Plethora of Cyber Forensics

Abstract

As threats against digital assets have risen and there is necessitate exposing and eliminating hidden risks and threats. The ability of exposing is called “cyber forensics.” Cyber Penetrators have adopted more sophistical tools and tactics that endanger the operations of the global phenomena. These attackers are also using anti-forensic techniques to hide evidence of a cyber crime. Cyber forensics tools must increase its toughness and counteract these advanced persistent threats. This paper focuses on briefing of Cyber forensics, various phases of cyber forensics, handy tools and new research trends and issues in this fascinated area.

Authors and Affiliations

N. Sridhar , Dr. D. Lalitha Bhaskari , Dr. P. S. Avadhani

Keywords

Related Articles

Verifiable Search Over Updatable Encrypted Data in Cloud Computing

With all the benefits from cloud computing, there are negative influences for the data trust and integrity since clients lose control over the outsourced data in clouds. We propose a verification scheme that supports key...

Power and Contention Control Scheme: As a Good Candidate for Interference Modeling in Cognitive Radio Network

Due to the ever growing need for spectrum, the cognitive radio (CR) has been proposed to improve the radio spectrum utilization. In this scenario, the secondary users (SU) are permitted to share spectrum with the license...

Video Summarization: Survey on Event Detection and Summarization in Soccer Videos

In today's world, the rapid development of digital video and editing technology has led to fast growing of video data, creating the need for effective and advanced techniques for analysis and video retrieval, as multimed...

Reliable Network Traffic Collection for Network Characterization and User Behavior

This paper presents a reliable and complete traffic collection facility as a first and crucial step toward accurate traffic analysis for network characterization and user behavior. The key contribution is to produce an a...

QUATERNIONIC WIGNER-VILLE DISTRIBUTION OF ANALYTICAL SIGNAL IN HYPERSPECTRAL IMAGERY

The 2D Quaternionic Fourier Transform (QFT), applied to a real 2D image, produces an invertible quaternionic spectrum. If we conserve uniquely the first quadrant of this spectrum, it is possible, after inverse transforma...

Download PDF file
  • EP ID EP145280
  • DOI -
  • Views 108
  • Downloads 0

How To Cite

N. Sridhar, Dr. D. Lalitha Bhaskari, Dr. P. S. Avadhani (2011). Plethora of Cyber Forensics. International Journal of Advanced Computer Science & Applications, 2(11), 110-114. https://europub.co.uk./articles/-A-145280