SlideShare a Scribd company logo
1 of 25
Cyber
law Cyber
forensics
What does
cyber law
means?
Information technology law (also called "cyber
law") concerns the law of information technology,
including computing and the internet. It is related
to legal informatics, and governs the digital
dissemination of both (digitalized) information
and software, information security and electronic
commerce. aspects and it has been described as
"paper laws" for a "paperless environment". It
raises specific issues of intellectual property in
computing and online, contract law, privacy,
freedom of expression, and jurisdiction.
ļ‚Ø it touches almost all aspects of transactions and activities on and
concerning the Internet
ļ‚Ø Companies shall now be able to carry out electronic commerce
using the legal infrastructure provided by the Act.
ļ‚Ø prevent or reduce large scale damage from cybercriminal activities
by protecting information access, privacy, communications,
intellectual property (IP) and freedom of speech related to the use
of the Internet, websites, email, computers, cell phones, software
and hardware, such as data storage devices.
Add a footer 3
Add a footer 4
a. Unauthorized access & Hacking:-
Access means gaining entry into, instructing or communicating with the logical, arithmetical,
or memory function resources of a computer, computer system or computer network.
Unauthorized access would therefore mean any kind of access without the permission of either
the rightful owner or the person in charge of a computer, computer system or computer
network.
Every act committed towards breaking into a computer and/or network is hacking. Hackers
write or use ready-made computer programs to attack the target computer. They possess the
desire to destruct and they get the kick out of such destruction. Some hackers hack for
personal monetary gains, such as to stealing the credit card information, transferring money
from various bank accounts to their own account followed by withdrawal of money.
By hacking web server taking control on another persons website called as web hijacking
b. Trojan Attack:- The program that act like something useful but do the things that are quiet damping. The
programs of this kind are called as Trojans.
The name Trojan Horse is popular.
Trojans come in two parts, a Client part and a Server part. When the victim (unknowingly) runs the server on
its machine, the attacker will then use the Client to connect to the Server and start using the trojan.
TCP/IP protocol is the usual protocol type used for communications, but some functions of the trojans use the
UDP protocol as well.
Add a footer 5
c. Virus and Worm attack:-
A program that has capability to infect other programs and make copies of itself
and spread into other programs is called virus.
Programs that multiply like viruses but spread from computer to computer are
called as worms. d. E-mail & IRC related crimes:-
1. Email spoofing
Email spoofing refers to email that appears to have been originated from one
source when it was actually sent from another source. Please Read
2. Email Spamming
Email "spamming" refers to sending email to thousands and thousands of users -
similar to a chain letter.
3. Sending malicious codes through email
E-mails are used to send viruses, Trojans etc through emails as an
attachment or by sending a link of website which on visiting downloads
malicious code.
4. Email bombing
E-mail "bombing" is characterized by abusers repeatedly sending an
identical email message to a particular address.
Add a footer 6
5. Sending threatening emails
6. Defamatory emails
7. Email frauds
8. IRC related
Three main ways to attack IRC are: "verbalĆ¢ā¦£8218;?Ŧ#8220; attacks, clone
attacks, and flood attacks.
e. Denial of Service attacks:-
Flooding a computer resource with more requests than it can handle. This
causes the resource to crash thereby denying access of service to authorized
users.
Examples include
attempts to "flood" a network, thereby preventing legitimate network traffic
attempts to disrupt connections between two machines, thereby preventing
access to a service
attempts to prevent a particular individual from accessing a service
attempts to disrupt service to a specific system or person.
FR
ā€¢INDIAN PENAL CODE,1860.
ā€¢ INDIAN EVIDENCE ACT,1872.
ā€¢BANKERS BOOK EVIDENCE
ACT,1891.
ā€¢GENERAL CLAUSES ACT,1897
ā€¢IT ACT 2000
Add a footer 7
Cyber acts in India
Add a footer 8
Role
of
cyber
law
ā€¢Basically cyber law is a list of
sections and acts which is basically
used in cases of cyber crimes and
cyber threats.
ā€¢To make our digital life safe by
defending us from cyber threats
FR
ļ‚Ø https://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?article=4284&context=califor
nialawreview
Title- Robotics and the Lessons of Cyberlaw
Publication year- 2015
Author-Ryan calo
Writer-Ryan calo
Journal- California Law Review
Add a footer 9
Resource
https://www.ijntr.org/downhttps://www.ijntr.org/download_data/IJNTR03050003.pdfload_d
ata/IJNTR03050003.pdf
Title-Cyber Crime Problem Areas, Legal Areas and the Cyber Crime Law
Publication year-2017
Author-Dr mir mohammad azad
Writer-syeda shajia sharmin, Advocate Kazi Nafiul Mazid
Journal-International Journal of New Technology and Research
Add a footer 10
Cyber forensics
Computer forensics (also known as computer forensic science) is a branch of
digital forensic science pertaining to evidence found in computers and digital
storage media. The goal of computer forensics is to examine digital media in a
forensically sound manner with the aim of identifying, preserving, recovering,
analyzing and presenting facts and opinions about the digital information.
Although it is most often associated with the investigation of a wide variety of
computer crime, computer forensics may also be used in civil proceedings. The
discipline involves similar techniques and principles to data recovery, but with
additional guidelines and practices designed to create a legal audit trail.
Evidence from computer forensics investigations is usually subjected to the same
guidelines and practices of other digital evidence. It has been used in a number of
high-profile cases and is becoming widely accepted as reliable within U.S. and
European court systems
FR
11
Computer forensics investigations details carrying out a
structured investigation while documenting a chain of
evidence to discover exactly what happened on a computer
and who was responsible for it. The main priority of
computer forensics is accuracy. Forensic practitioners must
follow strict guidelines and maintain the highest standards
of work ethics to achieve accuracy because emphasis must
be on evidential integrity and security. A Computer Forensic
investigation must follow a rigid set of methods to ensure
that computer evidence is correctly obtained. These steps are
outlined below:
1. Protect - Protect subject computer system from alteration, data
corruption, virus infection, and physical damage.
2. Discover -Uncover all files: normal, hidden, deleted, encrypted, and
password- protected.
3. Recover -Recover as many of the deleted files as possible.
4. Reveal - Reveal the contents of hidden and temporary files.
5. Access - Access the protected and encrypted files, if legal.
6. Analyze - Analyze all relevant data, including data located in
unallocated file space and file slack.
7. Report -Print out a listing of all relevant files, and provide an
overall opinion on the system examination.
8. Testimony -Provide expert testimony or consultation, if required.
Techniques in Computer Forensics Investigation
A number of techniques are used during computer forensics investigations and much has been written on the
many techniques used by law enforcement in particular.See, e.g., "Defending Child Pornography Cases".
Cross-drive analysis: This is the forensic technique that correlates information found on multiple hard drives. The
process, still being researched, can be used to identify social networks and to perform anomaly detection (Garfinkel,
2006).
Live analysis: The examination of computers from within the operating system using custom forensics or existing
sys-admin tools to extract evidence. The practice is useful when dealing with Encrypting File Systems, for example,
where the encryption keys may be collected and, in some instances, the logical hard drive volume may be imaged
(known as a live acquisition) before the computer is shut down.
Deleted files: A common technique used in computer forensics is the recovery of deleted files. Modern forensic
software have their own tools for recovering or carving out deleted data, Aaron et al, (2009). Most operating systems
and file systems do not always erase physical file data, allowing investigators to reconstruct it from the physical
disk sectors. File carving involves searching for known file headers within the disk image and reconstructing
deleted materials.
Stochastic forensics: This method uses stochastic properties of the computer system to investigate activities
lacking digital artifacts. Its chief use is to investigate data theft. One of the techniques used to hide data is via
steganography: One of the techniques used to hide data is via the process of hiding data inside of a picture or
digital image. An example would be to hide pornographic images of children or other information that a given
criminal does not want to have discovered. Computer forensics professionals can fight this by looking at the hash of
the file and comparing it to the original image (if available.) While the image appears exactly the same, the hash
1. The lack of real data sources
2. The young and ever changing nature of the field
3. The dependency on tools
4. The lack of published error rates for the various widely used digital forensics
tools
5. The lack of basic research in this domain (cite our paper)
6. The lack of agreed upon standards and processes
7. The limitation of the hardware standards being used during the acquisition of
data
8. The volatility of the evidence ā€“ such as RAM
9. The continuous change in technology
10. The use of anti forensics techniques and tools
11. The lack of a common body of knowledge
https://www.aaai.org/ocs/index.php/SSS/SSS15/paper/viewFile/10227/10
092
Title-Data Sources for Advancing Cyber Forensics: What the Social
World Has to Offer
Publication year- 2015
Author-Ibrahim Baggili
Writer- Frank Breitinger
Journal-UNH Cyber Forensics Research & Education Group / Lab
https://www.ajol.info/index.php/stech/article/viewFile/154713/144
296
Title-Computer Forensics Investigation; Implications for
Improved Cyber Security in Nigeria
Publication year- 2017
Author-Chigozie-Okwum, Chioma C, Michael, Daniel O.
Writer-Ugboaja, Samuel G.
Journal-african journals online
Role of
cyber
forensic
s
Computer forensics is the process of
using the latest knowledge of science
and technology with computer
sciences to collect, analyze and present
proofs to the criminal or civil courts.
.Forensics is the process which deals in
