z-logo
open-access-imgOpen Access
A Study on Different Software Used to Perform Cyber Crime
Author(s) -
Nabila Malik
Publication year - 2021
Publication title -
international journal for research in applied science and engineering technology
Language(s) - English
Resource type - Journals
ISSN - 2321-9653
DOI - 10.22214/ijraset.2021.39395
Subject(s) - hacker , backup , cybercrime , computer security , computer science , software , computer forensics , field (mathematics) , world wide web , digital forensics , the internet , mathematics , database , pure mathematics , programming language
Software used to perform Cyber Crime are the most emerging subject in the field of Forensic Science. Today, the demand of computer and other electronic devices have increased. This creates an increase in Cyber crime and its awareness. This paper provides you vast information about methods of Cyber crime, Software used to perform cyber crime and a research study on them. In this paper you will also learn how can a software and its algorithm perform, what footprints your device left, what are the loopholes which help that software. This will help you for a better understanding of the software which were used to perform cyber crime and how can you prevent yourself from such activities. If you are a Forensic Expert than you will learn about the software tools which are used in computer forensic. I have analyzed many tools and I will share my study in this paper. After reading you will come to know how forensic science expert backup a hard drive, or how hackers steal your information.1 Keywords: Cybercrime, Hacking, Ethical hacking, Virus, Security, Cyber Security, Network Security.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here