threats in Organization,” International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.6, pp.7-10, 2019.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation