Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Log Files

Handbook of Research on Innovative Approaches to Information Technology in Library and Information Science
Log files are utilized in forensic investigations to determine the actions performed on a system or network.
Published in Chapter:
Digital Evidence Collection and Preservation in Computer Network Forensics
Rajdipsinh Vaghela (Parul Institute of Engineering and Technology, Parul University, Vadodara, India), V. Dankan Gowda (B.M.S. Institute of Technology and Management, Bangalore, India), Mohammad Taj (Aditya Engineering College, India), Annepu Arudra (Rajiv Gandhi Institute of Technology, India), and Manoj Chopra (IES University, Bhopal, India)
DOI: 10.4018/979-8-3693-0807-3.ch003
Abstract
The growing integration of information and communication technology (ICT) in today's world has led to the rise of crimes in the digital realm, specifically those linked to networks and computers. This surge in cybercrime presents substantial hurdles for forensic evaluation. A pivotal evidence source in cyber forensic probes, especially when pinpointing potential threats to confidential data, stems from the extensive data produced by network nodes. The primary goal of cyber forensics is to offer clear, well-documented evidence that can stand up in a courtroom. This chapter intends to deliver a thorough overview of the current scholarly material, emphasizing diverse aspects of cyber forensic endeavors. It encompasses foundational theories, prior data analysis blueprints, and initiatives to refine methods, thereby augmenting the reach, proficiency, and precision of the network forensic structure.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Continuing Science Education of the Global Public
A record of all online activities occurring on the Web site as captured by the software monitoring the server.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR