Abstract
This paper discussed several areas of endeavour including financial sectors that cyber-attacker can target. Most often cybercrimes are committed remotely using the internet. This article brings to the fore computer crimes and their various types. It demonstrated the existing laws instituted by international and regional bodies to combat cybercrimes. The authors also described various countries specific laws, aimed at combatting computer crimes. Fighting these kind of crimes demands systems and security measures; the researchers discussed computer forensic interface and application which facilitate analyses and investigations of these crimes. In the forensic application interface, there are three major tabs, namely: view captured screenshot, view captured processes, and view index.dat; the authors explained their various functions. The researchers used system flow chart diagrams to describe the operational flow of the forensic application system and forensic interface. While the forensic application system captured image and process performance, forensic interface visualized the flow of data between the forensic expert interface and the core functionalities of the system.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have