ADVANCING DIGITAL FORENSIC INVESTIGATIONS: ADDRESSING CHALLENGES AND ENHANCING CYBERCRIME SOLUTIONS
Volume 3, Issue 1, Pp 10-15, 2025
DOI: https://doi.org/10.61784/wjit3018
Author(s)
Firzah Hafiz Deandra, Sherly, Iskandar Muda*
Affiliation(s)
Universitas Sumatera Utara, Medan, Indonesia.
Corresponding Author
Iskandar Muda
ABSTRACT
Digital forensics is a critical discipline focused on the identification, preservation, analysis, and presentation of digital evidence in a legally admissible manner. This paper examines the implementation of Digital Forensic Investigations (DFIs) in combating cybercrime, emphasizing the technical, organizational, and legal challenges hindering their effectiveness. The study highlights strategies to enhance forensic processes and improve cybercrime investigations. Structured forensic methodologies, guided by international standards like ISO 27037:2012, ensure the integrity and credibility of evidence while addressing challenges such as encrypted communications, cloud environments, and decentralized data storage. Specialized tools for data recovery, mobile forensics, and cloud forensics are increasingly pivotal in modern investigations. The paper underscores the role of digital forensics in strengthening cybersecurity, reconstructing cybercrime events, and supporting legal proceedings through reliable evidence. Advancements in artificial intelligence and machine learning are also explored as innovative approaches to tackling sophisticated cyber threats, underscoring the evolving nature of digital forensics in ensuring justice and securing digital ecosystems.
KEYWORDS
Digital forensics; Cybercrime; Digital evidence; Digital Forensic Investigations (DFIs); Cybersecurity
CITE THIS PAPER
Firzah Hafiz Deandra, Sherly, Iskandar Muda. Advancing digital forensic investigations: addressing challenges and enhancing cybercrime solutions. World Journal of Information Technology. 2025, 3(1): 10-15. DOI: https://doi.org/10.61784/wjit3018.
REFERENCES
[1] Sihombing, E, Erlina, Rujiman. The effect of forensic accounting, training, experience, work load and professional skeptic on auditors ability to detect of fraud. International Journal of Scientific and Technology Research, 2019, 8(8): 474-480. https://www.ijstr.org/paper-references.php?ref=IJSTR-0819-20847
[2] Montasari, R. Review and Assessment of the Existing Digital Forensic Investigation Process Models. Int. J. Comput. Appl., 2016, 147(7): 1-9.
[3] Cohen, F. Digital forensic evidence examination. Fred Cohen & Associates, 2010.
[4] Kohn, M, Eloff, J H P, Olivier, M S. Framework for a digital forensic investigation. Proceedings of Information Security South Africa (ISSA), Johannesburg, South Africa. 2006.
[5] Carrier, B. File system forensic analysis. Addison-Wesley. 2005.
[6] Casey, E. Digital evidence and computer crime: Forensic science, computers and the Internet. Academic Press. 2011.
[7] Garfinkel, S L. Digital forensics research: The next 10 years. Digital Investigation, 2010, 7(1): S64-S73. DOI: https://doi.org/10.1016/j.diin.2010.05.009.
[8] Lillis, D, Becker, B, O’Sullivan, T, et al. Current challenges and future research areas for digital forensic investigation. Annual ADFSL Conference on Digital Forensics, Security and Law, 2016.
[9] Abdullah, I, Lubis, A W, Sumitra, A. Explanation of Forensic Accounting and Its Application (Case Some Industry Sector). Journal of Pharmaceutical Negative Results, 2022, 13(9): 1585-1588. DOI: https://doi.org/10.47750/pnr.2022.13.S09.195
[10] Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet (3rd ed.). Academic Press.
[11] Fry, J. Digital forensics: An integrated approach. Wiley. 2019.
[12] Kessler, G C. An overview of digital forensics. International Journal of Digital Crime and Forensics, 2012, 4(2): 1-19. DOI: https://doi.org/10.4018/jdcf.2012040101.
[13] Mell, P M, Grance, T. The NIST definition of cloud computing. National Institute of Standards and Technology Special Publication, 2020, 800-145. DOI: https://doi.org/10.6028/NIST.SP.800-145.
[14] Raghavan, S, Kessler, G C. Emerging challenges in digital forensics: Tools and techniques for encrypted and anonymized data analysis. Wiley. 2021.
[15] Braakman, J, de Vries, P. Digital forensics and the law: An introduction. Springer. 2013.
[16] Jansen, W, Ayers, R. Guidelines on cell phone forensics. National Institute of Standards and Technology Special Publication, 2007, 800-101. DOI: https://doi.org/10.6028/NIST.SP.800-101.
[17] Lindsay, B R. Cybercrime and international law: Strengthening the global legal framework. Oxford University Press. 2020.
[18] Soghoian, C. Cloud computing and the challenges of data privacy and cross-border data transfer. Journal of International Commercial Law and Technology, 2013, 8(3): 187-201.
[19] Alshabibi, M M, Budookhi, A K, Hafizur Rahman, M M. Forensic investigation, challenges, and issues of Cloud Data: A systematic literature review. Computers, 2024, 13(8): 213.
[20] Graeme Horsman. The different types of reports produced in Digital Forensic Investigations. Science & Justice. 2021. https://www.sciencedirect.com/science/article/abs/pii/S1355030621000927
[21] Didik, S, Yudi, P, Bambang, S. Analysis and evaluation digital forensic investigation framework using ISO 27037: 2012. International Journal of Cyber-Security and Digital Forensics, 2019, 8(1): 1-14.
[22] Chen, C, Dong, B. Digital forensics analysis based on cybercrime and the study of the rule of law in space governance. De Gruyter. 2023. https://www.degruyter.com/document/doi/10.1515/comp-2022-0266/html
[23] Mwatu, W. Digital Forensics Framework For Combating Cyber-crime. Doctoral dissertation, KCA University. 2022.
[24] Oerlemans, J J. Investigating cybercrime. Investigating cybercrime | Scholarly Publications, 2017. https://scholarlypublications.universiteitleiden.nl/handle/1887/44879
[25] Sikos, L F. AI in digital forensics: Ontology Engineering for Cybercrime Investigations. WIREs Forensic Science, 2020, 3(3). DOI: https://doi.org/10.1002/wfs2.1394.
[26] Sabillon, R, Serra-Ruiz, J, Cavaller, V, et al. Digital Forensic Analysis of Cybercrimes. International Journal of Information Security and Privacy, 2017, 11(2): 25-37. DOI: https://doi.org/10.4018/ijisp.2017040103.