2017
DOI: 10.4018/ijisp.2017040103
|View full text |Cite
|
Sign up to set email alerts
|

Digital Forensic Analysis of Cybercrimes

Abstract: This paper reviews the existing methodologies and best practices for digital investigations phases like collecting, evaluating and preserving digital forensic evidence and chain of custody of cybercrimes. Cybercriminals are adopting new strategies to launch cyberattacks within modified and ever changing digital ecosystems, this article proposes that digital investigations must continually readapt to tackle cybercrimes and prosecute cybercriminals, working in international collaboration networks, sharing preven… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 16 publications
(3 reference statements)
0
2
0
Order By: Relevance
“…Identity theft is a common cybercriminal tactic that involves fraudulently using someone's personal information, often targeting Internet banking services. Cybercriminals can exploit stolen information for activities like opening bank accounts, obtaining credit cards or loans and fraudulently accessing state benefits (Sabillon et al, 2017).…”
Section: Jfcmentioning
confidence: 99%
“…Identity theft is a common cybercriminal tactic that involves fraudulently using someone's personal information, often targeting Internet banking services. Cybercriminals can exploit stolen information for activities like opening bank accounts, obtaining credit cards or loans and fraudulently accessing state benefits (Sabillon et al, 2017).…”
Section: Jfcmentioning
confidence: 99%
“…Perpetrators of crimes can be subject to punishment based on the evidence [4]. Digital criminals usually use anti-forensic techniques thus causing difficulties to find the digital evidence [5]. One of the anti-forensic techniques is steganography [6].…”
Section: Introductionmentioning
confidence: 99%