Ebraheim Alsaadi
Zayed University, College of Technological Innovation, Graduate Student
There has been a wide usage of anti-computer forensics all over the world. This paper takes an overview of, and an analysis of the most widely used anti-forensic techniques in the world. Mostly, these techniques hide or make it... more
There has been a wide usage of anti-computer forensics all over the world. This paper takes an overview of, and an analysis of the most widely used anti-forensic techniques in the world. Mostly, these techniques hide or make it unrecoverable digital tracks of a crime in any form of magnetic media. Computer forensics department holds the mandate of collecting as much information and documentation about a crime as possible, regardless of whether such information is computer related or not. As such, computer forensics identifies the discipline involved in the study of the techniques and methodologies necessary for collection, analysis and presentation of unequivocal evidence, necessary in legal proceedings. Innovatively, there are anti-investigation techniques, aimed at making information collected by automated tools as well as fresh-and-blood investigators. With the help of modern operating systems, especially by the nature of management of data, events, and information, it is easy to find these individuals. However, due to the different techniques applied by computer users, it is hard to find people who use anti-computer forensics.
Research Interests: Computer Science, Computer Forensics, Digital Investigation, Forensic Science, Computer Security, and 17 moreForensic Sciences, Digital Investigation,Computer Forensics, Computer secuirty, Digital Investigation,Computer Forensics, Computer security, Information Technology, Cyber & Computer forensics, Computer Forensics for Cyberspace Crimes, Anti-computer forensic, Why we use Computer Forensics, DIGITAL EVIDENCE AND INVESTIGATION, Computer Security and Forensics, Computer Forensics Ethical Dilemmas, Computer Forensics and Law, Digital Forensics and Cyber Investigation, Digital Investigation and Law Enforcment, Truecrypt, FTK Imager, AccessData FTK Imager, and Bit Shifting
The terminology Internet of Things (IoT) refers to a future where every day physical objects are connected by the Internet in one form or the other, but outside the traditional desktop realm. The successful emergence of the IoT vision,... more
The terminology Internet of Things (IoT) refers to a future where every day physical objects are connected
by the Internet in one form or the other, but outside the traditional desktop realm. The successful
emergence of the IoT vision, however, will require computing to extend past traditional scenarios involving
portables and smart-phones to the connection of everyday physical objects and the integration of
intelligence with the environment. Subsequently, this will lead to the development of new computing
features and challenges. The main purpose of this paper, therefore, is to investigate the features,
challenges, and weaknesses that will come about, as the IoT becomes reality with the connection of more
and more physical objects. Specifically, the study seeks to assess emergent challenges due to denial of
service attacks, eavesdropping, node capture in the IoT infrastructure, and physical security of the sensors.
We conducted a literature review about IoT, their features, challenges, and vulnerabilities. The
methodology paradigm used was qualitative in nature with an exploratory research design, while data was
collected using the desk research method. We found that, in the distributed form of architecture in IoT,
attackers could hijack unsecured network devices converting them into bots to attack third parties.
Moreover, attackers could target communication channels and extract data from the information flow.
Finally, the perceptual layer in distributed IoT architecture is also found to be vulnerable to node capture
attacks, including physical capture, brute force attack, DDoS attacks, and node privacy leaks.
by the Internet in one form or the other, but outside the traditional desktop realm. The successful
emergence of the IoT vision, however, will require computing to extend past traditional scenarios involving
portables and smart-phones to the connection of everyday physical objects and the integration of
intelligence with the environment. Subsequently, this will lead to the development of new computing
features and challenges. The main purpose of this paper, therefore, is to investigate the features,
challenges, and weaknesses that will come about, as the IoT becomes reality with the connection of more
and more physical objects. Specifically, the study seeks to assess emergent challenges due to denial of
service attacks, eavesdropping, node capture in the IoT infrastructure, and physical security of the sensors.
We conducted a literature review about IoT, their features, challenges, and vulnerabilities. The
methodology paradigm used was qualitative in nature with an exploratory research design, while data was
collected using the desk research method. We found that, in the distributed form of architecture in IoT,
attackers could hijack unsecured network devices converting them into bots to attack third parties.
Moreover, attackers could target communication channels and extract data from the information flow.
Finally, the perceptual layer in distributed IoT architecture is also found to be vulnerable to node capture
attacks, including physical capture, brute force attack, DDoS attacks, and node privacy leaks.