wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cyber Crime Investigation In The Era Of Big Data

profile
18_prachi Kandalkar
Mar 14, 2022
0 Likes
0 Discussions
122 Reads

Cybercrime is a kind of crime that happens in "cyberspace", 
that is, happens in the world of computer and the Internet. 
Big Data is becoming a challenge to criminal forensic 
investigators when dealing with cyber-enabled and 
cyber-dependent crimes. In the era of Big Data, the 
valuable pieces of informationis being generated and 
transmitted by any instances, rangingfrom single-board 
computers. Big data is a buzzword in the IT industry and is often 
associated with personal data collected by large and medium 
scale enterprises.There is no formal threshold for the size 
of data that can be referred to as “big data.” The four 
main pillars of big data are often defined as volume 
(amount of data), variety (multiple types of data) velocity 
(speed of data processing) and value (not a tangible price but
the valuable intelligence that can be collected from the 
data). In India, cyber law enforcement and regulation is going 
through a tough patch. On the one hand, India has a bad and weak
cyber law, while law enforcement officials are barely aware of 
the basics of cyber law and cyber forensics. For cyber thieves, 
India has become a haven.


Comments ()


Sign in

Read Next

Business Engineering

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

Street foods

Blog banner

Banaras

Blog banner

CSI and Organizational Change

Blog banner

FILE SHARING

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

Procedure For Corporate High-Tech Investigations

Blog banner

Spotify

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

Memory Partitioning

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

ADD A SPICE TO YOUR LIFE.

Blog banner

Major achievement

Blog banner

Data Mining

Blog banner

Virtual Memory

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner

The Real Reason Patola Outfits Come at a Premium Cost

Blog banner

Virtual Machine

Blog banner

Deadlock in Operating System

Blog banner

Predicting Student Performance with Data Science

Blog banner

MUTUAL EXCLUSION

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

Article on Zoho Corporation

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

What Is Experiential Learning and Why Does It Work Better Than Rote Learning?

Blog banner

Elements and Principles of Photography

Blog banner

Incident management in ITSM

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

Operating System Objectives and Functions

Blog banner

GIS Topography

Blog banner

"Mahakali cave"

Blog banner

Race Condition in Operating Theatre

Blog banner

Big Data Architecture

Blog banner

VIRTUAL MACHINE

Blog banner

Paid Email

Blog banner

The Memory Hierarchy

Blog banner

What is semaphore in operating system?

Blog banner

Service Strategy In ITSM

Blog banner

Financial Fraud Detection

Blog banner

10 Reasons to date your best friend

Blog banner

How To Invest In Indian Stock Market @ BSE & NSE ~ Tutorial 3

Blog banner