Skip to main content
Data Forensics / Forensic Data Analysis

Data Forensics / Forensic Data Analysis

CYBERSECURITY DICTIONARY

Data Forensics / Forensic Data Analysis (FDA)

Data Forensics – also known as Forensic Data Analysis (FDA) – refers to the study of digital data and the investigation of cybercrime. FDA may focus on mobile devices, computers, servers and other storage devices, and it typically involves the tracking and analysis of data passing through a network. Investigators employ a range of tools, including decryption and reverse engineering. Some investigators distinguish between “persistent data” data stored on a drive – and volatile data, which resides in registries, cache, and RAM and which will be destroyed when the computer is shut down. Attribution and illuminating the complete attack path are among the primary objectives.

Investigators must address not only the obvious technical challenges but also an array of administrative and legal issues. Technical issues encompass encryption, basic questions of data storage and “anti-forensics” tactics intended to circumvent investigator efforts. The complexities of cyber threats and attacks can create significant difficulties in accurately attributing malicious activity. And while there are a variety of standards for data forensics, there aren’t mutually agreed-upon standards, nor is there a single governing body to assure that professionals are qualified and following best practices.

Seeking Clarity?

View the Cybersecurity Dictionary for top terms searched by your peers.

Explore the Dictionary

Related Assets

October 22, 2018

PCI Compliance Does Not Always Equal Security

Learn how a risk-centric approach can be applied to each PCI requirement.

See Details

October 29, 2018

Leveraging Risk Strategy to Move Beyond Check-Box PCI Compliance

Merchants often put compliance spending at the top of their list for budgeting purposes because the consequences of non-compliance can be expensive. F...

See Details

July 31, 2017

PCI Services

Learn how Optiv can help you plan, build and run your PCI compliance program.

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.