Navigating cyber investigations: strategies and tools for forensic data acquisition

Gespeichert in:
Bibliographische Detailangaben
Titel: Navigating cyber investigations: strategies and tools for forensic data acquisition
Autoren: Kanakala, Srinivas, Prashanthi, Vempaty, Sharada, K. V.
Quelle: International Journal of Electrical and Computer Engineering (IJECE); Vol 15, No 4: August 2025; 4022-4030 ; 2722-2578 ; 2088-8708 ; 10.11591/ijece.v15i4
Verlagsinformationen: Institute of Advanced Engineering and Science
Publikationsjahr: 2025
Schlagwörter: Civil litigations, Computer forensics, Cybercrimes, Data acquisition, Data automation, Digital evidence, Forensic investigation
Beschreibung: The rapid proliferation of cybercrimes has underscored the critical importance of robust data acquisition methodologies in the field of digital forensics. This research publication explores various aspects of forensic data acquisition, focusing on techniques, tools, and best practices employed by forensic investigators to collect and preserve digital evidence effectively. Beginning with an overview of the escalating cyber threat landscape and the consequential need for forensic investigations, the publication delves into the fundamental concepts of data acquisition, emphasizing the significance of ensuring data integrity and admissibility in legal proceedings. It examines the process of acquiring both volatile and non-volatile data from diverse sources, including hard drives, RAM, and other digital storage media. Furthermore, evaluates a range of forensic imaging and validation methods, encompassing tools such as Belkasoft live RAM capturer, AccessData FTK Imager, and ProDiscover, alongside validation techniques using PowerShell utility and commercial forensic software. Through comprehensive analysis and discussion, this study serves as a valuable resource for forensic practitioners, researchers, and legal professionals seeking to enhance their understanding of forensic data acquisition methodologies in the ever-evolving landscape of cybercrime investigation.
Publikationsart: article in journal/newspaper
Dateibeschreibung: application/pdf
Sprache: English
Relation: https://ijece.iaescore.com/index.php/IJECE/article/view/37582/18362; https://ijece.iaescore.com/index.php/IJECE/article/view/37582
DOI: 10.11591/ijece.v15i4.pp4022-4030
Verfügbarkeit: https://ijece.iaescore.com/index.php/IJECE/article/view/37582
https://doi.org/10.11591/ijece.v15i4.pp4022-4030
Rights: Copyright (c) 2025 Srinivas Kanakala, Vempaty Prashanthi, K. V. Sharada ; http://creativecommons.org/licenses/by-sa/4.0
Dokumentencode: edsbas.13642EBE
Datenbank: BASE
FullText Text:
  Availability: 0
CustomLinks:
  – Url: https://ijece.iaescore.com/index.php/IJECE/article/view/37582#
    Name: EDS - BASE (s4221598)
    Category: fullText
    Text: View record from BASE
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Kanakala%20n
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edsbas
DbLabel: BASE
An: edsbas.13642EBE
RelevancyScore: 1009
AccessLevel: 3
PubType: Academic Journal
PubTypeId: academicJournal
PreciseRelevancyScore: 1009.3056640625
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: Navigating cyber investigations: strategies and tools for forensic data acquisition
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Kanakala%2C+Srinivas%22">Kanakala, Srinivas</searchLink><br /><searchLink fieldCode="AR" term="%22Prashanthi%2C+Vempaty%22">Prashanthi, Vempaty</searchLink><br /><searchLink fieldCode="AR" term="%22Sharada%2C+K%2E+V%2E%22">Sharada, K. V.</searchLink>
– Name: TitleSource
  Label: Source
  Group: Src
  Data: International Journal of Electrical and Computer Engineering (IJECE); Vol 15, No 4: August 2025; 4022-4030 ; 2722-2578 ; 2088-8708 ; 10.11591/ijece.v15i4
– Name: Publisher
  Label: Publisher Information
  Group: PubInfo
  Data: Institute of Advanced Engineering and Science
– Name: DatePubCY
  Label: Publication Year
  Group: Date
  Data: 2025
