Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{161449, author = {Dr. J. Savitha and M. Nisanth and S. Suriyadhanush and K. Monishkumar and J.Benito Sam Kumar}, title = {Digital Forensics and Anti-Forensics Techniques}, journal = {International Journal of Innovative Research in Technology}, year = {}, volume = {10}, number = {4}, pages = {133-136}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=161449}, abstract = {The importance of digital forensics in any investigation where data is involved following a security breach cannot be overstated. Data may be personal, commercial, or confidential. The purpose of digital forensic analysis is to legally obtain and evaluate the data being examined. Conversely, anti-forensics techniques are designed to conceal, manipulate, or erase the data or to challenge the credibility of the evidence obtained. This paper provides an overview of current anti-forensics methods, the techniques employed, and the available countermeasures}, keywords = {Digital forensics, anti-forensics, forensics techniques.}, month = {}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry