computer forensic
Recently Published Documents


TOTAL DOCUMENTS

146
(FIVE YEARS 26)

H-INDEX

10
(FIVE YEARS 1)

Author(s):  
Nabila Malik

Abstract: Software used to perform Cyber Crime are the most emerging subject in the field of Forensic Science. Today, the demand of computer and other electronic devices have increased. This creates an increase in Cyber crime and its awareness. This paper provides you vast information about methods of Cyber crime, Software used to perform cyber crime and a research study on them. In this paper you will also learn how can a software and its algorithm perform, what footprints your device left, what are the loopholes which help that software. This will help you for a better understanding of the software which were used to perform cyber crime and how can you prevent yourself from such activities. If you are a Forensic Expert than you will learn about the software tools which are used in computer forensic. I have analyzed many tools and I will share my study in this paper. After reading you will come to know how forensic science expert backup a hard drive, or how hackers steal your information.1 Keywords: Cybercrime, Hacking, Ethical hacking, Virus, Security, Cyber Security, Network Security.


Lex Russica ◽  
2021 ◽  
pp. 102-118
Author(s):  
E. R. Rossinskaya ◽  
I. A. Ryadovskiy

The paper considers the doctrine of information and computer forensic support of investigative and judicial actions tactics, which is part of the system of the private theory of information and computer support of forensic activity. The subject of the teaching is the laws of gathering, scrutinizing and applying computer information in the production of investigative and judicial actions. The objects are the tactics and technology of investigative and judicial actions. Based on the theoretical aspects of the teaching, the authors have developed the tactics and technology of non-verbal investigative actions in cases of computer crimes. Among these are inspection of the scene of the crime, search, seizure, investigative experiment, given the choice of tactical impact and making a tactical decision depending on the specifics of investigative situations in the conditions of tactical risk associated with possible counteraction to the investigation. The tactical and technological support for the production of the above-mentioned non-verbal investigative actions is developed taking into account the features of digital traces, which are characterized by a high speed of transformation, are easily destroyed and modified, can be represented by an almost infinite number of copies, are characterized by the impossibility of perception directly by the senses, but only with the use of special devices and programs for detection, fixation and preservation, are confirmed by control numbers (hash sums) or other data indicating their integrity. The basic principles of working with digital traces in the production of non-verbal investigative actions are determined. They are the preservation of digital traces unchanged at all stages of working with them; full reflection of all manipulations in the protocols of investigative actions; the exceptional importance of preparatory measures, including the selection of a specialist and the determination of his competence, the availability of the necessary equipment and software for working with digital traces. For each of the above-mentioned investigative actions in the investigation of computer crimes, tactical techniques and technological support for the most effective obtaining of criminally significant evidentiary and investigative information have been developed.


2021 ◽  
Vol 2 (4) ◽  
pp. 1189-1196
Author(s):  
I Putu Agus Eka Pratama

Data plays the important role, so that data recovery and data security be prioritized. Computer users often lose their data due to personal errors or by attacks. Digital forensics has one sub-field called computer forensic, which has an important role in the process of secure data recovery. USB Flashdisk as the most widely used storage media has a probability of data loss. It is necessary to do computer forensic actions, especially secure data recovery, on it so that it can restore data securely to other media while protecting it by giving privilege root. In this research, computer forensic testing the 2781 files of various data formats that were erased on a 32 GB USB flash drive using Photorec. The media for collecting data recovery results using an Intel computer, 2 GB RAM, 1.8 GHz processor, the Linux operating system Xubuntu 20.04. Testing is carried out following the test scenarios that have been designed, then observed, recorded, and analyzed. Photorec places recovery data in 6 recup_dir subdirectories. Test results and analysis of the test results show that Photorec is a reliable tool for computer forensic, especially secure data recovery because it can restore 100% of data, accompanied by privilege root for all data recovery results, so they cannot be changed and deleted by an end-user without granted access.


Author(s):  
Johan Jarlbrink

Computers and mobile phones are piling up in archives, libraries, and museums. What kind of objects are they, what can they tell us, and how can we approach them? The aim of this chapter is to exemplify what an investigation of a hard drive implicates, the methods needed to conduct it, and what kind of results we can get out of it. To focus the investigation, hard drives are approached as records of everyday media use. The chapter introduces a computer forensic method used as a media ethnographic tool. Computer forensics and media ethnography are rooted in different methodological traditions, but both take an interest in people’s routines and the way they do and organize things. The chapter argues that a hard drive represents a window into the history of new media: into time specific software, formats, and media use.


Author(s):  
M. Zelena

This article outlines current issues of research on computer traces in the investigation of crimes at the stage of pre-trial investigation related to illegal trafficking of narcotic drugs, psychotropic substances or their analogues. The main ways of conducting drug trafficking in Ukraine using modern information technologies, that is, using computer technology (mostly mobile devices, personal portable computers) and software products (programs for communicating by means of calls and messages through the Internet, Web browsers, etc.) on the World Wide Web are analyzed. Based on the analysis of research and publications of scientists as well as on the basis of empirical research during computer forensic investigations connected with investigation of illegal distribution of narcotic drugs, methods of illicit goods distribution on the Internet along with methods for investigating computer technologies, which directly relate to drug trafficking using modern information technologies, has been considered. Types of data that can be extracted using specialized software in laboratories of computer research during computer forensic investigation, and which, in turn, can function as factual data and is the evidence of commission of crimes related to drug trafficking, psychotropic substances or their analogues are considered, namely, we are talking about such data as: information from messenger programs, web browsers, text messages, as well as from user files (including graphic, audio and video files); In addition, guiding questions that can be addressed to a forensic expert while computer forensic investigation in criminal investigations related to illegal production, manufacture, purchase, storage, transportation, transfer, sale of narcotic drugs, psychotropic substances or their analogues are suggested.


Author(s):  
Seyyed Sajjad Kazemi ◽  
Sajjad Heidari

Digital forensics is essentially synonymous with computer forensics, but the term "digital forensics" is generally used for the technical review of all devices that have the ability to store data. Today, digital criminology is challenged in cloud computing. The first problem is to understand why and how criminal and social actions are so unique and complex. The second problem is the lack of accurate scientific tools for forensic medicine in cyberspace. So far, no complete tools or explanations for criminology have been provided in the virtual infrastructure, and no training for security researchers has been provided in detail. Therefore, the author of the present descriptive-analytical research is based on library resources and using fish taking tools. To investigate suspicious cases related to cyberspace, criminologists must be well-equipped with technical and legal issues to deal with. In this article, we analyze digital criminology and its role in judicial law. The benefit of computer forensic knowledge is not only an indispensable necessity for security and judicial institutions, but also professional users and owners of computer systems, systems and networks must be fully aware of and properly comply with its legal and technical requirements.


2021 ◽  
Vol 7 (4) ◽  
pp. 9-18
Author(s):  
Vasily V. Bychkov ◽  
Vladimir A. Prorvich

The article reveals the basic regulatory framework for the use of artificial intelligence in Russia. The possibility of using artificial intelligence to fight crime is being analyzed. The need for artificial intelligence to create computer forensic in countering extremist crimes is in development.


Author(s):  
Eduard Lantukh ◽  
Vladimir Ishigeev ◽  
Oleg Gribunov

The authors come to the conclusion that it is necessary to involve specia­lists in computer equipment in the process of investigation because the investigation and detection of computer crimes requires the analysis of computer information and its carriers. The characteristic features of examined objects determine, first of all, special rules for obtaining and registering them, as well as taking into consideration research methodology when ordering and conducting computer forensic examinations. Confiscation, examination, recording of computer information of evidential significance requires specialist knowledge. In this connection, it is necessary to involve specialists and (or) experts in the process of investigation, detection and prevention of computer crimes. The latent character of computer crimes, a wide use of remote assess, the absence of visual perception of virtual objects and other factors hinder the collection of computer information. Thus, ordering and conducting different types of computer forensic examination play a special role in the investigation, detection and prevention of crimes. A modern and high-quality examination conducted by specialists with expert knowledge in the sphere of hi tech during the investigation of computer technology-related criminal cases offers considerable support to the law enforcement bodies in combating not only these crimes, but also a whole range of crimes where information technology acts as a partial platform for criminal activities. When law enforcement bodies thus influence one of the components of regional and international criminal activities, they raise the level of both physical and information security of citizens. The authors also stress that the more actively information technologies enter the life of a society, the more vulnerable this society is to the criminals who use these technologies for their own purposes.


Author(s):  
Wasim Ahmad Bhat ◽  
Ali AlZahrani ◽  
Mohamad Ahtisham Wani

2020 ◽  
Vol 5 (2) ◽  
pp. 96
Author(s):  
Muh Hajar Akbar ◽  
Sunardi Sunardi ◽  
Imam Riadi

Steganography is an anti-forensic technique that allows a criminal to hide information in other messages, so that during an examination it will be difficult to obtain evidence of the crime information. Therefore we need a technique to detect hidden messages in the data. This technique is known as steganalysis. Steganalysis is an anti-steganography science whose main purpose is to study the hiding characteristics of data on digital media and detect the existence of secret messages that are hidden using steganography techniques. The purpose of this study is to apply steganalysis techniques to detect the presence of messages that are hidden in other messages by using the forensic method, namely Generic Computer Forensic Investigation Model (GCFIM). In this study, the process of inserting steganographic messages using the Hiderman application, while the steganalysis process uses the StegSpy application. The results obtained in this study were the process of steganalysis using the help of the StegSpy application proved to be successful in detecting the presence of hidden messages in the five files that were scanned by steganographic messages.


Sign in / Sign up

Export Citation Format

Share Document