wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cyber Crime Investigation In The Era Of Big Data

profile
18_prachi Kandalkar
Mar 14, 2022
0 Likes
0 Discussions
122 Reads

Cybercrime is a kind of crime that happens in "cyberspace", 
that is, happens in the world of computer and the Internet. 
Big Data is becoming a challenge to criminal forensic 
investigators when dealing with cyber-enabled and 
cyber-dependent crimes. In the era of Big Data, the 
valuable pieces of informationis being generated and 
transmitted by any instances, rangingfrom single-board 
computers. Big data is a buzzword in the IT industry and is often 
associated with personal data collected by large and medium 
scale enterprises.There is no formal threshold for the size 
of data that can be referred to as “big data.” The four 
main pillars of big data are often defined as volume 
(amount of data), variety (multiple types of data) velocity 
(speed of data processing) and value (not a tangible price but
the valuable intelligence that can be collected from the 
data). In India, cyber law enforcement and regulation is going 
through a tough patch. On the one hand, India has a bad and weak
cyber law, while law enforcement officials are barely aware of 
the basics of cyber law and cyber forensics. For cyber thieves, 
India has become a haven.


Comments ()


Sign in

Read Next

Loneliness

Blog banner

OS Assignment 3

Blog banner

Modern Operating Systems

Blog banner

SESSION HIJACKING

Blog banner

How to feel Happy everyday day

Blog banner

Penetration Testing

Blog banner

Memory management

Blog banner

Mobile Security

Blog banner

Virtual Machine

Blog banner

Evolution of Operating Systems

Blog banner

DELIRIUM

Blog banner

Types of Threads

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

Cyber Security in Quantum and Space Communication

Blog banner

Traditional UNIX Scheduling

Blog banner

Hello World

Blog banner

Zero-Click Searches: How To Stay Visible In Google’s New Era

Blog banner

Esri India launches Policy Maps.

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

SQL Injection

Blog banner

Multicore CPUs

Blog banner

Process, process creation and process termination

Blog banner

Measuring IT Risk

Blog banner

Yahoo! mail

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

Memory Management

Blog banner

Paginng In OS

Blog banner

Having passion in life

Blog banner

Deadlock and Starvation

Blog banner

Synchronization

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

How to kiss

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

How return on investment is defined in IT services

Blog banner

Linux Threads:

Blog banner

Zomato (Income Sources)

Blog banner

Photography

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Creating Digitally Signed Document

Blog banner

security requirements for safe e-payment

Blog banner