This document discusses cyber law, cyber forensics, and biometrics. It provides definitions and explanations of these topics. Specifically, it defines cyber law as the law governing information technology and aspects related to computing and the internet. It notes cyber law addresses issues like intellectual property, privacy, and jurisdiction in an online context. The document also defines cyber forensics as the process of using forensic science techniques to recover digital evidence from computers and digital devices in a way that preserves evidentiary integrity. It explains some common techniques used in cyber forensics investigations. Finally, the document defines biometrics as body measurements and calculations used for identification and access control. It provides examples of physiological and behavioral biometric identifiers like fingerprints, iris scans, and
Digital forensics research: The next 10 yearsMehedi Hasan
Today’s Golden Age of computer forensics is quickly coming to an end. Without a clear strategy for enabling research efforts that build upon one another, forensic research will fall behind the market, tools will become increasingly obsolete, and law enforcement, military and other users of computer forensics products will be unable to rely on the results of forensic analysis. This article summarizes current forensic research directions and argues that to move forward the community needs to adopt standardized, modular approaches for data representation and forensic processing.
@2010 Digital Forensic Research Workshop. Published by Elsevier Ltd. All rights reserved
Computer forensics is a very important branch of computer science in relation to computer and Internet related crimes. Earlier, computers were only used to produce data but now it has expanded to all devices related to digital data. The goal of Computer forensics is to perform crime investigations by using evidence from digital data to find who was the responsible for that particular crime.
For better research and investigation, developers have created many computer forensics tools. Police departments and investigation agencies select the tools based on various factors including budget and available experts on the team.
Digital forensics research: The next 10 yearsMehedi Hasan
Today’s Golden Age of computer forensics is quickly coming to an end. Without a clear strategy for enabling research efforts that build upon one another, forensic research will fall behind the market, tools will become increasingly obsolete, and law enforcement, military and other users of computer forensics products will be unable to rely on the results of forensic analysis. This article summarizes current forensic research directions and argues that to move forward the community needs to adopt standardized, modular approaches for data representation and forensic processing.
@2010 Digital Forensic Research Workshop. Published by Elsevier Ltd. All rights reserved
Computer forensics is a very important branch of computer science in relation to computer and Internet related crimes. Earlier, computers were only used to produce data but now it has expanded to all devices related to digital data. The goal of Computer forensics is to perform crime investigations by using evidence from digital data to find who was the responsible for that particular crime.
For better research and investigation, developers have created many computer forensics tools. Police departments and investigation agencies select the tools based on various factors including budget and available experts on the team.
Forensic science is a scientific method of gathering and examining information about the past which is then used in the court of law. Digital Forensics is the use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation, and presentation of digital evidence derived from digital devices for the purpose of facilitation or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations.
The presentation is all about computer forensics. the process , the tools and its features and some example scenarios.. It will give you a great insight into the computer forensics
La sociedad cívica tiene algunas expectativas básicas: Gente e instituciones, incluyendo gobiernos, deben comportarse según las leyes y la ética de la sociedad. Sin embargo, hoy en día la tecnología presta capacidades inesperadas y no bien conocidas. Estas tecnologías pueden chocar con la ética y las leyes de la sociedad. En particular, en sociedades modernas hay la expectativa de la privacidad de individuos y organizaciones.
En esta charla examinamos varias tecnologías que en muchos casos contradicen nuestras expectativas en cuanto a la privacidad. Veamos bases de datos estadísticos donde consultas deberían guardar la privacidad de los datos de individuos y varias tecnologías que permiten el monitoreo de la ubicación o el comportamiento de una persona o de las comunicaciones de la misma. También examinamos problemas relacionados con el uso de criptografía y el uso de marcas de agua, entro varios. En muchos casos, la tecnología compromete la privacidad, en algunos casos, presta más privacidad que es deseable.
An introduction to cyber forensics and open source tools in cyber forensicsZyxware Technologies
A presentation targeted at professionals looking to get into cyber forensics leveraging the vast array of open source / free tools available in the cyber forensics space. Built as an introductory presentation for officers in Kerala Police
This slide will cover details of evidence collection in cyber forensic which will be more useful for CSE & IT department students studying in engineering colleges.
