UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 6
June-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1907O10


Registration ID:
223788

Page Number

56-63

Share This Article


Jetir RMS

Title

A Study of Digital Forensic Tools and its Process for Cyber Crime Investigation

Abstract

Computer forensics is the process of using the latest knowledge of science and technology with computer sciences to collect, analyze and present proofs to the criminal or civil courts. Network administrator and security staff administer and manage networks and information systems should have complete knowledge of computer forensics. The meaning of the word “forensics” is “to bring to the court”. Forensics is the process which deals in finding evidence and recovering the data. The evidence includes many forms such as finger prints, DNA test or complete files on computer hard drives etc. The consistency and standardization of computer forensics across courts is not recognized strongly because it is new discipline. It is necessary for network &System administrator and security staff of networked organizations to practice computer forensics and should have knowledge of laws because rate of cyber crimes is increasing greatly. It is very interesting for mangers and personnel who want to know how computer forensics can become a strategic element of their organization security. Personnel, security staff and network administrator should know all the issues related to computer forensics. Computer experts use advanced tools and techniques to recover deleted, damaged or corrupt data and evidence against attacks and intrusions. These evidences are collected to follow cases in criminal and civil courts against those culprits who committed computer crimes. The survivability and integrity of network infrastructure of any organization depends on the application of computer forensics. In the current situations computer forensics should be taken as the basic element of computer and network security. It would be a great advantage for your company if you know all the technical and legal aspects of computer forensics. If your network is attacked and intruder is caught then good knowledge about computer forensics will help to provide evidence and prosecute the case in the court.

Key Words

Computer forensics, Digital forensics, Cyber security & Cyber crime.

Cite This Article

"A Study of Digital Forensic Tools and its Process for Cyber Crime Investigation", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 6, page no.56-63, June 2019, Available :http://www.jetir.org/papers/JETIR1907O10.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"A Study of Digital Forensic Tools and its Process for Cyber Crime Investigation", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 6, page no. pp56-63, June 2019, Available at : http://www.jetir.org/papers/JETIR1907O10.pdf

Publication Details

Published Paper ID: JETIR1907O10
Registration ID: 223788
Published In: Volume 6 | Issue 6 | Year June-2019
DOI (Digital Object Identifier):
Page No: 56-63
Country: Rohtak, Haryana, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002948

Print This Page

Current Call For Paper

Jetir RMS