Essays about: "Forensics"
Showing result 1 - 5 of 66 essays containing the word Forensics.
-
1. Peering into the Dark : A Dark Web Digital Forensic Investigation on Windows 11
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : The ability to access the Internet while remaining anonymous is a necessity in today's society. Whistleblowers need it to establish contact with journalists, and individuals living under repressive regimes need it to access essential resources. READ MORE
-
2. Digital Forensic Analysis of Snapchat and BeReal : In Search of Artifacts
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Snapchat and BeReal are popular social media platforms focused on photo sharing and instant messaging. A tool often used in police investigations is the analysis of communication, this includes different electronic devices and smartphone devices. READ MORE
-
3. Big Data Analytics Using Apache Flink for Cybercrime Forensics on X (formerly known as Twitter)
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : The exponential growth of social media usage has led to massive data sharing, posing challenges for traditional systems in managing and analyzing such vast amounts of data. This surge in data exchange has also resulted in an increase in cyber threats from individuals and criminal groups. READ MORE
-
4. Anti-forensic Techniques: Feasibility and Efficiency against Forensic Tools
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : The anti-forensics process using different methods to hide information or alter it which can lead theinvestigation to the wrong direction. The rising of new skills and experience levels can put the wholeinvestigation in jeopardy especially in the aspect of financial and time loss. READ MORE
-
5. Collecting Cyber Traces : Adding Forensic Evidence In Threat Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : There is a rising concern about cyber security as both industry and individuals depend increasingly on the Internet. Threat modeling and attack simulations are the main approaches for the security analyst to examine the universal reliability of Information Technology infrastructures. READ MORE