Skip to main content

Part of the book series: Springer Series in Wireless Technology ((SSWT))

  • 2135 Accesses

Abstract

Cyber Forensics is a science wherein the scientific examination and analysis of digital evidence are done so that the information obtained is put up into the presentable format which can be used as appropriate proof in the court of law. Cyber forensics has very much vast context associated with digital forensics including homeland security, information security, corporate espionage, economic spying, white collar crime, child pornography, traditional crime, incident response, employee monitoring, privacy issues, etc.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Baier H (2011/2012) Data acquisition and foundations of file system analysis. Hochschule Darmstadt, CASED, WS 2011/2012

    Google Scholar 

  • Choi Y, Lee J-Y, Choi S, Kim J-H, Kim I (2016) Introduction to a network forensics system for cyber incidents analysis. In: 18th international conference on advanced communication technology (ICACT)

    Google Scholar 

  • Coronel BD, Cedillo P, Campos K, Camacho J (2018) A systematic literature review in cyber forensics: current trends from the client perspective. IEEE Third Ecuador Technical Chapters Meeting (ETCM), pp 1–6

    Google Scholar 

  • ISO/IEC 27017 (2015) Information technology—security techniques—code of practice for information security controls based on ISO/IEC 27002 for cloud services

    Google Scholar 

  • ISO/IEC 27037 (2012) Information technology—security techniques—guidelines for identification, collection, acquisition and preservation of digital evidence. https://www.iso.org/standard/44381.html

  • ISO/IEC 27042 (2015) Information technology—security techniques—guidelines for the analysis and interpretation of digital evidence. https://www.iso.org/standard/44406.html

  • ISO/IEC 27041 (2015) Information technology—security techniques—guidance on assuring suitability and adequacy of incident investigative method

    Google Scholar 

  • ISO/IEC 27050-3 (2017) Information technology—security techniques—electronic discovery—Part 3: code of practice for electronic discovery. https://www.iso.org/standard/66231.html

  • Kent K, Chevalier S, Grance T, Dang H (2006) Guide to integrating forensic techniques into incident response-recommendations of the National Institute of Standards and Technology, U.S. Department of Commerce

    Google Scholar 

  • Khobragade PK, Malik LG (2014) Data generation and analysis for digital forensic application using data mining. In: Fourth international conference on communication systems and network technologies (CSNT), pp 458–462

    Google Scholar 

  • Lord N (2018) What are memory forensics?—a definition of memory forensics. Digital Guardian Blog on Data Protection. https://digitalguardian.com/blog/what-are-memory-forensics-definition-memory-forensics

  • Paganini P (2012) Analysis of cybercrime and its impact on private and military sectors. PenTest Mag Audit Stand 03

    Google Scholar 

  • Prem T, Paul Selwin V, Mohan AK (2017) Disk memory forensics—analysis of memory forensics frameworks flow. In: International conference on innovations in power and advanced computing technologies

    Google Scholar 

  • Raftopoulos E, Dimitropoulos X (2013) Understanding network forensics analysis in an operational environment. IEEE Security and Privacy Workshop (SPW), pp 111–118 (2013)

    Google Scholar 

  • Saibharath S, Geethakumari G (2015) Cloud forensics: evidence collection and preliminary analysis. In: IEEE international advance computing conference (IACC)

    Google Scholar 

  • Scarfone K, Grance T, Masone K (2008) Computer security incident handling guide. National Institute of Standards and Technology, Mar 2008

    Google Scholar 

  • Sekgwathe V, Talib M (2012) Cyber forensics: computer security and incident response. Int J New Comput Archit Their Appl 2(1):127–137

    Google Scholar 

  • Threat Encyclopedia (2013) 7 cybercrime scenarios you should avoid. TrendLabs Security Gallery

    Google Scholar 

  • West-Brown MJ, Stikvoort D, Kossakowski KP, Killcrece G, Ruefle R, Zajicek M (2003) Handbook for computer security incident response teams (CSIRTs), Apr 2003

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ramjee Prasad .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Prasad, R., Rohokale, V. (2020). Cyber Forensics. In: Cyber Security: The Lifeline of Information and Communication Technology. Springer Series in Wireless Technology. Springer, Cham. https://doi.org/10.1007/978-3-030-31703-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-31703-4_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-31702-7

  • Online ISBN: 978-3-030-31703-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics