Skip to main content

2021 | OriginalPaper | Buchkapitel

Digital Forensics: Essential Competencies of Cyber-Forensics Practitioners

verfasst von : Chamundeswari Arumugam, Saraswathi Shunmuganathan

Erschienen in: Advances in Machine Learning and Computational Intelligence

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Technical advancement expands the usage of digital devices in today’s society. As the usage increases, the amount of cyber-crime related to data leakage also substantially increases. To deal with these cyber-crime-related activities, a crucial need of skilled cyber-forensics practitioners is essential. Cyber-forensics practitioners should equip with varied forensics frameworks to meet the technological enhancement in today’s society. This work discusses the various essential competencies required for the practitioners to prepare themselves for forensic investigation. Actually, the experts are expected to be well versed in investigation approach using various resources like computer, IoT, cloud, mobile, etc., and various commercial and open-source forensics tools. An investigation approach is taken up here to measure the effectiveness of a forensics practitioner in targeting the challenges in a forensics laboratory using multi-agent.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
10.
Zurück zum Zitat H. Zhang, L. Chen, Q. Liu, Digital Forensic Analysis of Instant Messaging Applications on Android Smartphones, in International Conference on Computing, Networking and Communications (2018), pp. 647–651 H. Zhang, L. Chen, Q. Liu, Digital Forensic Analysis of Instant Messaging Applications on Android Smartphones, in International Conference on Computing, Networking and Communications (2018), pp. 647–651
11.
Zurück zum Zitat C. Anglano, M. Canonico, M. Guazzone, Forensic analysis of telegram messenger on android smartphones. Digital Invest. 23, 31–49 (2017) C. Anglano, M. Canonico, M. Guazzone, Forensic analysis of telegram messenger on android smartphones. Digital Invest. 23, 31–49 (2017)
12.
Zurück zum Zitat L. Zhang, F. Yu, Q. Ji, The Forensic Analysis of WeChat Message. In 2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC) (2016), pp. 500–503 L. Zhang, F. Yu, Q. Ji, The Forensic Analysis of WeChat Message. In 2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC) (2016), pp. 500–503
13.
Zurück zum Zitat A.H. Lone, F.A. Badroo, K.R. Chudhary, A. Khalique, Implementation of forensic analysis procedures for WhatsApp and Viber android applications. Int. J. Comput. Appl. 128(12), 26–33 (2015) A.H. Lone, F.A. Badroo, K.R. Chudhary, A. Khalique, Implementation of forensic analysis procedures for WhatsApp and Viber android applications. Int. J. Comput. Appl. 128(12), 26–33 (2015)
14.
Zurück zum Zitat C. Anglano, M. Canonico, M. Guazzone, Forensic analysis of the chat secure instant messaging application on android smartphones. Digital Invest. 19, 44–59 (2016) C. Anglano, M. Canonico, M. Guazzone, Forensic analysis of the chat secure instant messaging application on android smartphones. Digital Invest. 19, 44–59 (2016)
15.
Zurück zum Zitat M. Chernyshev, S. Zeadally, Z. Baig, A. Woodward, Mobile forensics: advances, challenges, and research opportunities. IEEE Secur. Priv. 15(6), 42–51 (2017)CrossRef M. Chernyshev, S. Zeadally, Z. Baig, A. Woodward, Mobile forensics: advances, challenges, and research opportunities. IEEE Secur. Priv. 15(6), 42–51 (2017)CrossRef
16.
Zurück zum Zitat P. Feng, Q. Li, P. Zhang, Z. Chen, Logical acquisition method based on data migration for android mobile devices. Digital Invest. 26, 55–62 (2018)CrossRef P. Feng, Q. Li, P. Zhang, Z. Chen, Logical acquisition method based on data migration for android mobile devices. Digital Invest. 26, 55–62 (2018)CrossRef
