Abstract | Today’s digital forensic investigation centre towards data collection, preservation, extraction, evidence searching, reconstructions of relevant user input analysis, and evidence presentation of user involvement in business applications. In this research, stages of digital investigation are applied on various experiments carried out on user input information. A typical business environment of security incidence was investigated on use case element of business applications. In this paper, design methodology discussed how images were captured and processed for investigation. The extraction procedure was formulated at interval and dump memory of the extracted information determines artifacts of user evidence per time of user activities on sample memory application. Validated extracted information was analysed and as reconstructed, presented in quantitative assessment of user input, on sample use cases of business applications of MS Outlook and Adobe. The research investigation uncovers how user input information are stored and recovered from the application memory and for use as evidence. |
---|