CINXE.COM
types of digital forensics - Google Search
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.0//EN" "http://www.wapforum.org/DTD/xhtml-mobile10.dtd"><html xmlns="http://www.w3.org/1999/xhtml" lang="en-SG"><head><meta content="application/xhtml+xml; charset=UTF-8" http-equiv="Content-Type"/><meta content="no-cache" name="Cache-Control"/><title>types of digital forensics - Google Search</title><style>a{text-decoration:none;color:inherit}a:hover{text-decoration:underline}a img{border:0}body{font-family:arial,sans-serif;padding:8px;margin:0 auto;max-width:700px;min-width:240px;}.FbhRzb{border-left:thin solid #dadce0;border-right:thin solid #dadce0;border-top:thin solid #dadce0;height:40px;overflow:hidden}.n692Zd{margin-bottom:10px}.cvifge{height:40px;border-spacing:0}.QvGUP{height:40px;padding:0 8px 0 8px;vertical-align:top}.O4cRJf{height:40px;width:100%;padding:0;padding-right:16px}.O1ePr{height:40px;padding:0;vertical-align:top}.kgJEQe{height:36px;width:98px;vertical-align:top;margin-top:4px}.lXLRf{vertical-align:top}.MhzMZd{border:0;vertical-align:middle;font-size:14px;height:40px;padding:0;width:100%;padding-left:16px}.xB0fq{height:40px;border:none;font-size:14px;background-color:#1a73e8;color:#fff;padding:0 16px;margin:0;vertical-align:top;cursor:pointer}.xB0fq:focus{border:1px solid #1a73e8}.M7pB2{border:thin solid #dadce0;margin:0 0 3px 0;font-size:13px;font-weight:500;height:40px}.euZec{width:100%;height:40px;text-align:center;border-spacing:0}table.euZec td{padding:0;width:25%}.QIqI7{display:inline-block;padding-top:4px;font-weight:bold;color:#4285f4}.EY24We{border-bottom:2px solid #4285f4}.CsQyDc{display:inline-block;color:#70757a}.TuS8Ad{font-size:14px}.HddGcc{padding:8px;color:#70757a}.dzp8ae{font-weight:bold;color:#3c4043}.rEM8G{color:#70757a}.bookcf{table-layout:fixed;width:100%;border-spacing:0}.InWNIe{text-align:center}.uZgmoc{border:thin solid #dadce0;color:#70757a;font-size:14px;text-align:center;table-layout:fixed;width:100%}.frGj1b{display:block;padding:12px 0 12px 0;width:100%}.BnJWBc{text-align:center;padding:6px 0 13px 0;height:35px}</style></head><body><style>.ezO2md{border:thin solid #dadce0;padding:12px 16px 12px 16px;margin-bottom:10px;font-family:arial,sans-serif}.lIMUZd{font-family:arial,sans-serif}.synv3b{padding-bottom:12px}.FYYwXe{padding-bottom:12px}.oO6lG{padding-top:12px}.LUX65{overflow:hidden;text-align:center}.DT7Nxc{margin:0 auto;display:block}.HeLCGb{margin:0 -50%;display:inline-block}.CSfvHb{padding-bottom:8px}.fYyStc{word-break:break-word}.ynsChf{display:block;white-space:nowrap;overflow:hidden;text-overflow:ellipsis}.Fj3V3b{color:#1967d2;font-size:14px;line-height:20px}.FrIlee{color:#202124;font-size:13px;line-height:20px}.F9iS2e{color:#70757a;font-size:13px;line-height:20px}.WMQ2Le{color:#70757a;font-size:12px;line-height:16px}.x3G5ab{color:#202124;font-size:18px;line-height:24px}.fuLhoc{color:#1967d2;font-size:18px;line-height:24px}.epoveb{font-size:32px;line-height:40px;font-weight:400;color:#202124}.dXDvrc{color:#0d652d;font-size:14px;line-height:20px;word-wrap:break-word}.dloBPe{font-weight:bold}.YVIcad{color:#70757a}.JkVVdd{color:#ea4335}.oXZRFd{color:#ea4335}.MQHtg{color:#fbbc04}.pyMRrb{color:#1e8e3e}.EtTZid{color:#1e8e3e}.M3vVJe{color:#1967d2}.qXLe6d{display:block}.NHQNef{font-style:italic}.Cb8Z7c{white-space:pre}a.ZWRArf{text-decoration:none}a .CVA68e:hover{text-decoration:underline}.GN4D8d{margin:0}.Dks9wf{width:100%}.KZhhub{border-spacing:0;width:100%}.udTCfd{vertical-align:top;width:100%}.SqPqqd{display:block;padding-top:12px}.VeHcBf{border-spacing:0;width:100%;table-layout:auto;padding:4px 0 4px 0}.MGsU1d{text-align:right}</style><div class="n692Zd"><div class="BnJWBc"><a class="lXLRf" href="/?sca_esv=c744cb070de47b7e&output=search&sa=X&ved=0ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQPAgC"><img class="kgJEQe" src="/images/branding/searchlogo/1x/googlelogo_desk_heirloom_color_150x55dp.gif" alt="Google"/></a></div><div class="FbhRzb"><form action="/search"><input name="sca_esv" value="c744cb070de47b7e" type="hidden"/><input name="oq" type="hidden"/><input name="aqs" type="hidden"/><table class="cvifge"><tr><td class="O4cRJf"><input class="MhzMZd" value="types of digital forensics" name="q" type="text"/></td><td class="O1ePr"><input class="xB0fq" value="Search" type="submit"/></td></tr></table></form></div><div class="M7pB2"><table class="euZec"><tbody><tr><td class="EY24We"><span class="QIqI7">ALL</span></td><td><a class="CsQyDc" href="/search?q=types+of+digital+forensics&sca_esv=c744cb070de47b7e&tbm=isch&source=lnms&sa=X&ved=0ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQ_AUIBSgB">IMAGES</a></td><td><a class="CsQyDc" href="/search?q=types+of+digital+forensics&sca_esv=c744cb070de47b7e&tbm=nws&source=lnms&sa=X&ved=0ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQ_AUIBigC">NEWS</a></td><td><a class="CsQyDc" href="/search?q=types+of+digital+forensics&sca_esv=c744cb070de47b7e&tbm=bks&source=lnms&sa=X&ved=0ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQ_AUIBygD">BOOKS</a></td></tr></tbody></table></div></div><div><div> <div> <div class="ezO2md"><div><div class="FYYwXe"> <div class="CSfvHb"> <span class="qXLe6d FrIlee"> <span class="dloBPe fYyStc">Here is a brief overview of the main types of digital forensics:</span> </span> </div> <div> <ul class="GN4D8d"> <li> <span class="qXLe6d FrIlee"> <span class="fYyStc">Computer Forensics. Computer forensic science (computer forensics) investigates computers and digital storage evidence. ... </span> </span> </li> <li> <span class="qXLe6d FrIlee"> <span class="fYyStc">Mobile Device Forensics. ... </span> </span> </li> <li> <span class="qXLe6d FrIlee"> <span class="fYyStc">Network Forensics. ... </span> </span> </li> <li> <span class="qXLe6d FrIlee"> <span class="fYyStc">Forensic Data Analysis. ... </span> </span> </li> <li> <span class="qXLe6d FrIlee"> <span class="fYyStc">Database Forensics.</span> </span> </li> </ul> </div> </div><div><a class="fuLhoc ZWRArf" href="/url?q=https://www.bluevoyant.com/knowledge-center/understanding-digital-forensics-process-techniques-and-tools&sa=U&ved=2ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQFnoECAwQAg&usg=AOvVaw1YchLBAobzHJrXALiHpBAm"><span class="CVA68e qXLe6d">Understanding Digital Forensics: Process, Techniques, and Tools</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">www.bluevoyant.com › knowledge-center › understanding-digital-forensic...</span> </span> </a></div><div class="oO6lG"> <span class="qXLe6d F9iS2e WMQ2Le"> <a class="M3vVJe" href="https://www.google.com/url?q=https://support.google.com/websearch%3Fp%3Dfeatured_snippets%26hl%3Den-SG&opi=89978449&usg=AOvVaw0XmUePKqidLOPpq7KneD4H">About featured snippets</a> </span> </div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="/url?q=https://www.open.edu/openlearn/science-maths-technology/digital-forensics/content-section-4.3&sa=U&ved=2ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQFnoECA4QAg&usg=AOvVaw0h5oKnfk2nvFmogjxBU9b2"><span class="CVA68e qXLe6d fuLhoc ZWRArf">4.3 Different types of digital forensics | OpenLearn - Open University</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">www.open.edu › openlearn › digital-forensics › content-section-4</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">Some of these sub-disciplines are: Computer Forensics – the identification, preservation, collection, analysis and reporting on evidence found on computers, ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="/url?q=https://www.oxygenforensics.com/en/resources/what-is-digital-forensics/&sa=U&ved=2ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQFnoECA0QAg&usg=AOvVaw18r6LyoHkEtmCMVcNESGEK"><span