Research Article | Open Access | Download PDF
Volume 1 | Issue 2 | Year 2011 | Article Id. IJCOT-V1I2P302 | DOI : https://doi.org/10.14445/22492593/IJCOT-V1I2P302
Laptop Theft Analysis for Digital Investigations
J. Keziya Rani , S. Prem Kumar , U. Ram Mohan , C. Uma Shankar
Citation :
J. Keziya Rani , S. Prem Kumar , U. Ram Mohan , C. Uma Shankar, "Laptop Theft Analysis for Digital Investigations," International Journal of Computer & Organization Trends (IJCOT), vol. 1, no. 2, pp. 7-10, 2011. Crossref, https://doi.org/10.14445/22492593/IJCOT-V1I2P302
Abstract
The Study of computer security and certain aspects of cyber crime fascinated the detailed study of the present day most commonly encountered cyber crime like Laptop theft. In this paper, we present a novel methodology to encounter the Laptop thefts/ thievery. The principle adopted in this paper is basica l ly a theft of a laptop/stolen/lost is to retrieve a stolen Laptop. The software is embedded into laptop and on the desktop pc and in case of the theft the information will be displayed on home desktop the moment laptop put to use. When stolen compu ter connects eventually to the Internet, it will report to a secret monitoring website and the suspect will be trace and caught. To reduce the loss of laptops in any organization , the laptops are connected to the main server where in a laptop is tagged wi th a card similar to an access control “Proximity card”
Keywords
Computer Security , Cyber Crime, Embedded software, Proximity card.
References
[1] BOCIJ . P et.al (2002) „Cyber stalking : A new challenge for
criminal law‟, 3-5,vol. 122, Criminal Lawyer.
[2] BRAIN D. CARRIER , JOE GRAND (2004) “ A hard ware
based memory acquisition procedure for Digital
Investigations “ 1742 – 2876 , Digital Investigation journal.
[3] CHAVALAS .B , PHILIPS . A (2005) Trojan Defence : A
Forensic View Part II, Digital Investigation Journal.
[4] CHITTESTER C.G , HAIMES Y.Y(2004) Risks of
Terrorism to Information Technology & to critical
interdependent infrastructures. Journal of Homeland
Security & emergency management.
[5] CHRISTOPHER BURGESS, RICHARD POWER (2008),
“ Notes on Cyber Forensics “, 297-304 , Secrets Stolen.
[6] COHEN .F (1999) simulating cyber attacks, defences &
consequences. 479-518, Computers & Security.
[7] COLLIN B.C (1997) “ The future of Cyber Terrorism :
where physical & virtual words converge “ , 15 – 18, crime
& justice international.
[8] D.YEUNG, Y.DING (2003), Host Based Intrusion
Detection using Dynamic & static behavioural models , 229-
243,pattern recognition.
[9] DA-YU KAO ET.AL (2010) “ Strategy of Triple –E on
solving Trojan defense in cyber crime cases ”, vol.26, 52-60,
Computer law & security Review.
[10] DEVOST M.G et.al (1997) “ Information terrorism :
Political violence in the information age “ , vol. 9 , 72 – 83 ,
terrorism & Political Violence.