UCSY's Research Repository

Computer and Cybercrime Forensics Investigation in Myanmar

Show simple item record

dc.contributor.author Maung, Tin Maung
dc.date.accessioned 2022-04-20T06:05:20Z
dc.date.available 2022-04-20T06:05:20Z
dc.date.issued 2022-04-01
dc.identifier.uri https://onlineresource.ucsy.edu.mm/handle/123456789/2596
dc.description.abstract Communication technology and devices are timely changing and increasing various levels and different operating systems in all over the world. In this day and age, our country is just developing country and most of the people are not accustomed to use the modern communications system and digital devices. The rapid increase of smart technologies and Internet usage creates new attack surfaces for cybercrime. In society, information is the new challenge for security, privacy, and cybercrime. To prevent cyberspace from exploitation of vulnerabilities it is essential to understand current and future threats with the use of social media, mobile device, virtual worlds, and mixed reality. Digital Investigators do not have to try and read people's minds anymore because people's interests, hidden secrets, financial information and even their love life are all on their computer. The usage of Standard Cyber Laws and Policy for Cybercrime Investigation can provide an ethical, secure and monitored computing environment. Acceptable Evidences can be obtained by examining sensible clues from any digital devices such as computer, mobile smart phones, tablets, GPS and IoT devices via traditional way or cloud. The most important part of forensic investigation is to gather the “relevant” and “acceptable” information for cyber evidence on court. There is a need for forensic examiners to investigate the locating and documenting the remnant data on various digital devices to trace the criminal offensive activities. Computer users think that by simply deleting traces of their activity, everything is gone. What they do not realize is that by using the right Digital Forensics tool, that can locate, extract and analyze what was once there and get it back. There will be amazed by the number of artifacts that can be recovered and extracted, even from the tiniest of devices. Therefore, forensic investigators need to emphasize how file system timestamps work. At the present time, most of the computer users are familiarity in Windows Operating System of Microsoft Platform and mobile phone users almost used in Android and iOS operating systems in Myanmar. Utilization of Open Source forensics tool has not only helped reduce and prevent cybercrime but also cost of investigation and protect the country from cybercrime. In this research, the workable process flow which consists of six stages and a detailed analysis framework have been proposed for the forensics investigation on Windows and Mobile systems. Consequently, the scope of this research includes Windows, Android and iOS operating system for computer and cyber forensics. The discovered data remnants can provide the forensic examiners generating the effective evidences in real-world forensics. The discovered data remnants can lead the forensic data reduction. Finally, an applicable tool (MYANFOSICS) with many useful features has been proposed for the forensics investigation on Windows, Android and iOS operating systems. en_US
dc.description.sponsorship University of Computer Studies, Yangon en_US
dc.language.iso en en_US
dc.publisher University of Computer Studies, Yangon en_US
dc.subject Computer and Cybercrime en_US
dc.subject Forensics Investigation in Myanmar en_US
dc.title Computer and Cybercrime Forensics Investigation in Myanmar en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository



Browse

My Account

Statistics