2020
DOI: 10.1007/978-981-15-5243-4_81
|View full text |Cite
|
Sign up to set email alerts
|

Digital Forensics: Essential Competencies of Cyber-Forensics Practitioners

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…Based on this information, the investigator will be able to determine the suitable tools required for the data extraction process. This process should be formally documented [37].…”
Section: ) Data Preparationmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on this information, the investigator will be able to determine the suitable tools required for the data extraction process. This process should be formally documented [37].…”
Section: ) Data Preparationmentioning
confidence: 99%
“…1) Manual data extraction: here the investigator manually navigates the mobile device to search for the required evidence; documentation of this process is essential and might be done by video recording of the screen of the mobile device during the navigation process [37].…”
Section: C) Data Extractionmentioning
confidence: 99%
“…Another challenge in digital forensics is the availability of expert digital forensics practitioners in sufficient numbers. Further, due to continuous advancements in the technology arena, the experts must update themselves about the recent advancements to remain familiar with the current state of technology to analyze it as and when required [223].…”
Section: G Cyber Securitymentioning
confidence: 99%
“…The article is mainly focused on Ubiquitous Devices, Lightweight Cryptography, Contemporary Symmetric Encryption, Block cipher standardization, and Electronic Identity Technologies. [223] Extended use of technologies in everyday life also increases the risk of cybercrime linked specifically with data theft, exposure, or leakage. This then increases the need for the availability of Expert Forensic Practitioners.…”
Section: G Cyber Securitymentioning
confidence: 99%
“…Manual data extraction: here the investigator manually navigates the mobile device to search for the required evidence; documentation of this process is essential and might be done by video recording of the screen of the mobile device during the navigation process [37]. It is important here for the investigator to conduct the boundaries of the research warrant and never explore data that is not included in the research warrant.…”
Section: Data Preparationmentioning
confidence: 99%