{"id":2537,"date":"2011-09-12T10:37:47","date_gmt":"2011-09-12T10:37:47","guid":{"rendered":"https:\/\/www.techopedia.com\/definition\/cyberforensics\/"},"modified":"2022-05-31T14:49:40","modified_gmt":"2022-05-31T14:49:40","slug":"cyberforensics","status":"publish","type":"definition","link":"https:\/\/www.techopedia.com\/definition\/2388\/cyberforensics","title":{"rendered":"Cyberforensics"},"content":{"rendered":"
Cyberforensics is an electronic discovery technique used to determine and reveal technical criminal evidence. It often involves extracting data from local and\/or cloud storage to electronic to establish a chain of evidence for legal process purposes.<\/p>\n
In tech lingo, the concept of reverse engineering<\/a> may also be referred to as computer forensics or digital forensics. In this more general context, the term is used to describe an investigation that disassembles and analyzes code to determine where code broke (debugging<\/a>) or understand how a cybersecurity exploit<\/a> was carried out.<\/p>\n Cybercrimes cover a broad spectrum, from email scams to downloading copyrighted works for distribution, and are fueled by a desire to profit from another person’s intellectual property or private information.<\/p>\n Cyberforensic techniques include:<\/p>\n What Does Cyberforensics Mean? Cyberforensics is an electronic discovery technique used to determine and reveal technical criminal evidence. It often involves extracting data from local and\/or cloud storage to electronic to establish a chain of evidence for legal process purposes. In tech lingo, the concept of reverse engineering may also be referred to as computer […]<\/p>\n","protected":false},"author":7813,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"","_lmt_disable":"","om_disable_all_campaigns":false,"footnotes":""},"definitioncat":[255,218,245,236,223],"class_list":["post-2537","definition","type-definition","status-publish","format-standard","hentry","definitioncat-cyber-threats","definitioncat-cybersecurity","definitioncat-internet","definitioncat-network-management","definitioncat-storage"],"acf":[],"yoast_head":"\nTechopedia Explains Cyberforensics<\/span><\/h2>\n
\n