class="CVA68e qXLe6d fuLhoc ZWRArf">What is Digital Forensics? History, Types, and Use Cases</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">www.oxygenforensics.com › Home › Resources</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc YVIcad">31 Aug 2023</span> <span class="fYyStc YVIcad"> · </span> <span class="fYyStc">Digital forensics, also known as computer or mobile forensics, deals with investigating and recovering digital evidence from electronic devices ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="/url?q=https://www.ensigninfosecurity.com/cybersecurity-101/what-is-digital-forensics&sa=U&ved=2ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQFnoECAkQAg&usg=AOvVaw1rwUtXLD4t_2N0NvhPQIsf"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Digital Forensics: Key Concepts, Stages and Techniques</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">www.ensigninfosecurity.com › cybersecurity-101 › what-is-digital-forensics</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc YVIcad">1 Aug 2024</span> <span class="fYyStc YVIcad"> · </span> <span class="fYyStc">Types of Digital Forensics · Computer Forensics: Involves the recovery and analysis of data stored on computers, laptops, servers, and other ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="/url?q=https://www.salvationdata.com/knowledge/types-of-digital-forensics/&sa=U&ved=2ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQFnoECAYQAg&usg=AOvVaw1TnCA_QPWWapPcigx-vg8b"><span class="CVA68e qXLe6d fuLhoc ZWRArf">What are the 4 common types of digital forensics in 2024?</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">www.salvationdata.com › knowledge › types-of-digital-forensics</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc YVIcad">30 May 2023</span> <span class="fYyStc YVIcad"> · </span> <span class="fYyStc">Database Forensics. This type of digital forensics is related to databases, including their metadata. The cached information may also exist in ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="/url?q=https://www.exterro.com/basics-of-digital-forensics/chapter-3-the-three-types-of-digital-forensic-investigations&sa=U&ved=2ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQFnoECAcQAg&usg=AOvVaw1MbmZCrJM-Hk0N9sXmrnAa"><span class="CVA68e qXLe6d fuLhoc ZWRArf">CHAPTER 3 - THE THREE TYPES OF DIGITAL FORENSIC ... - Exterro</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">www.exterro.com › basics-of-digital-forensics › chapter-3-the-three-types-...</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">There are three main types of digital forensic investigations: criminal investigations, civil litigation, and internal investigations—but of course this is ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="/url?q=https://intellipaat.com/blog/digital-forensics/&sa=U&ved=2ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQFnoECAUQAg&usg=AOvVaw3pEm8dzzl86E5CmV4R8Klz"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Digital Forensics - Types, Process, and Challenges - Intellipaat</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">intellipaat.com › Blog</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc YVIcad">6 days ago</span> <span class="fYyStc YVIcad"> · </span> <span class="fYyStc">Network Forensics This type of Digital Forensics results in monitoring, analysis, and preservation of network traffic to identify cyber ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="/url?q=https://www.geeksforgeeks.org/types-of-computer-forensics/&sa=U&ved=2ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQFnoECAgQAg&usg=AOvVaw3Oj0pOFbvQhYfVUyl-1ZJf"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Types of Computer Forensics - GeeksforGeeks</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">www.geeksforgeeks.org › types-of-computer-forensics</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc YVIcad">4 Apr 2024</span> <span class="fYyStc YVIcad"> · </span> <span class="fYyStc">Types of Computer Forensics · Disk Forensics: · Network Forensics: · Database Forensics: · Memory Forensics: · Mobile Forensics: · Malware ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="/url?q=https://www.simplilearn.com/what-is-digital-forensics-article&sa=U&ved=2ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQFnoECAoQAg&usg=AOvVaw38-0bzLQyOcK7qF51Bbtgg"><span class="CVA68e qXLe6d fuLhoc ZWRArf">What Is Digital Forensics? - Simplilearn.com</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">www.simplilearn.com › Resources › Cyber Security</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc YVIcad">16 Nov 2024</span> <span class="fYyStc YVIcad"> · </span> <span class="fYyStc">Digital forensics is the process of storing, analyzing, retrieving, and preserving electronic data that may be useful in an investigation.</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="/url?q=https://www.guru99.com/digital-forensics.html&sa=U&ved=2ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQFnoECAsQAg&usg=AOvVaw2qipaW8YRzBEdbRO-8tXZX"><span class="CVA68e qXLe6d fuLhoc ZWRArf">What is Digital Forensics? History, Process, Types, Challenges</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">www.guru99.com › Ethical Hacking › Cyber Security</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc YVIcad">10 Jul 2024</span> <span class="fYyStc YVIcad"> · </span> <span class="fYyStc">Summary. Different types of Digital Forensics are Disk Forensics, Network Forensics, Wireless Forensics, Database Forensics, Malware Forensics, ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div> <span class="qXLe6d x3G5ab"> <span class="dloBPe fYyStc">Related searches</span> </span> </div><div><table class="VeHcBf"><tbody><tr><td><a class="ZWRArf" href="/search?sca_esv=c744cb070de47b7e&q=digital+forensics+tools&sa=X&ved=2ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQ1QJ6BAgEEAE"><span class="CVA68e qXLe6d"> <span class="qXLe6d FrIlee"> <span class="fYyStc">digital forensics tools</span> </span> </span></a></td><td><div class="MGsU1d"><a href="/search?sca_esv=c744cb070de47b7e&q=digital+forensics+tools"><div class="FrIlee">></div></a></div></td></tr></tbody></table></div><div><table class="VeHcBf"><tbody><tr><td><a class="ZWRArf" href="/search?sca_esv=c744cb070de47b7e&q=digital+forensics+examples&sa=X&ved=2ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQ1QJ6BAgEEAI"><span class="CVA68e qXLe6d"> <span class="qXLe6d FrIlee"> <span class="fYyStc">digital forensics examples</span> </span> </span></a></td><td><div class="MGsU1d"><a href="/search?sca_esv=c744cb070de47b7e&q=digital+forensics+examples"><div class="FrIlee">></div></a></div></td></tr></tbody></table></div><div><table class="VeHcBf"><tbody><tr><td><a class="ZWRArf" href="/search?sca_esv=c744cb070de47b7e&q=digital+forensics+salary&sa=X&ved=2ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQ1QJ6BAgEEAM"><span class="CVA68e qXLe6d"> <span class="qXLe6d FrIlee"> <span class="fYyStc">digital forensics salary</span> </span> </span></a></td><td><div class="MGsU1d"><a href="/search?sca_esv=c744cb070de47b7e&q=digital+forensics+salary"><div class="FrIlee">></div></a></div></td></tr></tbody></table></div><div><table class="VeHcBf"><tbody><tr><td><a class="ZWRArf" href="/search?sca_esv=c744cb070de47b7e&q=digital+forensics+tools+and+techniques+pdf&sa=X&ved=2ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQ1QJ6BAgEEAQ"><span class="CVA68e qXLe6d"> <span class="qXLe6d FrIlee"> <span