Cyber Security and Digital Forensics

2022 ◽  
2008 ◽  
pp. 2366-2387
Author(s):  
Warren Wylupski ◽  
David R. Champion ◽  
Zachary Grant

One of the emerging issues in the field of digital crime and digital forensics is corporate preparedness in dealing with attacks on computer network security. Security attacks and breaches of an organization’s computer network can result in the compromise of confidential data, loss of customer confidence, poor public relations, disruption of business, and severe financial loss. Furthermore, loss of organizational data can present a number of criminal threats, including extortion, blackmail, identity theft, technology theft, and even hazards to national security. This chapter first examines the preparedness and response of three southwestern companies to their own specific threats to corporate cyber-security. Secondly, this chapter suggests that by developing an effective security policy focusing on incident detection and response, a company can minimize the damage caused by these attacks, while simultaneously strengthening the existing system and forensic processes against future attacks. Advances in digital forensics and its supporting technology, including intrusion detection, intrusion prevention, and application control, will be imperative to maintain network security in the future.


Author(s):  
Warren Wylupski ◽  
David R. Champion ◽  
Zachary Grant

One of the emerging issues in the field of digital crime and digital forensics is corporate preparedness in dealing with attacks on computer network security. Security attacks and breaches of an organization’s computer network can result in the compromise of confidential data, loss of customer confidence, poor public relations, disruption of business, and severe financial loss. Furthermore, loss of organizational data can present a number of criminal threats, including extortion, blackmail, identity theft, technology theft, and even hazards to national security. This chapter first examines the preparedness and response of three southwestern companies to their own specific threats to corporate cyber-security. Secondly, this chapter suggests that by developing an effective security policy focusing on incident detection and response, a company can minimize the damage caused by these attacks, while simultaneously strengthening the existing system and forensic processes against future attacks. Advances in digital forensics and its supporting technology, including intrusion detection, intrusion prevention, and application control, will be imperative to maintain network security in the future.


2018 ◽  
Vol 1 (1) ◽  
pp. 13-18
Author(s):  
Livia Roşu ◽  
◽  
Georgiana Subaşu ◽  

2021 ◽  
Author(s):  
Mohammed I. Alghamdi

The rapid technological advancement has led the entire world to shift towards digital domain. However, this transition has also result in the emergence of cybercrimes and security breach incidents that threatens the privacy and security of the users. Therefore, this chapter aimed at examining the use of digital forensics in countering cybercrimes, which has been a critical breakthrough in cybersecurity. The chapter has analyzed the most recent trends in digital forensics, which include cloud forensics, social media forensics, and IoT forensics. These technologies are helping the cybersecurity professionals to use the digital traces left by the data storage and processing to keep data safe, while identifying the cybercriminals. However, the research has also observed specific threats to digital forensics, which include technical, operational and personnel-related challenges. The high complexity of these systems, large volume of data, chain of custody, the integrity of personnel, and the validity and accuracy of digital forensics are major threats to its large-scale use. Nevertheless, the chapter has also observed the use of USB forensics, intrusion detection and artificial intelligence as major opportunities for digital forensics that can make the processes easier, efficient, and safe.


Author(s):  
Abhishek Kumar Pandey ◽  
Ashutosh Kumar Tripathi ◽  
Gayatri Kapil ◽  
Virendra Singh ◽  
Mohd. Waris Khan ◽  
...  

The digital age has undoubtedly revolutionized the life and work of people. However, this sheen of digital technology remains challenged by the spate of cybercrimes that imperil the privacy and data of the end-users. The alarming rise in cybercrimes has become a major concern for cyber specialists. In this grim context, digital forensics has emerged as a boon for cyber specialists because it has proven to be an effective means for investigating cyber-attacks. This chapter reviews the existing tools and approaches in the field of digital forensics in cybersecurity. This chapter also discusses the current challenges and problems that are faced by a forensic investigator. In addition, it enlists the different categories of digital forensics. The study concludes by underlining the importance and the need for extensive research in digital forensic tools.


2017 ◽  
Vol 22 ◽  
pp. 3-13 ◽  
Author(s):  
Zubair A. Baig ◽  
Patryk Szewczyk ◽  
Craig Valli ◽  
Priya Rabadia ◽  
Peter Hannay ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document