Computer forensics
![Image](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFV5syVtS_Z7m91UGjYSXHvcSVrZeEj54mxoV0MQaZ8wCtxp_-xiCyxYvAlWUJLgoezM73Cs2dAGbI7nz_w9bTQUOUPFJPFbX0j4P2Z2I0JNOIC6sAWFaRXpcl6m23yxmKDF8AjIuTs3_VfjSWm-DeU708nqmAztUixvjqcf4g_UmBoD10_1xjBiQdAg/w640-h480/computer-forensics-mc-slide1.png)
INTRODUCTION Computer Forensics is a scientific method of investigation and analysis in order to gather evidence from digital devices or computer networks and components which is suitable for presentation in a court of law or legal body. It involves performing a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computer and who was responsible for it. TYPES Disk Forensics: It deals with extracting raw data from the primary or secondary storage of the device by searching active, modified, or deleted files. Network Forensics: It is a sub-branch of Computer Forensics that involves monitoring and analyzing the computer network traffic. Database Forensics: It deals with the study and examination of databases and their related metadata. Malware Forensics: It deals with the identification of suspicious code and studying viruses, worms, etc. Email Forensics: It deals with emails and their recovery and analysis, including deleted