Home > Other Scientific Research Area > Other > Special Issue > Recent Advances in Computer Applications and Information Technology > Digital Forensics: Computer Crime Investigation

Digital Forensics: Computer Crime Investigation

Call for Papers

Volume-10 | Issue-3

Last date : 26-Jun-2026

Best International Journal
Open Access | Peer Reviewed | Best International Journal | Indexing & IF | 24*7 Support | Dedicated Qualified Team | Rapid Publication Process | International Editor, Reviewer Board | Attractive User Interface with Easy Navigation

Journal Type : Open Access

First Update : Within 7 Days after submittion

Submit Paper Online

For Author

Research Area


Digital Forensics: Computer Crime Investigation


Tushar Ramdham | Shivam Meshram



Tushar Ramdham | Shivam Meshram "Digital Forensics: Computer Crime Investigation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | Recent Advances in Computer Applications and Information Technology, March 2026, pp.569-574, URL: https://www.ijtsrd.com/papers/ijtsrd101455.pdf

As a crucial topic within the realm of cybersecurity, digital forensics is essential to the investigation and prevention of crimes using computers. As digital technologies, internet usage, cloud computing, and smart devices continue to rise exponentially, cybercrimes like ransomware attacks, identity theft, financial fraud, hacking, data breaches, and cyberterrorism have become much more commonplace globally. The necessity for methodical digital investigation procedures has never been greater, as criminals increasingly rely on digital platforms to carry out and hide their operations. A systematic framework for locating, preserving, gathering, analysing, and presenting digital evidence in a way that is acceptable in court is offered by digital forensics[1]. This study examines the basic ideas of digital forensics, concentrating on computer crime investigation and methods for recovering erased data. The retrieval of erased or concealed data is among the most crucial components of digital forensic inquiry. In contrast to popular assumption, deleted files are not instantaneously removed from storage devices; rather, the operating system just identifies the storage space as usable again and eliminates file references. Using specific forensic methods, such data can be recovered until it is overwritten. Forensic disc imaging, file carving, metadata reconstruction, hash verification, and timeline analysis are some of the data recovery techniques covered in this study. The study also looks at the organised digital forensic investigation procedure, which uses cryptographic hashing algorithms like MD5 and SHA-256 to guarantee integrity and authenticity[2] The study also examines popular forensic tools including EnCase, FTK, Autopsy, Wireshark, and Volatility that help investigators retrieve, examine, and interpret digital evidence from memory systems, networks, and computers. Additionally, the study draws attention to contemporary difficulties in digital forensic investigations, such as disputes over jurisdiction, cloud-based systems, and encryption. The results highlight the importance of digital forensics in preventing cybercrimes and bolstering cybersecurity regimes. The incorporation of automation, artificial intelligence, and advanced analytics into forensic investigations will further improve accuracy, efficiency, and dependability as technology develops. The significance of contemporary digital forensic procedures in preserving cyber resilience, legal compliance, and digital trust in the linked world of today is highlighted by this study, which advances our understanding of them.[3].

Forensic imaging, file carving, hash algorithms, network forensics, memory forensics, cyber security, evidence preservation, incident response, forensic tools, digital forensics, computer crime investigation, cybercrime, deleted data recovery, digital evidence, and data integrity.


IJTSRD101455
Special Issue | Recent Advances in Computer Applications and Information Technology, March 2026
569-574
IJTSRD | www.ijtsrd.com | E-ISSN 2456-6470
Copyright © 2019 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)

International Journal of Trend in Scientific Research and Development - IJTSRD having online ISSN 2456-6470. IJTSRD is a leading Open Access, Peer-Reviewed International Journal which provides rapid publication of your research articles and aims to promote the theory and practice along with knowledge sharing between researchers, developers, engineers, students, and practitioners working in and around the world in many areas like Sciences, Technology, Innovation, Engineering, Agriculture, Management and many more and it is recommended by all Universities, review articles and short communications in all subjects. IJTSRD running an International Journal who are proving quality publication of peer reviewed and refereed international journals from diverse fields that emphasizes new research, development and their applications. IJTSRD provides an online access to exchange your research work, technical notes & surveying results among professionals throughout the world in e-journals. IJTSRD is a fastest growing and dynamic professional organization. The aim of this organization is to provide access not only to world class research resources, but through its professionals aim to bring in a significant transformation in the real of open access journals and online publishing.

Thomson Reuters
Google Scholer
Academia.edu

ResearchBib
Scribd.com
archive

PdfSR
issuu
Slideshare

WorldJournalAlerts
Twitter
Linkedin