{"title":"The Role of Raspberry Pi in Forensic Computer Crimes","authors":"B. Fakiha","doi":"10.58346/jisis.2023.i4.005","DOIUrl":null,"url":null,"abstract":"This study examined the use of Raspberry Pi for forensic analysis and its potential for providing computer protection. It investigates its capability to identify suspicious patterns on USB drives and its compatibility with certain software. Furthermore, it examines the ability of the Raspberry Pi to generate reports and send email notifications upon detection of any malicious files such as worms, Trojans, and spyware. Additionally, it investigates Raspberry Pi's ability to move potentially malicious files to a secure trash folder for sanitization. The experiment was designed using an experimental method. The findings suggest that the Raspberry Pi can provide computer protection through automatic report generation and email notifications for malicious file detection. As a result, this study provides evidence that Raspberry Pi can effectively provide digital forensics services. Its quick file search capabilities make it a powerful tool that can help organizations gather crucial digital evidence that may otherwise remain undetected.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"31 4","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Internet Services and Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58346/jisis.2023.i4.005","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0
Abstract
This study examined the use of Raspberry Pi for forensic analysis and its potential for providing computer protection. It investigates its capability to identify suspicious patterns on USB drives and its compatibility with certain software. Furthermore, it examines the ability of the Raspberry Pi to generate reports and send email notifications upon detection of any malicious files such as worms, Trojans, and spyware. Additionally, it investigates Raspberry Pi's ability to move potentially malicious files to a secure trash folder for sanitization. The experiment was designed using an experimental method. The findings suggest that the Raspberry Pi can provide computer protection through automatic report generation and email notifications for malicious file detection. As a result, this study provides evidence that Raspberry Pi can effectively provide digital forensics services. Its quick file search capabilities make it a powerful tool that can help organizations gather crucial digital evidence that may otherwise remain undetected.