Abstract
Computers are an integral part of our life. A significant percentage of today’s transactions and processes take place using the computer and Internet. People have readily adopted Internet technology and innocently trust it while using it with the ignorance of the limitations and threats to the system security. With the advance of technology, equally or more advanced form of crimes started emerging. Different types of cyber attacks from various sources may adversely affect computers, software, a network, an agency’s operations, an industry, or the Internet itself. Thus companies and their products aim to take assistance of legal and computer forensics. Digital forensics deals with computer-based evidence to determine who, what, where, when, and how crimes are being committed. Computer and network forensics has evolved to assure proper presentation of cyber crime evidentiary data into court. Forensic tools and techniques are an integral part of criminal investigations used to investigate suspect systems, gathering and preserving evidence, reconstructing or simulating the event, and assessing the current state of an event. In this paper we deliberate on two aspects; first, various types of crimes in the cyber space and various sources of cyber attacks, and second, investigation processes for various cyber attacks with the help of digital forensic tools like WinHex [1].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
WinHex (http://www.WinHex.com)
Carrier, B.D., Spafford, E.H.: Categories of digital investigation analysis techniques based on the computer history model. J. Digit Invest. Sci. 3S, S121–S130 (2006)
Di Pietro, R., Verde, N.V.: Digital forensic techniques and tools chapter 17 of security handbook of electronic security and digital forensics
Choi, J., Savoldi, A., Gubian, P., Lee, S., Lee, S.: Live forensic analysis of a compromised Linux system using LECT (Linux Evidence Collection Tool) 2008 IEEE
Arasteh, A.R., Debbabi, M., Sakha, A., Saleh, M.: Analyzing multiple logs for forensic evidence. Digit. Invest. J. Sci. 4S, S82–S91 (2007)
Casey, E.: Network traffic as a source of evidence: tool strengths, weaknesses, and future needs. Digit. Invest. J. 9–148 (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Sindhu, K.K., Kombade, R., Gadge, R., Meshram, B.B. (2014). Forensic Investigation Processes for Cyber Crime and Cyber Space. In: Sathiakumar, S., Awasthi, L., Masillamani, M., Sridhar, S. (eds) Proceedings of International Conference on Internet Computing and Information Communications. Advances in Intelligent Systems and Computing, vol 216. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1299-7_19
Download citation
DOI: https://doi.org/10.1007/978-81-322-1299-7_19
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1298-0
Online ISBN: 978-81-322-1299-7
eBook Packages: EngineeringEngineering (R0)