class="fYyStc">digital forensics tools and techniques pdf</span> </span> </span></a></td><td><div class="MGsU1d"><a href="/search?sca_esv=c744cb070de47b7e&q=digital+forensics+tools+and+techniques+pdf"><div class="FrIlee">></div></a></div></td></tr></tbody></table></div><div><table class="VeHcBf"><tbody><tr><td><a class="ZWRArf" href="/search?sca_esv=c744cb070de47b7e&q=digital+forensic+process&sa=X&ved=2ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQ1QJ6BAgEEAU"><span class="CVA68e qXLe6d"> <span class="qXLe6d FrIlee"> <span class="fYyStc">digital forensic process</span> </span> </span></a></td><td><div class="MGsU1d"><a href="/search?sca_esv=c744cb070de47b7e&q=digital+forensic+process"><div class="FrIlee">></div></a></div></td></tr></tbody></table></div><div><table class="VeHcBf"><tbody><tr><td><a class="ZWRArf" href="/search?sca_esv=c744cb070de47b7e&q=digital+forensics+course&sa=X&ved=2ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQ1QJ6BAgEEAY"><span class="CVA68e qXLe6d"> <span class="qXLe6d FrIlee"> <span class="fYyStc">digital forensics course</span> </span> </span></a></td><td><div class="MGsU1d"><a href="/search?sca_esv=c744cb070de47b7e&q=digital+forensics+course"><div class="FrIlee">></div></a></div></td></tr></tbody></table></div><div><table class="VeHcBf"><tbody><tr><td><a class="ZWRArf" href="/search?sca_esv=c744cb070de47b7e&q=digital+forensics+investigation&sa=X&ved=2ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQ1QJ6BAgEEAc"><span class="CVA68e qXLe6d"> <span class="qXLe6d FrIlee"> <span class="fYyStc">digital forensics investigation</span> </span> </span></a></td><td><div class="MGsU1d"><a href="/search?sca_esv=c744cb070de47b7e&q=digital+forensics+investigation"><div class="FrIlee">></div></a></div></td></tr></tbody></table></div><div><table class="VeHcBf"><tbody><tr><td><a class="ZWRArf" href="/search?sca_esv=c744cb070de47b7e&q=digital+forensics+pdf&sa=X&ved=2ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQ1QJ6BAgEEAg"><span class="CVA68e qXLe6d"> <span class="qXLe6d FrIlee"> <span class="fYyStc">digital forensics pdf</span> </span> </span></a></td><td><div class="MGsU1d"><a href="/search?sca_esv=c744cb070de47b7e&q=digital+forensics+pdf"><div class="FrIlee">></div></a></div></td></tr></tbody></table></div></div></div> </div> </div></div><table class="uZgmoc"><tbody><td><a class="frGj1b" href="/search?q=types+of+digital+forensics&sca_esv=c744cb070de47b7e&ei=PpFEZ-imFrqd4-EP1J_1iA4&start=10&sa=N">Next ></a></td></tbody></table><br/><div class="TuS8Ad" data-ved="0ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQpyoIQQ"><style>.VYM29{font-weight:bold}</style><div class="HddGcc" align="center"><span class="VYM29">Singapore</span><span> - </span><span>From your IP address</span><span> - </span><a href="/url?q=https://support.google.com/websearch%3Fp%3Dws_settings_location%26hl%3Den-SG&opi=89978449&sa=U&ved=0ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQty4IQg&usg=AOvVaw1XlF_SUtLPiP_2ho-i-43V">Learn more</a></div><div align="center"><a class="rEM8G" href="/url?q=https://accounts.google.com/ServiceLogin%3Fcontinue%3Dhttps://www.google.com/search%253Fsca_esv%253Dc744cb070de47b7e%2526q%253Dtypes%252Bof%252Bdigital%252Bforensics%26hl%3Den&opi=89978449&sa=U&ved=0ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQxs8CCEM&usg=AOvVaw3WSN58a2dpFik9XQd_Na1-">Sign in</a></div><div><table class="bookcf"><tbody class="InWNIe"><tr><td><a class="rEM8G" href="https://www.google.com/preferences?hl=en&sa=X&ved=0ahUKEwjovfeJ4PeJAxW6zjgGHdRPHeEQv5YECEQ">Settings</a></td><td><a class="rEM8G" href="https://www.google.com/intl/en_sg/policies/privacy/">Privacy</a></td><td><a class="rEM8G" href="https://www.google.com/intl/en_sg/policies/terms/">Terms</a></td></tr></tbody></table></div></div><div> </div></body></html>