PHD Concept Note Forensic 2
PHD Concept Note Forensic 2
The increasing rate of cybercrime worldwide has prompted the need for
advanced network forensics focuses on monitoring and analyzing computer
network traffic to identify potential security threats, gather digital evidence
and reconstruct cybercrimes. Tanzania like other nations is facing challenges
related to cybersecurity(Kigwana, Kebande and Venter, 2017). Despite effort
to safeguard systems, the success of network forensic techniques and tools
remains unclear due to evolving cybersecurity(Kigwana, Kebande and
Venter, 2017; Muzigura and Casmir, 2023). Despite efforts to safeguard
systems, the success of network forensic is essential to understand their
effectiveness and inform future improvements.
2.1.2.5 To identify the most commonly used network forensic tools and
techniques in detecting, preventing and investigating cybercrime.
This study is significant because it will provide valuable insights into the
strengths and weakness of the current network forensic tools and techniques
used in Tanzania. By understanding their effectiveness, the findings will help
inform policy makers, network administrators and cybersecurity
professionals about areas that require improvement. Furthermore, it will
contribute to the body of knowledge on network forensics in developing
countries and provide a basis for future research on improving cybersecurity
defenses.(Mwita and Mhina, 2023)(Massawe and Mshana, 2023)
This section will review existing literature on network forensic techniques and tools, focusing
on their application in different regions, including developing countries like Tanzania. Previous
studies on network security, forensic methodologies, and cybercrime investigations will be
analyzed. The literature review will highlight gaps in current research, emphasizing the need for
an empirical assessment of tools and techniques in Tanzania.
Because of the nature of digital forensic discipline this study will utilize the
qualitative research method. Qualitative research is an appropriate research
method because digital forensic is a growing discipline and many of the
procedure followed cannot be measured quantitative example the digital
forensic process and to an extent the recovery of digital forensic evidence.
Furthermore, the opinions of the digital forensic expert will weigh heavily on
the digital forensic evidence expert will weigh heavily on the outcome of the
proposed E-mail Forensic Methodology mainly because these experts can
provide insight into the digital forensic investigation process, due to their
implicit knowledge, something that cannot be achieved through the
quantitative research method.
Hence this is a qualitative research technique, the study will utilize both
primary and secondary data sources. The primary data source are interviews
will be conducted with network administrators, cybersecurity professionals
and law enforcement officers in Tanzania to gather data on the use of
network forensic tools, more specifically expert review. Secondary data will
include literature survey of internet sources, frameworks, methodologies,
journal articles, past research project reports as well as books.
Case study of actual cybercrime incidents will be analyzed to assess the
effectiveness of forensic investigations.
Since the network forensic investigation for emails and website population
is relative unknown and due to the interpretive nature of this study the
sample size of the population is relatively small. Expertise in network
forensic from ISP’s TCRA, Ministry of Home Affairs will be consulted.
REFERENCES:
Albladi, S.M. and Weir, G.R.S. (2018) ‘User characteristics that influence judgment of social
engineering attacks in social networks’, Human-centric Computing and Information Sciences,
8(1), p. 5. Available at: https://doi.org/10.1186/s13673-018-0128-7.
Albladi, S.M. and Weir, G.R.S. (2020) ‘Predicting individuals’ vulnerability to social engineering in
social networks’, Cybersecurity, 3(1), p. 7. Available at: https://doi.org/10.1186/s42400-020-
00047-5.
Aldawood, H. and Skinner, G. (2020) ‘Analysis and Findings of Social Engineering Industry
Experts Explorative Interviews: Perspectives on Measures, Tools, and Solutions’, IEEE Access, 8,
pp. 67321–67329. Available at: https://doi.org/10.1109/ACCESS.2020.2983280.
Kigwana, I., Kebande, V.R. and Venter, H.S. (2017) ‘A proposed digital forensic investigation
framework for an eGovernment structure for Uganda’, in 2017 IST-Africa Week Conference (IST-
Africa). 2017 IST-Africa Week Conference (IST-Africa), Windhoek: IEEE, pp. 1–8. Available at:
https://doi.org/10.23919/ISTAFRICA.2017.8102348.
Massawe, E.R. and Mshana, J.A. (2023) ‘Preventing and Combating Cybercrimes: Case of
Cybercrimes Investigation Unit of Tanzania Police’, European Journal of Theoretical and Applied
Sciences, 1(5), pp. 1179–1190. Available at: https://doi.org/10.59324/ejtas.2023.1(5).102.
Mwita, P.S. and Mhina, J.R.A. (2023) ‘Assessing the Effectiveness of the Implementation of
Cybercrimes Mitigation Strategies in Selected Commercial Banks in Tanzania’, European Journal
of Theoretical and Applied Sciences, 1(6), pp. 571–583. Available at:
https://doi.org/10.59324/ejtas.2023.1(6).58.