A study on digital forensics standard operation procedure for wireless cybercrime

  • Lin I
  • Yen Y
  • Chang A
  • 34

    Readers

    Mendeley users who have this article in their library.
  • 2

    Citations

    Citations of this article.

Abstract

With the rapid development of information technology, computer and networking, it has brought convenience to the whole world, it has changed the way we live our daily life, interactions with people are no longer just face to face, but can be transmitted through the use of internet. With the frequent use of internet technology, Cyber crime became the new threat of our society. Amongst all advance technology, wireless network is the number one threat, with high mobility, no wired required and easy installation, it's the most common way to access the internet these days. Wireless signals travels through air rather than a traditional wired network which can be much more vulnerable for those who has intentions pursuing illegal activities. With the increases growth of internet users and the development of new technologies, current legislations and security has faced difficulties in trying to keep up, hence Cyber crime numbers are increased rapidly. Although wireless Cyber crime is a new threat, but with the detail tracking and investigation effort, ultimately the professional will find some kind of digital evidence, and its often required to identify and preserve in order to be recognized and restoring the truth, hence the establishment of trainings in digital evidence through to forensic requires immediate implementation, with increase of the standards and knowledge it will strength the competence and credibility of the forensics unit's professional ability in assistance to fight again all crime.

Author-supplied keywords

  • cybercrime
  • digital evidence
  • digital forensics
  • wireless cybercrime

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Find this document

Authors

  • I. Long Lin

  • Yun Sheng Yen

  • Annie Chang

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free