wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cyber Crime Investigation In The Era Of Big Data

profile
18_prachi Kandalkar
Mar 14, 2022
0 Likes
0 Discussions
122 Reads

Cybercrime is a kind of crime that happens in "cyberspace", 
that is, happens in the world of computer and the Internet. 
Big Data is becoming a challenge to criminal forensic 
investigators when dealing with cyber-enabled and 
cyber-dependent crimes. In the era of Big Data, the 
valuable pieces of informationis being generated and 
transmitted by any instances, rangingfrom single-board 
computers. Big data is a buzzword in the IT industry and is often 
associated with personal data collected by large and medium 
scale enterprises.There is no formal threshold for the size 
of data that can be referred to as “big data.” The four 
main pillars of big data are often defined as volume 
(amount of data), variety (multiple types of data) velocity 
(speed of data processing) and value (not a tangible price but
the valuable intelligence that can be collected from the 
data). In India, cyber law enforcement and regulation is going 
through a tough patch. On the one hand, India has a bad and weak
cyber law, while law enforcement officials are barely aware of 
the basics of cyber law and cyber forensics. For cyber thieves, 
India has become a haven.


Comments ()


Sign in

Read Next

Memory management

Blog banner

File management

Blog banner

security controls

Blog banner

Go Daddy

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

Virtual memory

Blog banner

Deadlock and Starvation

Blog banner

Firewall

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

Evolution of Operating system

Blog banner

PHONE TECHNOLOGY

Blog banner

DBMS and various career options related to it.

Blog banner

Deadlock

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

Steganography and Steganalysis

Blog banner

Direct Memory Access

Blog banner

Wiretapping

Blog banner

ZOHO

Blog banner

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Data Exfiltration

Blog banner

Starting Android Activity Using Intent

Blog banner

THE ACTORS LIFE

Blog banner

Memory Management

Blog banner

Wrike

Blog banner

Threads in OS

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

Microsoft Windows Overview

Blog banner

Cybersecurity Standards for Automotive

Blog banner

Memory management

Blog banner

Junk food vs healthy food

Blog banner

Virtual Memory

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

OS Evolution Achievements

Blog banner

WINDOWS I/ O

Blog banner

Cross site scripting Attack

Blog banner

Big Data

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

Flipkart

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

Disk scheduling

Blog banner

Memory managment

Blog banner