Laptop Theft Analysis for Digital Investigations

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends  (IJCOT)          
 
© 2011 by IJCOT Journal
Volume-1 Issue-2                          
Year of Publication : 2011
Authors : J. Keziya Rani , S. Prem Kumar , U. Ram Mohan , C. Uma Shankar

Citation

J. Keziya Rani , S. Prem Kumar , U. Ram Mohan , C. Uma Shankar "Laptop Theft Analysis for Digital Investigations", International Journal of Computer & organization Trends (IJCOT), V1(2):7-10 Sep - Oct 2011, ISSN 2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.

Abstract

The Study of computer security and certain aspects of cyber crime fascinated the detailed study of the present day most commonly encountered cyber crime like Laptop theft. In this paper, we present a novel methodology to encounter the Laptop thefts/ thievery. The principle adopted in this paper is basica l ly a theft of a laptop/stolen/lost is to retrieve a stolen Laptop. The software is embedded into laptop and on the desktop pc and in case of the theft the information will be displayed on home desktop the moment laptop put to use. When stolen compu ter connects eventually to the Internet, it will report to a secret monitoring website and the suspect will be trace and caught. To reduce the loss of laptops in any organization , the laptops are connected to the main server where in a laptop is tagged wi th a card similar to an access control “Proximity card”

References

[1] BOCIJ . P et.al (2002) ‘Cyber stalking : A new challenge for criminal law’, 3 - 5,vol. 122, Criminal Law yer.
[2] BRAIN D. CARRIER , JOE GRAND (2004) “ A hard ware based memory acquisition procedure for Digital Investigations “ 1742 – 2876 , Digital Investigation journal.
[3] CHAVALAS .B , PHILIPS . A (2005) Trojan Defence : A Forensic View Part II, Digital Inv estigation Journal.
[4] CHITTESTER C.G , HAIMES Y.Y(2004) Risks of Terrorism to Information Technology & to critical interdependent infrastructures. Journal of Homeland Security & emergency management.
[5] CHRISTOPHER BURGESS, RICHARD POWER (2008), “ Notes o n Cyber Forensics “, 297 - 304 , Secrets Stolen.
[6] COHEN .F (1999) simulating cyber attacks, defences & consequences. 479 - 518, Computers & Security.
[7] COLLIN B.C (1997) “ The future of Cyber Terrorism : where physical & virtual words converge “ , 15 – 18, crime & justice international.
[8] D.YEUNG, Y.DING (2003), Host Based Intrusion Detection using Dynamic & static behavioural models , 229 - 243,pattern recognition.
[9] DA - YU KAO ET.AL (2010) “ Strategy of Triple – E on solving Trojan defense in cyber crime cas es ”, vol.26, 52 - 60, Computer law & security Review.
[10] DEVOST M.G et.al (1997) “ Information terrorism : Political violence in the information age “ , vol. 9 , 72 – 83 , terrorism & Political Violence.

Keywords

Computer Security , Cyber Crime, Embedded software, Proximity card.