Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime

The cybersecurity in the modern world has become global, and cyber attacks are becoming more complex and large-scale. In the system of civil and criminal justice, computer forensics helps to ensure the integrity of digital evidence presented in court cases. The purpose of this study is to develop sc...

Full description

Saved in:
Bibliographic Details
Main Authors: Serhii Drobotov, Roman Pertsev, Mariia Hrab, Vasyl Fedytnyk, Svitlana Moroz, Mariia Kikalishvili
Format: Article
Language:English
Published: University of Tehran 2023-01-01
Series:Journal of Information Technology Management
Subjects:
Online Access:https://jitm.ut.ac.ir/article_90741_c1aa51be8b7de86bc769e2b7401c13dd.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850274535229620224
author Serhii Drobotov
Roman Pertsev
Mariia Hrab
Vasyl Fedytnyk
Svitlana Moroz
Mariia Kikalishvili
author_facet Serhii Drobotov
Roman Pertsev
Mariia Hrab
Vasyl Fedytnyk
Svitlana Moroz
Mariia Kikalishvili
author_sort Serhii Drobotov
collection DOAJ
description The cybersecurity in the modern world has become global, and cyber attacks are becoming more complex and large-scale. In the system of civil and criminal justice, computer forensics helps to ensure the integrity of digital evidence presented in court cases. The purpose of this study is to develop scientifically sound proposals and recommendations for the implementation of tools for forensic research of computer tools and systems in the fight against cybercrime. The relevance of this study is due to the need to implement active ways to protect and combat cybercrime. To achieve the goal of the study, methodological principles and approaches of legal science were used. It is proposed to use computer forensic methods more widely research in the fight against cybercrime.This study identifies the types of computer forensics: forensics database; electronic forensics; malware forensics; criminology of memory; mobile forensics; network forensics. The authors foundlack of a regulatory mechanism to regulate cybersecurity, capture and use of digital evidence and the regulatory framework for international cooperation. To brought need in strengthening international cooperation and in developing appropriate policies and legislative initiatives of security and network and information systems, improvement legislation in the field countering cybercrime.
format Article
id doaj-art-60f2381ea34048d7bd1dfcf45b44cebb
institution OA Journals
issn 2008-5893
2423-5059
language English
publishDate 2023-01-01
publisher University of Tehran
record_format Article
series Journal of Information Technology Management
spelling doaj-art-60f2381ea34048d7bd1dfcf45b44cebb2025-08-20T01:51:07ZengUniversity of TehranJournal of Information Technology Management2008-58932423-50592023-01-0115113516210.22059/jitm.2023.9074190741Forensic Research of the Computer Tools and Systems in the Fight against CybercrimeSerhii Drobotov0Roman Pertsev1Mariia Hrab2Vasyl Fedytnyk3Svitlana Moroz4Mariia Kikalishvili5Department of criminal law policy and criminal law, Institute of Law Taras Shevchenko National University of Kyiv, Kyiv.Candidate of Juridical Scienses, practicing lawyer, Kiev, Ukraine.Attorney at law, partner of the bar association «Legal strategy».Department of Law, Institute of Lviv Interregional Academy of Personnel Management, Lviv, Ukraine.Department of Law Enforcement and Combating Corruption, National Research Institute of Law of Prince Volodymyr the Great, Interregional Academy of Personnel Management, Kyiv, Ukraine.Department of the State guard of Ukraine, Taras Shevchenko National University of Kiev, Kyiv, Ukraine.The cybersecurity in the modern world has become global, and cyber attacks are becoming more complex and large-scale. In the system of civil and criminal justice, computer forensics helps to ensure the integrity of digital evidence presented in court cases. The purpose of this study is to develop scientifically sound proposals and recommendations for the implementation of tools for forensic research of computer tools and systems in the fight against cybercrime. The relevance of this study is due to the need to implement active ways to protect and combat cybercrime. To achieve the goal of the study, methodological principles and approaches of legal science were used. It is proposed to use computer forensic methods more widely research in the fight against cybercrime.This study identifies the types of computer forensics: forensics database; electronic forensics; malware forensics; criminology of memory; mobile forensics; network forensics. The authors foundlack of a regulatory mechanism to regulate cybersecurity, capture and use of digital evidence and the regulatory framework for international cooperation. To brought need in strengthening international cooperation and in developing appropriate policies and legislative initiatives of security and network and information systems, improvement legislation in the field countering cybercrime.https://jitm.ut.ac.ir/article_90741_c1aa51be8b7de86bc769e2b7401c13dd.pdfforensic researchcomputer tools and systemscybercrime
spellingShingle Serhii Drobotov
Roman Pertsev
Mariia Hrab
Vasyl Fedytnyk
Svitlana Moroz
Mariia Kikalishvili
Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime
Journal of Information Technology Management
forensic research
computer tools and systems
cybercrime
title Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime
title_full Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime
title_fullStr Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime
title_full_unstemmed Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime
title_short Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime
title_sort forensic research of the computer tools and systems in the fight against cybercrime
topic forensic research
computer tools and systems
cybercrime
url https://jitm.ut.ac.ir/article_90741_c1aa51be8b7de86bc769e2b7401c13dd.pdf
work_keys_str_mv AT serhiidrobotov forensicresearchofthecomputertoolsandsystemsinthefightagainstcybercrime
AT romanpertsev forensicresearchofthecomputertoolsandsystemsinthefightagainstcybercrime
AT mariiahrab forensicresearchofthecomputertoolsandsystemsinthefightagainstcybercrime
AT vasylfedytnyk forensicresearchofthecomputertoolsandsystemsinthefightagainstcybercrime
AT svitlanamoroz forensicresearchofthecomputertoolsandsystemsinthefightagainstcybercrime
AT mariiakikalishvili forensicresearchofthecomputertoolsandsystemsinthefightagainstcybercrime