Digital Forensics of Cybercrimes and the Use of Cyber Forensics Tools to Obtain Digital Evidence

Digital Forensics of Cybercrimes and the Use of Cyber Forensics Tools to Obtain Digital Evidence

ISBN13: 9781799841623|ISBN10: 1799841626|ISBN13 Softcover: 9781799856092|EISBN13: 9781799841630
DOI: 10.4018/978-1-7998-4162-3.ch003
Cite Chapter Cite Chapter

MLA

Regner Sabillon. "Digital Forensics of Cybercrimes and the Use of Cyber Forensics Tools to Obtain Digital Evidence." Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM, IGI Global, 2021, pp.45-68. https://doi.org/10.4018/978-1-7998-4162-3.ch003

APA

R. Sabillon (2021). Digital Forensics of Cybercrimes and the Use of Cyber Forensics Tools to Obtain Digital Evidence. IGI Global. https://doi.org/10.4018/978-1-7998-4162-3.ch003

Chicago

Regner Sabillon. "Digital Forensics of Cybercrimes and the Use of Cyber Forensics Tools to Obtain Digital Evidence." In Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-4162-3.ch003

Export Reference

Mendeley
Favorite

Abstract

This chapter evaluates the most relevant methodologies and best practices for conducting digital investigations, preserving digital forensic evidence and following chain of custody (CoC) of cybercrimes. Cybercriminals are assuming new strategies to launch their sophisticated cyberattacks within the ever-changing digital ecosystems. The authors recommend that digital investigations must continually shift to tackle cybercrimes and prosecute cybercriminals to increase international collaboration networks, to share prevention knowledge, and to analyze lessons learned. They also establish a cyber forensics model for miscellaneous ecosystems called cyber forensics model in digital ecosystems (CFMDE). This chapter also reviews the most important categories of tools to conduct digital investigations. Nevertheless, as the cybercrime sophistication keeps improving, it is also necessary to harden technologies, techniques, methodologies, and tools to acquire digital evidence in order to support and make cyber investigation cases stronger.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.