Affiliation:
1. Research Scholar Dept of criminology & Forensic Science Karnataka University Dharwad.
2. Associate Prof Dept of Criminology & Forensic Science Karnataka University Dharwad
Abstract
Forensics, the science of using physical evidence to crack crime, has taken on a new avatar. The cyber forensic process is also advancing in new
ways. Digital forensics is the science of identifying, extracting, analyzing, and presenting the digital evidence that has been stored in digital
devices. Various digital tools and techniques are being used to achieve this. Here, the new cyber sleuths step in, armed with cyber forensics tools.
According to Section 65 of the Indian IT Act, a person who intentionally conceals or destroys or alters or intentionally or knowingly causes another
to conceal, destroy or alter any computer source code used for a computer, computer program, computer system, or network. To primary objective
of this study is to nd the role of Cyber Forensic Tools in Cyber investigation. It is better to sue security programmers by the body corporate to
control information on sites. Strict statutory laws need to be passed by the legislatures keeping in mind the interest of citizens. Working on this
paper helped me understand the primary aim of the cyber lab in solving the cases by analyzing the evidence given to them. Using cyber forensic
tools allows us to extract the data from the targeted devices, which plays a signicant role in detecting and collecting information regarding
cybercrimes.
Reference29 articles.
1. Arshad, H., Jantan, A. B., &Abiodun, O. I. (2018). Digital Forensics: review of issues in scientific validation of digital evidence. Journal of Information Processing Systems, 14(2), 346-376.
2. Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680-698.
3. Sindhu, K. K., &Meshram, B. B. (2012). Digital Forensic Investigation Tools and Procedures. International Journal of Computer Network and Information Security, 4(4), 39.
4. Prasanthi, B. V. (2016). Cyber forensic tools: a review. International Journal of Engineering Trends and Technology (IJETT), 41(5), 266-271.
5. McGuire, M., & Dowling, S. (2013). Cybercrime: A review of the evidence. Summary of key findings and implications. Home Office Research report, 75.