FORENSIC TOOLS FOR INVESTIGATING CYBER CRIMES

Journal Title: ASIAN JOURNAL OF NATURAL & APPLIED SCIENCES - Year 2016, Vol 5, Issue 3

Abstract

Nowadays in the developed countries, most of the governmental and private organizations use technology for running their activities. Using Internet, is becoming part of daily routine for running the organizations. However, despite all the benefits of information technology systems and internet, there are big risks on the users. Various states and even terrorist groups have benefited from technology for obtaining intelligence data, recruitment, propaganda, and attacking their opponents. Cyber forensics is legally admissible way of collecting, analyzing and reporting on digital data. It can be used in the detection and prevention of crime and finding the digital stored evidence of the crime. Discussion and presenting forensic models and areas in which they are useful and could be augmented is important to reach the goal of this research. This paper presents some cyber forensic methodologies of science of capturing, processing and investigating data from computers to discover evidence that is acceptable in court of law. The evidence samples is founded in the hard disks, file systems, deleted files, partitions with the windows forensics techniques, investigating Volatile Data and non-Volatile data. Then finding the evidence of been a part in the Cyber crime will be presented. Hence, cyber terrorism system emerges which can destroy its opponent systems and all the systems, associated with it. Especially in countries and regions lack a national security agency capable of finding public information. In a country like Iraq there is no any organization responsible for finding cyber attackers. User and administrators of the systems have to find digital evidence by themselves to prove identity of an attacker. Security forensics, the application of investigation and analysis techniques, preserve evidence for cyber crime which is very important to detect cyber criminals in those regions. Thus provides digital evidence which helps in revealing identity of hidden attackers.

Authors and Affiliations

Ala Berzinji

Keywords

Related Articles

  THE EFFECT OF INVOLVING MORE DERIVATIVE PROPERTIES, ON THE ACCURACY OF AN IMPLICIT ONE-STEP METHOD

  This work describes the development of a class of implicit one-step multi-derivative methods of the form; n j i j ij j l i i j n j y h β y + = = = ∑ ∑ + = ∑ 1 0 1 0 1 α ’ 1 α1 = + with lo...

 TEMPORAL VARIATION IN PERENNIAL CASH CROPS PRODUCTION IN ONDO STATE, NIGERIA

 Tree crops are the predominant agricultural produce from Ondo State but their production quantity over years vary from one crop to the other. Annual production of four important perennial cash crops (cocoa, rubbe...

 INFORMATION TECHNOLOGY AND ADVANCE COMPUTING AND THEIR INTERACTION FOR HEALTHY EDUCATION, TEACHING AND LEARNING: THE IKM APPROACHES

 IT and computing technologies really changes the entire world of information management, more clearly the information transfer cycle. Today with the help of computing and IT education and educational activities n...

Factors Predicting the Outcome of Trial of Labor After Prior Caesarean Section in the Gynecology-Obstetrics Service of the Provincial Hospital Cherif Idrissi, Kenitra, Morocco

The aim is to find out whether the trial of labor after prior caesarean section increases the risk of rupture and whether it has an influence on the foetal and maternal prognosis. A retrospective study of 224 cases of t...

 DIURETIC POTENTIAL OF CAPSICUM FRUTESCENS LINN., CORCHORUS OLITURIUS LINN., AND ABELMOSCHUS ESCULENTUS LINN.

 This experimental study was explored to determine the diuretic property of C. frutescens L., C. oliturius L., and A. esculentus L. Specifically, it sought to determine the diuretic efficacy of the different plant...

Download PDF file
  • EP ID EP204434
  • DOI -
  • Views 89
  • Downloads 0

How To Cite

Ala Berzinji (2016). FORENSIC TOOLS FOR INVESTIGATING CYBER CRIMES. ASIAN JOURNAL OF NATURAL & APPLIED SCIENCES, 5(3), 13-20. https://europub.co.uk/articles/-A-204434