Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Improvements in Cybersecurity: Coupling Python for Digital Forensics

Version 1 : Received: 24 July 2023 / Approved: 25 July 2023 / Online: 25 July 2023 (07:56:11 CEST)

How to cite: Abdulhameed, A.A.; Hussien, N.M.; Mohialden, Y.M.; Herlem, G.; LAJOIE, I.; YAHIAOUI, R. Improvements in Cybersecurity: Coupling Python for Digital Forensics. Preprints 2023, 2023071666. https://doi.org/10.20944/preprints202307.1666.v1 Abdulhameed, A.A.; Hussien, N.M.; Mohialden, Y.M.; Herlem, G.; LAJOIE, I.; YAHIAOUI, R. Improvements in Cybersecurity: Coupling Python for Digital Forensics. Preprints 2023, 2023071666. https://doi.org/10.20944/preprints202307.1666.v1

Abstract

This article delves deeply into digital forensics, covering computer forensics, network 1 forensics, and mobile device forensics. It analyzes the techniques and methodologies used by forensic 2 investigators in various disciplines. It underlines the diffculties investigators encounter and the 3 importance of thorough investigations to combat ever-increasing cyber risks. The paper emphasizes 4 the necessity of leveraging digital forensic tools to improve cybersecurity and provides a thorough 5 list of widely used Python libraries suitable for each investigation strategy, allowing for effective 6 comparison. Furthermore, it emphasizes the availability and suitability of these Python libraries in 7 computer device investigations (PyTSK3, Volatility, Pyregf, and Pyevtx), mobile device investigations 8 (Pytsk3, Volatility, Pyewf, dfVFS, Androguard, and pyMobileDevice), and network forensics (Scapy, 9 Bro/Zeek, Dpkt, pypcap, and NetworkX). The creation of these libraries recognizes the complexities 10 of digital crimes and the importance of applying modern techniques in forensic investigations. 11 Particularly, digital forensics plays an important role for healthcare providers because modern 12 medical devices produce, store, and transmit large amounts of patient and therapy information, 13 which could provide a forensic investigator with a treasure trove of potential digital evidence.

Keywords

cybersecurity; digital forensics; cyber threats; forensic investigator; python

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.