Javascript must be enabled to continue!
The application and effectiveness of Hex editor Forensic in investigating cybercrime
View through CrossRef
Information Technology usage and development has improved the efficiency and the flexibility of service provision among a number of institutions. While the process of computerization is taking place at a very high speed, the security surrounding the critical asset of IT is a major growing concern for the top management. The application of the digital forensic concept can therefore be helpful in curbing problems associated with cybercrime. The use of concepts relating to digital forensic investigation of criminal activities and digital forensics will, therefore, tackle the problem with finding digital evidence in cybercrimes. Hex editor is one of the various digital forensic investigation tools that allow the use of Hash Sets for identifying known safe files in program and operating system files. The tool is essential for identifying suspected files like Trojans, viruses, and hacker scripts. The paper seeks to establish the effectiveness of Hex editor in information technology security risk management. That is, the capabilities of Hex editor and the accuracy of Hex editor with regards to retrieving and analyzing data from a hard disc or drive in order to investigate and curb information technology security risk at the workplace. The researcher performed investigation on a Mozilla FxOS running on a phone released by Peak group in which case the researcher aimed to retrieve previous images that had been sent through the phone. In overall, Hex editor was able to identify the images and content of information that had been shared via the phone. Therefore, Hex editor is vital in identification, extraction, analysis, and presentation of digital evidence contained in digital devices. It is an effective tool that can be used by organizations for Forensic information technology security risk management. Keywords: Hex editor; Cybercrime; Digital Forensic; Investigation; technology, security, risk
Title: The application and effectiveness of Hex editor Forensic in investigating cybercrime
Description:
Information Technology usage and development has improved the efficiency and the flexibility of service provision among a number of institutions.
While the process of computerization is taking place at a very high speed, the security surrounding the critical asset of IT is a major growing concern for the top management.
The application of the digital forensic concept can therefore be helpful in curbing problems associated with cybercrime.
The use of concepts relating to digital forensic investigation of criminal activities and digital forensics will, therefore, tackle the problem with finding digital evidence in cybercrimes.
Hex editor is one of the various digital forensic investigation tools that allow the use of Hash Sets for identifying known safe files in program and operating system files.
The tool is essential for identifying suspected files like Trojans, viruses, and hacker scripts.
The paper seeks to establish the effectiveness of Hex editor in information technology security risk management.
That is, the capabilities of Hex editor and the accuracy of Hex editor with regards to retrieving and analyzing data from a hard disc or drive in order to investigate and curb information technology security risk at the workplace.
The researcher performed investigation on a Mozilla FxOS running on a phone released by Peak group in which case the researcher aimed to retrieve previous images that had been sent through the phone.
In overall, Hex editor was able to identify the images and content of information that had been shared via the phone.
Therefore, Hex editor is vital in identification, extraction, analysis, and presentation of digital evidence contained in digital devices.
It is an effective tool that can be used by organizations for Forensic information technology security risk management.
Keywords: Hex editor; Cybercrime; Digital Forensic; Investigation; technology, security, risk.
Related Results
A systematic literature review on cybercrime legislation
A systematic literature review on cybercrime legislation
Background
: Cybercrime is a fast-growing digital crime and legislation falling behind with the fast-moving advancement of technology. One important factor proj...
Synthesis, characterization and protective efficiency of novel polybenzoxazine precursor as an anticorrosive coating for mild steel
Synthesis, characterization and protective efficiency of novel polybenzoxazine precursor as an anticorrosive coating for mild steel
Abstract
In this study, 2-[(E)-(hexylimino)methyl] phenol (SA-Hex-SF) was synthesized by adding salicylaldehyde (SA) and n-hexylamine (Hex-NH...
Gender Bias and Cybercrime Investigation: A Comparative Study of Female Involvement in Cybercrime among Undergraduate Students in Selected Universities in Ekiti State, Nigeria
Gender Bias and Cybercrime Investigation: A Comparative Study of Female Involvement in Cybercrime among Undergraduate Students in Selected Universities in Ekiti State, Nigeria
Background to the Study: The study investigates the gender bias on female involvement in cybercrime among
undergraduate students in selected universities in Ekiti State, Nigeria. O...
REGARDING RELATION BETWEEN CLASSIFICATION OF FORENSIC SCIENCE GENERAL THEORY TASKS AND PRACTICAL FORENSIC ACTIVITY (Review Article)
REGARDING RELATION BETWEEN CLASSIFICATION OF FORENSIC SCIENCE GENERAL THEORY TASKS AND PRACTICAL FORENSIC ACTIVITY (Review Article)
The article analyzes conceptual foundations, views and ideas as to understanding of the essence of the classification of forensic science general theory tasks. The main views of sc...
CORRELATION AND STRUCTURE OF A FORENSIC TECHNIQUE AND FORENSIC SCIENCE
CORRELATION AND STRUCTURE OF A FORENSIC TECHNIQUE AND FORENSIC SCIENCE
A historical analysis of forensic techniques and forensic science emergence as scientific branches is outlined, their interconnection, differences are considered, the subject, obje...
THEORY OF FORENSIC EXPERTOLOGY IN THE SYSTEM OF LAW
THEORY OF FORENSIC EXPERTOLOGY IN THE SYSTEM OF LAW
The article deals with the concept of a general theory of forensic expertology, the conditions for its creation, the place of forensic expert science in the system of legal science...
Synthesis Characterization and Protective Efficiency of Novel Polybenzoxazine Precursor as a Potential Corrosion Inhibitor for Mild Steel
Synthesis Characterization and Protective Efficiency of Novel Polybenzoxazine Precursor as a Potential Corrosion Inhibitor for Mild Steel
Abstract
In this study, salicylaldehyde (SA) and n-hexylamine (Hex-NH2) were used to produce 2-[(E)-(hexylimino)methyl] phenol (SA-Hex-SF), which was then reduced by sodium...
International legal regulation of transnational cybercrime in cyberspace
International legal regulation of transnational cybercrime in cyberspace
The article considers the international legal regulation of combating cybercrime, which is considered as a transnational phenomenon. In the group of transnational crimes, along wit...

