Advanced Digital Forensics SIT703: Comprehensive Case Investigation
VerifiedAdded on 2023/06/07
|23
|3020
|454
Report
AI Summary
This report presents a case investigation in the field of digital forensics, focusing on cybercrime incidents. It begins with an overview of computer crime cases, specifically addressing attacks on US universities and rampant data exposures in 2018. The report identifies the necessary resources for forensic investigation, analyzes detailed findings related to the causes and impacts of these cyber attacks, and reviews the implications of phishing and security flaws. It reflects on the increasing sophistication of cybercrimes and the importance of robust security measures, as well as adherence to ethical guidelines in IT. The study concludes by emphasizing the critical role of cybersecurity in organizational operations and the continuous need for improved security practices to mitigate the risks of cyber threats. Desklib provides a platform to access this and other solved assignments.

Running head: CASE INVESTIGATION REPORT
Case Investigation Report
SIT703: Advanced Digital Forensics
Name of the Student:
Student ID:
Name of the University:
Author’s note:
Case Investigation Report
SIT703: Advanced Digital Forensics
Name of the Student:
Student ID:
Name of the University:
Author’s note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1CASE INVESTIGATION REPORT
Table of Contents
Introduction......................................................................................................................................2
1. Overview of the computer crime case.........................................................................................2
2. List of necessary resources for forensic investigation.................................................................4
3. Analysis of detailed findings.......................................................................................................5
4. Review and reflection on the findings.........................................................................................6
4.1 Review of findings.................................................................................................................6
4.2 Reflection on findings............................................................................................................7
Conclusion.......................................................................................................................................7
References........................................................................................................................................9
Appendix-Screenshots...................................................................................................................12
Table of Contents
Introduction......................................................................................................................................2
1. Overview of the computer crime case.........................................................................................2
2. List of necessary resources for forensic investigation.................................................................4
3. Analysis of detailed findings.......................................................................................................5
4. Review and reflection on the findings.........................................................................................6
4.1 Review of findings.................................................................................................................6
4.2 Reflection on findings............................................................................................................7
Conclusion.......................................................................................................................................7
References........................................................................................................................................9
Appendix-Screenshots...................................................................................................................12

2CASE INVESTIGATION REPORT
Introduction
According to Glisson and Choo (2018), the cyber security holds an integral role in the
execution of the operations of the organization. The complete alignment of cyber security would
be aligned for easing the information processing and developing the information access. The
growth of cyber crimes had been helpful for implying the development of the proper and
effective management process. The cyber crimes have been growing since the development of
the successive implication management. The computer technology development would be
effectively eased with the formation of the interesting alignment would be formed for easing the
usefulness of the operations. The methods of cyber crimes have also increase with the passage of
time resulting in forming the issues for the execution of the operations of the organization
(Chang, Zhong and Grabosky 2018). The following assignment would be implied for studying
various sources of information listing the alignment of the cyber criminal activities.
1. Overview of the computer crime case
The number of cyber criminal cases has increased with the passage of time and the
influence of operations for listing the development of the functions. The computer crime case has
been increased and hence the technology innovation has been resulting in forming the
management issues. The organizations have been using innovative technology for implying the
use of the successful operation development. The computer crime activities have been increased
with the influence of the technology innovation and development. The alignment would also
result in easing the understanding the causes of the computer crime cases. The following is the
explanation of some of the biggest computer crime cases of 2018,
Introduction
According to Glisson and Choo (2018), the cyber security holds an integral role in the
execution of the operations of the organization. The complete alignment of cyber security would
be aligned for easing the information processing and developing the information access. The
growth of cyber crimes had been helpful for implying the development of the proper and
effective management process. The cyber crimes have been growing since the development of
the successive implication management. The computer technology development would be
effectively eased with the formation of the interesting alignment would be formed for easing the
usefulness of the operations. The methods of cyber crimes have also increase with the passage of
time resulting in forming the issues for the execution of the operations of the organization
(Chang, Zhong and Grabosky 2018). The following assignment would be implied for studying
various sources of information listing the alignment of the cyber criminal activities.
1. Overview of the computer crime case
The number of cyber criminal cases has increased with the passage of time and the
influence of operations for listing the development of the functions. The computer crime case has
been increased and hence the technology innovation has been resulting in forming the
management issues. The organizations have been using innovative technology for implying the
use of the successful operation development. The computer crime activities have been increased
with the influence of the technology innovation and development. The alignment would also
result in easing the understanding the causes of the computer crime cases. The following is the
explanation of some of the biggest computer crime cases of 2018,
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3CASE INVESTIGATION REPORT
US Universities: The attack on the information storage system of US Universities has
been of major cyber criminal attack and it has resulted in forming major setback for the
exhaustion of the resources. The Spree attack was alleged by the 9 Iranian hackers resulting in
affecting over 300 universities of US and abroad (Tsikrika et al. 2017). The attack was planned
carefully for getting spear phishing mails into the universities and affecting the system from
inside. The phishing mails would result in making the information stored in the mails of the
universities and connected people vulnerable for being hacked into. The mail had toll a loss of
over $3 billion by stealing 21 Tb of private data and personal information from the mails. The
login credentials and the information storage had been abducted by the use of the phishing
technologies resulting in toll of extracting information from 8000 accounts. The use of the digital
technology had resulted in extorting the information for 3768 number of US institution’s
accounts (Glisson and Choo 2017). The information technology development lacked the
probable influence of the security development too. The phishing attack is also a common means
of extracting information from the influence of the successful and effective information
technology development. The alignment would also be helpful for taking care of the information
processing and the cyber criminal activities had resulted in forming major setback for operations.
Rampant Data Exposures: The flaw of the information storage system of US
Government Records has been of major cyber criminal attack and it has resulted in forming
major setback for the exhaustion of the resources. According to Apurva et al. (2017), the
exposure was alleged due to security flaws in the system resulting in affecting over 340 million
of records. The misconfiguration of the data records flaw resulted in exposing the security
number, credit card number, and other personal information of US adults to public. The flaw
resulted in costing serious damage to the integrity of the information stored by the government
US Universities: The attack on the information storage system of US Universities has
been of major cyber criminal attack and it has resulted in forming major setback for the
exhaustion of the resources. The Spree attack was alleged by the 9 Iranian hackers resulting in
affecting over 300 universities of US and abroad (Tsikrika et al. 2017). The attack was planned
carefully for getting spear phishing mails into the universities and affecting the system from
inside. The phishing mails would result in making the information stored in the mails of the
universities and connected people vulnerable for being hacked into. The mail had toll a loss of
over $3 billion by stealing 21 Tb of private data and personal information from the mails. The
login credentials and the information storage had been abducted by the use of the phishing
technologies resulting in toll of extracting information from 8000 accounts. The use of the digital
technology had resulted in extorting the information for 3768 number of US institution’s
accounts (Glisson and Choo 2017). The information technology development lacked the
probable influence of the security development too. The phishing attack is also a common means
of extracting information from the influence of the successful and effective information
technology development. The alignment would also be helpful for taking care of the information
processing and the cyber criminal activities had resulted in forming major setback for operations.
Rampant Data Exposures: The flaw of the information storage system of US
Government Records has been of major cyber criminal attack and it has resulted in forming
major setback for the exhaustion of the resources. According to Apurva et al. (2017), the
exposure was alleged due to security flaws in the system resulting in affecting over 340 million
of records. The misconfiguration of the data records flaw resulted in exposing the security
number, credit card number, and other personal information of US adults to public. The flaw
resulted in costing serious damage to the integrity of the information stored by the government
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4CASE INVESTIGATION REPORT
resulting in exposing huge amount of information to the people resulting in forming major
setback to the operations. The login credentials and the information storage had been abducted
due to the flaw in storage resulting in toll of extracting information of about 2 TB. The
information technology development lacked the probable influence of the security development
too. The phishing attack is also a common means of extracting information from the influence of
the successful and effective information technology development (Wall 2017). The alignment
would also be helpful for taking care of the information processing and the cyber criminal
activities had resulted in forming major setback for operations.
