CFP last date
20 May 2024
Reseach Article

Scientific Awareness about the Computer Forensic to Face the E-Criminal Activities of the E-User

by M. Nawaz Brohi, Rukshanda Kamran
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 4
Year of Publication: 2012
Authors: M. Nawaz Brohi, Rukshanda Kamran
10.5120/7618-0668

M. Nawaz Brohi, Rukshanda Kamran . Scientific Awareness about the Computer Forensic to Face the E-Criminal Activities of the E-User. International Journal of Computer Applications. 49, 4 ( July 2012), 32-37. DOI=10.5120/7618-0668

@article{ 10.5120/7618-0668,
author = { M. Nawaz Brohi, Rukshanda Kamran },
title = { Scientific Awareness about the Computer Forensic to Face the E-Criminal Activities of the E-User },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 4 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 32-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number4/7618-0668/ },
doi = { 10.5120/7618-0668 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:45:47.814175+05:30
%A M. Nawaz Brohi
%A Rukshanda Kamran
%T Scientific Awareness about the Computer Forensic to Face the E-Criminal Activities of the E-User
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 4
%P 32-37
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Computer has influenced our daily work, activities and played a vital role in every corner of our life. We are surfing the net for news, jobs, entertainment, transferring information and data online, purchasing, checking accounts, sending and receiving emails almost every day. For this widespread use, some computer users have misused this technology in illegal activities. As a result the computer forensic and investigation has emerged to carry out the investigation process for solving and discovering different types of internet or computer crimes and bring it to the court. In the paper we will discuss the challenging aspects of forensic investigation, skills needed by a computer forensics, knowledge needed by computer forensic investigator, and phases of computer forensic investigation. Overall the purpose of the paper is to provide the scientific awareness about the computer forensic to face the e-criminal activities of the e-user.

References
  1. Richard Nolan, Colin O'Sullivan, Jake Branson, and Cal Waits. 2005. First Responders Guide to Computer Forensics. CERT Training and Education, March 2005. http://www. us-cert. gov/reading_room/forensics. pdf Computer Forensic Produced in 2008 by US-CERT, a government organization.
  2. Gary Palmer. 2001. A Road Map for Digital Forensic Research, Report from DFRWS 2001, First Digital Forensic Research Workshop, Utica, New York, August 7 – 8, 2001, Page(s) 27–30
  3. Yong, J. J. 2009. Computer Forensics Career - What Does a Computer Forensic Investigator Actually Do? 17 Feb. 2009 EzineArticles. com.
  4. McCann Investigators Today, 6 Feb 2012 http://investigatorstoday. com/banner/mccann-investigations-in-dallas-texas. html.
  5. Simson Garfinkel. 2007. Anti-Forensics: Techniques, Detection and Countermeasures, Naval Postgraduate School, Monterey, CA, USA, 2007.
  6. Ranklin Witter. 2001. Legal Aspects of Collecting and Preserving Computer Forensic Evidence, GSEC Practical v1. 2c SANS Triangle Park Security Essentials Course, April 20, 2001.
  7. Eoghan, Casey. 2004. Digital evidence and computer crime, forensic science, computers and the internet, academic press, second edition, 2004.
  8. Digital evidence field guide, what every peace officer must know, continuing education series 1. 1. , US department of justice federal bureau of investigation, 2007.
  9. Brian Carrier. 2002. Defining Digital Forensic Examination and Analysis Tools. In Digital Research Workshop II, Available at: http://www. dfrws. org.
  10. Slim Rekhis. 2007. Theoretical Aspects of Digital Investigation of Security Incidents, Oct. 2007 CNAS REPORT CNAS-2008-103 Supersedes CNAS-2007-101
  11. Yun Wang, James Cannady, and James Rosenbluth. 2005. Foundations of computer forensics: A technology for the fight against computer crime. Computer Law and Security Report, 21(2):119–127, 2005.
  12. http://www. justice. gov/criminal/cybercrime/ (Computer Crime & Intellectual Property Section).
  13. Jessy, Jeslyn "What Are the Skills Needed by a Computer Forensics Accountant?" What Are the Skills Needed by a Computer Forensics Accountant? 9 Jul. 2009 EzineArticles. com
  14. Gary C. Kessler. 1998. An Overview of Cryptography, edited version of this paper appears in the 1999 Edition of Handbook on Local Area Networks, published by Auerbach in September 1998. http://www. garykessler. net/library/crypto. html (17 November 2006).
Index Terms

Computer Science
Information Sciences

Keywords

forensics computer forensic anti-forensics forensic investigation encryption decryption intruder