Examination of Cyber Crime in Special Reference of Non- Technical Attacks
Journal Title: International Journal of Forensic Sciences - Year 2017, Vol 2, Issue 1
Abstract
Cyber Forensics is a challenging and rapidly growing field of forensic Science. It involves collection and examination of electronic evidence. It appraises the damage to a computer or any network as a result of any electronic attack. It also recovers the lost informational data from such a system to chase a threat. The cyber attacks mainly are of two types: Technical Attacks and Non-Technical attacks. Technical attacks are those which were introduced by programming and coding. Whereas Non-technical attacks are those which can be attempted with the help of software and predefined programs. Nowadays most of the non technical attacks are being attempted by the young generation without knowing the consequences of such attacks. This paper seeks to introduce the fundamental technologies including tools and techniques used in commission of above discussed types of cyber attacks and it’s forensic analysis. Topics covered include type of non technical attacks, causes, technology of key logging software and devices technology. This also covers the phishing attacks, use of some spying software like Trojan, sniffer, and the legal and ethical aspects of computer forensics to combat and investigate such crimes. This paper serves as a conceptual study for introduction into the extensive and intricate area known as computer forensics that could be useful for investigative and law enforcement agencies.
Authors and Affiliations
Sarawagi K* and Srivastava A
Misdiagnosed Injuries of Unusual Gunshot Wounds in the Clinical Forensic Practice
Gunshot wounds are common in the forensic practice. The specific features of gunshot wounds usually make it easy to determine the entrance and exit wound. In some cases in the clinical practice, however, gunshot wounds...
Scrutiny and Comparison of Handwriting Characteristics in Questioned Guided Signatures with Standard Signature Samples
Signatures are the identity of individuals. Eventually, signatures can be used to prove authenticity of a person. Guided signatures are hereby the signatures that are executed by the individual, by the help of a guided...
Simulation
Simulation is basically an imitation, namely a model that imitates a real-world process or a system. Simulation has a few definitions such as: “The description of something by something else” or “Dealing with real things...
Crime Investigating Technique to Development of Invisible Fingerprints on Surfaces using Rock Phosphate Powder
There are several procedures available for the development of invisible fingerprints on different surfaces. This Research Study presents a Rock Phosphate powder are use which is simple for the development of Invisible f...
Determination of Sex of an Individual by Identifying SRY Gene through PCR Analysis of DNA Extracted From Incinerated Teeth-A Single Blind Pilot Study
Introduction: Sex determination using skeletal fragments presents a great difficulty to forensic investigators. The teeth are resistant to all conditions due to relatively high degree of physical and chemical resistance...