2. List of necessary resources for forensic investigation
Forensic information has been widely used for extracting information and resulting in
developing the influence of information technology. The information technology development
lacked the probable influence of the security development too. The alignment would also be
helpful for taking care of the information processing and the cyber criminal activities had
resulted in forming major setback for operations. The following is the sources of the study,
Article/Journal Name of the Authors Published by (Source)
Digital Forensics Compute
Cluster: A High Speed
Distributed Computing
Capability for Digital Forensics
Gonzales, D.,
Winkelman, Z., Tran,
T., Sanchez, R.,
Woods, D. and
Hollywood, J.
World Academy of Science,
Engineering and Technology,
International Journal of Computer,
Electrical, Automation, Control
and Information Engineering, 11(8)
Introduction to Deception, Digital
Forensics, and Malware
Minitrack
Nance, K. and Bishop,
M.
Proceedings of the 50th Hawaii
International Conference on
System Sciences
A bird's eye view of Cyber
Crimes and Free and Open
Source Software's to Detoxify
Cyber Crime Attacks-an End
Kannan, M.J. Anti-Cyber Crimes (ICACC), 2017
2nd International Conference on
(pp. 232-237). IEEE
resulting in exposing huge amount of information to the people resulting in forming major
setback to the operations. The login credentials and the information storage had been abducted
due to the flaw in storage resulting in toll of extracting information of about 2 TB. The
information technology development lacked the probable influence of the security development
too. The phishing attack is also a common means of extracting information from the influence of
the successful and effective information technology development (Wall 2017). The alignment
would also be helpful for taking care of the information processing and the cyber criminal
activities had resulted in forming major setback for operations.
2. List of necessary resources for forensic investigation
Forensic information has been widely used for extracting information and resulting in
developing the influence of information technology. The information technology development
lacked the probable influence of the security development too. The alignment would also be
helpful for taking care of the information processing and the cyber criminal activities had
resulted in forming major setback for operations. The following is the sources of the study,
Article/Journal Name of the Authors Published by (Source)
Digital Forensics Compute
Cluster: A High Speed
Distributed Computing
Capability for Digital Forensics
Gonzales, D.,
Winkelman, Z., Tran,
T., Sanchez, R.,
Woods, D. and
Hollywood, J.
World Academy of Science,
Engineering and Technology,
International Journal of Computer,
Electrical, Automation, Control
and Information Engineering, 11(8)
Introduction to Deception, Digital
Forensics, and Malware
Minitrack
Nance, K. and Bishop,
M.
Proceedings of the 50th Hawaii
International Conference on
System Sciences
A bird's eye view of Cyber
Crimes and Free and Open
Source Software's to Detoxify
Cyber Crime Attacks-an End
Kannan, M.J. Anti-Cyber Crimes (ICACC), 2017
2nd International Conference on
(pp. 232-237). IEEE

5CASE INVESTIGATION REPORT
User Perspective
Security strategies to overcome
cyber measures, factors and
barriers
Awan, J.H., Memon,
S., Khan, R.A.,
Noonari, A.Q.,
Hussain, Z. and
Usman, M.
Eng. Sci. Technol. Int. Res. J, 1(1)
3. Analysis of detailed findings
According to Chigozie-Okwum, Michael and Ugboaja (2017), the number of cyber
criminal cases has increased with the passage of time and the influence of operations for listing
the development of the functions. The computer crime case has been increased and hence the
technology innovation has been resulting in forming the management issues. Many of the
organizations have been using innovative technology for implying the use of the successful
operation development (Awan et al. 2017). The computer crime activities have been increased
with the influence of the technology innovation and development. The alignment would also
result in easing the understanding the causes of the computer crime cases. According to Hussein
(2018), many of the cyber attacks were planned carefully for getting spear phishing
mails/malware/ransomware into the main information system and affecting the system from
inside. The threat agents would result in making the information stored in the mails of the
universities and connected people vulnerable for being hacked into. The use of the digital
technology had resulted in extorting the information from the accounts of various people. The
information technology development lacked the probable influence of the security development
too (Nizami and Naqvi 2017). The cyber crime attack uses a common means of extracting
information from the influence of the successful and effective information technology
User Perspective
Security strategies to overcome
cyber measures, factors and
barriers
Awan, J.H., Memon,
S., Khan, R.A.,
Noonari, A.Q.,
Hussain, Z. and
Usman, M.
Eng. Sci. Technol. Int. Res. J, 1(1)
3. Analysis of detailed findings
According to Chigozie-Okwum, Michael and Ugboaja (2017), the number of cyber
criminal cases has increased with the passage of time and the influence of operations for listing
the development of the functions. The computer crime case has been increased and hence the
technology innovation has been resulting in forming the management issues. Many of the
organizations have been using innovative technology for implying the use of the successful
operation development (Awan et al. 2017). The computer crime activities have been increased
with the influence of the technology innovation and development. The alignment would also
result in easing the understanding the causes of the computer crime cases. According to Hussein
(2018), many of the cyber attacks were planned carefully for getting spear phishing
mails/malware/ransomware into the main information system and affecting the system from
inside. The threat agents would result in making the information stored in the mails of the
universities and connected people vulnerable for being hacked into. The use of the digital
technology had resulted in extorting the information from the accounts of various people. The
information technology development lacked the probable influence of the security development
too (Nizami and Naqvi 2017). The cyber crime attack uses a common means of extracting
information from the influence of the successful and effective information technology
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6CASE INVESTIGATION REPORT
development. The alignment would also be helpful for taking care of the information processing
and the cyber criminal activities had resulted in forming major setback for operations.
4. Review and reflection on the findings
4.1 Review of findings
The review of the two scenarios of hacking of US universities and rampant data
exposures have resulted in listing the probable issues for the cyber criminal operations. The
attack on the information storage system of US Universities has been of major cyber criminal
attack and it has resulted in forming major setback for the exhaustion of the resources. Kannan
(2017), have pointed out that the Spree attack was alleged by the 9 Iranian hackers resulting in
affecting over 300 universities of US and abroad. The attack was planned carefully for getting
spear phishing mails into the universities and affecting the system from inside. The phishing
mails would result in making the information stored in the mails of the universities and
connected people vulnerable for being hacked into. The mail had toll a loss of over $3 billion by
stealing 21 Tb of private data and personal information from the mails. The login credentials and
the information storage had been abducted by the use of the phishing technologies resulting in
toll of extracting information from 8000 accounts (Ozel et al. 2018). The flaw of the information
storage system of US Government Records has been of major cyber criminal attack and it has
resulted in forming major setback for the exhaustion of the resources. The exposure was alleged
due to security flaws in the system resulting in affecting over 340 million of records. The
misconfiguration of the data records flaw resulted in exposing the security number, credit card
number, and other personal information of US adults to public (Case and Richard 2017). The
flaw resulted in costing serious damage to the integrity of the information stored by the
development. The alignment would also be helpful for taking care of the information processing
and the cyber criminal activities had resulted in forming major setback for operations.
4. Review and reflection on the findings
4.1 Review of findings
The review of the two scenarios of hacking of US universities and rampant data
exposures have resulted in listing the probable issues for the cyber criminal operations. The
attack on the information storage system of US Universities has been of major cyber criminal
attack and it has resulted in forming major setback for the exhaustion of the resources. Kannan
(2017), have pointed out that the Spree attack was alleged by the 9 Iranian hackers resulting in
affecting over 300 universities of US and abroad. The attack was planned carefully for getting
spear phishing mails into the universities and affecting the system from inside. The phishing
mails would result in making the information stored in the mails of the universities and
connected people vulnerable for being hacked into. The mail had toll a loss of over $3 billion by
stealing 21 Tb of private data and personal information from the mails. The login credentials and
the information storage had been abducted by the use of the phishing technologies resulting in
toll of extracting information from 8000 accounts (Ozel et al. 2018). The flaw of the information
storage system of US Government Records has been of major cyber criminal attack and it has
resulted in forming major setback for the exhaustion of the resources. The exposure was alleged
due to security flaws in the system resulting in affecting over 340 million of records. The
misconfiguration of the data records flaw resulted in exposing the security number, credit card
number, and other personal information of US adults to public (Case and Richard 2017). The
flaw resulted in costing serious damage to the integrity of the information stored by the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7CASE INVESTIGATION REPORT
government resulting in exposing huge amount of information to the people resulting in forming
major setback to the operations. The login credentials and the information storage had been
abducted due to the flaw in storage resulting in toll of extracting information of about 2 TB.
4.2 Reflection on findings
Hence from the study of the two attacks it is clear that the growth of cyber crimes had
been helpful for implying the development of the proper and effective management process. The
cyber crimes had been growing since the development of the successive implication
management. The computer technology development had be effectively eased with the formation
of the interesting alignment had be formed for easing the usefulness of the operations. The
methods of cyber crimes had increased with the passage of time resulting in forming the issues
for the execution of the operations of the organization. The computer crime case had been
increased and hence the technology innovation had been resulting in forming the management
issues. We need to implement improved security measures for ensuring that the cyber criminal
activities can be limited. Moreover, we are required to follow ACS code of ethics for ensuring
that none of us misuse the IT technology for hacking and getting into another system unethically
resulting in forming the possible issues to the development.
Conclusion
It can be concluded that the cyber security holds an integral role in the execution of the
operations of the organization. The complete alignment of cyber security had been aligned for
easing the information processing and developing the information access. The growth of cyber
crimes had been helpful for implying the development of the proper and effective management
process. The cyber crimes had been growing since the development of the successive implication
government resulting in exposing huge amount of information to the people resulting in forming
major setback to the operations. The login credentials and the information storage had been
abducted due to the flaw in storage resulting in toll of extracting information of about 2 TB.
4.2 Reflection on findings
Hence from the study of the two attacks it is clear that the growth of cyber crimes had
been helpful for implying the development of the proper and effective management process. The
cyber crimes had been growing since the development of the successive implication
management. The computer technology development had be effectively eased with the formation
of the interesting alignment had be formed for easing the usefulness of the operations. The
methods of cyber crimes had increased with the passage of time resulting in forming the issues
for the execution of the operations of the organization. The computer crime case had been
increased and hence the technology innovation had been resulting in forming the management
issues. We need to implement improved security measures for ensuring that the cyber criminal
activities can be limited. Moreover, we are required to follow ACS code of ethics for ensuring
that none of us misuse the IT technology for hacking and getting into another system unethically
resulting in forming the possible issues to the development.
Conclusion
It can be concluded that the cyber security holds an integral role in the execution of the
operations of the organization. The complete alignment of cyber security had been aligned for
easing the information processing and developing the information access. The growth of cyber
crimes had been helpful for implying the development of the proper and effective management
process. The cyber crimes had been growing since the development of the successive implication

8CASE INVESTIGATION REPORT
management. The computer technology development had be effectively eased with the formation
of the interesting alignment had be formed for easing the usefulness of the operations. The
methods of cyber crimes had increased with the passage of time resulting in forming the issues
for the execution of the operations of the organization. The computer crime case had been
increased and hence the technology innovation had been resulting in forming the management
issues. The organizations had been using innovative technology for implying the use of the
successful operation development. The computer crime activities had been increased with the
influence of the technology innovation and development.
management. The computer technology development had be effectively eased with the formation
of the interesting alignment had be formed for easing the usefulness of the operations. The
methods of cyber crimes had increased with the passage of time resulting in forming the issues
for the execution of the operations of the organization. The computer crime case had been
increased and hence the technology innovation had been resulting in forming the management
issues. The organizations had been using innovative technology for implying the use of the
successful operation development. The computer crime activities had been increased with the
influence of the technology innovation and development.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9CASE INVESTIGATION REPORT
References
Apurva, A., Ranakoti, P., Yadav, S., Tomer, S. and Roy, N.R., 2017, October. Redefining cyber
security with big data analytics. In Computing and Communication Technologies for Smart
Nation (IC3TSN), 2017 International Conference on(pp. 199-203). IEEE.
Awan, J.H., Memon, S., Khan, R.A., Noonari, A.Q., Hussain, Z. and Usman, M., 2017. Security
strategies to overcome cyber measures, factors and barriers. Eng. Sci. Technol. Int. Res. J, 1(1),
pp.51-58.
Case, A. and Richard, G.G., 2017. Traditionally, digital forensics focused on artifacts located on
the storage devices of computer systems, mobile phones, digital cameras, and other electronic
devices. In the past decade, however, researchers have created a number of powerful memory
forensics tools that expand the scope of digital forensics to include the examination of volatile
memory as well. While memory forensic techniques have... Digital Investigation, 20, pp.S107-
S115.
Chang, L.Y., Zhong, L.Y. and Grabosky, P.N., 2018. Citizen co‐production of cyber security:
Self‐help, vigilantes, and cybercrime. Regulation & Governance, 12(1), pp.101-114.
Chigozie-Okwum, C.C., Michael, D.O. and Ugboaja, S.G., 2017. Computer forensics
investigation; implications for improved cyber security in Nigeria. AFRREV STECH: An
International Journal of Science and Technology, 6(1), pp.59-73.
Glisson, W. and Choo, K.K.R., 2018, January. Introduction to the Minitrack on Cyber-of-Things:
Cyber Crimes, Cyber Security and Cyber Forensics. In Proceedings of the 51st Hawaii
International Conference on System Sciences.
References
Apurva, A., Ranakoti, P., Yadav, S., Tomer, S. and Roy, N.R., 2017, October. Redefining cyber
security with big data analytics. In Computing and Communication Technologies for Smart
Nation (IC3TSN), 2017 International Conference on(pp. 199-203). IEEE.
Awan, J.H., Memon, S., Khan, R.A., Noonari, A.Q., Hussain, Z. and Usman, M., 2017. Security
strategies to overcome cyber measures, factors and barriers. Eng. Sci. Technol. Int. Res. J, 1(1),
pp.51-58.
Case, A. and Richard, G.G., 2017. Traditionally, digital forensics focused on artifacts located on
the storage devices of computer systems, mobile phones, digital cameras, and other electronic
devices. In the past decade, however, researchers have created a number of powerful memory
forensics tools that expand the scope of digital forensics to include the examination of volatile
memory as well. While memory forensic techniques have... Digital Investigation, 20, pp.S107-
S115.
Chang, L.Y., Zhong, L.Y. and Grabosky, P.N., 2018. Citizen co‐production of cyber security:
Self‐help, vigilantes, and cybercrime. Regulation & Governance, 12(1), pp.101-114.
Chigozie-Okwum, C.C., Michael, D.O. and Ugboaja, S.G., 2017. Computer forensics
investigation; implications for improved cyber security in Nigeria. AFRREV STECH: An
International Journal of Science and Technology, 6(1), pp.59-73.
Glisson, W. and Choo, K.K.R., 2018, January. Introduction to the Minitrack on Cyber-of-Things:
Cyber Crimes, Cyber Security and Cyber Forensics. In Proceedings of the 51st Hawaii
International Conference on System Sciences.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10CASE INVESTIGATION REPORT
Glisson, W. and Choo, R., 2017. Introduction to Cyber-of-Things: Cyber-crimes and Cyber-
Security Minitrack.
