Audit Tools for Cyber Crime Investigation
نویسنده
چکیده
In current scenario cyber crime is increasing very fast as the technology is growing very rapidly. So the cyber crime investigation is becoming a very complicated task to do without a proper framework. There is wide range of different types of cyber crime today. Solution of each case requires a very complicated task. The digital revolution has created the need of new laws, digital investigators, forensic methods, forensic tools and techniques, to enable the digital evidence presentable in court of law. To date, the digital investigation process has been directed by technology being investigated and the available tools. In this research paper , vari ous technical and doc umentati on tools are analyzed and disc ussed which are used in Cyber Crime Investigation.
منابع مشابه
New Model for Cyber Crime Investigation Procedure
In this paper, we presented a new model for cyber crime investigation procedure which is as follows: readiness phase, consulting with profiler, cyber crime classification and investigation priority decision, damaged cyber crime scene investigation, analysis by crime profiler, suspects tracking, injurer cyber crime scene investigation, suspect summon, cyber crime logical reconstruction, writing ...
متن کاملCyber Forensics Ontology for Cyber Criminal Investigation
We developed Cyber Forensics Ontology for the criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data and cyber sp...
متن کاملAn Investigation Into Computer Forensic Tools
Cyber-crime has reached unprecedented proportions in this day and age. In addition, the internet has created a world with seemingly no barriers while making a countless number of tools available to the cyber-criminal. In light of this, Computer Forensic Specialists employ state-of-the-art tools and methodologies in the extraction and analysis of data from storage devices used at the digital cri...
متن کاملSoTE: Strategy of Triple-E on solving Trojan defense in Cyber-crime cases
Cyber activity has become an essential part of the general public’s everyday life. The hacking threats of Cyber-crime are becoming more sophisticated as internet communication services are more popular. To further confirm the final finding of Cyber-crime, this study proposes three analytical tools to clarify the Cyber-crime issues by means of Ideal Log, M-N model and MDFA (Multi-faceted Digital...
متن کاملCyber Forensics in Kerala
Computers and mobile devices have created a niche for themselves in the digital communication stratosphere. With the advance of technology, the power of these devices has increased leaps and bounds. Due to this growing popularity, computers and mobile devices have plunged into criminal activities also. Drug dealers, rapists and murderers across the State have been caught based on the electronic...
متن کامل