Volatile data is the data that is usually stored in cache memory or RAM. This volatile data is not permanent this is temporary and this data can be lost if the power is lost i.e., when computer looses its connection.
During any cyber crime attack, investigation process is held in this process data collection plays an important role but if the data is volatile then such type of data should be collected immediately. Volatile information can be collected remotely or onsite. If there are many number of systems to be collected then remotely is preferred rather than onsite.
It is very important for the forensic investigation that immediate state of the computer is recorded so that the data does not lost as the volatile data will be lost quickly. If the volatile data is lost on the suspects computer if the power is shut down, Volatile information is not crucial but it leads to the investigation for the future purpose. To avoid this problem of storing volatile data on a computer we need to charge continuously so that the data isn’t lost. So that computer doesn’t loose data and forensic expert can check this data sometimes cache contains Web mail.
This volatile data may contain crucial information.so this data is to be collected as soon as possible. This process is known “Live Forensics”.
This may include several steps they are:
- Initially create response tool kit.
- Storing in this information which is obtained during initial response.
- Then obtain volatile data
- Then after that performing in in-depth live response.
Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.
- Difference between Volatile Memory and Non-Volatile Memory
- Mark-and-Sweep: Garbage Collection Algorithm
- Difference between Data Scientist, Data Engineer, Data Analyst
- System Protection in Operating System
- Allocating kernel memory (buddy system and slab system)
- User View Vs Hardware View Vs System View of Operating System
- System Programs in Operating System
- Difference between Local File System (LFS) and Distributed File System (DFS)
- File System Implementation in Operating System
- Xv6 Operating System -adding a new system call
- Traps and System Calls in Operating System (OS)
- Characteristics of data in geographical information system (GIS)
- Expected Properties of a Big Data System
- Types of Sources of Data in Data Mining
- Difference between a Data Analyst and a Data Scientist
- How Big Data Artificial Intelligence is Changing the Face of Traditional Big Data?
- Does Dark Data Have Any Worth In The Big Data World?
- Why Data Visualization Matters in Data Analytics?
- Difference Between Data Science and Data Mining
- Difference Between Big Data and Data Science
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.