Digital forensics analysis for data theft

Show simple item record

dc.contributor.author Lokhande, P. S.
dc.contributor.author Meshram, B.B.
dc.date.accessioned 2016-02-12T12:21:48Z
dc.date.available 2016-02-12T12:21:48Z
dc.date.issued 2015-12-27
dc.identifier.issn 1809-9807
dc.identifier.uri http://www.aiktcdspace.org:8080/jspui/handle/123456789/1491
dc.description.abstract Cyber Criminals are using various techniques to attack on computing systems. Not only the professionally Cyber Criminals but also white collar IT employees are also involved in the valuable data theft. Some of the motives behind the data theft are revenge on employer, higher pay offered by a competitor company, or selling valuable data, etc. This work gives step by step approach implemented to extract the digital evidence from the computing systems of employee by whom the data theft is made. The employee used the Windows operating systems and the data in MS word format and excel format was sent to the competitor company by email and the data was also copied from the computer to the pen drive of the employee and then it was deleted from the company’s computer. The extensive literature survey is made on Digital Forensic Analysis Process, Digital Forensic Model and various tools and hardware required for forensic set up. We have simulated the investigation process to get the evidence from the suspected employee’s computer. en_US
dc.language.iso en_US en_US
dc.publisher The International Journal of Forensic Computer Science en_US
dc.subject Staff Publication - SoET en_US
dc.subject Staff Publication - CO en_US
dc.title Digital forensics analysis for data theft en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository


Advanced Search

Browse

My Account