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22Civil+litigations%22">Civil litigations</searchLink><br /><searchLink fieldCode="DE" term="%22Computer+forensics%22">Computer forensics</searchLink><br /><searchLink fieldCode="DE" term="%22Cybercrimes%22">Cybercrimes</searchLink><br /><searchLink fieldCode="DE" term="%22Data+acquisition%22">Data acquisition</searchLink><br /><searchLink fieldCode="DE" term="%22Data+automation%22">Data automation</searchLink><br /><searchLink fieldCode="DE" term="%22Digital+evidence%22">Digital evidence</searchLink><br /><searchLink fieldCode="DE" term="%22Forensic+investigation%22">Forensic investigation</searchLink>
– Name: Abstract
  Label: Description
  Group: Ab
  Data: The rapid proliferation of cybercrimes has underscored the critical importance of robust data acquisition methodologies in the field of digital forensics. This research publication explores various aspects of forensic data acquisition, focusing on techniques, tools, and best practices employed by forensic investigators to collect and preserve digital evidence effectively. Beginning with an overview of the escalating cyber threat landscape and the consequential need for forensic investigations, the publication delves into the fundamental concepts of data acquisition, emphasizing the significance of ensuring data integrity and admissibility in legal proceedings. It examines the process of acquiring both volatile and non-volatile data from diverse sources, including hard drives, RAM, and other digital storage media. Furthermore, evaluates a range of forensic imaging and validation methods, encompassing tools such as Belkasoft live RAM capturer, AccessData FTK Imager, and ProDiscover, alongside validation techniques using PowerShell utility and commercial forensic software. Through comprehensive analysis and discussion, this study serves as a valuable resource for forensic practitioners, researchers, and legal professionals seeking to enhance their understanding of forensic data acquisition methodologies in the ever-evolving landscape of cybercrime investigation.
– Name: TypeDocument
  Label: Document Type
  Group: TypDoc
  Data: article in journal/newspaper
– Name: Format
  Label: File Description
  Group: SrcInfo
  Data: application/pdf
– Name: Language
  Label: Language
  Group: Lang
  Data: English
– Name: NoteTitleSource
  Label: Relation
  Group: SrcInfo
  Data: https://ijece.iaescore.com/index.php/IJECE/article/view/37582/18362; https://ijece.iaescore.com/index.php/IJECE/article/view/37582
– Name: DOI
  Label: DOI
  Group: ID
  Data: 10.11591/ijece.v15i4.pp4022-4030
– Name: URL
  Label: Availability
  Group: URL
  Data: https://ijece.iaescore.com/index.php/IJECE/article/view/37582<br />https://doi.org/10.11591/ijece.v15i4.pp4022-4030
– Name: Copyright
  Label: Rights
  Group: Cpyrght
  Data: Copyright (c) 2025 Srinivas Kanakala, Vempaty Prashanthi, K. V. Sharada ; http://creativecommons.org/licenses/by-sa/4.0
– Name: AN
  Label: Accession Number
  Group: ID
  Data: edsbas.13642EBE
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.13642EBE
RecordInfo BibRecord:
  BibEntity:
    Identifiers:
      – Type: doi
        Value: 10.11591/ijece.v15i4.pp4022-4030
    Languages:
      – Text: English
    Subjects:
      – SubjectFull: Civil litigations
        Type: general
      – SubjectFull: Computer forensics
        Type: general
      – SubjectFull: Cybercrimes
        Type: general
      – SubjectFull: Data acquisition
        Type: general
      – SubjectFull: Data automation
        Type: general
      – SubjectFull: Digital evidence
        Type: general
      – SubjectFull: Forensic investigation
        Type: general
    Titles:
      – TitleFull: Navigating cyber investigations: strategies and tools for forensic data acquisition
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Kanakala, Srinivas
      – PersonEntity:
          Name:
            NameFull: Prashanthi, Vempaty
      – PersonEntity:
          Name:
            NameFull: Sharada, K. V.
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 01
              M: 01
              Type: published
              Y: 2025
          Identifiers:
            – Type: issn-locals
              Value: edsbas
            – Type: issn-locals
              Value: edsbas.oa
          Titles:
            – TitleFull: International Journal of Electrical and Computer Engineering (IJECE); Vol 15, No 4: August 2025; 4022-4030 ; 2722-2578 ; 2088-8708 ; 10.11591/ijece.v15i4
              Type: main
ResultId 1