wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cyber Crime Investigation In The Era Of Big Data

profile
18_prachi Kandalkar
Mar 14, 2022
0 Likes
0 Discussions
122 Reads

Cybercrime is a kind of crime that happens in "cyberspace", 
that is, happens in the world of computer and the Internet. 
Big Data is becoming a challenge to criminal forensic 
investigators when dealing with cyber-enabled and 
cyber-dependent crimes. In the era of Big Data, the 
valuable pieces of informationis being generated and 
transmitted by any instances, rangingfrom single-board 
computers. Big data is a buzzword in the IT industry and is often 
associated with personal data collected by large and medium 
scale enterprises.There is no formal threshold for the size 
of data that can be referred to as “big data.” The four 
main pillars of big data are often defined as volume 
(amount of data), variety (multiple types of data) velocity 
(speed of data processing) and value (not a tangible price but
the valuable intelligence that can be collected from the 
data). In India, cyber law enforcement and regulation is going 
through a tough patch. On the one hand, India has a bad and weak
cyber law, while law enforcement officials are barely aware of 
the basics of cyber law and cyber forensics. For cyber thieves, 
India has become a haven.


Comments ()


Sign in

Read Next

Cyber Security in Data Breaching

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

BIRYANI ! The history you never knew about

Blog banner

How to Find the Right Therapist For Me?

Blog banner

Khau Galli – Vile Parle

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

Semaphores

Blog banner

R Programming

Blog banner

OS Assignment 3

Blog banner

Making Money through Instagram

Blog banner

Gamer life

Blog banner

DATA VAULT

Blog banner

Environmental Management using GIS

Blog banner

What is OS and its overview

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

IT RISK

Blog banner

Beatbox

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Technical SEO : Total Guide

Blog banner

Deadlock and Starvation

Blog banner

10 Reasons to date your best friend

Blog banner

Be you

Blog banner

Deadlock

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

Does School Infrastructure Really Matter For Learning?

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

Multiple processor scheduling

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

Kernel in Operating System

Blog banner

File and File System Structure

Blog banner

Deadlock

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

How Social Media Algorithms Will Work in 2026?

Blog banner

Data Exfiltration

Blog banner

Data Lake

Blog banner

Metasploit

Blog banner

RAID

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

VIRTUAL MEMORY

Blog banner

PHISHING

Blog banner

Os(Computer security threats)

Blog banner