dc.description.abstract |
Communication technology and devices are timely changing and increasing
various levels and different operating systems in all over the world. In this day and age,
our country is just developing country and most of the people are not accustomed to
use the modern communications system and digital devices. The rapid increase of smart
technologies and Internet usage creates new attack surfaces for cybercrime. In society,
information is the new challenge for security, privacy, and cybercrime. To prevent
cyberspace from exploitation of vulnerabilities it is essential to understand current and
future threats with the use of social media, mobile device, virtual worlds, and mixed
reality.
Digital Investigators do not have to try and read people's minds anymore
because people's interests, hidden secrets, financial information and even their love life
are all on their computer. The usage of Standard Cyber Laws and Policy for Cybercrime
Investigation can provide an ethical, secure and monitored computing environment.
Acceptable Evidences can be obtained by examining sensible clues from any digital
devices such as computer, mobile smart phones, tablets, GPS and IoT devices via
traditional way or cloud. The most important part of forensic investigation is to gather
the “relevant” and “acceptable” information for cyber evidence on court. There is a
need for forensic examiners to investigate the locating and documenting the remnant
data on various digital devices to trace the criminal offensive activities.
Computer users think that by simply deleting traces of their activity, everything
is gone. What they do not realize is that by using the right Digital Forensics tool, that
can locate, extract and analyze what was once there and get it back. There will be
amazed by the number of artifacts that can be recovered and extracted, even from the
tiniest of devices. Therefore, forensic investigators need to emphasize how file system
timestamps work. At the present time, most of the computer users are familiarity in
Windows Operating System of Microsoft Platform and mobile phone users almost used
in Android and iOS operating systems in Myanmar. Utilization of Open Source
forensics tool has not only helped reduce and prevent cybercrime but also cost of
investigation and protect the country from cybercrime.
In this research, the workable process flow which consists of six stages and a
detailed analysis framework have been proposed for the forensics investigation on
Windows and Mobile systems. Consequently, the scope of this research includes
Windows, Android and iOS operating system for computer and cyber forensics. The
discovered data remnants can provide the forensic examiners generating the effective
evidences in real-world forensics. The discovered data remnants can lead the forensic
data reduction. Finally, an applicable tool (MYANFOSICS) with many useful features
has been proposed for the forensics investigation on Windows, Android and iOS
operating systems. |
en_US |