2018
DOI: 10.14419/ijet.v7i3.19.16985
|View full text |Cite
|
Sign up to set email alerts
|

A Multi-level Evidence-based Cyber Crime Prosecution Information System

Abstract: This research work was designed to utilize multi-level cyber crime detection and control system to provide enhanced real-time evidence to cyber crime investigators to aid them in prosecuting cyber criminals. The design was based on a robust system combining user-identity, device identity, geographical location and user activities to provide evidences to uniquely identify a cyber user and detect crimes committed. The system captures the user’s facial image and biometric finger print as mandatory login parameter… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…The first line of defense is typically deployed on the network perimeter: a boundary of a network that is composed of various Internet-facing devices, including boundary routers and firewalls. These are configured to block any easily-identifiable illegitimate traffic [3]. The second line of defense is an IDS: a system built to analyze events within the network for any evidence of ongoing malicious activities.…”
Section: Introductionmentioning
confidence: 99%
“…The first line of defense is typically deployed on the network perimeter: a boundary of a network that is composed of various Internet-facing devices, including boundary routers and firewalls. These are configured to block any easily-identifiable illegitimate traffic [3]. The second line of defense is an IDS: a system built to analyze events within the network for any evidence of ongoing malicious activities.…”
Section: Introductionmentioning
confidence: 99%