Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime.

Saved in:
Bibliographic Details
Title: Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime.
Authors: Drobotov, Serhii, Pertsev, Roman, Hrab, Mariia, Fedytnyk, Vasyl, Moroz, Svitlana, Kikalishvili, Mariia
Source: Journal of Information Technology Management (JITM); 2023, Vol. 15 Issue 1, p135-162, 28p
Subject Terms: INTERNET security, COMPUTER engineering, COMPUTER systems, COMPUTER crimes, DATABASES, DIGITAL forensics, INFORMATION networks, ELECTRONIC evidence, INFORMATION storage & retrieval systems
Abstract (English): The cybersecurity in the modern world has become global, and cyber attacks are becoming more complex and large-scale. In the system of civil and criminal justice, computer forensics helps to ensure the integrity of digital evidence presented in court cases. The purpose of this study is to develop scientifically sound proposals and recommendations for the implementation of tools for forensic research of computer tools and systems in the fight against cybercrime. The relevance of this study is due to the need to implement active ways to protect and combat cybercrime. To achieve the goal of the study, methodological principles and approaches of legal science were used. It is proposed to use computer forensic methods more widely research in the fight against cybercrime.This study identifies the types of computer forensics: forensics database; electronic forensics; malware forensics; criminology of memory; mobile forensics; network forensics. The authors foundlack of a regulatory mechanism to regulate cybersecurity, capture and use of digital evidence and the regulatory framework for international cooperation. To brought need in strengthening international cooperation and in developing appropriate policies and legislative initiatives of security and network and information systems, improvement legislation in the field countering cybercrime. [ABSTRACT FROM AUTHOR]
Abstract (Arabic): المقالة تستعرض الأبحاث الجنائية المتعلقة بالأدوات والأنظمة الحاسوبية المستخدمة في مكافحة الجرائم الإلكترونية، مشددة على التعقيد المتزايد وحجم الهجمات الإلكترونية. كما تؤكد على أهمية الطب الشرعي الرقمي في الحفاظ على نزاهة الأدلة الرقمية لأغراض قانونية، وتصنف أنواعًا مختلفة من الطب الشرعي، مثل الطب الشرعي لقواعد البيانات، والطب الشرعي الإلكتروني، والطب الشرعي للهواتف المحمولة. تتناول المقالة أيضًا غياب الأطر التنظيمية للأمن السيبراني وتدعو إلى تعزيز التعاون الدولي والتدابير التشريعية لمكافحة الجرائم الإلكترونية بشكل فعال. بشكل عام، تدعو إلى توسيع استخدام الأساليب الجنائية لمواجهة الارتفاع المتزايد في معدلات الجرائم الإلكترونية وتحسين الدعم لجهود إنفاذ القانون ومبادرات الأمن السيبراني. [Extracted from the article]
Copyright of Journal of Information Technology Management (JITM) is the property of University of Tehran, Faculty of Management and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Database: Complementary Index
Be the first to leave a comment!
You must be logged in first