ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: Asian Journal of Natural and Applied Sciences (Vol.5, No. 3)

Publication Date:

Authors : ;

Page : 13-20

Keywords : Cyber Forensic; Cyber Crime; Cyber Terrorism; Security Forensic;

Source : Downloadexternal Find it from : Google Scholarexternal


Nowadays in the developed countries, most of the governmental and private organizations use technology for running their activities. Using Internet, is becoming part of daily routine for running the organizations. However, despite all the benefits of information technology systems and internet, there are big risks on the users. Various states and even terrorist groups have benefited from technology for obtaining intelligence data, recruitment, propaganda, and attacking their opponents. Cyber forensics is legally admissible way of collecting, analyzing and reporting on digital data. It can be used in the detection and prevention of crime and finding the digital stored evidence of the crime. Discussion and presenting forensic models and areas in which they are useful and could be augmented is important to reach the goal of this research. This paper presents some cyber forensic methodologies of science of capturing, processing and investigating data from computers to discover evidence that is acceptable in court of law. The evidence samples is founded in the hard disks, file systems, deleted files, partitions with the windows forensics techniques, investigating Volatile Data and non-Volatile data. Then finding the evidence of been a part in the Cyber crime will be presented. Hence, cyber terrorism system emerges which can destroy its opponent systems and all the systems, associated with it. Especially in countries and regions lack a national security agency capable of finding public information. In a country like Iraq there is no any organization responsible for finding cyber attackers. User and administrators of the systems have to find digital evidence by themselves to prove identity of an attacker. Security forensics, the application of investigation and analysis techniques, preserve evidence for cyber crime which is very important to detect cyber criminals in those regions. Thus provides digital evidence which helps in revealing identity of hidden attackers.

Last modified: 2017-07-21 22:08:40