finding evidence and recovering the
data.
BIOMETRI
CS
Biometrics is the technical term for body measurements and calculations. It
refers to metrics related to human characteristics. Biometrics authentication (or
realistic authentication)is used in computer science as a form of identification
and access control.It is also used to identify individuals in groups that are under
surveillance.
Biometric identifiers are the distinctive, measurable characteristics used to label
and describe individuals.Biometric identifiers are often categorized as
physiological versus behavioral characteristics.Physiological characteristics are
related to the shape of the body. Examples include, but are not limited to
fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris
recognition, retina and odour/scent. Behavioral characteristics are related to the
pattern of behavior of a person, including but not limited to typing rhythm,
gait, and voice.Some researchers have coined the term behaviometrics to
describe the latter class of biometrics.
More traditional means of access control include token-based identification
systems, such as a driver's license or passport, and knowledge-based
identification systems, such as a password or personal identification number.
Since biometric identifiers are unique to individuals, they are more reliable in
verifying identity than token and knowledge-based methods; however, the
collection of biometric identifiers raises privacy concerns about the ultimate use
of this information.
FR
Add a footer 18
FR
Face recognition technology is a combination of various other technologies and
their features and characteristics makes face recognition a better performer
depending upon the application.
Iris recognition is a high reliable biometric security system that acquires increased
attention. The human iris is an annular region between the black pupil and the
white sclera. The texture of iris is unique to each subject. The iris is first localized
with two circles in the image. Then the iris part is unwrapped to a rectangular
region where the iris texture is analyzed. In general the whole procedure of feature
Extraction of iris recognition system includes two steps. Initial, an arrangement of
one-dimensional (1-D) force signs is built keeping in mind the end goal to
adequately portray the most imperative data in the first two-dimensional (2-D)
picture. Second, utilizing a specific class of dyadic wavelets, a position
arrangement of neigh bourhood sharp variety focuses in such flags is recorded
A fingerprint scanner typically works by first recording fingerprint scans of all
authorized individuals for a particular system or facility. These scans are saved
within a database. The user requiring access puts their finger on a hardware
scanner, which scans and copies the input from the individual and looks for any
similarity within the already-stored scans. If there is a positive match, the
individual is granted access. Fingerprint scanners most commonly use an
individual's thumbprint as identification.
FR
Add a footer 20
How face recognition works
Genetic algorithm is used in detecting and extracting the
facial features from the video stream by eigen
technique.The feature based Genetic algorithm is chosen
as it deals with geometrical elements of the human face
also in oreder to perform math calculus in change
detection mechanism.
FR
Add a footer 21
The process of iris recognition consisting of
the following
ā€¢Feature Encoding by 2D Wavelet
Demodulation
ā€¢Recognizing iris
ā€¢Finding an Iris in an Image
FR
Add a footer 22
method of identifying the identity of an individual based on the
comparison of two fingerprints .It consists of three parts: a) fingerprint
enrollment b) fingerprint verification c) Fingerprint identification.
Fingerprint Enrollment: The fingerprint is captured by putting it on the
fingerprint deviceā€™s sensor. It is very important phase because the
captured image quality depends on way it is put on the sensor.
How fingerprint recognition work
FR
Add a footer 23
Fingerprint Verification: Verification is typically used for
fingerprint positive recognition, used to prevent the use of the
same identity by multiple people. There is one-to-one mapping
between template and individualā€™s fingerprint.
Fingerprint Identification: A match is found between each
individual and templates of all the users in the database. The
system recognizes an individual by conducting a one to many
comparison with an individualā€™s identity.
The analysis of fingerprints to find a match requires the
comparison of several fingerprint feature pattern which
includes patterns like minutiae points, ridge orientation
FR
Add a footer 24
http://14.139.205.163:8080/jspui/bitstream/123456789/144/1/2016PGCAIS06.pdf
Title-ENHANCED RSA KEY GENERATION MODELING USING FINGERPRINT
BIOMETRIC
Publication year- 2016
Author-neha bansal
Writer-neha bansal
Journal- DEPARTMENT OF COMPUTER APPLICATIONS
NATIONAL INSTITUTE OF TECHNOLOGY
https://www.bedicon.org/wp-content/uploads/2018/01/laws_topic4_source1.pdf
Title-comparing FINGERPRINT BIOMETRIC authentication
Publication year- 2017
Author-obi ogbanufe
Writer-dan j kim
Journal-Decision Support Systems
https://pdfs.semanticscholar.org/dc97/ceb1faf945e780a92be651b022a82e3bff5a.pdf
Title-50 years of biometric research: Accomplishments, challenges, and opportunities
Publication year- 2016
Author-AnilK.Jain , Karthik Nandakumar
Writer-Arun Ross
Journal-pattern recognition letters
FR
Add a footer 25

