For detection and attribution of misuse of digital data, adoption of proper forensic procedures is required. In a usual scenario where a malpractice is suspected in the office by an employee using a digital resource like computers/mobiles/pen drives, a manual exploration by an untrained person can tamper with the evidentiary value of the data. A proper forensic process includes imaging of the media through forensically safe methods like Write Blocking, Hashing and proper handling of the suspect media.
Copyright @2020 Cyber Moksha | Designed Zilicon Technologies Pvt.Ltd