Navigating cyber investigations: strategies and tools for forensic data acquisition
Gespeichert in:
| Titel: | Navigating cyber investigations: strategies and tools for forensic data acquisition |
|---|---|
| Autoren: | Kanakala, Srinivas, Prashanthi, Vempaty, Sharada, K. V. |
| Quelle: | International Journal of Electrical and Computer Engineering (IJECE); Vol 15, No 4: August 2025; 4022-4030 ; 2722-2578 ; 2088-8708 ; 10.11591/ijece.v15i4 |
| Verlagsinformationen: | Institute of Advanced Engineering and Science |
| Publikationsjahr: | 2025 |
| Schlagwörter: | Civil litigations, Computer forensics, Cybercrimes, Data acquisition, Data automation, Digital evidence, Forensic investigation |
| Beschreibung: | The rapid proliferation of cybercrimes has underscored the critical importance of robust data acquisition methodologies in the field of digital forensics. This research publication explores various aspects of forensic data acquisition, focusing on techniques, tools, and best practices employed by forensic investigators to collect and preserve digital evidence effectively. Beginning with an overview of the escalating cyber threat landscape and the consequential need for forensic investigations, the publication delves into the fundamental concepts of data acquisition, emphasizing the significance of ensuring data integrity and admissibility in legal proceedings. It examines the process of acquiring both volatile and non-volatile data from diverse sources, including hard drives, RAM, and other digital storage media. Furthermore, evaluates a range of forensic imaging and validation methods, encompassing tools such as Belkasoft live RAM capturer, AccessData FTK Imager, and ProDiscover, alongside validation techniques using PowerShell utility and commercial forensic software. Through comprehensive analysis and discussion, this study serves as a valuable resource for forensic practitioners, researchers, and legal professionals seeking to enhance their understanding of forensic data acquisition methodologies in the ever-evolving landscape of cybercrime investigation. |
| Publikationsart: | article in journal/newspaper |
| Dateibeschreibung: | application/pdf |
| Sprache: | English |
| Relation: | https://ijece.iaescore.com/index.php/IJECE/article/view/37582/18362; https://ijece.iaescore.com/index.php/IJECE/article/view/37582 |
| DOI: | 10.11591/ijece.v15i4.pp4022-4030 |
| Verfügbarkeit: | https://ijece.iaescore.com/index.php/IJECE/article/view/37582 https://doi.org/10.11591/ijece.v15i4.pp4022-4030 |
| Rights: | Copyright (c) 2025 Srinivas Kanakala, Vempaty Prashanthi, K. V. Sharada ; http://creativecommons.org/licenses/by-sa/4.0 |
| Dokumentencode: | edsbas.13642EBE |
| Datenbank: | BASE |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://ijece.iaescore.com/index.php/IJECE/article/view/37582# Name: EDS - BASE (s4221598) Category: fullText Text: View record from BASE – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Kanakala%20n Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edsbas DbLabel: BASE An: edsbas.13642EBE RelevancyScore: 1009 AccessLevel: 3 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 1009.3056640625 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: Navigating cyber investigations: strategies and tools for forensic data acquisition – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Kanakala%2C+Srinivas%22">Kanakala, Srinivas</searchLink><br /><searchLink fieldCode="AR" term="%22Prashanthi%2C+Vempaty%22">Prashanthi, Vempaty</searchLink><br /><searchLink fieldCode="AR" term="%22Sharada%2C+K%2E+V%2E%22">Sharada, K. V.