Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/12397
Full metadata record
DC FieldValueLanguage
dc.contributor.authorIsmaila, Idris-
dc.contributor.authorMustafa S., Zareefa-
dc.date.accessioned2021-08-05T07:30:56Z-
dc.date.available2021-08-05T07:30:56Z-
dc.date.issued2020-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/12397-
dc.description.abstractTechnology has brought about significant improvement in our lives, from online grocery shopping to e-learning, automated farming, remote-controlled surveillance systems and smart homes. All these have one thing in common, which is the Internet. While the low cost of data and the availability of cheap smart devices has created a lot of opportunities, some use this for nefarious purposes. Criminals use technology to commit crimes. Crimes committed using digital devices and computer network, such as the internet is called cybercrime. Computers can be used as instruments to commit a crime, can be the target of a crime or can be used to store illegal data. Every year, countries lose billions of dollars as a result of cybercrime. In its 2018 report, the Internet Crime Complaint Centre (IC3) reported that victims lost $2.7 billion due to cybercrime and between 2014 to 2018, a total loss of $7.45 billion (IC3, no date). How can such crimes be investigated? The answer is through digital forensics.en_US
dc.publisherAfrica Center of Excellence on Technology Enhanced Learning (ACETEL). National Open University of Nigeria.en_US
dc.subjectDigital Forensics, Malware, Computer Network, Cybercrime, Investigationen_US
dc.titleMalware and Digital Forensicsen_US
dc.typeBooken_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
Malware and Digital Forensics .pdf1.46 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.