Cyber Forensics
16,071 Followers
Recent papers in Cyber Forensics
This rough draft SOP will provide a substantial road map on how to build and manage a SOC and or a Cyber Intelligence Operations Center.
The paper deals with the Issues related to Medical Instrumentation which have come in light in the recent decade. As the instrumentation advances the added features provide great ease but also add security and privacy concerns as has... more
If we start from the concept: “Forensic Computer is the science of extracting data so that it can be presented as evidence in a court of law” (Albert J. Marcella, 2007), in the process of extraction is important the recovery, examination... more
We are glad to inform you that the School of Engineering & Technology, Sharda University, Greater Noida is organizing One Week International FDP on "Recent Trends in Cyber Security" through online mode from 26th June -01st July, 2021.... more
Software tools designed for disk analysis play a critical role today in digital forensics investigations. However, these digital forensics tools are often difficult to use, usually task specific, and generally require professionally... more
The utilization of the internet within organizations has surged over the past decade. Though, it has numerous benefits, the internet also comes with its own challenges such as intrusions and threats. Bring Your Own Device (BYOD) as a... more
The need for forensic accounting is due to incessant failure of the statutory audit to detect and prevent fraudulent activities. The purpose of this study is to examine the "Relevance of Forensic Accounting: Issues in Accountancy and... more
This document contain a simple example of an expert witness digital forensics report
Today it is globally known that it is a modern era of Artificial Intelligence. There is a great impact of Artificial Intelligence on the society as we are surrounded by technology. It is being observed that in Today's time, Artificial... more
Hardware virtualization technologies play a significant role in cyber security. On the one hand these technologies enhance security levels, by designing a trusted operating system. On the other hand these technologies can be taken up into... more
Despite growing concern among legal scholars and criminologists, our understanding of cyber stalking and cyber harassment legislation in the United States remains limited. Using a qualitative approach, this research work explored cyber... more
On April 4, 2017 a Syrian government air-attack at Khan Sheikhoun, Syria was followed by reports, photographs, and video data that indicated a significant number of casualties from exposure to toxic gases associated with the attack. This... more
The computer is being used by majority of the people living today. There are linked to the computer either directly or indirectly. The computer systems are gaining their implementations in different departments. Either it is education or... more
In the recent years, the use of internet and information technology across the globe has been increased tremendously. The opportunity to use the internet is huge and unconditional. Therefore, the criminal activities in the cyber world is... more
Over the decade web applications are grown rapidly. This leads to cyber crimes. Attacker injects various scripts to malfunction the web application. Attacker injects these scripts to text box of vulnerable web application from various... more
Electronic devices are a part and parcel of our lives today. With the penetration of technology in our lives, an increased dependency on gadgets, advancement in AI technologies, etc. the electronic devices hold abundance sensitive data... more
Dentro del proceso investigativo en delitos cibernéticos, todos los hallazgos encontrados vienen hacer parte fundamental de la investigación, los mismos que son tratados en el "Computer Crime Scene" como evidencia; la identificación,... more
The intensification of Information and Communications Technology usage in all facets of life exceedingly amplify the incidents of information security policy breaches, cyber crimes, fraud, commercial crimes, cyber laundering etc, hence... more
The purpose of this study is to explore the evolving technology and systems to find a low cost, efficient and portable solution for hard disk drive forensic imaging.Hard Disk Drive Imaging is one of the most frequently used forensic... more
Bilgi çağını yaşadığımız 21. yüzyılda teknolojiye bağımlı bir haldeyiz. Yaşamın her alanını dijitalleştiriyoruz. Bankacılıktan ticarete, habercilikten iletişime, iş hayatından sosyal hayata kadar her şeyin önüne “e” harfini koyar olduk.... more
Many a times, it has been argued that over dependency on technology leads to deskilling, lack of innovation and creativity thus resulting in inferior or substandard work. With a field growing in both demand for personnel and market for... more
COMPUTER FORENSICS INTEGRATES THE FIELDS OF COMPUTER SCIENCE AND LAW TO INVESTIGATE CRIME. FOR DIGITAL EVIDENCE TO BE LEGALLY ADMISSIBLE IN COURT, INVESTIGATORS SHOULD FOLLOW PROPER LEGAL PROCEDURES WHEN RECOVERING AND ANALYZING DATA FROM... more
Abstract—Intrusion Detection Systems (IDS) have become crucial components in computer and network security. NSLKDD intrusion detection dataset which is an enhanced version of KDDCUP'99 dataset was used as the experiment dataset in this... more
Management Fraud is a form of fraud, which normally does not come on surface, but its impact is staggering both in economic terms as well its effect on victims. Fraud whether it is committed by an employee or a manager is a concern of... more
In the modern world, we use microprocessors which are either based on ARM or x86 architecture which are the most common processor architectures. ARM originally stood for ‘Acorn RISC Machines’ but over the years changed to ‘Advanced RISC... more
The process of identifying and establishing attribution and motive in both cyber-attacks and counter attacks is often a problematic/challenging process. This is largely due to events often being undocumented and unverified, because of the... more
Lirieka Meintjes-Van Der Cognitive bias affecting forensic Walt & Adebola Olaborede expert opinion The influence of bias in forensic expert opinion can create problems for the criminal justice system. Many research studies have shown that... more
Serious weaknesses were discovered in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers... more
Software tools designed for disk analysis play a critical role today in digital forensics investigations. However, these digital forensics tools are often difficult to use, usually task specific, and generally require professionally... more
Computers are found in every aspect of our daily lives, employed for personal, social, and professional purposes. Electronic devices like hard discs and flash are standard storage media for most forms of information. The World Wide Web... more
A large number of industries including: critical national infrastructure (electricity, gas, water, etc.) and manufacturing firms rely heavily on computer systems, networks, control systems, and embedded devices... more
The purpose of this research is to investigate and identify ARP Poison Attacks by analyzing the pcap files
captured by Wireshark.
captured by Wireshark.
The use of hydro energy to generate electric power is crucial to meet the increasing energy demand of a modern economy and maintains the stability of power supply for unstable sources of power like solar, and wind. In newly constructed... more
"En ces temps de Covid-19, et à l'image de l'attaque informatique sur les données de la compagnie EasyJet, le cyberespace est de plus en plus instable. États, entreprises et particuliers semblent promis à une période de très forte... more
Today’s world lives more online than offline, uses digital mean and technology almost with every breath and shudders with the thought of compromised privacy and security. Computers have come to the verge where we have computers as our... more
The rate at which employee’s fall victim of Identity Theft and Phishing attack. Promote the education of employees and conduct training sessions with mock phishing scenarios. The fact that organizations have Information... more