wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cyber Crime Investigation In The Era Of Big Data

profile
18_prachi Kandalkar
Mar 14, 2022
0 Likes
0 Discussions
122 Reads

Cybercrime is a kind of crime that happens in "cyberspace", 
that is, happens in the world of computer and the Internet. 
Big Data is becoming a challenge to criminal forensic 
investigators when dealing with cyber-enabled and 
cyber-dependent crimes. In the era of Big Data, the 
valuable pieces of informationis being generated and 
transmitted by any instances, rangingfrom single-board 
computers. Big data is a buzzword in the IT industry and is often 
associated with personal data collected by large and medium 
scale enterprises.There is no formal threshold for the size 
of data that can be referred to as “big data.” The four 
main pillars of big data are often defined as volume 
(amount of data), variety (multiple types of data) velocity 
(speed of data processing) and value (not a tangible price but
the valuable intelligence that can be collected from the 
data). In India, cyber law enforcement and regulation is going 
through a tough patch. On the one hand, India has a bad and weak
cyber law, while law enforcement officials are barely aware of 
the basics of cyber law and cyber forensics. For cyber thieves, 
India has become a haven.


Comments ()


Sign in

Read Next

Process states

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Importance Of Yoga.

Blog banner

(Input/Output) in os

Blog banner

INTRODUCTION

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

This is my first blog.

Blog banner

Deadlock

Blog banner

A Survey of Anti-Forensic Techniques: Methods, Challenges, and Countermeasures

Blog banner

Virtual Machine's

Blog banner

CRISP-DM Methodology

Blog banner

INSTAGRAM

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

HACKING MOBILE PLATFORM

Blog banner

PROCESS STATE:

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

PYTHON

Blog banner

Optimization of operating system design

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

IOT Hacking Techniques

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Memory input output management

Blog banner

Explain DBMS in Brief

Blog banner

TECHNOLOGY : BOON OR CURSE ?

Blog banner

How Does SSO Works

Blog banner

Data Structures

Blog banner

Operating System

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

The Right way of cooking

Blog banner

IO Buffers

Blog banner

Mumbai

Blog banner

What if COVID does not exist!

Blog banner

APACHE KAFKA

Blog banner

SQL Injection

Blog banner

Regression Analysis

Blog banner

Business Engineering

Blog banner

Art and Culture of Rajasthan

Blog banner

MPL and how its effects?

Blog banner

Process State

Blog banner

Buffers in Operating Systems

Blog banner

Digital Marketing

Blog banner