wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cyber Crime Investigation In The Era Of Big Data

profile
18_prachi Kandalkar
Mar 14, 2022
0 Likes
0 Discussions
122 Reads

Cybercrime is a kind of crime that happens in "cyberspace", 
that is, happens in the world of computer and the Internet. 
Big Data is becoming a challenge to criminal forensic 
investigators when dealing with cyber-enabled and 
cyber-dependent crimes. In the era of Big Data, the 
valuable pieces of informationis being generated and 
transmitted by any instances, rangingfrom single-board 
computers. Big data is a buzzword in the IT industry and is often 
associated with personal data collected by large and medium 
scale enterprises.There is no formal threshold for the size 
of data that can be referred to as “big data.” The four 
main pillars of big data are often defined as volume 
(amount of data), variety (multiple types of data) velocity 
(speed of data processing) and value (not a tangible price but
the valuable intelligence that can be collected from the 
data). In India, cyber law enforcement and regulation is going 
through a tough patch. On the one hand, India has a bad and weak
cyber law, while law enforcement officials are barely aware of 
the basics of cyber law and cyber forensics. For cyber thieves, 
India has become a haven.


Comments ()


Sign in

Read Next

Embracing the power of Modern Machine UNIX

Blog banner

Threads in OS

Blog banner

Supervised and Unsupervised Learning

Blog banner

Hacking Mobile Platforms

Blog banner

Twisted world

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

Virtualisation

Blog banner

Worms, viruses and Bots

Blog banner

Evolution of Operating System

Blog banner

Security and E-mail

Blog banner

JIRA SOFTWARE

Blog banner

Processes: Process Description and Control.

Blog banner

Some facts about Technology

Blog banner

What is Segmentation?

Blog banner

Deadlock

Blog banner

Zero-Day Attack

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

Google classroom

Blog banner

Health and fitness in technology

Blog banner

Photography

Blog banner

note taker app

Blog banner

10 Amazing facts about Tokyo Ghoul

Blog banner

Cache Memory

Blog banner

Virtual Machine

Blog banner

Docker Framework

Blog banner

Cloud Security: Trends and Innovations

Blog banner

SQL Injection

Blog banner

Jira Software

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Linux

Blog banner

Retiring ISS

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

What is process

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

Cache memory

Blog banner

IT service level agreement

Blog banner

Operating system and overviews

Blog banner

Hypothesis Testing in Data Science

Blog banner

VIRTUAL MACHINES

Blog banner