Tracking Criminal Activity: Operating System Forensics Essay

Exclusively available on IvyPanda Available only on IvyPanda

It seems beneficial and helpful to analyze operating system data when investigating the case that is strongly related to the usage of technology. Therefore, forensic examiners tend to research any data left by the perpetrators that might help in determining their identities (Imam, 2019). As a matter of fact, incompetent perpetrators tend to leave the evidence on their devices, which makes it easier for experts to find during the analysis of the operating system data (Imam, 2019). Nevertheless, sometimes cyberpolice might deal with experienced criminals and spend a considerable amount of time researching the methods of revealing any artifacts that perpetrators might have missed in the system when covering their tracks.

We will write a custom essay on your topic a custom Essay on Tracking Criminal Activity: Operating System Forensics
808 writers online

Forensic examiners employ various methods of uncovering the evidence of hackers, perpetrators, viruses, and spyware. The detected data might help the investigation in terms of understanding the motives of the criminals (Imam, 2019). Therefore, according to Fakhar Imam (2019, line 17), examiners opt for scanning “deleted entries, swap or page files, spool files, and RAM during this process.” Still, it seems significant to note that experts use the following tools to conduct operating system forensics: Cuckoo Sandbox, Forensic toolkit for Linux, Helix, and X-Ways forensics (Imam, 2019). To be more particular, examiners can investigate the internet history cache to see what pages the perpetrator has entered while committing the cybercrime. In addition, it is also advantageous to research websites that were browsed by the criminals in the incognito mode to understand their aims and goals for hiding this data. Overall, the advancement of technology has allowed forensic examiners to employ various tools for analyzing the online activity and operational system data of the perpetrators who committed severe cybercrimes.

Reference

Imam, F. (2019). Infosec Resources. Web.

Print
Need an custom research paper on Tracking Criminal Activity: Operating System Forensics written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2022, December 11). Tracking Criminal Activity: Operating System Forensics. https://ivypanda.com/essays/tracking-criminal-activity-operating-system-forensics/

Work Cited

"Tracking Criminal Activity: Operating System Forensics." IvyPanda, 11 Dec. 2022, ivypanda.com/essays/tracking-criminal-activity-operating-system-forensics/.

References

IvyPanda. (2022) 'Tracking Criminal Activity: Operating System Forensics'. 11 December.

References

IvyPanda. 2022. "Tracking Criminal Activity: Operating System Forensics." December 11, 2022. https://ivypanda.com/essays/tracking-criminal-activity-operating-system-forensics/.

1. IvyPanda. "Tracking Criminal Activity: Operating System Forensics." December 11, 2022. https://ivypanda.com/essays/tracking-criminal-activity-operating-system-forensics/.


Bibliography


IvyPanda. "Tracking Criminal Activity: Operating System Forensics." December 11, 2022. https://ivypanda.com/essays/tracking-criminal-activity-operating-system-forensics/.

Powered by CiteTotal, essay bibliography generator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1