Dissemin is shutting down on January 1st, 2025

Published in

Handbook of Research on Cyber Crime and Information Privacy, p. 132-150, 2021

DOI: 10.4018/978-1-7998-5728-0.ch008

Links

Tools

Export citation

Search in Google Scholar

Computer Forensics and Cyber Attacks

Book chapter published in 2020 by Michele Perilli, Michelangelo De Bonis, Crescenzio Gallo ORCID
This paper was not found in any repository, but could be made available legally by the author.
This paper was not found in any repository, but could be made available legally by the author.

Full text: Unavailable

Red circle
Preprint: archiving forbidden
Green circle
Postprint: archiving allowed
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

During investigative activities in the field of contrasting tax evasion and fraud, it is known that law enforcement agencies are increasingly encountering digital documents, which are slowly replacing the paper ones. The chapter has the purpose to explain as data, extracted from an electronic device, turns into evidence in court. The authors describe how hidden data (metadata) can become forensic evidence. In particular, the chapter examines the metadata contained in digital photos, which conceal a mass of data whose existence is not normally suspected. The second part of the chapter consists of miscellaneous cyber-attack descriptions in which computer forensics can be applied. It is finally described how one can protect systems against a cyber-attacks.