ISSN: 2573-1734
Authors: Sarawagi K* and Srivastava A
Cyber Forensics is a challenging and rapidly growing field of forensic Science. It involves collection and examination of electronic evidence. It appraises the damage to a computer or any network as a result of any electronic attack. It also recovers the lost informational data from such a system to chase a threat. The cyber attacks mainly are of two types: Technical Attacks and Non-Technical attacks. Technical attacks are those which were introduced by programming and coding. Whereas Non-technical attacks are those which can be attempted with the help of software and predefined programs. Nowadays most of the non technical attacks are being attempted by the young generation without knowing the consequences of such attacks. This paper seeks to introduce the fundamental technologies including tools and techniques used in commission of above discussed types of cyber attacks and it’s forensic analysis. Topics covered include type of non technical attacks, causes, technology of key logging software and devices technology. This also covers the phishing attacks, use of some spying software like Trojan, sniffer, and the legal and ethical aspects of computer forensics to combat and investigate such crimes. This paper serves as a conceptual study for introduction into the extensive and intricate area known as computer forensics that could be useful for investigative and law enforcement agencies.
Keywords: Computer crime; Internet fraud; Computer hackers; Government secrecy; Identity theft; False impersonation; Globalization; Social media; Technical attacks; Non-technical attacks; Phishing; Key logging
Chat with us on WhatsApp