A study on digital forensics standard operation procedure for wireless cybercrime

8Citations
Citations of this article
52Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the rapid development of information technology, computer and networking, it has brought convenience to the whole world, it has changed the way we live our daily life, interactions with people are no longer just face to face, but can be transmitted through the use of internet. With the frequent use of internet technology, Cyber crime became the new threat of our society. Amongst all advance technology, wireless network is the number one threat, with high mobility, no wired required and easy installation, it's the most common way to access the internet these days. Wireless signals travels through air rather than a traditional wired network which can be much more vulnerable for those who has intentions pursuing illegal activities. With the increases growth of internet users and the development of new technologies, current legislations and security has faced difficulties in trying to keep up, hence Cyber crime numbers are increased rapidly. Although wireless Cyber crime is a new threat, but with the detail tracking and investigation effort, ultimately the professional will find some kind of digital evidence, and its often required to identify and preserve in order to be recognized and restoring the truth, hence the establishment of trainings in digital evidence through to forensic requires immediate implementation, with increase of the standards and knowledge it will strength the competence and credibility of the forensics unit's professional ability in assistance to fight again all crime. © 2011 IEEE.

Cite

CITATION STYLE

APA

Lin, I. L., Yen, Y. S., & Chang, A. (2011). A study on digital forensics standard operation procedure for wireless cybercrime. In Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011 (pp. 543–548). https://doi.org/10.1109/IMIS.2011.58

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free