Posts

Showing posts from March, 2019

Digital Forensics: Investigation VS Security

Image
Digital Forensics: Investigation VS Security  by David Mugisha,  Student of  Ms.Digital Forensics and Information Security (Gujarat Forensic Sciences University) Abstract : The past decade has seen previously unimagined advances in technology, and although those developments have benefited individuals and businesses alike, they have also become tools for fraudsters and cyber criminals to steal money and data, and avoid detection. Hackers use technology to hide their illicit activities and to move funds across jurisdictions and around the globe. Their operations are complex and they have significant resources to help them evade detection. This means that those tasked with investigating cyber criminal activity have had to keep pace. We are seeing a new breed of investigators, the digital forensic practitioner, Cyber Security professionals who traces these criminals and their activities. As with other types of evidence, the courts make no presumption tha...

ANDROID APPLICATION MALWARE ANALYSIS

Image
ANDROID APPLICATION MALWARE ANALYSIS by David Mugisha,  Student of  Ms.Digital Forensics and Information Security (Gujarat Forensic Sciences University ABSTRACT: Mobile devices have enjoyed unprecedented growth in the last decade. As devices become more ubiquitous and users place more sensitive data on their devices, the amount of mobile malware in the wild has grown. Nowadays, malicious software, which is also known as malware, imposes a larger threat to these mobile devices. Recently, many news items were posted about the increase of the Android malware. There were a lot of Android applications pulled from the Android Market because they contained malware. The vulnerabilities of those Applications or Android operating systems are being exploited by the attackers who got the capability of penetrating into the mobile systems without user authorization causing compromise the confidentiality, integrity and availability of the applications and the user. Lack ...

WEB BROWSER FORENSICS: Evidence collection And Analysis for Most Popular Web Browsers usage in Windows 10

Image
ABSTRACT: A web browser is an essential application program for accessing and performing various activities on the internet such as browsing internet, email, financial transaction, download files and videos, accessing social media application, etc. As web browser is the only way to access the internet and cybercrime criminals use the web browser to commit the internet crimes. It is essential for the digital forensic examiners and particularly for computer forensic investigators, to collect and analyze artifacts related to web browser usage from suspect’s device machine. There are various browsers used such as Google Chrome, Firefox Mozilla, Internet Explorer, Safari, opera, etc, among which Google chrome is very popular among the internet user community. In this Research paper, we collected and analyzed different artifacts such as history, cookies, cache, Session Restore, flash & super cookies,   etc on Windows 10 operating System installed Google chrome, Fire...

8th Annual INTERPA Conference 2019 : Methods And Implementation To Combat Cyber Crimes In Rwanda

Image
Description  Rwanda’s ICT usage and adoption have incredibly increased with more using internet in different aspects, including communication, financial services, business transactions, data management, education, medical services, agriculture and other country services. With the advent of these advancements in information accessibility and the advantages and applications of the internet comes an exponentially growing disadvantage of Cyber Crime. Cyber security has risen to become a national concern and has taken more seriously. Government of Rwanda adopted a national cyber security policy in 2015 to help safeguard government information and infrastructure against a growing number of cyber-attacks. This presentation was presented by David Mugisha (GFSU, Masters Student) in 8th Annual INTERPA Conference. It attempts to provide an overview of Cybercrime and Cyber threats in Rwanda, National cyber security governance framework 2015-2020, methods and strategy implementation to ...

3rd National Forensic Conference 2019 -Topic:The Power of Digital Forensics in Resolving cyber crime cases

Image
Description: This presentation was presented at Bihar state, in 3rd National forensic conference to law enforcement practitioners ,heads of forensics laboratories, Chief Military delegates, heads of Intelligence agencies, lawyers and Entrepreneurs from Bihar state. Deputy Chief Minister of Bihar Sushil Kumar Modi and Hon’ble Vinod Narayan Jha (PHED) were guests of honour in this conference. It covers an overview of digital forensics, its purpose and goals. it is also present digital crime classification, digital evidences, some branches of digital forensics in details including computer forensics, mobile forensics, Network forensics, wireless Forensics and anti-Forensics. 3rd National Forensic Conference was organized by Forensic Investigations & Consultancy Services with partnership of Bihar Entrepreneurs Association(BEA), at Bihar Entrepreneurs Association, Old Secretariat, Patna, Bihar on 24th January, 2019. Read full Presentation

Role and Impact of Digital Forensics in Cyber Crime Investigations

Image
ABSTRACT Cyber-crime is a growing problem, but the ability law enforcement agencies to investigate and successfully prosecute criminals for these crimes are unclear. While law enforcement agencies have been conducting these investigations for many years, the previously published needs assessments all indicated that there is lack the training, tools, or staff to effectively conduct investigations with the volume or complexity included many of these cases. This study discussed on Cyber crime and Global Economic Growth, Reasons for Conducting a Digital Forensic Investigation, Various Branches of Digital Forensics in details, Potential Source of Digital Evidence, standard operating procedure for digital evidence, Legal Aspects and What the Future Holds in the field of  digital forensics. Read full article click link below : https://www.researchgate.net/publication/331991596_ROLE_AND_IMPACT_OF_DIGITAL_FORENSICS_IN_CYBER_CRIME_INVESTIGATIONS

Introduction To Big Data Forensics

Image
Introduction Big Data forensics is a new type of forensics, just as Big Data is a new way of solving the challenges presented by large, complex data. Thanks to the growth in data and the increased value of storing more data and analyzing it fast—Big Data solutions have become more common and more prominently positioned within organizations. As such, the value of Big Data systems has grown, often storing data used to drive organizational strategy, identify sales, and many different modes of electronic communication. The forensic value of such data is obvious: if the data is useful to an organization, then the data is valuable to an investigation of that organization. The information in a Big Data system is not only inherently valuable, but the data is most likely organized and analyzed in such a way to identify how the organization treated the data. Big Data forensics is the forensic collection and analysis of Big Data systems. Traditional computer forensics typically foc...

Social Media Forensics: Investigative Process For Law Enforcement Agencies

Image
Social media Forensics:  Investigative Process For Law Enforcement Agencies by David Mugisha  (Gujarat Forensic Science University)                              Introduction Various social networking sites (SNSs), widely referred to as social media, provide services such as email, blogging, instant messaging and photo sharing for social and commercial interactions. SNSs are facilitating new forms of social interaction, dialogue, exchange and collaboration. They allow millions of users and organisations worldwide to exchange ideas, post updates and comments or participate in activities and events, while sharing their wider interests. At the same time, such a phenomenon has led to an upsurge in significant criminal activities by perpetrators who are becoming increasingly sophisticated in their attempts to deploy technology to circumvent detection. Law enforcement agencies often face seriou...