Digital forensics analysis for data theft

dc.contributor.authorLokhande, P. S.
dc.contributor.authorMeshram, B.B.
dc.date.accessioned2016-02-12T12:21:48Z
dc.date.available2016-02-12T12:21:48Z
dc.date.issued2015-12-27
dc.description.abstractCyber Criminals are using various techniques to attack on computing systems. Not only the professionally Cyber Criminals but also white collar IT employees are also involved in the valuable data theft. Some of the motives behind the data theft are revenge on employer, higher pay offered by a competitor company, or selling valuable data, etc. This work gives step by step approach implemented to extract the digital evidence from the computing systems of employee by whom the data theft is made. The employee used the Windows operating systems and the data in MS word format and excel format was sent to the competitor company by email and the data was also copied from the computer to the pen drive of the employee and then it was deleted from the company’s computer. The extensive literature survey is made on Digital Forensic Analysis Process, Digital Forensic Model and various tools and hardware required for forensic set up. We have simulated the investigation process to get the evidence from the suspected employee’s computer.en_US
dc.identifier.issn1809-9807
dc.identifier.urihttp://www.aiktcdspace.org:8080/jspui/handle/123456789/1491
dc.language.isoen_USen_US
dc.publisherThe International Journal of Forensic Computer Scienceen_US
dc.subjectStaff Publication - SoETen_US
dc.subjectStaff Publication - COen_US
dc.titleDigital forensics analysis for data theften_US
dc.typeArticleen_US
Files
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Brazil journal V10N1-PP04-data-forensic.pdf
Size:
1.25 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: