Cyber Crime Forensics

S. Subair, Derar Yosif, A. Ahmed, Christopher Thron
{"title":"Cyber Crime Forensics","authors":"S. Subair, Derar Yosif, A. Ahmed, Christopher Thron","doi":"10.54938/ijemdcsai.2022.01.1.37","DOIUrl":null,"url":null,"abstract":"Cyber crime is becoming more frequent in our daily life since computers are everywhere now and hence the term cyberspace is becoming our ordinary life. Digital forensics or computer forensics which the process of securing digital evidence against the crime is becoming inevitable. Digital evidence is the foundation for any digital forensic investigation that can be collected by several means using technologies and scientific crime scene investigation. Modifications with crime scene data may possibly change the evidences that may lead to different  investigation results. Several models and frameworks to help investigating cybercrimes have been proposed. In this paper we are proposing a frame work that to suit the Sudanese judiciary system. The framework suggested studied several models and frameworks in the globe to come out with a suitable framework model that can help the Sudanese courts taking their decisions concerning cybercrime. The conventional chain of custody is our main platform to construct our framework. That is due to fact that computer crime is different from conventional crime in that it may have no definite place or space. Although The share of people in computer crime is more crucial than the technology itself, achieving evidence integrity is more challenging than normal crimes. This work aims to study and evaluate the applicability of existing digital forensic process models to the Sudanese environment,  analyze each of these frameworks might and then construct a framework to Sudan courts.","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54938/ijemdcsai.2022.01.1.37","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Cyber crime is becoming more frequent in our daily life since computers are everywhere now and hence the term cyberspace is becoming our ordinary life. Digital forensics or computer forensics which the process of securing digital evidence against the crime is becoming inevitable. Digital evidence is the foundation for any digital forensic investigation that can be collected by several means using technologies and scientific crime scene investigation. Modifications with crime scene data may possibly change the evidences that may lead to different  investigation results. Several models and frameworks to help investigating cybercrimes have been proposed. In this paper we are proposing a frame work that to suit the Sudanese judiciary system. The framework suggested studied several models and frameworks in the globe to come out with a suitable framework model that can help the Sudanese courts taking their decisions concerning cybercrime. The conventional chain of custody is our main platform to construct our framework. That is due to fact that computer crime is different from conventional crime in that it may have no definite place or space. Although The share of people in computer crime is more crucial than the technology itself, achieving evidence integrity is more challenging than normal crimes. This work aims to study and evaluate the applicability of existing digital forensic process models to the Sudanese environment,  analyze each of these frameworks might and then construct a framework to Sudan courts.
网络犯罪取证
网络犯罪在我们的日常生活中变得越来越频繁,因为现在电脑无处不在,因此网络空间这个词正在成为我们的日常生活。数字取证或计算机取证的过程中,确保数字证据的犯罪是不可避免的。数字证据是任何数字法医调查的基础,可以通过多种手段利用技术和科学的犯罪现场调查来收集。对犯罪现场数据的修改可能会改变证据,从而导致不同的侦查结果。已经提出了一些模型和框架来帮助调查网络犯罪。在本文中,我们提出了一个适合苏丹司法系统的框架。建议的框架研究了全球几种模型和框架,以得出一个合适的框架模型,可以帮助苏丹法院就网络犯罪作出决定。传统的监管链是我们构建框架的主要平台。这是因为计算机犯罪与传统犯罪不同,它可能没有确定的地点或空间。虽然计算机犯罪中人的比例比技术本身更重要,但实现证据完整性比普通犯罪更具挑战性。这项工作旨在研究和评估现有数字法医过程模型对苏丹环境的适用性,分析这些框架中的每一个,然后构建一个适用于苏丹法院的框架。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信