wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cyber Crime Investigation In The Era Of Big Data

profile
18_prachi Kandalkar
Mar 14, 2022
0 Likes
0 Discussions
122 Reads

Cybercrime is a kind of crime that happens in "cyberspace", 
that is, happens in the world of computer and the Internet. 
Big Data is becoming a challenge to criminal forensic 
investigators when dealing with cyber-enabled and 
cyber-dependent crimes. In the era of Big Data, the 
valuable pieces of informationis being generated and 
transmitted by any instances, rangingfrom single-board 
computers. Big data is a buzzword in the IT industry and is often 
associated with personal data collected by large and medium 
scale enterprises.There is no formal threshold for the size 
of data that can be referred to as “big data.” The four 
main pillars of big data are often defined as volume 
(amount of data), variety (multiple types of data) velocity 
(speed of data processing) and value (not a tangible price but
the valuable intelligence that can be collected from the 
data). In India, cyber law enforcement and regulation is going 
through a tough patch. On the one hand, India has a bad and weak
cyber law, while law enforcement officials are barely aware of 
the basics of cyber law and cyber forensics. For cyber thieves, 
India has become a haven.


Comments ()


Sign in

Read Next

How the mobile IP is used in GSM architecture.

Blog banner

Why am I never satisfied with my Life?

Blog banner

Why Mumbai Professionals Are Switching Back to Home-Style Tiffin Meals

Blog banner

Article on Fresh Book

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

ASANA- A Management System.

Blog banner

Odoo

Blog banner

Benefits of yoga and meditation

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

Consumer to consumer business mode

Blog banner

Multiprocessor and Multicore Organization

Blog banner

How to Prepare Your Child for Their First Day of School?

Blog banner

K-means use cases

Blog banner

Dal Bafla Recipe

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

Types of Hackers

Blog banner

Direct Memory Access

Blog banner

Monday. com App

Blog banner

What is Virtual Memory

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

A Deep Dive

Blog banner

Operating System Objectives and Functions

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Strengthening Active Directory Security

Blog banner

Importance of Network Security Risk

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

FASHION

Blog banner

Direct Memory Access

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Operating system

Blog banner

Uniprocessor scheduling

Blog banner

Tableau

Blog banner

What is Packet Filtering?

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Memory Management

Blog banner

All you need to know about “Off-page SEO”

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

Webmail

Blog banner

Uniprocessor Scheduling

Blog banner

Deadlock and starvation in operating system

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner