Digital Forensics: Investigation VS Security
Digital Forensics: Investigation VS Security
by David Mugisha,
Student of Ms.Digital Forensics and Information Security
(Gujarat Forensic Sciences University)
Student of Ms.Digital Forensics and Information Security
(Gujarat Forensic Sciences University)
Abstract :
The past decade has seen previously unimagined advances in technology, and although those developments have benefited individuals and businesses alike, they have also become tools for fraudsters and cyber criminals to steal money and data, and avoid detection.
Hackers use technology to hide their
illicit activities and to move funds across jurisdictions and around the globe.
Their operations are complex and they have significant resources to help them
evade detection.
This means that those tasked with
investigating cyber criminal activity have had to keep pace. We are seeing a
new breed of investigators, the digital forensic practitioner, Cyber Security
professionals who traces these criminals and their activities.
As with other types of evidence, the courts make no
presumption that digital evidence is reliable without some evidence of
empirical testing in relation to the theories and techniques associated with
its production. The issue of reliability means that courts pay close attention
to the manner in which electronic evidence has been obtained and in particular
the process in which the data is captured and stored. Use of Digital Forensics helps investigators and
prosecutors to get Digital Evidences that are acceptable and support them
before criminal or civil courts.
Additional, Security in modern infrastructure and networked
cyber-physical systems (CPSs) has become a critical problem to the countries,
companies and organisations. They either lack of security protection or the
corresponding security protocols deployed in such systems are not corresponding
with their criticality. In fact, they have become a ripe target for
cyber-attacks. Security
professionals and cyber security teams need digital forensic tools and
techniques to analyze cyber attacks and network intrusions—not to convict the
attackers but to understand how the perpetrator gained access and to plug the
hole.
This article attempts to the use of Digital Forensics in Investigation compared to its use in Security
Read Full Article :
https://www.researchgate.net/ publication/332104265_Digital_ Forensics_Investigation_VS_ Security
This article attempts to the use of Digital Forensics in Investigation compared to its use in Security
Read Full Article :
https://www.researchgate.net/

Comments