scispace - formally typeset
Open AccessJournal Article

A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure.

Reads0
Chats0
TLDR
This paper collects the researches of investigation procedure of cybercrime in the recent years, and compares these investigation procedures via the traditional investigative procedures compatibility, cybercrime behavior analysis, evidence forensic procedures, case analysis and verification, the methods of evidence collection and analysis, and the area of judicial jurisdiction.
Abstract
Due to the development of networks, cybercrime has many crime types, including network attack, mail fraud, intimidation, copyright infringement, and so on. For network attacks, many approaches have been proposed and used to detect and defense. However, after the network attack is confirmed or other crime exists, it still need to execute the investigation procedure by the investigators, collect the evidences related to the crime, find the perpetrators, and prosecute them. Therefore, in this paper, we collect the researches of investigation procedure of cybercrime in the recent years. By introducing the research investigation procedure of these papers, we will discover the features of every procedure. Then we compare these investigation procedures via the traditional investigative procedures compatibility, cybercrime behavior analysis, evidence forensic procedures, case analysis and verification, the methods of evidence collection and analysis, and the area of judicial jurisdiction. Finally, we will propose the viewpoints of cybercrime investigation and forensic procedures, and we wish this paper will help the research of investigation and forensic procedures.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Cognitive and human factors in digital forensics: Problems, challenges, and the way forward

TL;DR: An analysis of seven sources of cognitive and human error specifically within the digital forensics process, and discusses relevant countermeasures, concludes that although some cognitive and bias issues are very similar across forensic domains, others are different and dependent on the specific characteristic of the domain in question, such as digitalForensics.
Journal ArticleDOI

Stride Towards Proposing Multi-Modal Biometric Authentication for Online Exam

TL;DR: Additional biometric traits are used which are mole, ornament details and face dimensions in addition to the dress color and face color for continuously monitoring of a person in an online exam employing hard biometric like facial recognition and soft biometrics.

Forensic Analysis of Social Networks Based on Instagram.

TL;DR: Instagram is considered as the research subject, an anti-forensic process is used to explore the differences between the traces that are left on different browsers, browsing environments, and operating systems, and found that different browsers can lead to the discrepancies in recording the user behaviors on the same social network.
Journal ArticleDOI

Investigasi forensik terhadap bukti digital dalam mengungkap cybercrime

Moh Riskiyadi
TL;DR: Teknologi yang berkembang pesat sejalan dengan tindakan cybercrime ying meningkat drastis, sehingga teknik and modus baru cybercrime sulit untuk dideteksi and dipecahkan oleh para investigator forensik digital as discussed by the authors.
Journal ArticleDOI

Cybercrime investigation in Finland

TL;DR: Three investigation models of computer integrity crimes were found and the recognition of various organizational models and educational backgrounds of investigators will help to develop cybercrime investigation training.
References
More filters
Journal Article

Getting Physical with the Digital Investigation Process

TL;DR: The notion of a digital crime scene with its own witnesses, evidence, and events that can be investigated using the same model as a physical crime scene is introduced.
Book

Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet

Eoghan Casey
TL;DR: This completely updated edition provides the introductory materials that new students require, and also expands on the material presented in previous editions to help students develop these skills.
Book

Cybercrime: The Transformation of Crime in the Information Age

TL;DR: The transformation of crime in the information age is discussed in this article, where the transformation of criminal activity in the Information Age has been studied in the context of cybercrimes and cybercrime futures.
Book

Cybercrime and Society

Majid Yar
TL;DR: The Second edition of the Cybercrime and the Internet: An Introduction Perceptions of Cybercrime Cybercrime: Questions and Answers A Brief History and Analysis of the Internet Defining and Classifying Cybercrime What's 'New' About Cybercrime? How Many Crimes? Assessing the Scale of Internet Offences Challenges for Criminology, Criminal Justice and Policing Summary Study questions as mentioned in this paper.
Related Papers (5)
Trending Questions (1)
What are the main cybercrimes that the FBI, SOCA, NCSC, and local police investigate?

The paper does not provide information about the specific cybercrimes investigated by the FBI, SOCA, NCSC, and local police. The paper focuses on the investigation procedures and forensic techniques used in cybercrime cases.