At the ISACA Annual Conference, I delivered a presentation that delved into the interrelation between cybercrime and digital forensics. By examining the intricate connection between these two pivotal domains, I aimed to elucidate the symbiotic relationship that exists, wherein the techniques and methodologies of digital forensics play a crucial role in the investigation and mitigation of cybercrime incidents. Through this comprehensive analysis, attendees gained valuable insights into the dynamic landscape of cyber threats and the essential role digital forensics assumes in the pursuit of effective cybercrime prevention and response strategies.
Because the technology is used largely in the last decades; cybercrimes have become a significant
international issue as a result of the huge damage that it causes to the business and even to the ordinary
users of technology. The main aims of this paper is to shed light on digital crimes and gives overview about
what a person who is related to computer science has to know about this new type of crimes. The paper has
three sections: Introduction to Digital Crime which gives fundamental information about digital crimes,
Digital Crime Investigation which presents different investigation models and the third section is about
Cybercrime Law.
Because the technology is used largely in the last decades; cybercrimes have become a significant
international issue as a result of the huge damage that it causes to the business and even to the ordinary
users of technology. The main aims of this paper is to shed light on digital crimes and gives overview about
what a person who is related to computer science has to know about this new type of crimes. The paper has
three sections: Introduction to Digital Crime which gives fundamental information about digital crimes,
Digital Crime Investigation which presents different investigation models and the third section is about
Cybercrime Law.
Crime and violence are inherent in our political and social system. With the moving pace of technology, the
popularity of internet grows continuously, with not only changing our views of life, but also changing the
way crime takes place all over the world. We need a technology that can be used to bring justice to those
who are responsible for conducting attacks on computer systems across the globe. In this paper, we present
various measures being taken in order to control and deal with the crime related to digital devices. This
paper gives an insight of Digital Forensics and current situation of India in handling such type of crimes.
Because the technology is used largely in the last decades; cybercrimes have become a significant
international issue as a result of the huge damage that it causes to the business and even to the ordinary
users of technology. The main aims of this paper is to shed light on digital crimes and gives overview about
what a person who is related to computer science has to know about this new type of crimes. The paper has
three sections: Introduction to Digital Crime which gives fundamental information about digital crimes,
Digital Crime Investigation which presents different investigation models and the third section is about
Cybercrime Law.
Because the technology is used largely in the last decades; cybercrimes have become a significant
international issue as a result of the huge damage that it causes to the business and even to the ordinary
users of technology. The main aims of this paper is to shed light on digital crimes and gives overview about
what a person who is related to computer science has to know about this new type of crimes. The paper has
three sections: Introduction to Digital Crime which gives fundamental information about digital crimes,
Digital Crime Investigation which presents different investigation models and the third section is about
Cybercrime Law.
Crime and violence are inherent in our political and social system. With the moving pace of technology, the
popularity of internet grows continuously, with not only changing our views of life, but also changing the
way crime takes place all over the world. We need a technology that can be used to bring justice to those
who are responsible for conducting attacks on computer systems across the globe. In this paper, we present
various measures being taken in order to control and deal with the crime related to digital devices. This
paper gives an insight of Digital Forensics and current situation of India in handling such type of crimes.
Essay on Introduction to Computer Crime
Essay about CyberCrime and Terrorism
Cyber Crime : A Crime
Essay on CyberCrime
Cyber Crime Essay
Cyber Crimes And The Crime
Persuasive Essay On Cybercrime
Cyber Crime Essay
Cybercrime And Its Effect On Society
CyberCrime Essay
Essay on Cyber Crime and National Security
Cyber-Crime is a Serious Problem Essay examples
Literature Review On Cyber Crime
Cyber Crime
Cyber Crime
Why Cybercrime Is Important
Essay on Cyber Crime and Cyber Law
Cybercrime: Two Case Studies
Cyber Crime Essay
Cyber Crime Essay
As our digital records are likely to be cyber-breached several times and/or we all have to deal with legal proceedings, learn how to use digital forensics experts efficiently.
