Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime.
Saved in:
| Title: | Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime. |
|---|---|
| Authors: | Drobotov, Serhii, Pertsev, Roman, Hrab, Mariia, Fedytnyk, Vasyl, Moroz, Svitlana, Kikalishvili, Mariia |
| Source: | Journal of Information Technology Management (JITM); 2023, Vol. 15 Issue 1, p135-162, 28p |
| Subject Terms: | INTERNET security, COMPUTER engineering, COMPUTER systems, COMPUTER crimes, DATABASES, DIGITAL forensics, INFORMATION networks, ELECTRONIC evidence, INFORMATION storage & retrieval systems |
| Abstract (English): | The cybersecurity in the modern world has become global, and cyber attacks are becoming more complex and large-scale. In the system of civil and criminal justice, computer forensics helps to ensure the integrity of digital evidence presented in court cases. The purpose of this study is to develop scientifically sound proposals and recommendations for the implementation of tools for forensic research of computer tools and systems in the fight against cybercrime. The relevance of this study is due to the need to implement active ways to protect and combat cybercrime. To achieve the goal of the study, methodological principles and approaches of legal science were used. It is proposed to use computer forensic methods more widely research in the fight against cybercrime.This study identifies the types of computer forensics: forensics database; electronic forensics; malware forensics; criminology of memory; mobile forensics; network forensics. The authors foundlack of a regulatory mechanism to regulate cybersecurity, capture and use of digital evidence and the regulatory framework for international cooperation. To brought need in strengthening international cooperation and in developing appropriate policies and legislative initiatives of security and network and information systems, improvement legislation in the field countering cybercrime. [ABSTRACT FROM AUTHOR] |
| Abstract (Arabic): | المقالة تستعرض الأبحاث الجنائية المتعلقة بالأدوات والأنظمة الحاسوبية المستخدمة في مكافحة الجرائم الإلكترونية، مشددة على التعقيد المتزايد وحجم الهجمات الإلكترونية. كما تؤكد على أهمية الطب الشرعي الرقمي في الحفاظ على نزاهة الأدلة الرقمية لأغراض قانونية، وتصنف أنواعًا مختلفة من الطب الشرعي، مثل الطب الشرعي لقواعد البيانات، والطب الشرعي الإلكتروني، والطب الشرعي للهواتف المحمولة. تتناول المقالة أيضًا غياب الأطر التنظيمية للأمن السيبراني وتدعو إلى تعزيز التعاون الدولي والتدابير التشريعية لمكافحة الجرائم الإلكترونية بشكل فعال. بشكل عام، تدعو إلى توسيع استخدام الأساليب الجنائية لمواجهة الارتفاع المتزايد في معدلات الجرائم الإلكترونية وتحسين الدعم لجهود إنفاذ القانون ومبادرات الأمن السيبراني. [Extracted from the article] |
| Copyright of Journal of Information Technology Management (JITM) is the property of University of Tehran, Faculty of Management and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Database: | Complementary Index |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Drobotov%20S Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edb DbLabel: Complementary Index An: 173422253 RelevancyScore: 944 AccessLevel: 6 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 943.755004882813 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime. – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Drobotov%2C+Serhii%22">Drobotov, Serhii</searchLink><br /><searchLink fieldCode="AR" term="%22Pertsev%2C+Roman%22">Pertsev, Roman</searchLink><br /><searchLink fieldCode="AR" term="%22Hrab%2C+Mariia%22">Hrab, Mariia</searchLink><br /><searchLink fieldCode="AR" term="%22Fedytnyk%2C+Vasyl%22">Fedytnyk, Vasyl</searchLink><br /><searchLink fieldCode="AR" term="%22Moroz%2C+Svitlana%22">Moroz, Svitlana</searchLink><br /><searchLink fieldCode="AR" term="%22Kikalishvili%2C+Mariia%22">Kikalishvili, Mariia</searchLink> – Name: TitleSource Label: Source Group: Src Data: Journal of Information Technology Management (JITM); 2023, Vol. 15 Issue 1, p135-162, 28p – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22INTERNET+security%22">INTERNET security</searchLink><br /><searchLink fieldCode="DE" term="%22COMPUTER+engineering%22">COMPUTER engineering</searchLink><br /><searchLink fieldCode="DE" term="%22COMPUTER+systems%22">COMPUTER systems</searchLink><br /><searchLink fieldCode="DE" term="%22COMPUTER+crimes%22">COMPUTER crimes</searchLink><br /><searchLink fieldCode="DE" term="%22DATABASES%22">DATABASES</searchLink><br /><searchLink fieldCode="DE" term="%22DIGITAL+forensics%22">DIGITAL forensics</searchLink><br /><searchLink fieldCode="DE" term="%22INFORMATION+networks%22">INFORMATION networks</searchLink><br /><searchLink fieldCode="DE" term="%22ELECTRONIC+evidence%22">ELECTRONIC evidence</searchLink><br /><searchLink fieldCode="DE" term="%22INFORMATION+storage+%26+retrieval+systems%22">INFORMATION storage & retrieval systems</searchLink> – Name: AbstractNonEng Label: Abstract (English) Group: Ab Data: The cybersecurity in the modern world has become global, and cyber attacks are becoming more complex and large-scale. In the system of civil and criminal justice, computer forensics helps to ensure the integrity of digital evidence presented in court cases. The purpose of this study is to develop scientifically sound proposals and recommendations for the implementation of tools for forensic research of computer tools and systems in the fight against cybercrime. The relevance of this study is due to the need to implement active ways to protect and combat cybercrime. To achieve the goal of the study, methodological principles and approaches of legal science were used. It is proposed to use computer forensic methods more widely research in the fight against cybercrime.This study identifies the types of computer forensics: forensics database; electronic forensics; malware forensics; criminology of memory; mobile forensics; network forensics. The authors foundlack of a regulatory mechanism to regulate cybersecurity, capture and use of digital evidence and the regulatory framework for international cooperation. To brought need in strengthening international cooperation and in developing appropriate policies and legislative initiatives of security and network and information systems, improvement legislation in the field countering cybercrime. [ABSTRACT FROM AUTHOR] – Name: AbstractNonEng Label: Abstract (Arabic) Group: Ab Data: المقالة تستعرض الأبحاث الجنائية المتعلقة بالأدوات والأنظمة الحاسوبية المستخدمة في مكافحة الجرائم الإلكترونية، مشددة على التعقيد المتزايد وحجم الهجمات الإلكترونية. كما تؤكد على أهمية الطب الشرعي الرقمي في الحفاظ على نزاهة الأدلة الرقمية لأغراض قانونية، وتصنف أنواعًا مختلفة من الطب الشرعي، مثل الطب الشرعي لقواعد البيانات، والطب الشرعي الإلكتروني، والطب الشرعي للهواتف المحمولة. تتناول المقالة أيضًا غياب الأطر التنظيمية للأمن السيبراني وتدعو إلى تعزيز التعاون الدولي والتدابير التشريعية لمكافحة الجرائم الإلكترونية بشكل فعال. بشكل عام، تدعو إلى توسيع استخدام الأساليب الجنائية لمواجهة الارتفاع المتزايد في معدلات الجرائم الإلكترونية وتحسين الدعم لجهود إنفاذ القانون ومبادرات الأمن السيبراني. [Extracted from the article] – Name: Abstract Label: Group: Ab Data: <i>Copyright of Journal of Information Technology Management (JITM) is the property of University of Tehran, Faculty of Management and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.) |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edb&AN=173422253 |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.22059/jitm.2023.90741 Languages: – Code: eng Text: English PhysicalDescription: Pagination: PageCount: 28 StartPage: 135 Subjects: – SubjectFull: INTERNET security Type: general – SubjectFull: COMPUTER engineering Type: general – SubjectFull: COMPUTER systems Type: general – SubjectFull: COMPUTER crimes Type: general – SubjectFull: DATABASES Type: general – SubjectFull: DIGITAL forensics Type: general – SubjectFull: INFORMATION networks Type: general – SubjectFull: ELECTRONIC evidence Type: general – SubjectFull: INFORMATION storage & retrieval systems Type: general Titles: – TitleFull: Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime. Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Drobotov, Serhii – PersonEntity: Name: NameFull: Pertsev, Roman – PersonEntity: Name: NameFull: Hrab, Mariia – PersonEntity: Name: NameFull: Fedytnyk, Vasyl – PersonEntity: Name: NameFull: Moroz, Svitlana – PersonEntity: Name: NameFull: Kikalishvili, Mariia IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 01 Text: 2023 Type: published Y: 2023 Identifiers: – Type: issn-print Value: 20085893 Numbering: – Type: volume Value: 15 – Type: issue Value: 1 Titles: – TitleFull: Journal of Information Technology Management (JITM) Type: main |
| ResultId | 1 |
Nájsť tento článok vo Web of Science