Conference paper Open Access
ABSTRACT: The accelerated evolution of technology during all this time has meant for forensic science a bridge from the classic methods of solving cases to modern methods of expertise. Numerous modern forensic identification devices have stormed the field of science in question. The novelty element that represented the beginning of the evolution of technology was the computer, and at the time of its appearance, for forensic specialists, it was a challenge that was determined to be a real success. With the development of the technological field, there is a significant increase in computerized crimes, which could not be controlled and stopped at the same time with the new device, software or program. If yesterday we were working with documents that became archives, where despite the high crime rate, it was equivalent to the rate of solving them. Cybercrime has become a real problem for the authorities, given that documents are stored on servers and they belong to national security, mentioning here about: the personal data of each citizen, financial statistics, military statistics, etc. Disclosing such secrets poses a major risk to national security, and these criminals are called hackers. Against hackers, intelligence forensics have had to find solutions to stop cybercrime in such a short time. One of the modern programs in the software industry is Link Analysis. This program is used for the purpose of discovering valuable knowledge, such as data analysis from the computer systems of the state institutions concerned, namely links to web platforms or civil society. Link Analysis will allow determining their relationship and also will allow the optimization of all search engines (Google, Yahoo, etc.) in the field of medical, forensic or security. Regarding the networking network, the software makes the connection between determining the integrity of the internet connection in each network node and the physical and virtual connections after analyzing the specific data. With the help of this software, forensic specialists will be able to find all the digital blockages, improving the internet network and thus avoiding cyber-attacks.
KEYWORDS: internet, software, forensics, cybernetics, data analysis
|All versions||This version|
|Data volume||3.2 MB||3.2 MB|