INTRODUCTION
Nowadays with a fast growing digital age of modern technology, cyber-attack …show more content…
These sources can contain a vast amount of data. Hence, they lead to many challenges in acquiring the evidence. For example, just in a mobile devices category, there are multiple types of devices – cell phones, smartphones, tablets, Personal Digital Assistant (PDA) devices, and etcetera. In helping the investigators to organize their sources, there are three different events – network intrusion, malware installation, and insider file deletion – can be used to prioritize data sources’ potential usefulness. This paper will discuss 4 major sources of data: log files, hard drives, mobile devices, and social networking websites. Each of the data sources has its own fundamental characteristics and ways for the investigators to collect valuable data out of it. The paper also explains the challenges regarding collecting and examining these