scholarly journals Review: Digital Forensics

Author(s):  
Anand Desai ◽  
Siddhesh Masurkar

With the advancement and growing science of technology and the internet, the threats to data and digital devices have been increasing due to hackers and data invigilators. So the branch of DIGITAL FORENSIC has been set up for the investigation of the cybercrimes committed through the means of the internet, network, digital devices, etc. There are millions of internet users worldwide who are targeted by these hackers, and they lose their data to these data thieves unknowingly. This data can be misused by cybercriminals for various purposes. This branch of forensic science tracks and investigates these cyber criminals and finds the appropriate evidence against them. This paper surveys the work of this branch gives you a brief explanation about the various sub-branches, job opportunities available, and several tools used in this investigation process.

2021 ◽  
pp. 249-258
Author(s):  
Talib M. Jawad Abbas ◽  
Ahmed Salem Abdulmajeed

Digital forensic is part of forensic science that implicitly covers crime related to computer and other digital devices. It‟s being for a while that academic studies are interested in digital forensics. The researchers aim to find out a discipline based on scientific structures that defines a model reflecting their observations. This paper suggests a model to improve the whole investigation process and obtaining an accurate and complete evidence and adopts securing the digital evidence by cryptography algorithms presenting a reliable evidence in a court of law. This paper presents the main and basic concepts of the frameworks and models used in digital forensics investigation.


Author(s):  
Gregory H. Carlton ◽  
Gary C. Kessler

The study and practice of forensic science comprises many distinct areas that range from behavioral to biological to physical and to digital matters, and in each area forensic science is utilized to obtain evidence that will be admissible within the legal framework. This article focuses on inconsistencies within the accepted methodology of digital forensics when comparing the current best practices of mobile digital devices and traditional computer devices. Here the authors raise the awareness of this disconnect in methodology, and they posit that some specific tasks within the traditional best practices of digital forensic science are artifacts of ritual rather than based on scientific requirements.


2020 ◽  
pp. 593-596
Author(s):  
Gregory H. Carlton ◽  
Gary C. Kessler

The study and practice of forensic science comprises many distinct areas that range from behavioral to biological to physical and to digital matters, and in each area forensic science is utilized to obtain evidence that will be admissible within the legal framework. This article focuses on inconsistencies within the accepted methodology of digital forensics when comparing the current best practices of mobile digital devices and traditional computer devices. Here the authors raise the awareness of this disconnect in methodology, and they posit that some specific tasks within the traditional best practices of digital forensic science are artifacts of ritual rather than based on scientific requirements.


Author(s):  
Gregory H. Carlton ◽  
Gary C. Kessler

The study and practice of forensic science comprises many distinct areas that range from behavioral to biological to physical and to digital matters, and in each area forensic science is utilized to obtain evidence that will be admissible within the legal framework. This article focuses on inconsistencies within the accepted methodology of digital forensics when comparing the current best practices of mobile digital devices and traditional computer devices. Here the authors raise the awareness of this disconnect in methodology, and they posit that some specific tasks within the traditional best practices of digital forensic science are artifacts of ritual rather than based on scientific requirements.


2019 ◽  
Vol 10 (03) ◽  
pp. 114-121
Author(s):  
Armanto Armanto

ABSTRACT The problem in this study is that more and more internet users in the Bina Insan Lubuklinggau University building specifically the Faculty of Computer internet connection often experience problems, the internet network is still unstable, and ways to divide internet access points in the Computer Faculty. This study uses data collection methods by observing and recording directly at the research site (Observation), conducting question and answer directly to the source (Interview), and documentation by reading literature books. The results showed that the internet is often experiencing constraints and unstable internet networks and ways to divide internet access points at the Computer Faculty of the University of Bina Insan Lubuklinggau by using Policy Base Routing and Failover Implementation using a Mikrotik Router. It can be concluded that the internet network connection is stable and shows the results of the distribution of internet access points at the Faculty of Computer Bina Insan Lubuklinggau. Keywords: Mikrotik, Policy Base Routing, Failover


2020 ◽  
Vol 19 (1) ◽  
pp. 73
Author(s):  
Rama Beta Herdian ◽  
Lie Jasa ◽  
Linawati Linawati

User behavior prediction on TCP / IP networks is very possible because each data packet is passed through a router that can be analyzed and then classified into several behavior types from commonly performed activities by internet users. User-behavior predictions developed using artificial neural networks (ANN), which can show accurate results in predicting the bandwidth used by users in the next few days. Predicting results helps network administrators to provide a more accurate picture of user behavior patterns in the future, where the Personnel Service Application System (SAPK) which becomes the user behavior internet priority it's only utilized network resources at 26.8% of the total internet network resources available. The ANN that was developed also showed that 40.3% of network resources were used more by streaming video activities and 37% were used for streaming audio activities. With the prediction result, the network administrator rearranges the internet network resources distribution by applying a new prediction results pattern. This study conclusively shows that user behavior with streaming video activities is the largest bandwidth user and needs to get special attention on the internet network at the Regional X National Civil Service Agency Office.


