FORENSIC TOOLS FOR INVESTIGATING CYBER CRIMES
Journal: Asian Journal of Natural and Applied Sciences (Vol.5, No. 3)Publication Date: 2016-09-15
Authors : Ala Berzinji;
Page : 13-20
Keywords : Cyber Forensic; Cyber Crime; Cyber Terrorism; Security Forensic;
Abstract
Nowadays in the developed countries, most of the governmental and private organizations use technology for running their activities. Using Internet, is becoming part of daily routine for running the organizations. However, despite all the benefits of information technology systems and internet, there are big risks on the users. Various states and even terrorist groups have benefited from technology for obtaining intelligence data, recruitment, propaganda, and attacking their opponents. Cyber forensics is legally admissible way of collecting, analyzing and reporting on digital data. It can be used in the detection and prevention of crime and finding the digital stored evidence of the crime. Discussion and presenting forensic models and areas in which they are useful and could be augmented is important to reach the goal of this research. This paper presents some cyber forensic methodologies of science of capturing, processing and investigating data from computers to discover evidence that is acceptable in court of law. The evidence samples is founded in the hard disks, file systems, deleted files, partitions with the windows forensics techniques, investigating Volatile Data and non-Volatile data. Then finding the evidence of been a part in the Cyber crime will be presented. Hence, cyber terrorism system emerges which can destroy its opponent systems and all the systems, associated with it. Especially in countries and regions lack a national security agency capable of finding public information. In a country like Iraq there is no any organization responsible for finding cyber attackers. User and administrators of the systems have to find digital evidence by themselves to prove identity of an attacker. Security forensics, the application of investigation and analysis techniques, preserve evidence for cyber crime which is very important to detect cyber criminals in those regions. Thus provides digital evidence which helps in revealing identity of hidden attackers.
Other Latest Articles
- THE CHANGES IN THE UTERUS OF OVAREICTOMIZED MICE IN RESPONSE TO PLUMERIA ACUMINATA AIT STEM EXTRACT
- COMPOSITION EFFECTS OF Al2O3 ON FTIR AND DTA IN LITHIUM BORATE GLASSES
- VALIDATED RP-HPLC METHOD FOR DETERMINATION OF ENZALUTAMIDE IN BULK DRUG AND PHARMACEUTICAL DOSAGE FORM
- Self-Ligating Brackets: A Review
- UV SPECTROPHOTOMETRIC METHOD FOR SIMULTANEOUS ESTIMATION OF CHLORTHALIDONE AND NEBIVOLOL HYDROCHLORIDE IN THEIR COMBINED DOSAGE FORMS
Last modified: 2017-07-21 22:08:40