</searchLink> – Name: TitleSource Label: Source Group: Src Data: International Journal of Electrical and Computer Engineering (IJECE); Vol 15, No 4: August 2025; 4022-4030 ; 2722-2578 ; 2088-8708 ; 10.11591/ijece.v15i4 – Name: Publisher Label: Publisher Information Group: PubInfo Data: Institute of Advanced Engineering and Science – Name: DatePubCY Label: Publication Year Group: Date Data: 2025 – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22Civil+litigations%22">Civil litigations</searchLink><br /><searchLink fieldCode="DE" term="%22Computer+forensics%22">Computer forensics</searchLink><br /><searchLink fieldCode="DE" term="%22Cybercrimes%22">Cybercrimes</searchLink><br /><searchLink fieldCode="DE" term="%22Data+acquisition%22">Data acquisition</searchLink><br /><searchLink fieldCode="DE" term="%22Data+automation%22">Data automation</searchLink><br /><searchLink fieldCode="DE" term="%22Digital+evidence%22">Digital evidence</searchLink><br /><searchLink fieldCode="DE" term="%22Forensic+investigation%22">Forensic investigation</searchLink> – Name: Abstract Label: Description Group: Ab Data: The rapid proliferation of cybercrimes has underscored the critical importance of robust data acquisition methodologies in the field of digital forensics. This research publication explores various aspects of forensic data acquisition, focusing on techniques, tools, and best practices employed by forensic investigators to collect and preserve digital evidence effectively. Beginning with an overview of the escalating cyber threat landscape and the consequential need for forensic investigations, the publication delves into the fundamental concepts of data acquisition, emphasizing the significance of ensuring data integrity and admissibility in legal proceedings. It examines the process of acquiring both volatile and non-volatile data from diverse sources, including hard drives, RAM, and other digital storage media. Furthermore, evaluates a range of forensic imaging and validation methods, encompassing tools such as Belkasoft live RAM capturer, AccessData FTK Imager, and ProDiscover, alongside validation techniques using PowerShell utility and commercial forensic software. Through comprehensive analysis and discussion, this study serves as a valuable resource for forensic practitioners, researchers, and legal professionals seeking to enhance their understanding of forensic data acquisition methodologies in the ever-evolving landscape of cybercrime investigation. – Name: TypeDocument Label: Document Type Group: TypDoc Data: article in journal/newspaper – Name: Format Label: File Description Group: SrcInfo Data: application/pdf – Name: Language Label: Language Group: Lang Data: English – Name: NoteTitleSource Label: Relation Group: SrcInfo Data: https://ijece.iaescore.com/index.php/IJECE/article/view/37582/18362; https://ijece.iaescore.com/index.php/IJECE/article/view/37582 – Name: DOI Label: DOI Group: ID Data: 10.11591/ijece.v15i4.pp4022-4030 – Name: URL Label: Availability Group: URL Data: https://ijece.iaescore.com/index.php/IJECE/article/view/37582<br />https://doi.org/10.11591/ijece.v15i4.pp4022-4030 – Name: Copyright Label: Rights Group: Cpyrght Data: Copyright (c) 2025 Srinivas Kanakala, Vempaty Prashanthi, K. V. Sharada ; http://creativecommons.org/licenses/by-sa/4.0 – Name: AN Label: Accession Number Group: ID Data: edsbas.13642EBE |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.13642EBE |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.11591/ijece.v15i4.pp4022-4030 Languages: – Text: English Subjects: – SubjectFull: Civil litigations Type: general – SubjectFull: Computer forensics Type: general – SubjectFull: Cybercrimes Type: general – SubjectFull: Data acquisition Type: general – SubjectFull: Data automation Type: general – SubjectFull: Digital evidence Type: general – SubjectFull: Forensic investigation Type: general Titles: – TitleFull: Navigating cyber investigations: strategies and tools for forensic data acquisition Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Kanakala, Srinivas – PersonEntity: Name: NameFull: Prashanthi, Vempaty – PersonEntity: Name: NameFull: Sharada, K. V. IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 01 Type: published Y: 2025 Identifiers: – Type: issn-locals Value: edsbas – Type: issn-locals Value: edsbas.oa Titles: – TitleFull: International Journal of Electrical and Computer Engineering (IJECE); Vol 15, No 4: August 2025; 4022-4030 ; 2722-2578 ; 2088-8708 ; 10.11591/ijece.v15i4 Type: main |
| ResultId | 1 |
Nájsť tento článok vo Web of Science