Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
This document contain a simple example of an expert witness digital forensics report
    • by 
    •   24  
      Critical TheoryCriminologyCriminal LawCriminal Justice
A large number of industries including: critical national infrastructure (electricity, gas, water, etc.) and manufacturing firms rely heavily on computer systems, networks, control systems, and embedded devices... more
    • by 
    •   6  
      Computer ScienceInformation TechnologySCADACyber Security
The intensification of Information and Communications Technology usage in all facets of life exceedingly amplify the incidents of information security policy breaches, cyber crimes, fraud, commercial crimes, cyber laundering etc, hence... more
    • by 
    •   7  
      Digital securityHackingRisk AnalysisCyber Forensics
    • by 
    •   8  
      The Internet of ThingsInternet of ThingsDigital ForensicsDigital Investigation,Computer Forensics, Computer security
Abstract—Intrusion Detection Systems (IDS) have become crucial components in computer and network security. NSLKDD intrusion detection dataset which is an enhanced version of KDDCUP'99 dataset was used as the experiment dataset in this... more
    • by 
    •   6  
      Computer VisionNetwork SecurityDigital Image ProcessingCyber Security
Dentro del proceso investigativo en delitos cibernéticos, todos los hallazgos encontrados vienen hacer parte fundamental de la investigación, los mismos que son tratados en el "Computer Crime Scene" como evidencia; la identificación,... more
    • by 
    •   6  
      Computer ForensicsCybercrimesDigital ForensicsCyber Forensics
ABSTRAK Anti Forensik merupakan suatu bagian kajian di bidang Teknologi Informasi yang bertujuan untuk mengamankan data digital yang bersifat rahasia, agar tidak ditemukan oleh ahli komputer forensik (investigator) pada saat proses... more
    • by  and +1
    •   6  
      Digital ForensicsDigital Investigation,Computer Forensics, Computer secuirtyDigital Investigation,Computer Forensics, Computer securityCyber Forensics
Software tools designed for disk analysis play a critical role today in digital forensics investigations. However, these digital forensics tools are often difficult to use, usually task specific, and generally require professionally... more
    • by 
    •   5  
      Expert SystemsComputer ForensicsDigital ForensicsCyber Security
Many a times, it has been argued that over dependency on technology leads to deskilling, lack of innovation and creativity thus resulting in inferior or substandard work. With a field growing in both demand for personnel and market for... more
    • by 
    •   10  
      Computer ForensicsDigital ForensicsCyber SecurityCyber Forensics
Volatile memory dump and its analysis is an essential part of digital forensics. Among a number of various software and hardware approaches for memory dumping there are authors who point out that some of these approaches are not resilient... more
    • by  and +1
    •   25  
      Information SecurityComputer ForensicsVirtual MemoryMalware Analysis
Bilgi çağını yaşadığımız 21. yüzyılda teknolojiye bağımlı bir haldeyiz. Yaşamın her alanını dijitalleştiriyoruz. Bankacılıktan ticarete, habercilikten iletişime, iş hayatından sosyal hayata kadar her şeyin önüne “e” harfini koyar olduk.... more
    • by 
    •   9  
      Computer ForensicsCybercrimesCyber ForensicsComputer Forensics for Cyberspace Crimes
Despite growing concern among legal scholars and criminologists, our understanding of cyber stalking and cyber harassment legislation in the United States remains limited. Using a qualitative approach, this research work explored cyber... more
    • by 
    •   2  
      Cyber ForensicsE-discovery
Hardware virtualization technologies play a significant role in cyber security. On the one hand these technologies enhance security levels, by designing a trusted operating system. On the other hand these technologies can be taken up into... more
    • by 
    •   17  
      CybersecurityDigital ForensicsAll areas of Informatics, Educational technologies, Cyber Security & Forensics, Cyber Audit, ICTCyber Security
The purpose of this study is to explore the evolving technology and systems to find a low cost, efficient and portable solution for hard disk drive forensic imaging.Hard Disk Drive Imaging is one of the most frequently used forensic... more
    • by 
    •   34  
      Computer SciencePolice ScienceForensicsCyberlaw
In the recent years, the use of internet and information technology across the globe has been increased tremendously. The opportunity to use the internet is huge and unconditional. Therefore, the criminal activities in the cyber world is... more
    • by 
    •   4  
      Computer ForensicsCyber crimeCyber ForensicsDigital Evidence
    • by  and +1
    •   20  
      Computer ScienceInformation SecurityInternational StudiesCyber Warfare
The purpose of this research is to investigate and identify ARP Poison Attacks by analyzing the pcap files
captured by Wireshark.
