Effectiveness of OSForensic in Digital Forensic Investigation to Curb cybercrime
Keywords:OSForensics; Cybercrime; Digital Forensic; Investigation
With the rapid development and higher level of dependence on new information and technology by
various organizations across the world, cybercrime issues are increasing, and there are no technologies
that seem flawless in combatting the issue. The use of concepts relating to digital forensic investigation
of criminal activities and digital forensics will, therefore, tackle the problem with finding digital evidence
in cybercrimes. OSForensics is one of the various digital forensic investigation tools that allows the use
of Hash Sets for identifying known safe files in program and operating system files. The tool is essential
for identifying suspected files like Trojans, viruses, and hacker scripts. The problem presented in this
paper, therefore, entails utilizing combinations of digital forensic investigation of criminal activities and
investigation concepts. The paper seeks to establish the effectiveness of OSForensic in Digital Forensic
Investigation to curb cybercrime. That is, the capabilities of OSForensics and the accuracy of OSForensics
with regards to retrieving and analyzing data from a hard drive in order to investigate and curb cybercrime
at the workplace. The researcher investigated a case in which a company security had been threatened by
an employee whose contract had recently been terminated. The company suspected that this employee had
some serious pictures, locations, and employee details belong to company. The image of the employee’s
personal flash was sent to the researcher to help initiate the investigation using OSForensicssoftware so
as to establish any evidence that the employee still had pictures, locations, and employee details belong to
company. In overall, OSForensic was able to identify company details that the employee was having. The
research was able to identify sensitive information about the company that the suspect was having, including
the names of the employees, images, company system structure and what seemed to be their respective
How to Cite
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Re use and mixing of content policy- We follow Creative Commons Licence Policy. We follow CC BY. Please refer below for all details
This license lets others distribute, remix, adapt, and build upon our work, even commercially, as long as they credit us for the original creation.
- The journal allows readers to read, download, copy, distribute, print, search, or link to the full texts of its articles and allow readers to use them for any other lawful purpose.
- The journal allows the author(s) to hold the copyright without restrictions.
- The journal allows the author(s) to retain publishing rights without restrictions