Computer Crime and Computer Forensics: Investigative Techniques
Computer Crime and Computer Forensics: Investigative Techniques
Computer Crime and Computer Forensics: Investigative Techniques
Computer Forensics
Investigative Techniques
Computer Power
Computer is a powerful tool in a limitless
cyberspace. Power of one computer is the power of
‘all connected computers’.
Cyberspace is a new space with new risks. It is a
Virtual Medium.
It has its own dark corners and alleys visited by
Cyber Criminals.
Cyber Crime & Importance of
Computer
- Cyber crimes originate from the abuse of computer.
- The law has been able to recognize the computer as
tool in criminal activity.
- A computer could be referred to as a ‘weapon of
offence’ as well as a ‘victim of crime’.
Advantages of Being a Cyber Criminal
- Complete Anonymity
- No Immediate Physical Risk
- Prevention Expensive and Uncertain
- Lag Between Action and Detection
- The Tools of Offence are Legitimate
Investigation of Cyber
Crimes:
Computer Forensics & Its
Tools
Starting point of a Cyber Crime
- Unauthorized access to computer
programmes or data
- Unauthorized access with a further criminal
intent
- Unauthorized modification of computer
material
Establishing the Nature of the Offence
that the computer performed a function as a consequence
of seeking or gaining access
•that the access was unauthorized
•that the person concerned knew that the access was
unauthorized
•that the access was a preliminary to the commission or
facilitation of a further serious offence
•that the intention behind the modification was to impair
the operation of the computer in some way.
Classification of Cyber Crimes
Cyber crimes could be categorized as :
•Data-related theft and interception
•Network intrusion and sabotage
•Hacking and virus distribution
•Fraud, forgery and
S. 70 Protected Cognizable,
System Non-bailable
S. 72 Breach of Non-
confidentiality cognizable.
and privacy Bailable
Power to Investigate Offences (S.78)