Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime

Publish Year: 1402
نوع سند: مقاله ژورنالی
زبان: English
View: 135

This Paper With 28 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_JITM-15-1_008

تاریخ نمایه سازی: 8 بهمن 1401

Abstract:

The cybersecurity in the modern world has become global, and cyber attacks are becoming more complex and large-scale. In the system of civil and criminal justice, computer forensics helps to ensure the integrity of digital evidence presented in court cases. The purpose of this study is to develop scientifically sound proposals and recommendations for the implementation of tools for forensic research of computer tools and systems in the fight against cybercrime. The relevance of this study is due to the need to implement active ways to protect and combat cybercrime. To achieve the goal of the study, methodological principles and approaches of legal science were used. It is proposed to use computer forensic methods more widely research in the fight against cybercrime.This study identifies the types of computer forensics: forensics database; electronic forensics; malware forensics; criminology of memory; mobile forensics; network forensics. The authors foundlack of a regulatory mechanism to regulate cybersecurity, capture and use of digital evidence and the regulatory framework for international cooperation. To brought need in strengthening international cooperation and in developing appropriate policies and legislative initiatives of security and network and information systems, improvement legislation in the field countering cybercrime.

Keywords:

Forensic research , Computer tools and systems , cybercrime

Authors

Drobotov

Department of criminal law policy and criminal law, Institute of Law Taras Shevchenko National University of Kyiv, Kyiv.

Pertsev

Candidate of Juridical Scienses, practicing lawyer, Kiev, Ukraine.

Hrab

Attorney at law, partner of the bar association «Legal strategy».

Fedytnyk

Department of Law, Institute of Lviv Interregional Academy of Personnel Management, Lviv, Ukraine.

Moroz

Department of Law Enforcement and Combating Corruption, National Research Institute of Law of Prince Volodymyr the Great, Interregional Academy of Personnel Management, Kyiv, Ukraine.

Kikalishvili

Department of the State guard of Ukraine, Taras Shevchenko National University of Kiev, Kyiv, Ukraine.

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Adu, K.K. & Adjei, E. (۲۰۱۸). The phenomenon of data ...
  • Ahmed, I., Obermeier, S., Sudhakaran, S. & Roussev, V. (۲۰۱۷). ...
  • Albanese, M., Jajodia, S. & Venkatesan, S. (۲۰۱۸). Defending from ...
  • Apau, R. & Koranteng, F.N. (۲۰۱۹). Impact of cybercrime and ...
  • Assessment of the state of development of the national cybersecurity ...
  • Association of Chief Police Officers (ACPO), Good practice guide for ...
  • Babenko, V., Demyanenko, O., Lyba, V., Feoktystova, O. (۲۰۲۱). Assessment ...
  • Baylon, C. & Antwi-Boasiako, A. (۲۰۱۶). Increasing internet connectivity while ...
  • Baylon, C. & Antwi-Boasiako A. (۲۰۱۶). Increasing internet connectivity while combatting cybercrime: Ghana ...
  • Becker, W.S., Dale, W.M. & Pavur, E.J. Jr. (۲۰۱۰). Forensic science in transition: critical ...
  • Berghel, H. (۲۰۱۲). Breaking the Fourth Wall of Electronic Crime: ...
  • Formation the Project Maturity of Public Administration in implementation of Digital Transformation Projects [مقاله ژورنالی]
  • Boateng, R., Isabalija, R.S., Olumide, L. & Budu, J. (۲۰۱۱). Sakawa - Cybercrime ...
  • Bondarenko, S., Halachenko, O., Shmorgun, L., Volokhova, I., Khomutenko, A. ...
  • Cyber Security Strategy of the United Kingdom: safety, security and ...
  • Dolliver, D.S., Collins, C. & Sams B. (۲۰۱۷). Hybrid approaches to digital forensic investigations: ...
  • Draft of the Cybersecurity Strategy of Ukraine (۲۰۲۱-۲۰۲۵) (Unofficial English ...
  • Gaggero, M., Paola D. Di, Petitti, A. & Caviglione, L. (۲۰۱۹). ...
  • Gradon, K. (۲۰۱۳). Crime Science and the Internet Battlefield: Securing ...
  • Gumennykova, T., Pankovets, V., Liapa, M., Miziuk, V., Gramatyk, N. ...
  • Half a thousand YouControl users about fraud ۲۰۲۰. https://youcontrol.com.ua/data-research/pivtysiachi-korystuvachiv-youcontrol-pro-shakhraystva-۲۰۲۰/ (Accessed ...
  • Hubanova, T., Shchokin, R., Hubanov, O., Antonov, V., Slobodianiuk, P. ...
  • Ivashchenko, A., Kovalenko, Yu., Hubanov, O., Hubanova, T., Lutsenko, I. ...
  • James, J. (۲۰۱۷). How Businesses Can Speed Up International Cybercrime ...
  • Khomutenko А., Mishchenko, A., Ripenko, A., Liulchak, Z., Hrozovskyi R. ...
  • Klochan, V., Piliaiev, I., Sydorenko, T., Khomutenko, V., Solomko, A. ...
  • Kovalenko, Y, (۲۰۱۵) Financial sector development and economic factors of ...
  • Business Restructuring as a Method of Strengtening Company’s Financial Position [مقاله ژورنالی]
  • On the basic principles of cybersecurity of Ukraine: Law of ...
  • Oppliger, R., Pernul, G. & Katsikas, S. (۲۰۱۷). New Frontiers: ...
  • Parker, D. (۲۰۰۷). The Dark Side of Computing: SRI International ...
  • Perevozova, I., Daliak, N., Babenko, V. (۲۰۱۹). Modeling of Financial Support for the ...
  • Sagan, O., Yakovleva, S., Anisimova, E., Balokha, A., & Yeremenko, ...
  • Vovk, V, Zhezherun, Y, Bilovodska, O, Babenko, V, Biriukova, A. ...
  • نمایش کامل مراجع