Gonzales, D., Winkelman, Z., Tran, T., Sanchez, R., Woods, D. and Hollywood, J., 2017. Digital
Forensics Compute Cluster: A High Speed Distributed Computing Capability for Digital
Forensics. World Academy of Science, Engineering and Technology, International Journal of
Computer, Electrical, Automation, Control and Information Engineering, 11(8), pp.944-951.
Hussein, Z., 2018. Cybercrime: Do Security and Software Influence Students’ Perception?.
In Proceedings of the Art and Design International Conference (AnDIC 2016) (pp. 325-332).
Springer, Singapore.
Kannan, M.J., 2017, March. A bird's eye view of Cyber Crimes and Free and Open Source
Software's to Detoxify Cyber Crime Attacks-an End User Perspective. In Anti-Cyber Crimes
(ICACC), 2017 2nd International Conference on (pp. 232-237). IEEE.
Nance, K. and Bishop, M., 2017, January. Introduction to Deception, Digital Forensics, and
Malware Minitrack. In Proceedings of the 50th Hawaii International Conference on System
Sciences.
Nizami, S.M. and Naqvi, G., 2017. The Reality of Cyber Security. International Journal for
Electronic Crime Investigation, p.11.
Ozel, M., Bulbul, H.I., Yavuzcan, H.G. and Bay, O.F., 2018. An analytical analysis of Turkish
digital forensics. Digital Investigation, 25, pp.55-69.
Tsikrika, T., Akhgar, B., Katos, V., Vrochidis, S., Burnap, P. and Williams, M.L., 2017,
February. 1st international workshop on search and mining terrorist online content & advances in
Glisson, W. and Choo, R., 2017. Introduction to Cyber-of-Things: Cyber-crimes and Cyber-
Security Minitrack.
Gonzales, D., Winkelman, Z., Tran, T., Sanchez, R., Woods, D. and Hollywood, J., 2017. Digital
Forensics Compute Cluster: A High Speed Distributed Computing Capability for Digital
Forensics. World Academy of Science, Engineering and Technology, International Journal of
Computer, Electrical, Automation, Control and Information Engineering, 11(8), pp.944-951.
Hussein, Z., 2018. Cybercrime: Do Security and Software Influence Students’ Perception?.
In Proceedings of the Art and Design International Conference (AnDIC 2016) (pp. 325-332).
Springer, Singapore.
Kannan, M.J., 2017, March. A bird's eye view of Cyber Crimes and Free and Open Source
Software's to Detoxify Cyber Crime Attacks-an End User Perspective. In Anti-Cyber Crimes
(ICACC), 2017 2nd International Conference on (pp. 232-237). IEEE.
Nance, K. and Bishop, M., 2017, January. Introduction to Deception, Digital Forensics, and
Malware Minitrack. In Proceedings of the 50th Hawaii International Conference on System
Sciences.
Nizami, S.M. and Naqvi, G., 2017. The Reality of Cyber Security. International Journal for
Electronic Crime Investigation, p.11.
Ozel, M., Bulbul, H.I., Yavuzcan, H.G. and Bay, O.F., 2018. An analytical analysis of Turkish
digital forensics. Digital Investigation, 25, pp.55-69.
Tsikrika, T., Akhgar, B., Katos, V., Vrochidis, S., Burnap, P. and Williams, M.L., 2017,
February. 1st international workshop on search and mining terrorist online content & advances in

11CASE INVESTIGATION REPORT
data science for cyber security and risk on the web. In Proceedings of the Tenth ACM
International Conference on Web Search and Data Mining (pp. 823-824). ACM.
Wall, D.S., 2017. Crime, Security and Information Communication Technologies: The Changing
Cybersecurity Threat Landscape and Its Implications for Regulation and Policing.
data science for cyber security and risk on the web. In Proceedings of the Tenth ACM
International Conference on Web Search and Data Mining (pp. 823-824). ACM.
Wall, D.S., 2017. Crime, Security and Information Communication Technologies: The Changing
Cybersecurity Threat Landscape and Its Implications for Regulation and Policing.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 23