Cybersecurity: Analysis and Application of ProDiscover Forensic Toolkit
Keywords:
cybercrime, ProDiscover, digital forensicAbstract
The world has in the recent past experienced rapid development in digital technology. However, as most organizations across the world continue to introduce digital technology into their operating system, issues of cybercrime have been on the rise and are one of the major threats to the progress and growth of many business firms. The application of the digital forensic concept can therefore be helpful in curbing problems associated with cybercrime. ProDiscover is one of the forensic tools which enable professionals in computing to locate all data in computing disk, including those that had previously been deleted. ProDiscover Forensic tool recovers deleted files, examines slack space, and dynamically allows previews, image captures, and searches of the Hardware Protected Area (HPA) using its technology. This paper sought to establish the application and effectiveness of ProDiscover Forensic in investigating cybercrime. For the purposes of this paper, efficiency will be defined as the proportion of input required by the ProDiscover system compared to its performance and output in addressing and managing workplace cybercrime. Alternatively, effectiveness will be defined as the degree and capacity to which the system will succeed in improving forensic investigation and mitigating cybersecurity issues in the workplace. That is, the capabilities of ProDiscover Forensic with regards to investigating and punishing cybercrime offence at the workplace. The researcher investigated a case in which a company by the name Jonson Corp. had been complaining about one of their staff, a Mr John who had been using the computer system for viewing and subsequently downloading pornographic images. The suspect’s floppy disk of 1.44 MB capacity that had been found in his drawer was used to retrieve all the deleted files. In overall, ProDiscover was able to retrieve the BEAUTY1.jpg and BEAUTY2.jpg images that had been erased from the soft disk. Therefore, the ProDiscover tool can be applied by organizations to enhance their information security functions, especially during a forensic investigation.
References
Best Computer Forensic Tools. (2019, February 18). Retrieved from https://resources.infosecinstitute.com/7-best-computer-forensics-tools/#gref
Azodolmolky, S., Wieder, P., & Yahyapour, R. (2017). Cloud computing networking: challenges and opportunities for innovations. IEEE Communications Magazine, 51(7), 54-62.
Bandyopadhyay, T., Jacob, V., & Raghunathan, S. (2010). Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest. Information Technology And Management, 11(1), 7-23. doi:10.1007/s10799-010-0066-1
Brooks, C. (2022, January 21). Cybersecurity in 2022 – A fresh look at some very alarming stats. Forbes. https://www.forbes.com/sites/chuckbrooks/2022/01/21/cybersecurity-in-2022--a-fresh-look-at-some-very-alarming-stats/
Budzier, A. (2011). The risk of risk registers – managing risk is managing discourse not tools. J Inf Technol, 26(4), 274-276. doi:10.1057/jit.2011.13
Conner, T. (2020). A Review of the Challenges Anti-Forensics Present to the Viability of File Recovery (Doctoral dissertation, Utica College).
Dweikat, M., Eleyan, D., & Eleyan, A.(2020). Digital Forensic Tools Used in Analyzing Cybercrime.
Farahmand, F., Navathe, S., Sharp, G., & Enslow, P. (2005). A Management Perspective on Risk of Security Threats to Information Systems. Information Technology And Management, 6(2-3), 203-225. doi:10.1007/s10799-005-5880-5
Flores, D. A., Qazi, F., & Jhumka, A. (2016, August). Bring your disclosure: analysing BYOD threats to corporate information. Paper presented at 2016 IEEE International Conference on Turst, Security and Privacy in Computing and Communications, Tianjin, China.
Ghazinour, K., Vakharia, D. M., Kannaji, K. C., & Satyakumar, R. (2017, September). A study on digital forensic tools. In 2017 IEEE international conference on power, control, signals and instrumentation engineering (ICPCSI) (pp. 3136-3142). IEEE.
Hidayat, A., Sudarmaji, D., Irawan, D., Susanto, L. J., & Mustika, H. P. (2018). Comparative Analysis Of Applications OSforensics, GetDataBack, Genius, and Diskdigger On Digital Data Recovery in the Computer Device. International Journal of Technology & Engineering, 7(4.7), 445-448.
James, T., Nottingham, Q., & Kim, B. (2017). Determining the antecedents of digital security practices in the general public dimension. Information Technology And Management, 14(2), 69-89. doi:10.1007/s10799-012-0147-4
Kilungu, M. K. (2015). An Investigation of Digital Forensic Models Applicable in the Public Sector: A case of Kenya National Audit Office. Nairobi: University of Nairobi.
Kim, S., Kim, G., & French, A. (2015). Relationships between need-pull/technology-push and information security management and the moderating role of regulatory pressure. Information Technology And Management. doi:10.1007/s10799-015-0217-5
Lovanshi, M., & Bansal, P. (2019). Comparative study of digital forensic tools. In Data, Engineering and Applications (pp. 195-204). Springer, Singapore.
Naskar, R., Malviya, P., & Chakraborty, R. S. (2017). Digital Forensics
Sanap, V. K., & Mane, V. (2015). Comparative Study and Simulation of Digital Forensic Tools Tools. International Conference on Advances in Science and Technology (pp. 1-4). Mumbai: Ramrao Adik Institute of Technology.
SC Media. (2008, May 7). Security Weekly Labs: Technology Pathways ProDiscover Forensics 4.9. https://www.scmagazine.com/editorial/product-test/-/technology-pathways-prodiscover-forensics-4-9
Sharma, P., & Nagpal, B. (2020). Regex: an experimental approach for searching in cyber forensic. International Journal of Information Technology, 12(2), 339-343.
Symantec. (2016). Internet security threat report (21). Retrieved from https://know.elq.symantec.com/e/f2
Wang, P., Chao, K., Lo, C., & Wang, Y. (2015). Using ontologies to perform threat analysis and develop defensive strategies for mobile security. Information Technology And Management. doi:10.1007/s10799-014-0213-1
Windowsbulletin.com. (2019). ProDiscover Basic and ZeroView. Retrieved February 14, 2020, from Windows Bulletin-Tutorials
Downloads
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.