Back to Current Issues

Survey on current Digital forensic practices

Divith Devaiah M.M , Prakash B Metre ,

Affiliations
Acharya Doctor Sarvepalli Radhakrishnan Rd, Bengaluru, Karnataka 560107,
:10.22362/ijcert/2017/v4/i5/xxxx [UNDER PROCESS]


Abstract
Cyber-crimes are taking over the world like a breeze. For every crimes committed around the globe, one or the other form of computer or any electronic device is used. So every crime can be linked as cyber-crime. To investigate these crimes, a cost friendly and easily available forensic device is required, which helps in collecting, analyzing and preserving data from which results can be extracted. This paper illuminates all the practices that are currently in place and also clarifies the effects of vulnerabilities.


Citation
Divith Devaiah M.M et.al, “Survey on current Digital forensic practices”, International Journal of Computer Engineering In Research Trends, 4(5):180-184 ,May -2017


Keywords : : Cyber Crimes, Cyber Criminal, Forensic, Forensic tools, Vulnerability, Criminology, agile tool.

References
1.	Malek Harbawi and Asaf Varol, “The Role of Digital Forensics in Combating Cybercrimes”.
2.	M. Al Fahdi, N.L. Clarke and S.M. Furnell, “Challenges to Digital Forensics: A survey of researchers & practitioners attitudes and opinions.
3.	B.Skaggs, B. Blackburn, G. Manes, S. Shenoi, “Network Vulnerability Analysis”.
4.	Prashant S. Shinde and Prof. Shrikant B. Ardhapurkar, “Cyber Security Analysis using Vulnerability Assessment and penetration Testing”.
5.	Abirami Sivaprasad and Smita Jangale, “A Complete study on Tools and Techniques for digital Forensic Analysis”.
6.	Andrw Jones and Stilianos Vidalis and Nasser Abouzakhar, “Information Security and digital forensics in the world of cyber physical systems”.
7.	Arun V. Sathanur and David J. Haglin, “A novel centrality Measure for network-wide cyber vulnerability assessment”.
8.	Arni Ariani, John Lewis and Pradeep K. Ray, “The vulnerability assessment for Emergency response Plans”.
9.	C.Balan, Dija S, Divya S, VIdyadharan, “The need to adopt agile methodology in the development of cyber forensic tools”.
10.	S.Al Sharif, F.Iqbal,T.Baker and A. Marrington, “Magec:An image searching tool for detecting forged images in forensic investigation”.
11.	Noble Kumari and A.K Mohapatra, “An insight into digital forensics branches and tools”.
12.	Simson L Garfinkel and Nicole Beebe, Lishu liu, “Detecting Threatening insiders with lightweight media forensics”.


DOI Link : Not yet assigned

Download :
  V4I507.pdf


Refbacks : There are currently no refbacks

Quick Links


DOI:10.22362/ijcert


Science Central

Score: 13.30



Submit your paper to editorijcert@gmail.com

>