Authors
Preeti Kiran, Ranjeet K. Singh
Abstract
As the world is entering into the digital era and the entire information about a person could be found online, so the reporting of computer crimes are increasing daily. To solve computer crimes, it is necessary to study digital forensics, which includes the methodology of retrieving and examination of content stored on digital devices, including desktops, laptops, smartphones, etc. Due to the vulnerabilities that have caused an increase in computer crime, there are numerous tools present for the analysis of these vulnerabilities. Examiners need a solution that puts all of the knowledge together and automates some of the repetitive acquisition and processing processes, freeing up time for deeper study. In this paper, various forensic tools are described which could be used for identification, collection, examination, and analysis, and reporting of digital evidence. Analysis of digital evidence includes disk imaging, memory capture, web browser history analysis, and various logs, etc., found in the system or network. Keywords: Digital Forensics, Computer Forensics, Cybercrime, Computer Crime, Computer Tools.
Introduction
Digital forensic was known little regarding the methodology of retrieving and examination of content stored on digital devices, including desktops, laptops, and smartphones, etc. In recent years, however, as cybercrime is on an increasingly wide scale and digital technologies are being rapidly embraced, the digital forensic field has gained tremendous prominence, contributing to what was historically limited to the recovery and analysis of biological and chemical evidence during criminal investigations (Pande, Jitendra, and Prasad, 2016).
Computer forensic (branch of digital forensics) collects, preserves, analyses, and presents evidence related to computers. Digital evidence is often useful in criminal cases, civil disputes, and human resources or industrial proceedings (Vacca and John, 2005). Computer crimes are criminal abuses of computer technology expertise for their actions, investigation, or prosecution. Computer-related crimes are white-collar crimes i.e., any criminal act based on computer technology may be a crime against the technology. Computer crime cannot only include computers actively but passively as the evidence of action is stored in the data form. Computer crime victims and possible victims include anyone who uses or is influenced by computing systems and data processing systems, including those who store and process data on their computers (Parker, 1989).
It is difficult to assess the first or early stage of the “Computer Forensic” analysis. Yet most experts believe that more than 30 years ago, computer forensics started to evolve. The sector started primarily in the United States where police and military authorities started to see criminals getting technical. In response to possible safety breaches, government agencies responsible for securing valuable, privy, and inevitably confidential information performed forensic investigations not to investigate a particular breach, but also learn how to prevent any future violations. Ultimately, the fields of cyber management, focusing on cyber and assets safety and computer forensics focusing on responding to high-tech violations, started to intertwine.
The field is evolving over the following decades and until today. It has been introduced by both the government and private organizations and businesses- using internal information management and forensic computer practitioners and contracting these practitioners or companies as necessary. Significantly, the private legal sector has recently undergone an increase in the area of discovery and the need for computer forensic exams and civil legal disputes (Pande, Jitendra, and Prasad, 2016).
References
Altheide, Cory, and Harlan A. Carvey. Digital Forensics with Open Source Tools. Syngress, 2011.
Balogh, Stefan, and Matej Pondelik. “Capturing Encryption Keys for Digital Analysis.” Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 15 Sept. 2011, pp. 759–763.
Coronel, Bryan, et al. “A Systematic Literature Review in Cyber Forensics: Current Trends from the Client Perspective.” 2018 IEEE Third Ecuador Technical Chapters Meeting (ETCM), Oct. 2018, pp. 1–6.
Garfinkel, Simson L. “Digital Forensics Research: The next 10 Years.” The International Journal of Digital Forensics & Incident Response, vol. 7, Aug. 2010, pp. 64–73.
Guo, Hong, et al. “Research and Review on Computer Forensics.” Forensics in Telecommunications, Information, and Multimedia, 2010, pp. 224–233.
Hatole, Pranali P., and Shobha K. Bawiskar. “Literature Review of Email Forensics.” Imperial Journal of Interdisciplinary Research, vol. 3, no. 4, Apr. 2017.
Kaur, Mandeep, et al. “A Literature Review on Cyber Forensic and Its Analysis Tools.” Ijarcce, vol. 5, no. 1, 2016, pp. 23–28.
Kumar, Mohit. “A Detailed Study to Examine Digital Forensics and Cyber Security: Trends and Patterns in India.” International Journal of Forensic Science, vol. 5, no. 2, 1st May 2020.
Law, Frank Y.w., et al. “Protecting Digital Data Privacy in Computer Forensic Examination.” 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011, pp. 1–6.,
Lim, Kyung Soo, et al. “Applying a Stepwise Forensic Approach to Incident Response and Computer Usage Analysis.” IEEE, 10th Dec. 2009.
Marrington, Andrew, et al. “A Model for Computer Profiling.” 2010 International Conference on Availability, Reliability and Security, 2010, pp. 635–640.
Nassif, Luis Filipe Da Cruz, and Eduardo Raul Hruschka. “Document Clustering for Forensic Computing: An Approach for Improving Computer Inspection.” 2011 10th International Conference on Machine Learning and Applications and Workshops, 2011, pp. 265–268.
Parker, Donn B. Criminal Resource Justice Manual. National Institute of Justice, 1989, Accessed Date 09th October 2020.
Raghavan, Sriram, and S V Raghavan. “A Study of Forensic & Analysis Tools.” IEEE, 21st Nov. 2013.
Shaaban, Ayman, and Konstantin Sapronov. Practical Windows Forensics: Leverage the Power of Digital Forensics for Windows Systems. Packt Publishing, 2016.
Simou, Stavros, et al. “Cloud Forensics Solutions: A Review.” Lecture Notes in Business Information Processing, June 2014, pp. 299–309.
Suteva, Natasa, et al. “Computer Forensic Analysis of Some Web Attacks.” World Congress on Internet Security (WorldCIS-2014), 2014, pp. 42–47.
Vacca, John R., Computer Forensics: Computer Crime Scene Investigation, Second ed., Charles River Media Inc, 2005.
Wiles, Jack, and Anthony Reyes., Cyber Crime and Digital Forensics, Elsevier Inc., 2007.
How to cite this article?
APA Style | Kiran, P. & Singh, Dr. R. K. (2020). Role of Computer Analysis Tools in Forensic Science. Academic Journal of Forensic Sciences, 03(02), 17-25. |
Chicago Style | |
MLA Style | |
DOI | |
URL |