Digital Forensics and Evidence Collection Methodology

  • Hitesh Vijay Gidwani
  • Show Author Details
  • Hitesh Vijay Gidwani

    Student at MIT World Peace University, Pune

  • img Save PDF


The Research Paper focuses on the various techniques of Cyber-attack and prescribes preventive measures elated to the same. Cyber-attack is a cyber-crime, which is targeted on any user’s device to hack and compromise the same for illegal monetary gains. The paper also puts light on the importance of Information Technology act,2000 and its compliance with other related statutes. Digital forensic is a branch of forensic science dealing with the extraction of data and investigation of the material recovered from the digital devices. In the 21st Century, the use of computers is increasing more and more. This has allowed the development of the internet. In turn, the web has brought many benefits, but the web has also contributed to the increase of cyber-crime. So, with the increase of cybercrime, it's become critical to extend and develop computer systems security. The intellectual property has evolved as a valuable asset that is compromised and stolen, Digital forensics has also interplayed with the concept of “evaluation source” of such intellectual property to prove the original owner of the intangible yet valuable asset of a legal person. While talking about digital evidence used in courts, these shreds of evidence fall in the same criteria and same legal guidelines as other forms of evidence. The concept of authenticity and integrity are considered Integrity is ensuring that the act of seizing and acquiring digital media does not modify the evidence. Hacking or unauthorized access to any digital device with motive to gain financial profits, or commission of a crime that involves the usage of computer, phone or any digital device connected to the network, or even the network for matter of fact since a compromised network can become the stream flow to the data being accessed through that network source.


Research Paper


International Journal of Legal Science and Innovation, Volume 3, Issue 3, Page 1082 - 1091


Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution -NonCommercial 4.0 International (CC BY-NC 4.0) (, which permits remixing, adapting, and building upon the work for non-commercial use, provided the original work is properly cited.


Copyright © IJLSI 2021