Author(s):  
Ludwig Englbrecht ◽  
Günther Pernul

Stricter policies, laws and regulations for companies on the handling of private information arise challenges in the handling of data for Digital Forensics investigations. This paper describes an approach that can meet necessary requirements to conduct a privacy-aware Digital Forensics investigation in an enterprise. The core of our approach is an entropy-based identification algorithm to detect specific patterns within files that can indicate non-private information. Therefore we combine various approaches with the goal to detect and exclude files containing sensitive information systematically. This privacy-preserving method can be integrated into a Digital Forensics examination process to prepare an image which is free from private as well as critical information for the investigation. We implemented and evaluated our approach with a prototype. The approach demonstrates that investigations in enterprises can be supported and improved by adapting existing algorithms and processes from related subject areas to implement privacy-preserving measures into an investigation process.


2021 ◽  
Vol 13 (6) ◽  
pp. 0-0

The extensive use of digital devices by individuals generates a significant amount of private data which creates challenges for investigation agencies to protect suspects' privacy. Existing digital forensics models illustrate the steps and actions to be followed during an investigation, but most of them are inadequate to investigate a crime with all the processes in an integrated manner and do not protect suspect's privacy. In this paper, we propose the development of a privacy-preserving digital forensics (P2DF) framework, which facilitates investigation through maintaining confidentiality of the suspects through various privacy standards and policies. It includes an access control mechanism which allows only authorized investigators to access private data and identified digital evidences. It is also equipped with a digital evidence preservation mechanism which could be helpful for the court of law to ensure the authenticity, confidentiality, and reliability of the evidences, and to verify whether privacy of the suspect was preserved during the investigation process.


2021 ◽  
Vol 7 (2) ◽  
pp. 125
Author(s):  
Anisa Nur Hidayati ◽  
Imam Riadi ◽  
Erika Ramadhani ◽  
Sarah Ulfah Al Amany

The increase in the number of internet users in Indonesia as much as 175.4 million as recorded in the Datareportal.com report and 4.83 billion globally, impact the increase in the number of cyber fraud cases. Data states that 96% of fraud cases are not resolved due to fraud methods carried out online and make it difficult for legal officers to obtain evidence. Previous fraud investigation research mainly focused on fraud detection, so this research focuses on submitting a framework for investigating cyber fraud cases. The cyber fraud case requires a new framework for investigation because in this fraud case, there is digital evidence that is very prone to be damaged, lost, or modified, which makes this case unsolved. This research aims to develop a framework that is expected to help auditors to uncover cases of cyber fraud so that resolved cyber fraud cases can increase. The method used in making this framework uses Jabareen's conceptual framework development method, which consists of 6 stages, namely, Mapping the selected data source, extensive reading and categorizing of the chosen data, Identifying and naming objects, Deconstructing and categorizing the concept, Integrating concept, Synthesis, resynthesis. And make it all sense. The framework for cyber fraud investigation uses 22 digital forensic frameworks and eight frameworks for fraud audit investigations. The results of developing a framework using the Jabareen method resulted in 8 stages, integrating various concepts selected from digital forensics and fraud audits. Evaluation of framework development was carried out by giving limited questionnaires to practitioners and academics, which produced 89% for the feasibility value and needs of the framework and 67% there is no need for changes to the framework being developed.


2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
Nadiya El Kamel ◽  
Mohamed Eddabbah ◽  
Youssef Lmoumen ◽  
Raja Touahni

The development of Internet and social media contributes to multiplying the data produced on the Internet and the connected nodes, but the default installation and the configuration of variety of software systems represent some security holes and shortcomings, while the majority of Internet users have not really set up safety awareness, leading to huge security risks. With the development of network attack techniques, every host on the Internet has become the target of attacks. Therefore, the network information security cannot be ignored as a problem. To deal with 0-day and future attacks, the honeypot technique can be used not only passively as an information system, but also to reinforce the traditional defense systems against future attacks. In this paper, we present an introduction of machine learning and honeypot systems, and based on these technologies, we design a smart agent for cyber-attack prevention and prediction.


Sign in / Sign up

Export Citation Format

Share Document