Essays about: "forensic tool"
Showing result 1 - 5 of 22 essays containing the words forensic tool.
-
1. Potential and Limitations of the Sketch Map Tool in the International Red Cross Red Crescent Movement
University essay from Lunds universitet/Avdelningen för Riskhantering och SamhällssäkerhetAbstract : In disaster risk management, participatory mapping (PM) closes spatial data gaps in communities by integrating local risk knowledge. The thesis examined the potential and limitations of the Sketch Map Tool (SMT) as a PM tool for community-based disaster risk reduction (DRR) through an International Red Cross Red Crescent Movement case study. READ MORE
-
2. Digital Forensic Analysis of Snapchat and BeReal : In Search of Artifacts
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Snapchat and BeReal are popular social media platforms focused on photo sharing and instant messaging. A tool often used in police investigations is the analysis of communication, this includes different electronic devices and smartphone devices. READ MORE
-
3. Big Data Analytics Using Apache Flink for Cybercrime Forensics on X (formerly known as Twitter)
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : The exponential growth of social media usage has led to massive data sharing, posing challenges for traditional systems in managing and analyzing such vast amounts of data. This surge in data exchange has also resulted in an increase in cyber threats from individuals and criminal groups. READ MORE
-
4. The Self-administered Interview (SAI) - A sum of its parts? : A comparison between different componentes of SAI from temporal aspects and as facilitators for later retrieval
University essay from Uppsala universitet/Institutionen för psykologiAbstract : When conducting initial forensic interviews, facilitating later retrieval in an efficient and timely manner is often important. A tool called The Self-Administered Interview (SAI) has been shown to facilitate later retrieval when completed initially. READ MORE
-
5. Howthe difficulty of obtaining intrusion artifacts can influence threat modeling : An experiment that shows how IT forensics can be used preventingly
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : IT system intrusions are a problem today and the belief that all you need is a strong outer defense has faded. Today continuous monitoring of the IT infrastructure is widespread and alerts are continuously investigated. READ MORE