Abstract
Cyber Forensics is a science wherein the scientific examination and analysis of digital evidence are done so that the information obtained is put up into the presentable format which can be used as appropriate proof in the court of law. Cyber forensics has very much vast context associated with digital forensics including homeland security, information security, corporate espionage, economic spying, white collar crime, child pornography, traditional crime, incident response, employee monitoring, privacy issues, etc.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Baier H (2011/2012) Data acquisition and foundations of file system analysis. Hochschule Darmstadt, CASED, WS 2011/2012
Choi Y, Lee J-Y, Choi S, Kim J-H, Kim I (2016) Introduction to a network forensics system for cyber incidents analysis. In: 18th international conference on advanced communication technology (ICACT)
Coronel BD, Cedillo P, Campos K, Camacho J (2018) A systematic literature review in cyber forensics: current trends from the client perspective. IEEE Third Ecuador Technical Chapters Meeting (ETCM), pp 1–6
ISO/IEC 27017 (2015) Information technology—security techniques—code of practice for information security controls based on ISO/IEC 27002 for cloud services
ISO/IEC 27037 (2012) Information technology—security techniques—guidelines for identification, collection, acquisition and preservation of digital evidence. https://www.iso.org/standard/44381.html
ISO/IEC 27042 (2015) Information technology—security techniques—guidelines for the analysis and interpretation of digital evidence. https://www.iso.org/standard/44406.html
ISO/IEC 27041 (2015) Information technology—security techniques—guidance on assuring suitability and adequacy of incident investigative method
ISO/IEC 27050-3 (2017) Information technology—security techniques—electronic discovery—Part 3: code of practice for electronic discovery. https://www.iso.org/standard/66231.html
Kent K, Chevalier S, Grance T, Dang H (2006) Guide to integrating forensic techniques into incident response-recommendations of the National Institute of Standards and Technology, U.S. Department of Commerce
Khobragade PK, Malik LG (2014) Data generation and analysis for digital forensic application using data mining. In: Fourth international conference on communication systems and network technologies (CSNT), pp 458–462
Lord N (2018) What are memory forensics?—a definition of memory forensics. Digital Guardian Blog on Data Protection. https://digitalguardian.com/blog/what-are-memory-forensics-definition-memory-forensics
Paganini P (2012) Analysis of cybercrime and its impact on private and military sectors. PenTest Mag Audit Stand 03
Prem T, Paul Selwin V, Mohan AK (2017) Disk memory forensics—analysis of memory forensics frameworks flow. In: International conference on innovations in power and advanced computing technologies
Raftopoulos E, Dimitropoulos X (2013) Understanding network forensics analysis in an operational environment. IEEE Security and Privacy Workshop (SPW), pp 111–118 (2013)
Saibharath S, Geethakumari G (2015) Cloud forensics: evidence collection and preliminary analysis. In: IEEE international advance computing conference (IACC)
Scarfone K, Grance T, Masone K (2008) Computer security incident handling guide. National Institute of Standards and Technology, Mar 2008
Sekgwathe V, Talib M (2012) Cyber forensics: computer security and incident response. Int J New Comput Archit Their Appl 2(1):127–137
Threat Encyclopedia (2013) 7 cybercrime scenarios you should avoid. TrendLabs Security Gallery
West-Brown MJ, Stikvoort D, Kossakowski KP, Killcrece G, Ruefle R, Zajicek M (2003) Handbook for computer security incident response teams (CSIRTs), Apr 2003
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Prasad, R., Rohokale, V. (2020). Cyber Forensics. In: Cyber Security: The Lifeline of Information and Communication Technology. Springer Series in Wireless Technology. Springer, Cham. https://doi.org/10.1007/978-3-030-31703-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-31703-4_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-31702-7
Online ISBN: 978-3-030-31703-4
eBook Packages: EngineeringEngineering (R0)