ISSN Print: 2381-1110  ISSN Online: 2381-1129
American Journal of Computer Science and Information Engineering  
Manuscript Information
 
 
Establishing a Process for Cyber Related Crimes Investigation Through Digital Forensics
American Journal of Computer Science and Information Engineering
Vol.5 , No. 1, Publication Date: May 16, 2018, Page: 9-14
921 Views Since May 16, 2018, 460 Downloads Since May 16, 2018
 
 
Authors
 
[1]    

Dipo Theophilus Akomolafe, Department of Mathematical Sciences, Ondo State University of Science and Technology, Okitipupa, Ondo State, Nigeria.

[2]    

Abiola Olawale Ilori, Department of Mathematical Sciences, Ondo State University of Science and Technology, Okitipupa, Ondo State, Nigeria.

[3]    

Yerokun Oluwatoyin Mary, Department of Computer Science Education, Federal College of Education (Technical), Asaba, Delta State, Nigeria.

 
Abstract
 

As cyber related criminal attacks become more predominant in today’s technologically driven society, the need for digital evidence to prosecute such activities has increased. The process used to acquire this digital evidence is digital forensics, a branch of Computer Science. Digital forensic is a new and developing field, still in its infancy, when compared to traditional forensic fields. Over the years, investigation in digital forensic field has been tool centered and being propelled by commercial developers. This, along with lack of established standards to guide digital forensics practitioners has raised divergent and confusing issues in the acceptability of digital evidence. Issues regarding the reliability, confidentiality, verifiability and consistency of digital evidences have been the major obstacles in the acceptance of digital evidence. Consequently, this paper aimed at addressing issues regarding digital forensics investigation process, methods, methodologies and standards for acquiring and preserving digital evidence using the grounded theory approach. Data were gathered using literature surveys, questionnaires and electronic interviews. The results obtained in the study pointed to the fact that there were no existing standards in place for digital forensics investigation process. A framework and methodology was established to address the identified issues thus laying the foundation for a single integrated approach to digital forensics.


Keywords
 

Digital Forensics, Digital Evidence, Cybercrimes, Grounded Theory


Reference
 
[01]    

Carlton, G. H. (2007). “A grounded theory approach to identifying and measuring forensic data acquisition tasks”. Journal of Digital Forensics, Security and Law, 2 (1), 35-55.

[02]    

Carrier, B. D. and Spafford, E. (2004). “An event based Digital Forensics Investigation Framework.” Center for Education and Research in Information Assurance and Security.

[03]    

Casey, E. (2011). “Digital Evidence and Computer Crime, Forensic science, Computers and the Internet”. Academic Press, London, UK.

[04]    

Chaikin D. (2007). “Network Investigations of Cyber Attacks: The limits of digital evidence, Springer Science and Business Media”.

[05]    

Hall, B. and Howard, K. (2008). “A Synergistic Approach: Conducting Mixed Methods Research With Typological and Systemic Design Considerations”. Journal of Mixed Methods Research, 2 (3) 248-269.

[06]    

Harbawi Malek, and Asaf Varol. "The role of digital forensics in combating cybercrimes". Digital Forensic and Security (ISDFS), 2016 4th International Symposium on. IEEE, 2016.

[07]    

Kent, Karen, et al. (2006). "Guide to integrating forensic techniques into incident response." NIST Special Publication 10: 800-86.

[08]    

Kessler, G. C. (2010). “Judges’ awareness, understanding, and application of digital evidence” (Doctoral dissertation, Nova Southeastern University).

[09]    

Lillis David, et al. (2016). "Current Challenges and Future Research Areas for Digital Forensic Investigation". arXiv preprint arXiv:1604.03850.

[10]    

Metropolitan Police Service (2015). Information for Prospective Bidders, Digital Cyber and Communications Forensics Unit.

[11]    

Nance, K., Hay, B. and Bishop, M. (2009). “Digital forensics: Defining a research agenda”. Proceedings of the Forty-Second Annual Hawai'i International Conference on System Sciences. Los Alamitos, CA: IEEE Press.

[12]    

Schatz, B. (2010). “Towards reliable volatile memory acquisition by software”. Digital investigation, 4, 126-134.





 
  Join Us
 
  Join as Reviewer
 
  Join Editorial Board
 
share:
 
 
Submission
 
 
Membership