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...Gamaliel Olayiwola Fasuyi
Â
This Study focuses on the legal framework prohibiting Cybercrimes in Nigeria. Cybercrime
involves using computers and internet by individuals to commit crime. The people across the globe are technologically transformed to the extent that life
depends on technology. The application of ICT covers every facet of human life and that has led
to the birth of unanticipated rates of crimes coming in a borderless form. The paper examines the
types of cybercrimes prevalent in Nigeria, international conventions approach and other
jurisdictional practices with a view to abreast the application of legal framework of cybercrimes
both in the Nigerian context and international community.
The findings of the paper are that the Nigerian legislations on the subject acknowledge
the existing challenges and are on the right track, but need to be strengthened to achieve the desired
purpose. It further observed that there is no unanimous definition of the concept in all jurisdictions
which add issue to the subject in terms of challenges. The study recommends that the recently signed Nigerian Cybercrimes (Prohibition & Prevention Act) 2015 should be actively enforced
with a view to bringing our legal framework on par with other jurisdictions as well as proffering
other reforms to enhance Cybersecurity in Nigeria.
In this presentation we were looking at how cybersecurity threats are in Africa and which are the common type of attacks African countries are exposed to
Essay on Introduction to Computer Crime
Essay about CyberCrime and Terrorism
Cyber Crime : A Crime
Essay on CyberCrime
Cyber Crime Essay
Cyber Crimes And The Crime
Persuasive Essay On Cybercrime
Cyber Crime Essay
Cybercrime And Its Effect On Society
CyberCrime Essay
Essay on Cyber Crime and National Security
Cyber-Crime is a Serious Problem Essay examples
Literature Review On Cyber Crime
Cyber Crime
Cyber Crime
Why Cybercrime Is Important
Essay on Cyber Crime and Cyber Law
Cybercrime: Two Case Studies
Cyber Crime Essay
Cyber Crime Essay
As our digital records are likely to be cyber-breached several times and/or we all have to deal with legal proceedings, learn how to use digital forensics experts efficiently.
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...Gamaliel Olayiwola Fasuyi
Â
This Study focuses on the legal framework prohibiting Cybercrimes in Nigeria. Cybercrime
involves using computers and internet by individuals to commit crime. The people across the globe are technologically transformed to the extent that life
depends on technology. The application of ICT covers every facet of human life and that has led
to the birth of unanticipated rates of crimes coming in a borderless form. The paper examines the
types of cybercrimes prevalent in Nigeria, international conventions approach and other
jurisdictional practices with a view to abreast the application of legal framework of cybercrimes
both in the Nigerian context and international community.
The findings of the paper are that the Nigerian legislations on the subject acknowledge
the existing challenges and are on the right track, but need to be strengthened to achieve the desired
purpose. It further observed that there is no unanimous definition of the concept in all jurisdictions
which add issue to the subject in terms of challenges. The study recommends that the recently signed Nigerian Cybercrimes (Prohibition & Prevention Act) 2015 should be actively enforced
with a view to bringing our legal framework on par with other jurisdictions as well as proffering
other reforms to enhance Cybersecurity in Nigeria.
In this presentation we were looking at how cybersecurity threats are in Africa and which are the common type of attacks African countries are exposed to
One of the most common questions asked by newbies is how to get started into cybersecurity, in this presentation i talked about various ways on which people can get started into cybersecurity
I had the honor of being invited by DLab to deliver a presentation focused on the fundamental aspects of web application security. The objective of this session was to provide attendees with a comprehensive comprehension of the methodologies essential for approaching web applications through a cybersecurity lens. By meticulously exploring key principles and strategies, the presentation aimed to equip participants with a robust foundation for effectively evaluating and safeguarding web applications against potential security threats.
Importance of cybersecurity in digital transformation | 2023KharimMchatta
Â
I had the distinct honor of presenting at the joint event hosted by the Smart Africa Group (SAG) and the American Chamber of Commerce Tanzania (AMCHAM), centered around the theme of digital transformation. During this occasion, my presentation centered on illuminating the pivotal role of cybersecurity within the context of digital transformation. By delineating the significance of prioritizing robust cybersecurity measures, I aimed to emphasize the intrinsic interdependence between technological advancement and safeguarding digital ecosystems. This comprehensive discourse underscored the imperative for a heightened commitment to cybersecurity in order to navigate the evolving digital landscape with resilience and foresight.
Cybersecurity in the blue economy | 2022KharimMchatta
Â
At the annual Tanzania ICT conference, I had the esteemed opportunity to deliver a presentation that intersected the realms of the blue economy and cybersecurity. By bridging these two pivotal domains, the presentation aimed to elucidate the critical symbiosis between the maritime sector's technological advancements and the imperative of robust cybersecurity measures. This comprehensive exploration underscored the necessity for harmonizing sustainable growth in the blue economy with resilient cybersecurity strategies, reflecting the ever-evolving digital landscape's influence on maritime operations and security paradigms.
Commonwealth of Learning cybersecurity training for teachers | 2022KharimMchatta
Â
I had the privilege of receiving an invitation from the Commonwealth of Learning to conduct a training session targeted at their members, predominantly comprised of educators and lecturers. The training was meticulously designed to raise awareness within the education sector, focusing on imparting knowledge about cybersecurity measures that both educators and their students can adopt for their protection. Through this engagement, the aim was to equip participants with the necessary insights to navigate potential online risks and ensure a secure digital environment conducive to effective teaching and learning.
While securing one's inaugural position in the realm of cybersecurity might appear straightforward, the process is far from facile. In this presentation, we meticulously examine the multifaceted challenges associated with attaining a foothold in the cybersecurity industry. By delineating diverse strategies and approaches, we aim to impart valuable insights into the nuanced journey of realizing one's professional aspirations. This comprehensive exploration underscores the significance of a strategic and informed approach to ultimately materialize the endeavor of securing an ideal role within the cybersecurity domain.
During this informative session, our focus centered on elucidating various methodologies through which an individual can potentially exploit vulnerabilities within web applications. By engaging with the students from the University of Dodoma, we provided valuable insights into a spectrum of techniques employed when assessing a web application's security resilience. By imparting these multifaceted approaches, our objective was to equip the participants with a comprehensive understanding of potential attack vectors, thereby enhancing their capacity to effectively evaluate and fortify the security posture of web applications.
Enhancing Cyber threat hunting for your team | 2021KharimMchatta
Â
At the ISACA annual meeting, our presentation delved into diverse strategies aimed at empowering cybersecurity teams to elevate their cyber threat hunting capabilities within their organizational systems. Through a comprehensive exploration of innovative techniques, best practices, and emerging trends, we aimed to equip attendees with actionable insights to proactively identify and mitigate potential threats. By highlighting the significance of continuous improvement in threat hunting methodologies, we sought to contribute to the advancement of effective cybersecurity practices in a rapidly evolving digital landscape.
Cybercrime's accelerated by covid 19 | 2021KharimMchatta
Â
During the ISACA Cybersecurity Day, our presentation focused on the surge in cybercrime precipitated by the COVID-19 pandemic. Through a comprehensive analysis, we explored the correlation between the global health crisis and the escalation of cyber threats. By shedding light on the intricate dynamics at play and the vulnerabilities exposed during this period, we aimed to deepen attendees' understanding of the evolving threat landscape and underscore the imperative for robust cybersecurity measures in the face of unprecedented challenges.
Threat Modelling in Penetration Testing | 2021KharimMchatta
Â
Threat Modelling holds substantial importance in penetration testing, yet its significance often goes unrecognized. This presentation will elucidate the process of performing effective threat modelling during engagements, encompassing methodologies such as STRIDE and emphasizing real-world cases to underscore the implications of inadequate practices. Attendees will gain practical insights into implementing threat modelling through best practices, fostering a heightened appreciation for its role in enhancing cybersecurity strategies.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Â
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Â
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Â
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Â
Clients donât know what they donât know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clientsâ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
Â
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
⢠The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
⢠Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
⢠Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
⢠Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Â
Are you looking to streamline your workflows and boost your projectsâ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, youâre in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part âEssentials of Automationâ series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Hereâs what youâll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
Weâll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Donât miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Â
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as âpredictable inferenceâ.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
Â
As AI technology is pushing into IT I was wondering myself, as an âinfrastructure container kubernetes guyâ, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefitâs both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Â
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Â
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
Â
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. Whatâs changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Dev Dives: Train smarter, not harder â active learning and UiPath LLMs for do...UiPathCommunity
Â
đĽ Speed, accuracy, and scaling â discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Miningâ˘:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing â with little to no training required
Get an exclusive demo of the new family of UiPath LLMs â GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
đ¨âđŤ Andras Palfi, Senior Product Manager, UiPath
đŠâđŤ Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Â
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Â
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overviewâ
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
2. Whoami?
â Kharim Mchatta
â CEO of HACK IT CONSULTANCY
âAuthor of 4 Cybersecurity books
â Cybersecurity professional (Pen tester & Digital Forensics expert)
â Founder of H4K-IT (Cybersec community in TZ)
â CTF player
â Blogger
â Author at eForensics and Pentets Magazine in Poland
â DW Swahili Subject matter expert (cybersecurity)
3. ROAD MAP OF TODAYS DISCUSSION
Discussion around
- digital economy
- Effects of digital economy
Discussion around digital forensics
- Types of digital forensics
- Digital forensics experts
Discussion on cybercrime
- Types of cybercrime
- Cybercrime inTanzania
Discussion around laws
- International vs Local laws
- Advocate vs Digital Forensics Expert
5. AFRICA DIGITAL ECONOMY
Majority of African countries are heading into the digital
economy while some of them are already in there. Some
African countries that are well known for their digital
economy include the following
Nigeria
Kenya
S. Africa
6. Tanzania in Digital Economy
Tanzania is heading into the digital economy.This means
that majority of the activities are being moved over to the
internet.
Here are some of the activities that are done online currently
includes
⢠National ID Number
⢠TRA (Filing returns)
⢠BRELA Registration
⢠Workers Compensation Funds (WCF)
⢠NHIF
7. Problems of Digital Economy
Tanzania being in the digital economy means majority of our
information can be found and accessed over the internet.
This comes with its draw backs and the major one is
cybercrime which affects the lives of people in variety of ways.
Example
⢠Privacy of the people can be compromised
⢠Information can be leaked
⢠System being hacked
⢠System being inaccessible due to denial of services (DOS)
⢠Financial Loss
⢠Reputational Loss
9. Cybercrime inTanzania is constantly increasing as more entities keep
on digitalizing their operations.This means that there are going to
be more cybercrime cases faced in the court.
The problem that we are facing as a country currently is that most of
the advocates and lawyers havenât got the opportunity to explore and
understand about the digital crime since itâs a new concept.
Hence it is important to have advocates and lawyers who are knowledgeable
on issueâs relating to digital crime.This can be achieved through training.
Tanzania Digital Crime Ruling
10. What is cybercrime?
The first reported cybercrime took place in 1834 where the French
telegram system was hacked by a couple of robbers where they stole
information from the stoke market making it the first cybercrime in the
world. This led to the rise of more cybercrime activities which involved
viruses and network hacks.
History of Cybercrime
These are all the crimes that are conducted by means of computer or
over the internet.
11. There are several cybercrime that are being conducted and some of
them include;
Types of Cybercrime
Financial Fraud Theft of intellectual
property
Damage of company
service network
Systems being
hacked
Other Cybercrimeâs
12. Tanzania as a country in the digital era faces plenty of cyber attacks. On
21st July 2020, IPPmedia reported that TCRA has called on all
Information and Communication Technology (ICT) experts in the
country to be wary of cyber-attacks due to 10 - 15 companies had
been hacked.
Cybercrime in Tanzania
The most common cybercrime activities happening in Tanzania include
the following;
⢠System hacking
⢠Financial fraud
⢠Social Engineering
⢠Cyberbullying
⢠Intellectual property theft
13. The rise of cybercrime in the world had to be addressed. This led to the
need of having a way on which these crime had to be addressed by law
enforcers.This Led to a rise of digital forensics.
Cybercrime & Digital Forensics
It is the process of collecting, analyzing, preserving and documenting of
digital evidence and presenting them in court of law for prosecution.
What is digital forensics
14. When it comes to digital forensics this refers to acquiring of evidence
from any electronic device. Here are some of the common types of
digital forensics
digital forensics Investigation
â Computer forensics
â Mobile forensics
â Email forensics
â Network forensics
â Hacking
â Malware forensics
â Wireless forensics
â Database forensics
19. When a cybercrime has occurred, there are 3 technical people who are
going to be responsible for handling the case and these individual's have
different roles to play when it comeâs to digital forensics and each role
should be well understood by everybody.
⢠First responder
⢠Computer forensics analyst
⢠Expert witness
In court the expert witness is going to be responsible to answer all the
questions in court of how the investigation was conducted and whether
the procedures were followed.
Digital Forensics Expert
20. In digital forensics there are a set of stages that an expert must go
through in order until they present the evidence in the court of law
and these stages include:
Stage/Phases of Digital Forensics
⢠Authority
⢠Planning
⢠Evidence identification
⢠Evidence collection
⢠Chain of custody
⢠Analysis
⢠Report writing
⢠Expert witness
21. Best Practice in Digital Forensics (Kenya National Forensics Lab)
22. Law and Investigators
Laws in digital forensics are there to govern digital forensics expert on
what is or is not allowed to do when doing an investigation.
There is no single law that governs digital forensics but a nexus of them
which needs to be put into consideration. There are situations where a
digital forensics expert may be carry out an investigation and later it is
considered a criminal offense.
Here are some of the International Laws that govern digital forensics
⢠Human rights act of 1998 â every person has their basic rights.
⢠Data protection right
⢠Interception of communication
⢠Computer misuse act 1990
⢠Police and criminal evidence act 1984 â this act is for law enforcers
which covers power to search a person and property, power to
detain and arrest people, questioning of suspects, access and copying.
24. Law and Investigators
Here are some of the local Laws that govern digital forensics which can
be found on the cybercrime act 2015 part IV search and seizure
⢠Search and seizure
⢠Disclosure of data
⢠Expedited preservation
⢠Disclosure and collection of traffic data
⢠Disclosure and collection of content data
⢠Court order
⢠Use of forensic tools
⢠Hearing of application
26. Food for Though (Discussion)
We have discussed about Tanzania heading into the digital economy but
there are some questions we should be asking ourselves
1. Is Tanzania well prepared for the effects of being in the digital economy
2. Do we have experts who can help us combat the effects of digital economy
3. Do law enforcers understand about the effects of digital economy
4. Is the laws in place satisfying the ways to combat effects of cybercrime (are
there loopholes on the current laws)
5. What is our way forward
27. This intellectual property belongs to HACK IT Consultancy a
cybersecurity company located in Dar es salaam,Tanzania.
Author: Kharim Mchatta
Contact: +255 735 212 145
Email: info@hackitconsultacy.com
Website: www.h4k-it.com
LinkedIn: hack it consultancy Instagram: @hackitconsultancy