    • by 
    •   3  
      Network SecurityCyber ForensicsWireshark
    • by 
    •   5  
      Computer ForensicsDigital ForensicsIEEE 802.11 WLANWiFI
In present day's satellite play important role in various part of life and industry. Security, entertainment, data communication and many other things are dependent on satellite networks and communication modules. Satellite is more or... more
    • by  and +1
    •   5  
      Artificial IntelligenceNetwork SecuritySatellite NetworksCyber Forensics
    • by 
    •   10  
      Computer ForensicsDigital ForensicsWireless NetworkWireless Technology
Over the decade web applications are grown rapidly. This leads to cyber crimes. Attacker injects various scripts to malfunction the web application. Attacker injects these scripts to text box of vulnerable web application from various... more
    • by 
    •   6  
      Computer ScienceInformation SecurityComputer SecurityCyber Forensics
If we start from the concept: “Forensic Computer is the science of extracting data so that it can be presented as evidence in a court of law” (Albert J. Marcella, 2007), in the process of extraction is important the recovery, examination... more
    • by 
    •   8  
      Criminal JusticeCyberlawCybercrimesCybersecurity
The paper deals with the Issues related to Medical Instrumentation which have come in light in the recent decade. As the instrumentation advances the added features provide great ease but also add security and privacy concerns as has... more
    • by 
    •   2  
      Biomedical informaticsCyber Forensics
Electronic devices are a part and parcel of our lives today. With the penetration of technology in our lives, an increased dependency on gadgets, advancement in AI technologies, etc. the electronic devices hold abundance sensitive data... more
    • by 
    •   20  
      LawCriminal LawCivil LawDigital Literacy
    • by 
    •   10  
      Computer ForensicsDigital ForensicsWireless NetworkWireless Technology
Today it is globally known that it is a modern era of Artificial Intelligence. There is a great impact of Artificial Intelligence on the society as we are surrounded by technology. It is being observed that in Today's time, Artificial... more
    • by 
    •   5  
      Digital ForensicsCyber SecurityCyber ForensicsArtificial Intelligence And Techniques
The process of identifying and establishing attribution and motive in both cyber-attacks and counter attacks is often a problematic/challenging process. This is largely due to events often being undocumented and unverified, because of the... more
    • by 
    •   4  
      Computer ForensicsCyber ForensicsCyber AttacksScript-based Cyber Attacks
Serious weaknesses were discovered in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers... more
    • by 
    •   12  
      Network SecurityBiometricsCryptographyBiometrics Authentication Technologies
The rate at which employee’s fall victim of Identity Theft and Phishing attack. Promote the education of employees and conduct training sessions with mock phishing scenarios. The fact that organizations have Information... more
    • by 
    •   4  
      Information SecurityCyber SecurityCyber ForensicsDigital Forensic, Cyber Crime, Cyber Security
Today’s world lives more online than offline, uses digital mean and technology almost with every breath and shudders with the thought of compromised privacy and security. Computers have come to the verge where we have computers as our... more
    • by 
    •   2  
      Data SecurityCyber Forensics
Lirieka Meintjes-Van Der Cognitive bias affecting forensic Walt & Adebola Olaborede expert opinion The influence of bias in forensic expert opinion can create problems for the criminal justice system. Many research studies have shown that... more
    • by 
    •   11  
      Criminal LawLaw of evidenceDNA (Forensic Science)Cognitive Bias
In the modern world, we use microprocessors which are either based on ARM or x86 architecture which are the most common processor architectures. ARM originally stood for ‘Acorn RISC Machines’ but over the years changed to ‘Advanced RISC... more
    • by 
    •   15  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
    • by 
    •   15  
      Computer ScienceInformation SecurityComputer SecuritySemantic Analysis
    • by 
    •   5  
      Computer ScienceCyber ForensicsSequenceComputer Applications
Management Fraud is a form of fraud, which normally does not come on surface, but its impact is staggering both in economic terms as well its effect on victims. Fraud whether it is committed by an employee or a manager is a concern of... more
    • by 
    •   6  
      FinanceFraud Detection And PreventionHuman Resource ManagementHuman Resources
    • by 
    •   19  
      Information SecurityComputer ForensicsVirtual MemoryMalware Analysis
Computers are found in every aspect of our daily lives, employed for personal, social, and professional purposes. Electronic devices like hard discs and flash are standard storage media for most forms of information. The World Wide Web... more
    • by 
    •   5  
      Internet & TechnologyComputer SystemsCybercrimeCyber Forensics
On April 4, 2017 a Syrian government air-attack at Khan Sheikhoun, Syria was followed by reports, photographs, and video data that indicated a significant number of casualties from exposure to toxic gases associated with the attack. This... more
    • by 
    •   4  
      Computational ForensicsCyber ForensicsAnti ForensicsLaw of Forensics and Scientific Evidence