Investigation of Different Constraints in Cybercrime & Digital Forensics

Shallu Kotwal, Jatinder Manhas

Abstract


With rapid changes in technology and its increased use in different organizations, the cybercrime and digital forensics methods are also making advancement in new ways to tackle the latest trends in cyber crime. Cybercrime refers to any crime that involves a computer network or any public or private system. Cyber crime is emerging as a serious threat worldwide. The government organizations, police departments and various intelligence units of different countries have started to act accordingly. To control and investigate cybercrime, the investigators use various Digital forensics methods and mechanisms. Digital forensics is the procedure of investigating computer crimes in cyber world. Many researchers have been done a lot in this area to help forensic investigators to resolve the existing challenges with different methodologies designed by them. Experts provided with different tools and technologies to resolve the threats related to cyber crime in a more efficient and speedy manner with minimum loss to the victim. Still the desired technologies and tools are not that much efficient that they can control the occurrence of different types of cyber crime activities. This paper reviews the complete details regarding the growth of cybercrime and its various modes of occurrence at different level.  Authors in this paper tries to bring few facts and figures which would be an eye-opener for computer and internet users. Therefore, the current manuscript provides the understanding of various types of cyber crimes and its impact on different section of the society.

Full Text:

PDF

References


Shrivastav et al., International Journal of Advanced Research in Computer Science and Software Engineering 3(7),July - 2013, pp. 414-4192013

Cyber Crime Research Presentation by the Australian Institute of Criminology Dr Russell G Smith Principal Criminologist

Rajib Singla. 2013. “Cyber crimes against India: Increasing in leaps and bounds”. 21 November.http://blogs.quickheal.com/wp/cyber-crimes-against-india-increasing-in-leaps-and-bounds

Federal Bureau of Investigation (FBI) for cybercrime information Cybercrimes www.fbi.gov/about-us/investigate/cyber/cyber

Federal Bureau of Investigation(FBI) for tips to avoid Internet fraud www.fbi.gov/scams-safety/fraud/Internet fraud.

IJCSNS International Journal of Computer Science and Network Security, 84 VOL.12 No.2, February 2012

Hemraj Saini, Yerra Shankar Rao, T.C.Panda / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 2,Mar-Apr 2012, pp.202-209

An Introduction To Cyber-Crime Cyber Law.html

International Journal of Cyber Criminology (IJCC) – Publisher & Editor-in-Chief – K. Jaishankar ISSN: 0973-5089 - January – June 2015. Vol. 9 (1): 55–119. DOI: 10.5281/zenodo.22387

International Journal of Cyber-Security and Digital Forensics (IJCSDF) 2(2): 48-76 The Society of Digital Information and Wireless Communications, 2013 (ISSN: 2305-0012)

Computer Intrusion Forensics Research Paper Nathan Balon Ronald Stovall Thomas Scaria CIS 544

Issues and Challenges of Cyber Security for Social Networking Sites (Facebook) Roshan Jabee Department of Computer Science and Engineering, Jamia Hamdrad New Delhi, India M. Afshar Alam Department of Computer Science and Engineering, Jamia Hamdrad New Delhi, India

http://www.ijcaonline.org/archives/volume144/number3/jabee-2016-ijca-910174.pdf

http://pib.nic.in/newsite/PrintRelease.aspx?relid=132545

https://factly.in/cyber-crimes-in-india-which-state-tops-the-chart/

http://www.iacpcybercenter.org/topics/training-2/free-training-for-law-enforcement/

http://kashmirreader.com/2017/01/19/india-reports-39730-cybercrime-cases-jan-oct-2016

www.ic3.gov

www.shoutmeloud.com/top-mobile-os-overview.html

http://tech.firstpost.com/news-analysis/android-malware-increasing-tips-protect-phone-218395.html

articles.forensicfocus.com/2014/04/14/windows-forensics-and-security/

http://Ohiohtcia.org/linuxintro-1.8.1.pdf - Introduction to Linux for Data Forensics.




DOI: https://doi.org/10.23956/ijarcsse/V7I7/0209

Refbacks

  • There are currently no refbacks.




© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.