1. INTRODUCTORY
1.1 INTRODUCTION
As Internet technologies proliferate into everyday life, we come close to realizing new and existing online opportunities. One such opportunity is in Cyber forensics, unique process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally accepted. The American Heritage Dictionary defines forensics as “relating to the use of science or technology in the investigation and establishment of facts or evidence in a court of law”. Cyber forensics involves the identification, documentation, and interpretation of computer media for using them as evidence and/or to rebuild the crime scenario. According to computer forensics defined as the process of identifying, collecting, preserving, analyzing and presenting the computer- related evidence in a manner that is legally acceptable by court5. More recently, computer forensics branched into several overlapping areas, generating various terms such as, digital forensics, data forensics, system forensics, network forensics, email forensics, cyber forensics, forensics analysis, enterprise forensics, proactive forensics etc.