Cyber Forensics in Kerala

نویسنده

  • Arunima S Kumar
چکیده

Computers and mobile devices have created a niche for themselves in the digital communication stratosphere. With the advance of technology, the power of these devices has increased leaps and bounds. Due to this growing popularity, computers and mobile devices have plunged into criminal activities also. Drug dealers, rapists and murderers across the State have been caught based on the electronic devices they carry around. Cyber Forensics deals with the application of investigation and analysis techniques to gather and preserve evidence from a computing device in a method accepted by the court of law. Mobile Device forensics is an evolving form of cyber forensics. New models of mobile phones are released every few months and thus its usage has also increased tremendously – both for good and bad purposes. This scenario poses new challenges for forensic examiners because acquiring tamper-free data from a mobile device is of great importance in crime investigations. Such data resides at different locations in a mobile device such as handset memory, attached memory cards, call records, SMS, calendar entries, installed applications etc. This paper deals with the study of forensic tools used for investigation of cyber crime in Kerala. The paper discusses the capabilities and shortcomings of the forensic tools under study. An enhancement is proposed for the currently available tools, to make them a comprehensive set of tools with a set of features that combats a wide range of cyber and mobile device crimes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

Plethora of Cyber Forensics

As threats against digital assets have risen and there is necessitate exposing and eliminating hidden risks and threats. The ability of exposing is called “cyber forensics.” Cyber Penetrators have adopted more sophistical tools and tactics that endanger the operations of the global phenomena. These attackers are also using anti-forensic techniques to hide evidence of a cyber crime. Cyber forens...

متن کامل

Combating Against Anti-Forensics Aligned with E-mail Forensics

Knowledge on cyber forensics is increasing on par with the cyber crime incidents. Cyber criminals’ uses sophisticated technological knowledge and always they plan to escape from the clutches of law. This paper elaborates e-mail forensics and categories of anti-forensics that can be applicable to the email forensics. This paper elucidates the process of identifying such anti-forensics applied in...

متن کامل

Trainees' Competency Based-Assessment Methods in Cyber Forensics Education or Training Programmes - A Review

Cyber Forensics Investigations training or education is relatively new. The nature of Cyber Forensics is multidisciplinary, which enforces proliferations to diverse training programmes, from a handful of day's workshop to Masters Degree in Cyber Forensics. Thus, researchers found that the world lacks experts of Cyber Forensics due to some factors. Consequently, this paper focuses to analyze the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014