More Related Content

What's hot

computer forensics
computer forensicscomputer forensics
computer forensicsVaibhav Tapse
Ā 
Fs Ch 19
Fs Ch 19Fs Ch 19
Fs Ch 19warren142
Ā 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)CA.Kolluru Narayanarao
Ā 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics sunanditaAnand
Ā 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examinerNeeraj Aarora
Ā 
TOOLS AND TECHNIQUES FOR NETWORK FORENSICS
TOOLS AND TECHNIQUES FOR NETWORK FORENSICSTOOLS AND TECHNIQUES FOR NETWORK FORENSICS
TOOLS AND TECHNIQUES FOR NETWORK FORENSICSIJNSA Journal
Ā 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Muzzammil Wani
Ā 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensicsRahul Baghla
Ā 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics pptNikhil Mashruwala
Ā 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime InvestigationHarshita Ved
Ā 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsSagar Rahurkar
Ā 
Cyber Crimes & Cyber Forensics
Cyber Crimes & Cyber ForensicsCyber Crimes & Cyber Forensics
Cyber Crimes & Cyber Forensicsjahanzebmunawar
Ā 
Traditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer CrimeTraditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer CrimeDhrumil Panchal
Ā 
Digital forensics
Digital forensicsDigital forensics
Digital forensicsyash sawarkar
Ā 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
Ā 

What's hot (20)

computer forensics
computer forensicscomputer forensics
computer forensics
Ā 
Fs Ch 19
Fs Ch 19Fs Ch 19
Fs Ch 19
Ā 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
Ā 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
Ā 
cyber Forensics
cyber Forensicscyber Forensics
cyber Forensics
Ā 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examiner
Ā 
TOOLS AND TECHNIQUES FOR NETWORK FORENSICS
TOOLS AND TECHNIQUES FOR NETWORK FORENSICSTOOLS AND TECHNIQUES FOR NETWORK FORENSICS
TOOLS AND TECHNIQUES FOR NETWORK FORENSICS
Ā 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
Ā 
Current Forensic Tools
Current Forensic Tools Current Forensic Tools
Current Forensic Tools
Ā 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
Ā 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
Ā 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
Ā 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
Ā 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
Ā 
Cyber Crimes & Cyber Forensics
Cyber Crimes & Cyber ForensicsCyber Crimes & Cyber Forensics
Cyber Crimes & Cyber Forensics
Ā 
Computer forensic
Computer forensicComputer forensic
Computer forensic
Ā 
Traditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer CrimeTraditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer Crime
Ā 
Codebits 2010
Codebits 2010Codebits 2010
Codebits 2010
Ā 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Ā 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
Ā 

Similar to cyberlaws and cyberforensics,biometrics

cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemsMayank Diwakar
Ā 
UNIT 1Computer forensics science. .pptx
UNIT 1Computer forensics science.  .pptxUNIT 1Computer forensics science.  .pptx
UNIT 1Computer forensics science. .pptxramkumarttf69
Ā 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
Ā 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop newforensicsnation
Ā 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protectforensicsnation
Ā 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
Ā 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshopforensicsnation
Ā 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsSamantha Vargas
Ā 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1Jinalkakadiya
Ā 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)JIEMS Akkalkuwa
Ā 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking - Mark - Fullbright
Ā 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.finalAlexisHarvey8
Ā 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortressSTO STRATEGY
Ā 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
Ā 
Cyber crime
Cyber crimeCyber crime
Cyber crime24sneha
Ā 

Similar to cyberlaws and cyberforensics,biometrics (20)

cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
Ā 
UNIT 1Computer forensics science. .pptx
UNIT 1Computer forensics science.  .pptxUNIT 1Computer forensics science.  .pptx
UNIT 1Computer forensics science. .pptx
Ā 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
Ā 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
Ā 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
Ā 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
Ā 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
Ā 
Computer forensic
Computer forensicComputer forensic
Computer forensic
Ā 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
Ā 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Ā 
The Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptxThe Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptx
Ā 
Scope of Cyber forensics
Scope of Cyber forensicsScope of Cyber forensics
Scope of Cyber forensics
Ā 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
Ā 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
Ā 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
Ā 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
Ā 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortress
Ā 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Ā 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
Ā 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Ā 

Recently uploaded

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
Ā 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
Ā 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
Ā 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
Ā 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
Ā 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
Ā 
80 Đį»€ THI THį»¬ TUYį»‚N SINH TIįŗ¾NG ANH VƀO 10 Sį»ž GD ā€“ ĐT THƀNH PHį» Hį»’ CHƍ MINH NĂ...
80 Đį»€ THI THį»¬ TUYį»‚N SINH TIįŗ¾NG ANH VƀO 10 Sį»ž GD ā€“ ĐT THƀNH PHį» Hį»’ CHƍ MINH NĂ...80 Đį»€ THI THį»¬ TUYį»‚N SINH TIįŗ¾NG ANH VƀO 10 Sį»ž GD ā€“ ĐT THƀNH PHį» Hį»’ CHƍ MINH NĂ...
80 Đį»€ THI THį»¬ TUYį»‚N SINH TIįŗ¾NG ANH VƀO 10 Sį»ž GD ā€“ ĐT THƀNH PHį» Hį»’ CHƍ MINH NĂ...Nguyen Thanh Tu Collection
Ā 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
Ā 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
Ā 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
Ā 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
Ā 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
Ā 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
Ā 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
Ā 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
Ā 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
Ā 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
Ā 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
Ā 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
Ā 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
Ā 

Recently uploaded (20)

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Ā 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
Ā 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
Ā 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Ā 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
Ā 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
Ā 
80 Đį»€ THI THį»¬ TUYį»‚N SINH TIįŗ¾NG ANH VƀO 10 Sį»ž GD ā€“ ĐT THƀNH PHį» Hį»’ CHƍ MINH NĂ...
80 Đį»€ THI THį»¬ TUYį»‚N SINH TIįŗ¾NG ANH VƀO 10 Sį»ž GD ā€“ ĐT THƀNH PHį» Hį»’ CHƍ MINH NĂ...80 Đį»€ THI THį»¬ TUYį»‚N SINH TIįŗ¾NG ANH VƀO 10 Sį»ž GD ā€“ ĐT THƀNH PHį» Hį»’ CHƍ MINH NĂ...
80 Đį»€ THI THį»¬ TUYį»‚N SINH TIįŗ¾NG ANH VƀO 10 Sį»ž GD ā€“ ĐT THƀNH PHį» Hį»’ CHƍ MINH NĂ...
Ā 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
Ā 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
Ā 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
Ā 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
Ā 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
Ā 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
Ā 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
Ā 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
Ā 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Ā 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
Ā 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Ā 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
Ā 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Ā 

cyberlaws and cyberforensics,biometrics

  • 2. What does cyber law means? Information technology law (also called "cyber law") concerns the law of information technology, including computing and the internet. It is related to legal informatics, and governs the digital dissemination of both (digitalized) information and software, information security and electronic commerce. aspects and it has been described as "paper laws" for a "paperless environment". It raises specific issues of intellectual property in computing and online, contract law, privacy, freedom of expression, and jurisdiction.
  • 3. ļ‚Ø it touches almost all aspects of transactions and activities on and concerning the Internet ļ‚Ø Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act. ļ‚Ø prevent or reduce large scale damage from cybercriminal activities by protecting information access, privacy, communications, intellectual property (IP) and freedom of speech related to the use of the Internet, websites, email, computers, cell phones, software and hardware, such as data storage devices. Add a footer 3
  • 4. Add a footer 4 a. Unauthorized access & Hacking:- Access means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network. Unauthorized access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network. Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack the target computer. They possess the desire to destruct and they get the kick out of such destruction. Some hackers hack for personal monetary gains, such as to stealing the credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money. By hacking web server taking control on another persons website called as web hijacking b. Trojan Attack:- The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans. The name Trojan Horse is popular. Trojans come in two parts, a Client part and a Server part. When the victim (unknowingly) runs the server on its machine, the attacker will then use the Client to connect to the Server and start using the trojan. TCP/IP protocol is the usual protocol type used for communications, but some functions of the trojans use the UDP protocol as well.
  • 5. Add a footer 5 c. Virus and Worm attack:- A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus. Programs that multiply like viruses but spread from computer to computer are called as worms. d. E-mail & IRC related crimes:- 1. Email spoofing Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source. Please Read 2. Email Spamming Email "spamming" refers to sending email to thousands and thousands of users - similar to a chain letter. 3. Sending malicious codes through email E-mails are used to send viruses, Trojans etc through emails as an attachment or by sending a link of website which on visiting downloads malicious code. 4. Email bombing E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address.
  • 6. Add a footer 6 5. Sending threatening emails 6. Defamatory emails 7. Email frauds 8. IRC related Three main ways to attack IRC are: "verbalĆ¢ā¦£8218;?Ŧ#8220; attacks, clone attacks, and flood attacks. e. Denial of Service attacks:- Flooding a computer resource with more requests than it can handle. This causes the resource to crash thereby denying access of service to authorized users. Examples include attempts to "flood" a network, thereby preventing legitimate network traffic attempts to disrupt connections between two machines, thereby preventing access to a service attempts to prevent a particular individual from accessing a service attempts to disrupt service to a specific system or person.
  • 7. FR ā€¢INDIAN PENAL CODE,1860. ā€¢ INDIAN EVIDENCE ACT,1872. ā€¢BANKERS BOOK EVIDENCE ACT,1891. ā€¢GENERAL CLAUSES ACT,1897 ā€¢IT ACT 2000 Add a footer 7 Cyber acts in India
  • 8. Add a footer 8 Role of cyber law ā€¢Basically cyber law is a list of sections and acts which is basically used in cases of cyber crimes and cyber threats. ā€¢To make our digital life safe by defending us from cyber threats
  • 9. FR ļ‚Ø https://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?article=4284&context=califor nialawreview Title- Robotics and the Lessons of Cyberlaw Publication year- 2015 Author-Ryan calo Writer-Ryan calo Journal- California Law Review Add a footer 9 Resource https://www.ijntr.org/downhttps://www.ijntr.org/download_data/IJNTR03050003.pdfload_d ata/IJNTR03050003.pdf Title-Cyber Crime Problem Areas, Legal Areas and the Cyber Crime Law Publication year-2017 Author-Dr mir mohammad azad Writer-syeda shajia sharmin, Advocate Kazi Nafiul Mazid Journal-International Journal of New Technology and Research
  • 10. Add a footer 10 Cyber forensics Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information. Although it is most often associated with the investigation of a wide variety of computer crime, computer forensics may also be used in civil proceedings. The discipline involves similar techniques and principles to data recovery, but with additional guidelines and practices designed to create a legal audit trail. Evidence from computer forensics investigations is usually subjected to the same guidelines and practices of other digital evidence. It has been used in a number of high-profile cases and is becoming widely accepted as reliable within U.S. and European court systems
  • 11. FR 11 Computer forensics investigations details carrying out a structured investigation while documenting a chain of evidence to discover exactly what happened on a computer and who was responsible for it. The main priority of computer forensics is accuracy. Forensic practitioners must follow strict guidelines and maintain the highest standards of work ethics to achieve accuracy because emphasis must be on evidential integrity and security. A Computer Forensic investigation must follow a rigid set of methods to ensure that computer evidence is correctly obtained. These steps are outlined below:
  • 12. 1. Protect - Protect subject computer system from alteration, data corruption, virus infection, and physical damage. 2. Discover -Uncover all files: normal, hidden, deleted, encrypted, and password- protected. 3. Recover -Recover as many of the deleted files as possible. 4. Reveal - Reveal the contents of hidden and temporary files. 5. Access - Access the protected and encrypted files, if legal. 6. Analyze - Analyze all relevant data, including data located in unallocated file space and file slack. 7. Report -Print out a listing of all relevant files, and provide an overall opinion on the system examination. 8. Testimony -Provide expert testimony or consultation, if required.
  • 13. Techniques in Computer Forensics Investigation A number of techniques are used during computer forensics investigations and much has been written on the many techniques used by law enforcement in particular.See, e.g., "Defending Child Pornography Cases". Cross-drive analysis: This is the forensic technique that correlates information found on multiple hard drives. The process, still being researched, can be used to identify social networks and to perform anomaly detection (Garfinkel, 2006). Live analysis: The examination of computers from within the operating system using custom forensics or existing sys-admin tools to extract evidence. The practice is useful when dealing with Encrypting File Systems, for example, where the encryption keys may be collected and, in some instances, the logical hard drive volume may be imaged (known as a live acquisition) before the computer is shut down. Deleted files: A common technique used in computer forensics is the recovery of deleted files. Modern forensic software have their own tools for recovering or carving out deleted data, Aaron et al, (2009). Most operating systems and file systems do not always erase physical file data, allowing investigators to reconstruct it from the physical disk sectors. File carving involves searching for known file headers within the disk image and reconstructing deleted materials. Stochastic forensics: This method uses stochastic properties of the computer system to investigate activities lacking digital artifacts. Its chief use is to investigate data theft. One of the techniques used to hide data is via steganography: One of the techniques used to hide data is via the process of hiding data inside of a picture or digital image. An example would be to hide pornographic images of children or other information that a given criminal does not want to have discovered. Computer forensics professionals can fight this by looking at the hash of the file and comparing it to the original image (if available.) While the image appears exactly the same, the hash
  • 14. 1. The lack of real data sources 2. The young and ever changing nature of the field 3. The dependency on tools 4. The lack of published error rates for the various widely used digital forensics tools 5. The lack of basic research in this domain (cite our paper) 6. The lack of agreed upon standards and processes 7. The limitation of the hardware standards being used during the acquisition of data 8. The volatility of the evidence ā€“ such as RAM 9. The continuous change in technology 10. The use of anti forensics techniques and tools 11. The lack of a common body of knowledge
  • 15. https://www.aaai.org/ocs/index.php/SSS/SSS15/paper/viewFile/10227/10 092 Title-Data Sources for Advancing Cyber Forensics: What the Social World Has to Offer Publication year- 2015 Author-Ibrahim Baggili Writer- Frank Breitinger Journal-UNH Cyber Forensics Research & Education Group / Lab https://www.ajol.info/index.php/stech/article/viewFile/154713/144 296 Title-Computer Forensics Investigation; Implications for Improved Cyber Security in Nigeria Publication year- 2017 Author-Chigozie-Okwum, Chioma C, Michael, Daniel O. Writer-Ugboaja, Samuel G. Journal-african journals online
  • 16. Role of cyber forensic s Computer forensics is the process of using the latest knowledge of science and technology with computer sciences to collect, analyze and present proofs to the criminal or civil courts. .Forensics is the process which deals in finding evidence and recovering the data.
