Cybercrimes Solutions using Digital Forensic Tools

Full Text (PDF, 210KB), PP.11-18

Views: 0 Downloads: 0

Author(s)

Dhwaniket Ramesh Kamble 1 Nilakshi Jain 1 Swati Deshpande 1

1. Faculty of Information Technology, Shah and Anchor Kutchhi Engineering College, University of Mumbai, India.

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2015.06.02

Received: 15 Jul. 2015 / Revised: 28 Aug. 2015 / Accepted: 5 Oct. 2015 / Published: 8 Nov. 2015

Index Terms

ISafe, Recuva, USBDeview, WinHex

Abstract

The crimes using computers is growing with rapid speed. As computer crimes have hit up to a high mark, the tools used to fight such crimes is budding faster. In today's world the use of Digital Forensics have also become vital. Digital Forensics is a step-by-step process of scientific methods and techniques to investigate crime obtained from digital evidences. For investigating the digital evidence there are many Digital Forensic tools which are used to investigate digital crimes by identifying the digital evidences. The study results in giving the solutions for Digital Forensic tools for investigators looking to spread out their serviceability in using Digital Forensic tools.

Cite This Paper

Dhwaniket Ramesh Kamble, Nilakshi Jain, Swati Deshpande,"Cybercrimes Solutions using Digital Forensic Tools", IJWMT, vol.5, no.6, pp.11-18, 2015. DOI: 10.5815/ijwmt.2015.06.02

Reference

[1]Ravneet Kaur, Amandeep Kaur, "Digital Forensics". International Journal of Computer Applications, Volume 50 – No.5, India, 2012.

[2]Preeti Tuli, Priyanka Sahu, "System Monitoring and Security Using Keylogger". International Journal of Computer Science and Mobile Computing, Vol. 2, Issue. 3,pp. 106-111, Chhattisgarh, 2013.

[3]ISafe. [Online]. Available: http://employee-monitoring-software-review.toptenreviews.com/ ISafe-review.html. [Accessed: May. 27, 2015].

[4]USBDeview. [Online]. Available: http://www.nirsoft.net/utils/usb_devices_view.html. [Accessed: May. 30, 2015].

[5]Recuva. [Online]. Available: https://www.piriform.com/recuva. [Accessed: May. 23, 2015].

[6]K. K. Sindhu, Dr. B. B. Meshram, " Digital Forensic Investigation Tools and Procedures". International Journal of Computer Network and Information Security,4, 39-48, 2012.

[7]WinHex. [Online]. Available: http://www.WinHex.com. [Accessed: May. 26, 2015].

[8]Tweakers. [Online]. Available: http://tweakers.net/downloads/30694/winhex-171.html. [Accessed: May. 26, 2015].

[9]SC Magazine. [Online]. Available: http://www.scmagazine.com. [Accessed: May. 27, 2015].

[10]IBTimes UK. [Online]. Available: http://www.ibtimes.co.uk. [Accessed: May. 30, 2015].

[11]Kroll Ontrack. [Online]. Available: http://www.krollontrack.com. [Accessed: May. 23, 2015].

[12]Technology-Bits-NYTimes.com. [Online]. Available: http://bits.blogs.nytimes.com. [Accessed: May. 26, 2015].