17.
Zurück zum Zitat D. Quick, K.K.R. Choo, Digital forensic intelligence: data subsets and open source intelligence (DFINT + OSINT): a timely and cohesive mix. Fut. Gener. Comput. Syst. 78, 558–567 (2018)CrossRef D. Quick, K.K.R. Choo, Digital forensic intelligence: data subsets and open source intelligence (DFINT + OSINT): a timely and cohesive mix. Fut. Gener. Comput. Syst. 78, 558–567 (2018)CrossRef
18.
Zurück zum Zitat D. Quick, K.K.R. Choo, Pervasive social networking forensics: intelligence and evidence from mobile device extracts. J. Network Comput. Appl. 86, 24–33 (2017)CrossRef D. Quick, K.K.R. Choo, Pervasive social networking forensics: intelligence and evidence from mobile device extracts. J. Network Comput. Appl. 86, 24–33 (2017)CrossRef
19.
Zurück zum Zitat A. Case, G.G. Richard III, Memory forensics: the path forward. Digital Invest. 20, 23–33 (2017)CrossRef A. Case, G.G. Richard III, Memory forensics: the path forward. Digital Invest. 20, 23–33 (2017)CrossRef
20.
Zurück zum Zitat E. Casey, S. Barnum, R. Griffith, J. Snyder, H. van Beek, A. Nelson, Advancing coordinated cyber-investigations and tool interoperability using a community developed specification language. Digital Invest. 22, 14–45 (2017)CrossRef E. Casey, S. Barnum, R. Griffith, J. Snyder, H. van Beek, A. Nelson, Advancing coordinated cyber-investigations and tool interoperability using a community developed specification language. Digital Invest. 22, 14–45 (2017)CrossRef
21.
Zurück zum Zitat Y. Cheng, X. Fu, X. Du, B. Luo, M. Guizani, A lightweight live memory forensic approach based on hardware virtualization. Inf. Sci. 379, 23–41 (2017)CrossRef Y. Cheng, X. Fu, X. Du, B. Luo, M. Guizani, A lightweight live memory forensic approach based on hardware virtualization. Inf. Sci. 379, 23–41 (2017)CrossRef
22.
Zurück zum Zitat C. Rajchada, V. Wantanee, R.C. Kim-Kwang, Forensic analysis and security assessment of Android m-banking apps. Austr. J. Forens. Sci. 50(1), 3–19 (2018)CrossRef C. Rajchada, V. Wantanee, R.C. Kim-Kwang, Forensic analysis and security assessment of Android m-banking apps. Austr. J. Forens. Sci. 50(1), 3–19 (2018)CrossRef
23.
Zurück zum Zitat Y. Ibrar, I.A.T. Hashem, A. Ahmed, S.M. Ahsan Kazmi, C.S. Hong, Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges. Fut. Gener. Comput. Syst. 92, 265–275 (2019) Y. Ibrar, I.A.T. Hashem, A. Ahmed, S.M. Ahsan Kazmi, C.S. Hong, Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges. Fut. Gener. Comput. Syst. 92, 265–275 (2019)
24.
Zurück zum Zitat C.-T. Huang, H.-J. Ko, Z.-W. Zhuang, P.-C. Shih, S.-J. Wang, Mobile Forensics for Cloud Storage Service on iOS Systems, In ISITA2018, Singapore, 28–31 Oct 2018 C.-T. Huang, H.-J. Ko, Z.-W. Zhuang, P.-C. Shih, S.-J. Wang, Mobile Forensics for Cloud Storage Service on iOS Systems, In ISITA2018, Singapore, 28–31 Oct 2018
35.
Zurück zum Zitat C. Arumugam, S. Kameswaran, B. Kaliamourthy, Risk assessment framework: ADRIM process model for global software development, in Towards Extensible and Adaptable Methods in Computing, ed. by S. Chakraverty, A. Goel, S. Misra (Springer, Singapore, 2018) C. Arumugam, S. Kameswaran, B. Kaliamourthy, Risk assessment framework: ADRIM process model for global software development, in Towards Extensible and Adaptable Methods in Computing, ed. by S. Chakraverty, A. Goel, S. Misra (Springer, Singapore, 2018)
Metadaten
Titel
Digital Forensics: Essential Competencies of Cyber-Forensics Practitioners
verfasst von
Chamundeswari Arumugam
Saraswathi Shunmuganathan
Copyright-Jahr
2021
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-5243-4_81

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.