  • 17. BIOMETRI CS Biometrics is the technical term for body measurements and calculations. It refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication)is used in computer science as a form of identification and access control.It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals.Biometric identifiers are often categorized as physiological versus behavioral characteristics.Physiological characteristics are related to the shape of the body. Examples include, but are not limited to fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. Behavioral characteristics are related to the pattern of behavior of a person, including but not limited to typing rhythm, gait, and voice.Some researchers have coined the term behaviometrics to describe the latter class of biometrics. More traditional means of access control include token-based identification systems, such as a driver's license or passport, and knowledge-based identification systems, such as a password or personal identification number. Since biometric identifiers are unique to individuals, they are more reliable in verifying identity than token and knowledge-based methods; however, the collection of biometric identifiers raises privacy concerns about the ultimate use of this information.
  • 19. FR Face recognition technology is a combination of various other technologies and their features and characteristics makes face recognition a better performer depending upon the application. Iris recognition is a high reliable biometric security system that acquires increased attention. The human iris is an annular region between the black pupil and the white sclera. The texture of iris is unique to each subject. The iris is first localized with two circles in the image. Then the iris part is unwrapped to a rectangular region where the iris texture is analyzed. In general the whole procedure of feature Extraction of iris recognition system includes two steps. Initial, an arrangement of one-dimensional (1-D) force signs is built keeping in mind the end goal to adequately portray the most imperative data in the first two-dimensional (2-D) picture. Second, utilizing a specific class of dyadic wavelets, a position arrangement of neigh bourhood sharp variety focuses in such flags is recorded A fingerprint scanner typically works by first recording fingerprint scans of all authorized individuals for a particular system or facility. These scans are saved within a database. The user requiring access puts their finger on a hardware scanner, which scans and copies the input from the individual and looks for any similarity within the already-stored scans. If there is a positive match, the individual is granted access. Fingerprint scanners most commonly use an individual's thumbprint as identification.
  • 20. FR Add a footer 20 How face recognition works Genetic algorithm is used in detecting and extracting the facial features from the video stream by eigen technique.The feature based Genetic algorithm is chosen as it deals with geometrical elements of the human face also in oreder to perform math calculus in change detection mechanism.
  • 21. FR Add a footer 21 The process of iris recognition consisting of the following ā€¢Feature Encoding by 2D Wavelet Demodulation ā€¢Recognizing iris ā€¢Finding an Iris in an Image
  • 22. FR Add a footer 22 method of identifying the identity of an individual based on the comparison of two fingerprints .It consists of three parts: a) fingerprint enrollment b) fingerprint verification c) Fingerprint identification. Fingerprint Enrollment: The fingerprint is captured by putting it on the fingerprint deviceā€™s sensor. It is very important phase because the captured image quality depends on way it is put on the sensor. How fingerprint recognition work
  • 23. FR Add a footer 23 Fingerprint Verification: Verification is typically used for fingerprint positive recognition, used to prevent the use of the same identity by multiple people. There is one-to-one mapping between template and individualā€™s fingerprint. Fingerprint Identification: A match is found between each individual and templates of all the users in the database. The system recognizes an individual by conducting a one to many comparison with an individualā€™s identity. The analysis of fingerprints to find a match requires the comparison of several fingerprint feature pattern which includes patterns like minutiae points, ridge orientation
  • 24. FR Add a footer 24 http://14.139.205.163:8080/jspui/bitstream/123456789/144/1/2016PGCAIS06.pdf Title-ENHANCED RSA KEY GENERATION MODELING USING FINGERPRINT BIOMETRIC Publication year- 2016 Author-neha bansal Writer-neha bansal Journal- DEPARTMENT OF COMPUTER APPLICATIONS NATIONAL INSTITUTE OF TECHNOLOGY https://www.bedicon.org/wp-content/uploads/2018/01/laws_topic4_source1.pdf Title-comparing FINGERPRINT BIOMETRIC authentication Publication year- 2017 Author-obi ogbanufe Writer-dan j kim Journal-Decision Support Systems https://pdfs.semanticscholar.org/dc97/ceb1faf945e780a92be651b022a82e3bff5a.pdf Title-50 years of biometric research: Accomplishments, challenges, and opportunities Publication year- 2016 Author-AnilK.Jain , Karthik Nandakumar Writer-Arun Ross Journal-pattern recognition letters