Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    There has been a wide usage of anti-computer forensics all over the world. This paper takes an overview of, and an analysis of the most widely used anti-forensic techniques in the world. Mostly, these techniques hide or make it... more
    There has been a wide usage of anti-computer forensics all over the world. This paper takes an overview of, and an analysis of the most widely used anti-forensic techniques in the world. Mostly, these techniques hide or make it unrecoverable digital tracks of a crime in any form of magnetic media. Computer forensics department holds the mandate of collecting as much information and documentation about a crime as possible, regardless of whether such information is computer related or not. As such, computer forensics identifies the discipline involved in the study of the techniques and methodologies necessary for collection, analysis and presentation of unequivocal evidence, necessary in legal proceedings. Innovatively, there are anti-investigation techniques, aimed at making information collected by automated tools as well as fresh-and-blood investigators. With the help of modern operating systems, especially by the nature of management of data, events, and information, it is easy to find these individuals. However, due to the different techniques applied by computer users, it is hard to find people who use anti-computer forensics.
    Research Interests:
    The terminology Internet of Things (IoT) refers to a future where every day physical objects are connected by the Internet in one form or the other, but outside the traditional desktop realm. The successful emergence of the IoT vision,... more
    The terminology Internet of Things (IoT) refers to a future where every day physical objects are connected
    by the Internet in one form or the other, but outside the traditional desktop realm. The successful
    emergence of the IoT vision, however, will require computing to extend past traditional scenarios involving
    portables and smart-phones to the connection of everyday physical objects and the integration of
    intelligence with the environment. Subsequently, this will lead to the development of new computing
    features and challenges. The main purpose of this paper, therefore, is to investigate the features,
    challenges, and weaknesses that will come about, as the IoT becomes reality with the connection of more
    and more physical objects. Specifically, the study seeks to assess emergent challenges due to denial of
    service attacks, eavesdropping, node capture in the IoT infrastructure, and physical security of the sensors.
    We conducted a literature review about IoT, their features, challenges, and vulnerabilities. The
    methodology paradigm used was qualitative in nature with an exploratory research design, while data was
    collected using the desk research method. We found that, in the distributed form of architecture in IoT,
    attackers could hijack unsecured network devices converting them into bots to attack third parties.
    Moreover, attackers could target communication channels and extract data from the information flow.
    Finally, the perceptual layer in distributed IoT architecture is also found to be vulnerable to node capture
    attacks, including physical capture, brute force attack, DDoS attacks, and node privacy leaks.
    Research Interests: