Digital Forensics: Development of a Forensics Appliance–Analysis and Recommendations
Yassine El Bahlouli1, Nabil Hmina2
1Yassine ElBahlouli, Forensics and Cyber-security Researcher in “Systems Engineering Laboratory, Data Analysis and Security Team”. National School of Applied Sciences, University Ibn Tofail, Kénitra, Morocco.
2Nabil Hmina, Researcher and Director of “Systems Engineering Laboratory, Data Analysis and Security Team”. National School of Applied Sciences, University Ibn Tofail, Kénitra, Morocco.
Manuscript received on February 05, 2019. | Revised Manuscript received on February 19, 2019. | Manuscript published on February 28, 2019. | PP: 6-8 | Volume-6 Issue-1, February 2019. | Retrieval Number: A2203026119/19©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In the context of IT development, and with the growth of cyber crime, the IT experts still looking to improve techniques and investigative tools to defend against cyber crime. To achieve our objectives and in order to produce a better solution dedicated to make the forensics techniques and tools accessible to everyone to defend well against cyber crime, we will first present the world of forensics, define the steps necessary for an investigation, examine tow of the most popular solution SIFT and DEFT, model the process they use, and set a benchmark to produce our solution. The proposed solution is in the direction of specialization and is designed to facilitate access to these techniques and tools to improve the methodology used in the investigation to defend against cyber crime.
Keywords: Forensics, Digital Forensics, Forensic Appliance, Forensics tools, Forensics Techniques.