Computer Forensics: Evolution and Its Pivotal Role in Modern Investigations
Main Article Content
Abstract
The preservation, identification, retrieval, documentation, and evaluation of laptop facts are the honest primary goals of computer forensics. Many computer forensics guidelines and approaches that want to be described and established are tested in this have a look at. Data have to be undamaged and available for evaluation. Authenticity of the information is likewise guaranteed. As a end result, pc forensic specialists extract and take a look at facts from storage devices used on the scene of a digital crime the usage of contemporary strategies and device. Examining some of these forensic technologies is the number one objective of this take a look at. The aim of the cutting-edge take a look at is to evaluate and comparison the key variations and similarities across the extraordinary forensic equipment as a way to determine which characteristics need to be progressed for effective garage device autopsy.
Article Details
Issue
Section

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
How to Cite
References
. Lin, X., Introduction to Computer Forensics, in Introductory Computer Forensics: A Hands-on Practical Approach. 2018, Springer International Publishing: Cham. p. 3-36. DOI: https://doi.org/10.1007/978-3-030-00581-8_1
. Moore, R., The role of computer forensics in criminal investigations, in Crime online. 2013, Willan. p. 81-94.
. Brady, P.Q. and W.R. King, Technology and homicide investigation. The handbook of homicide, 2017: p. 515-532. DOI: https://doi.org/10.1002/9781118924501.ch29
. Furneaux, N., An introduction to computer forensics. Medicine, Science and the Law, 2006. 46(3): p. 213-218. DOI: https://doi.org/10.1258/rsmmsl.46.3.213
. Britz, M., Computer forensics and cyber crime: An introduction, 2/e. 2009: Pearson Education India.
. Yari, I.A. and S. Zargari. An overview and computer forensic challenges in image steganography. in 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). 2017. IEEE. DOI: https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.60
. Yusoff, Y., R. Ismail, and Z. Hassan, Common phases of computer forensics investigation models. International Journal of Computer Science & Information Technology, 2011. 3(3): p. 17-31. DOI: https://doi.org/10.5121/ijcsit.2011.3302
. McGrath, N., A Computer Forensic Methodology. 2005, Dublin, National College of Ireland.
. McMillian, J., Importance of a standard methodology in computer forensics. Information Security Reading Room, 2000. 2.
. Alazab, M., S. Venkatraman, and P. Watters, Effective digital forensic analysis of the NTFS disk image. Ubiquitous Computing and Communication Journal, 2009. 4(1): p. 551-558.
. Al-Sabaawi, A. Digital Forensics for Infected Computer Disk and Memory: Acquire, Analyse, and Report. in 2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE). 2020. IEEE. DOI: https://doi.org/10.1109/CSDE50874.2020.9411614
. Breitinger, F., et al. Towards a process model for hash functions in digital forensics. in Digital Forensics and Cyber Crime: Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers 5. 2014. Springer.
. Mokhonoana, P. and M.S. Olivier. Application of Message Digests for the Verification of Logical Forensic Data. in ISSA. 2008.
. Kishore, N. and B. Kapoor. An efficient parallel algorithm for hash computation in security and forensics applications. in 2014 IEEE International Advance Computing Conference (IACC). 2014. IEEE. DOI: https://doi.org/10.1109/IAdCC.2014.6779437
. Pradeep, K., R. Soman, and P. Honnavalli. Validity of Forensic Evidence using Hash Function. in 2020 5th International Conference on Communication and Electronics Systems (ICCES). 2020. IEEE.
. Barmpatsalou, K., et al., A critical review of 7 years of Mobile Device Forensics. Digital Investigation, 2013. 10(4): p. 323-349. DOI: https://doi.org/10.1016/j.diin.2013.10.003
. Ayers, R., S. Brothers, and W. Jansen, Guidelines on mobile device forensics (draft). NIST Special Publication, 2013. 800(101). DOI: https://doi.org/10.6028/NIST.SP.800-101r1
. Tassone, C., et al., Mobile device forensics: A snapshot. Trends and Issues in Crime and Criminal Justice, 2013(460): p. 1-7. DOI: https://doi.org/10.52922/ti239109
. Brungs, A. and R. Jamieson, Identification of legal issues for computer forensics. Information Systems Management, 2005. 22(2). DOI: https://doi.org/10.1201/1078/45099.22.2.20050301/87278.7
. Adams, C.W. Legal issues pertaining to the development of digital forensic tools. in 2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering. 2008. IEEE. DOI: https://doi.org/10.1109/SADFE.2008.17
. Pichan, A., M. Lazarescu, and S.T. Soh, Cloud forensics: technical challenges, solutions and comparative analysis. Digital investigation, 2015. 13: p. 38-57. DOI: https://doi.org/10.1016/j.diin.2015.03.002
. Bennett, D., The challenges facing computer forensics investigators in obtaining information from mobile devices for use in criminal investigations. Information Security Journal: A Global Perspective, 2012. 21(3): p. 159-168. DOI: https://doi.org/10.1080/19393555.2011.654317
. Kebande, V.R. and H.S. Venter, On digital forensic readiness in the cloud using a distributed agent-based solution: issues and challenges. Australian Journal of Forensic Sciences, 2018. 50(2): p. 209-238. DOI: https://doi.org/10.1080/00450618.2016.1194473
. Khan, A.A., et al., Digital forensics and cyber forensics investigation: security challenges, limitations, open issues, and future direction. International Journal of Electronic Security and Digital Forensics, 2022. 14(2): p. 124-150. DOI: https://doi.org/10.1504/IJESDF.2022.121174
. Noblett, M.G., M.M. Pollitt, and L.A. Presley, Recovering and examining computer forensic evidence. Forensic Science Communications, 2000. 2(4).
. Jekot, W., Computer forensics, search strategies, and the particularity requirement. Pitt. J. Tech. L. & Pol'y, 2006. 7: p. 1. DOI: https://doi.org/10.5195/TLP.2007.29
. Çiğdem Sıcakyüz, R. Rajab Asaad, S. Almufti, and N. R. Rustamova, “Adaptive Deep Learning Architectures for Real-Time Data Streams in Edge Computing Environments”, QTJ, vol. 3, no. 2, pp. 1–14, Jun. 2024, doi: 10.48161/qtj.v3n2a25. DOI: https://doi.org/10.48161/qtj.v3n2a25
. R. Asaad, R. Ismail Ali, and S. Almufti, “Hybrid Big Data Analytics: Integrating Structured and Unstructured Data for Predictive Intelligence”, QTJ, vol. 1, no. 2, Apr. 2022, doi: 10.48161/qtj.v1n2a14. DOI: https://doi.org/10.48161/qtj.v1n2a14