Skip to main content

2014 | OriginalPaper | Buchkapitel

Forensic Investigation Processes for Cyber Crime and Cyber Space

verfasst von : K. K. Sindhu, Rupali Kombade, Reena Gadge, B. B. Meshram

Erschienen in: Proceedings of International Conference on Internet Computing and Information Communications

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Computers are an integral part of our life. A significant percentage of today’s transactions and processes take place using the computer and Internet. People have readily adopted Internet technology and innocently trust it while using it with the ignorance of the limitations and threats to the system security. With the advance of technology, equally or more advanced form of crimes started emerging. Different types of cyber attacks from various sources may adversely affect computers, software, a network, an agency’s operations, an industry, or the Internet itself. Thus companies and their products aim to take assistance of legal and computer forensics. Digital forensics deals with computer-based evidence to determine who, what, where, when, and how crimes are being committed. Computer and network forensics has evolved to assure proper presentation of cyber crime evidentiary data into court. Forensic tools and techniques are an integral part of criminal investigations used to investigate suspect systems, gathering and preserving evidence, reconstructing or simulating the event, and assessing the current state of an event. In this paper we deliberate on two aspects; first, various types of crimes in the cyber space and various sources of cyber attacks, and second, investigation processes for various cyber attacks with the help of digital forensic tools like WinHex [1].

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Carrier, B.D., Spafford, E.H.: Categories of digital investigation analysis techniques based on the computer history model. J. Digit Invest. Sci. 3S, S121–S130 (2006) Carrier, B.D., Spafford, E.H.: Categories of digital investigation analysis techniques based on the computer history model. J. Digit Invest. Sci. 3S, S121–S130 (2006)
3.
Zurück zum Zitat Di Pietro, R., Verde, N.V.: Digital forensic techniques and tools chapter 17 of security handbook of electronic security and digital forensics Di Pietro, R., Verde, N.V.: Digital forensic techniques and tools chapter 17 of security handbook of electronic security and digital forensics
4.
Zurück zum Zitat Choi, J., Savoldi, A., Gubian, P., Lee, S., Lee, S.: Live forensic analysis of a compromised Linux system using LECT (Linux Evidence Collection Tool) 2008 IEEE Choi, J., Savoldi, A., Gubian, P., Lee, S., Lee, S.: Live forensic analysis of a compromised Linux system using LECT (Linux Evidence Collection Tool) 2008 IEEE
5.
Zurück zum Zitat Arasteh, A.R., Debbabi, M., Sakha, A., Saleh, M.: Analyzing multiple logs for forensic evidence. Digit. Invest. J. Sci. 4S, S82–S91 (2007) Arasteh, A.R., Debbabi, M., Sakha, A., Saleh, M.: Analyzing multiple logs for forensic evidence. Digit. Invest. J. Sci. 4S, S82–S91 (2007)
6.
Zurück zum Zitat Casey, E.: Network traffic as a source of evidence: tool strengths, weaknesses, and future needs. Digit. Invest. J. 9–148 (2003) Casey, E.: Network traffic as a source of evidence: tool strengths, weaknesses, and future needs. Digit. Invest. J. 9–148 (2003)
Metadaten
Titel
Forensic Investigation Processes for Cyber Crime and Cyber Space
verfasst von
K. K. Sindhu
Rupali Kombade
Reena Gadge
B. B. Meshram
Copyright-Jahr
2014
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-1299-7_19

Neuer Inhalt