FORENSIC TOOLS FOR INVESTIGATING CYBER CRIMES

Journal Title: ASIAN JOURNAL OF NATURAL & APPLIED SCIENCES - Year 2016, Vol 5, Issue 3

Abstract

Nowadays in the developed countries, most of the governmental and private organizations use technology for running their activities. Using Internet, is becoming part of daily routine for running the organizations. However, despite all the benefits of information technology systems and internet, there are big risks on the users. Various states and even terrorist groups have benefited from technology for obtaining intelligence data, recruitment, propaganda, and attacking their opponents. Cyber forensics is legally admissible way of collecting, analyzing and reporting on digital data. It can be used in the detection and prevention of crime and finding the digital stored evidence of the crime. Discussion and presenting forensic models and areas in which they are useful and could be augmented is important to reach the goal of this research. This paper presents some cyber forensic methodologies of science of capturing, processing and investigating data from computers to discover evidence that is acceptable in court of law. The evidence samples is founded in the hard disks, file systems, deleted files, partitions with the windows forensics techniques, investigating Volatile Data and non-Volatile data. Then finding the evidence of been a part in the Cyber crime will be presented. Hence, cyber terrorism system emerges which can destroy its opponent systems and all the systems, associated with it. Especially in countries and regions lack a national security agency capable of finding public information. In a country like Iraq there is no any organization responsible for finding cyber attackers. User and administrators of the systems have to find digital evidence by themselves to prove identity of an attacker. Security forensics, the application of investigation and analysis techniques, preserve evidence for cyber crime which is very important to detect cyber criminals in those regions. Thus provides digital evidence which helps in revealing identity of hidden attackers.

Authors and Affiliations

Ala Berzinji

Keywords

Related Articles

Spatial Variation in Urban Air Pollution: A GIS Based Approach in Faisalabad, Pakistan

Air pollution is becoming more acute problem across the world as well in the major cities of Pakistan. Faisalabad is the main industrial hub and the 3rd largest city of Pakistan. Where situation is aggravating day by day...

 AGE AND GENDER AS DETERMINANTS OF ACADEMIC ACHIEVEMENTS IN COLLEGE MATHEMATICS

 Mathematics Education occupies a central position to all disciplines. This study considered age and gender as determinants of academic achievement (CGPA) of Mathematics students. The study used thirty eight (38) fe...

Effects of Supplementing Different Levels of Vitamin A to Aflatoxin B1 Contaminated Diets on the Performance of Broiler Chickens

This study was conducted to evaluate the effects of supplementing different levels of vitamin A on the performance of broiler chickens fed on diets contaminated with aflatoxin B1 (AFB1) for 42 days. Conducted as a Comple...

 MODELS FOR DSP APPLICATIONS ON TILED MANY-CORE ARCHITECTURES

 Many-core processors can now be used as an alternative hardware platform for implementing embedded media devices. However, a lack of generic tools for application development may hamper their rate of adoption by...

MULTI-LEVEL WINDOWS EXPLOITATION USING LINUX OPERATING SYSTEM

Hacking is the art of exploiting computers to get access to otherwise unauthorized information. Now days, the world is using many modern IT systems to gather, store, and manipulate important information. Besides that, it...

Download PDF file
  • EP ID EP204434
  • DOI -
  • Views 115
  • Downloads 0

How To Cite

Ala Berzinji (2016). FORENSIC TOOLS FOR INVESTIGATING CYBER CRIMES. ASIAN JOURNAL OF NATURAL & APPLIED SCIENCES, 5(3), 13-20. https://europub.co.uk/articles/-A-204434