The document discusses information technology law (also called cyber law) and cyber forensics. It explains that cyber law concerns the legal aspects of computing and the internet, including intellectual property, contracts, privacy, and jurisdiction. Cyber forensics involves examining digital evidence from computers and storage devices in a forensically sound manner to identify, preserve, recover, analyze and present digital information in a legal context.
2. What does
cyber law
means?
Information technology law (also called "cyber
law") concerns the law of information technology,
including computing and the internet. It is related
to legal informatics, and governs the digital
dissemination of both (digitalized) information
and software, information security and electronic
commerce. aspects and it has been described as
"paper laws" for a "paperless environment". It
raises specific issues of intellectual property in
computing and online, contract law, privacy,
freedom of expression, and jurisdiction.
3. ď¨ it touches almost all aspects of transactions and activities on and
concerning the Internet
ď¨ Companies shall now be able to carry out electronic commerce
using the legal infrastructure provided by the Act.
ď¨ prevent or reduce large scale damage from cybercriminal activities
by protecting information access, privacy, communications,
intellectual property (IP) and freedom of speech related to the use
of the Internet, websites, email, computers, cell phones, software
and hardware, such as data storage devices.
Add a footer 3
4. Add a footer 4
a. Unauthorized access & Hacking:-
Access means gaining entry into, instructing or communicating with the logical, arithmetical,
or memory function resources of a computer, computer system or computer network.
Unauthorized access would therefore mean any kind of access without the permission of either
the rightful owner or the person in charge of a computer, computer system or computer
network.
Every act committed towards breaking into a computer and/or network is hacking. Hackers
write or use ready-made computer programs to attack the target computer. They possess the
desire to destruct and they get the kick out of such destruction. Some hackers hack for
personal monetary gains, such as to stealing the credit card information, transferring money
from various bank accounts to their own account followed by withdrawal of money.
By hacking web server taking control on another persons website called as web hijacking
b. Trojan Attack:- The program that act like something useful but do the things that are quiet damping. The
programs of this kind are called as Trojans.
The name Trojan Horse is popular.
Trojans come in two parts, a Client part and a Server part. When the victim (unknowingly) runs the server on
its machine, the attacker will then use the Client to connect to the Server and start using the trojan.
TCP/IP protocol is the usual protocol type used for communications, but some functions of the trojans use the
UDP protocol as well.
5. Add a footer 5
c. Virus and Worm attack:-
A program that has capability to infect other programs and make copies of itself
and spread into other programs is called virus.
Programs that multiply like viruses but spread from computer to computer are
called as worms. d. E-mail & IRC related crimes:-
1. Email spoofing
Email spoofing refers to email that appears to have been originated from one
source when it was actually sent from another source. Please Read
2. Email Spamming
Email "spamming" refers to sending email to thousands and thousands of users -
similar to a chain letter.
3. Sending malicious codes through email
E-mails are used to send viruses, Trojans etc through emails as an
attachment or by sending a link of website which on visiting downloads
malicious code.
4. Email bombing
E-mail "bombing" is characterized by abusers repeatedly sending an
identical email message to a particular address.
6. Add a footer 6
5. Sending threatening emails
6. Defamatory emails
7. Email frauds
8. IRC related
Three main ways to attack IRC are: "verbalâ⌣8218;?Ō#8220; attacks, clone
attacks, and flood attacks.
e. Denial of Service attacks:-
Flooding a computer resource with more requests than it can handle. This
causes the resource to crash thereby denying access of service to authorized
users.
Examples include
attempts to "flood" a network, thereby preventing legitimate network traffic
attempts to disrupt connections between two machines, thereby preventing
access to a service
attempts to prevent a particular individual from accessing a service
attempts to disrupt service to a specific system or person.
7. FR
â˘INDIAN PENAL CODE,1860.
⢠INDIAN EVIDENCE ACT,1872.
â˘BANKERS BOOK EVIDENCE
ACT,1891.
â˘GENERAL CLAUSES ACT,1897
â˘IT ACT 2000
Add a footer 7
Cyber acts in India
8. Add a footer 8
Role
of
cyber
law
â˘Basically cyber law is a list of
sections and acts which is basically
used in cases of cyber crimes and
cyber threats.
â˘To make our digital life safe by
defending us from cyber threats
9. FR
ď¨ https://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?article=4284&context=califor
nialawreview
Title- Robotics and the Lessons of Cyberlaw
Publication year- 2015
Author-Ryan calo
Writer-Ryan calo
Journal- California Law Review
Add a footer 9
Resource
https://www.ijntr.org/downhttps://www.ijntr.org/download_data/IJNTR03050003.pdfload_d
ata/IJNTR03050003.pdf
Title-Cyber Crime Problem Areas, Legal Areas and the Cyber Crime Law
Publication year-2017
Author-Dr mir mohammad azad
Writer-syeda shajia sharmin, Advocate Kazi Nafiul Mazid
Journal-International Journal of New Technology and Research
10. Add a footer 10
Cyber forensics
Computer forensics (also known as computer forensic science) is a branch of
digital forensic science pertaining to evidence found in computers and digital
storage media. The goal of computer forensics is to examine digital media in a
forensically sound manner with the aim of identifying, preserving, recovering,
analyzing and presenting facts and opinions about the digital information.
Although it is most often associated with the investigation of a wide variety of
computer crime, computer forensics may also be used in civil proceedings. The
discipline involves similar techniques and principles to data recovery, but with
additional guidelines and practices designed to create a legal audit trail.
Evidence from computer forensics investigations is usually subjected to the same
guidelines and practices of other digital evidence. It has been used in a number of
high-profile cases and is becoming widely accepted as reliable within U.S. and
European court systems
11. FR
11
Computer forensics investigations details carrying out a
structured investigation while documenting a chain of
evidence to discover exactly what happened on a computer
and who was responsible for it. The main priority of
computer forensics is accuracy. Forensic practitioners must
follow strict guidelines and maintain the highest standards
of work ethics to achieve accuracy because emphasis must
be on evidential integrity and security. A Computer Forensic
investigation must follow a rigid set of methods to ensure
that computer evidence is correctly obtained. These steps are
outlined below:
12. 1. Protect - Protect subject computer system from alteration, data
corruption, virus infection, and physical damage.
2. Discover -Uncover all files: normal, hidden, deleted, encrypted, and
password- protected.
3. Recover -Recover as many of the deleted files as possible.
4. Reveal - Reveal the contents of hidden and temporary files.
5. Access - Access the protected and encrypted files, if legal.
6. Analyze - Analyze all relevant data, including data located in
unallocated file space and file slack.
7. Report -Print out a listing of all relevant files, and provide an
overall opinion on the system examination.
8. Testimony -Provide expert testimony or consultation, if required.
13. Techniques in Computer Forensics Investigation
A number of techniques are used during computer forensics investigations and much has been written on the
many techniques used by law enforcement in particular.See, e.g., "Defending Child Pornography Cases".
Cross-drive analysis: This is the forensic technique that correlates information found on multiple hard drives. The
process, still being researched, can be used to identify social networks and to perform anomaly detection (Garfinkel,
2006).
Live analysis: The examination of computers from within the operating system using custom forensics or existing
sys-admin tools to extract evidence. The practice is useful when dealing with Encrypting File Systems, for example,
where the encryption keys may be collected and, in some instances, the logical hard drive volume may be imaged
(known as a live acquisition) before the computer is shut down.
Deleted files: A common technique used in computer forensics is the recovery of deleted files. Modern forensic
software have their own tools for recovering or carving out deleted data, Aaron et al, (2009). Most operating systems
and file systems do not always erase physical file data, allowing investigators to reconstruct it from the physical
disk sectors. File carving involves searching for known file headers within the disk image and reconstructing
deleted materials.
Stochastic forensics: This method uses stochastic properties of the computer system to investigate activities
lacking digital artifacts. Its chief use is to investigate data theft. One of the techniques used to hide data is via
steganography: One of the techniques used to hide data is via the process of hiding data inside of a picture or
digital image. An example would be to hide pornographic images of children or other information that a given
criminal does not want to have discovered. Computer forensics professionals can fight this by looking at the hash of
the file and comparing it to the original image (if available.) While the image appears exactly the same, the hash
14. 1. The lack of real data sources
2. The young and ever changing nature of the field
3. The dependency on tools
4. The lack of published error rates for the various widely used digital forensics
tools
5. The lack of basic research in this domain (cite our paper)
6. The lack of agreed upon standards and processes
7. The limitation of the hardware standards being used during the acquisition of
data
8. The volatility of the evidence â such as RAM
9. The continuous change in technology
10. The use of anti forensics techniques and tools
11. The lack of a common body of knowledge
15. https://www.aaai.org/ocs/index.php/SSS/SSS15/paper/viewFile/10227/10
092
Title-Data Sources for Advancing Cyber Forensics: What the Social
World Has to Offer
Publication year- 2015
Author-Ibrahim Baggili
Writer- Frank Breitinger
Journal-UNH Cyber Forensics Research & Education Group / Lab
https://www.ajol.info/index.php/stech/article/viewFile/154713/144
296
Title-Computer Forensics Investigation; Implications for
Improved Cyber Security in Nigeria
Publication year- 2017
Author-Chigozie-Okwum, Chioma C, Michael, Daniel O.
Writer-Ugboaja, Samuel G.
Journal-african journals online
16. Role of
cyber
forensic
s
Computer forensics is the process of
using the latest knowledge of science
and technology with computer
sciences to collect, analyze and present
proofs to the criminal or civil courts.
.Forensics is the process which deals in
finding evidence and recovering the
data.
17. BIOMETRI
CS
Biometrics is the technical term for body measurements and calculations. It
refers to metrics related to human characteristics. Biometrics authentication (or
realistic authentication)is used in computer science as a form of identification
and access control.It is also used to identify individuals in groups that are under
surveillance.
Biometric identifiers are the distinctive, measurable characteristics used to label
and describe individuals.Biometric identifiers are often categorized as
physiological versus behavioral characteristics.Physiological characteristics are
related to the shape of the body. Examples include, but are not limited to
fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris
recognition, retina and odour/scent. Behavioral characteristics are related to the
pattern of behavior of a person, including but not limited to typing rhythm,
gait, and voice.Some researchers have coined the term behaviometrics to
describe the latter class of biometrics.
More traditional means of access control include token-based identification
systems, such as a driver's license or passport, and knowledge-based
identification systems, such as a password or personal identification number.
Since biometric identifiers are unique to individuals, they are more reliable in
verifying identity than token and knowledge-based methods; however, the
collection of biometric identifiers raises privacy concerns about the ultimate use
of this information.
19. FR
Face recognition technology is a combination of various other technologies and
their features and characteristics makes face recognition a better performer
depending upon the application.
Iris recognition is a high reliable biometric security system that acquires increased
attention. The human iris is an annular region between the black pupil and the
white sclera. The texture of iris is unique to each subject. The iris is first localized
with two circles in the image. Then the iris part is unwrapped to a rectangular
region where the iris texture is analyzed. In general the whole procedure of feature
Extraction of iris recognition system includes two steps. Initial, an arrangement of
one-dimensional (1-D) force signs is built keeping in mind the end goal to
adequately portray the most imperative data in the first two-dimensional (2-D)
picture. Second, utilizing a specific class of dyadic wavelets, a position
arrangement of neigh bourhood sharp variety focuses in such flags is recorded
A fingerprint scanner typically works by first recording fingerprint scans of all
authorized individuals for a particular system or facility. These scans are saved
within a database. The user requiring access puts their finger on a hardware
scanner, which scans and copies the input from the individual and looks for any
similarity within the already-stored scans. If there is a positive match, the
individual is granted access. Fingerprint scanners most commonly use an
individual's thumbprint as identification.
20. FR
Add a footer 20
How face recognition works
Genetic algorithm is used in detecting and extracting the
facial features from the video stream by eigen
technique.The feature based Genetic algorithm is chosen
as it deals with geometrical elements of the human face
also in oreder to perform math calculus in change
detection mechanism.
21. FR
Add a footer 21
The process of iris recognition consisting of
the following
â˘Feature Encoding by 2D Wavelet
Demodulation
â˘Recognizing iris
â˘Finding an Iris in an Image
22. FR
Add a footer 22
method of identifying the identity of an individual based on the
comparison of two fingerprints .It consists of three parts: a) fingerprint
enrollment b) fingerprint verification c) Fingerprint identification.
Fingerprint Enrollment: The fingerprint is captured by putting it on the
fingerprint deviceâs sensor. It is very important phase because the
captured image quality depends on way it is put on the sensor.
How fingerprint recognition work
23. FR
Add a footer 23
Fingerprint Verification: Verification is typically used for
fingerprint positive recognition, used to prevent the use of the
same identity by multiple people. There is one-to-one mapping
between template and individualâs fingerprint.
Fingerprint Identification: A match is found between each
individual and templates of all the users in the database. The
system recognizes an individual by conducting a one to many
comparison with an individualâs identity.
The analysis of fingerprints to find a match requires the
comparison of several fingerprint feature pattern which
includes patterns like minutiae points, ridge orientation
24. FR
Add a footer 24
http://14.139.205.163:8080/jspui/bitstream/123456789/144/1/2016PGCAIS06.pdf
Title-ENHANCED RSA KEY GENERATION MODELING USING FINGERPRINT
BIOMETRIC
Publication year- 2016
Author-neha bansal
Writer-neha bansal
Journal- DEPARTMENT OF COMPUTER APPLICATIONS
NATIONAL INSTITUTE OF TECHNOLOGY
https://www.bedicon.org/wp-content/uploads/2018/01/laws_topic4_source1.pdf
Title-comparing FINGERPRINT BIOMETRIC authentication
Publication year- 2017
Author-obi ogbanufe
Writer-dan j kim
Journal-Decision Support Systems
https://pdfs.semanticscholar.org/dc97/ceb1faf945e780a92be651b022a82e3bff5a.pdf
Title-50 years of biometric research: Accomplishments, challenges, and opportunities
Publication year- 2016
Author-AnilK.Jain , Karthik Nandakumar
Writer-Arun Ross
Journal-pattern recognition letters