Download DOC word file from below Links:
Link 1 :http://gestyy.com/eiT4WO
Link 2: http://fumacrom.com/RQUm
Disclaimer: Above doc file is only for education purpose only
Process of Digital forensics
Identification
Preservation
Analysis
4. Presentation and Reporting:
5. Disseminating the case:
What is acquisition in digital forensics?
How to handle data acquisition in digital forensics
Types of Digital Forensics
Disk Forensics
Network Forensics
Wireless Forensics
Database Forensics
Forensic science is a scientific method of gathering and examining information about the past which is then used in the court of law. Digital Forensics is the use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation, and presentation of digital evidence derived from digital devices for the purpose of facilitation or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations.
The presentation is all about computer forensics. the process , the tools and its features and some example scenarios.. It will give you a great insight into the computer forensics
La sociedad cívica tiene algunas expectativas básicas: Gente e instituciones, incluyendo gobiernos, deben comportarse según las leyes y la ética de la sociedad. Sin embargo, hoy en día la tecnología presta capacidades inesperadas y no bien conocidas. Estas tecnologías pueden chocar con la ética y las leyes de la sociedad. En particular, en sociedades modernas hay la expectativa de la privacidad de individuos y organizaciones.
En esta charla examinamos varias tecnologías que en muchos casos contradicen nuestras expectativas en cuanto a la privacidad. Veamos bases de datos estadísticos donde consultas deberían guardar la privacidad de los datos de individuos y varias tecnologías que permiten el monitoreo de la ubicación o el comportamiento de una persona o de las comunicaciones de la misma. También examinamos problemas relacionados con el uso de criptografía y el uso de marcas de agua, entro varios. En muchos casos, la tecnología compromete la privacidad, en algunos casos, presta más privacidad que es deseable.
An introduction to cyber forensics and open source tools in cyber forensicsZyxware Technologies
A presentation targeted at professionals looking to get into cyber forensics leveraging the vast array of open source / free tools available in the cyber forensics space. Built as an introductory presentation for officers in Kerala Police
This slide will cover details of evidence collection in cyber forensic which will be more useful for CSE & IT department students studying in engineering colleges.
Download DOC word file from below Links:
Link 1 :http://gestyy.com/eiT4WO
Link 2: http://fumacrom.com/RQUm
Disclaimer: Above doc file is only for education purpose only
Process of Digital forensics
Identification
Preservation
Analysis
4. Presentation and Reporting:
5. Disseminating the case:
What is acquisition in digital forensics?
How to handle data acquisition in digital forensics
Types of Digital Forensics
Disk Forensics
Network Forensics
Wireless Forensics
Database Forensics
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
The presentation contains: Concept of Forensic, Need & Purpose of Forensic
Computer Forensic, Role of IT for Forensic, Data Collection / Mining Tools, Data Analysis & Reporting, Fraud Detection & Auditing
First i will be defining the term Forensics for Information technology and explain the process and steps. I will discuss the techniques and tools used and also the key issues faced by the industry. Finally I will explain how an audit can benefit an IT investigation.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
2. What does
cyber law
means?
Information technology law (also called
"cyber law") concerns the law of
information technology, including
computing and the internet. It is related to
legal informatics, and governs the digital
dissemination of both (digitalized)
information and software, information
security and electronic commerce. aspects
and it has been described as "paper laws"
for a "paperless environment". It raises
specific issues of intellectual property in
computing and online, contract law, privacy,
freedom of expression, and jurisdiction.
3. Importance of cyber law
• it touches almost all aspects of transactions and
activities on and concerning the Internet
• Companies shall now be able to carry out
electronic commerce using the legal infrastructure
provided by the Act.
• prevent or reduce large scale damage from
cybercriminal activities by protecting information
access, privacy, communications, intellectual
property (IP) and freedom of speech related to the
use of the Internet, websites, email, computers,
cell phones, software and hardware, such as data
storage devices.
Add a footer 3
4. FR
Cyber acts in India
•INDIAN PENAL CODE,1860.
• INDIAN EVIDENCE ACT,1872.
•BANKERS BOOK EVIDENCE ACT,1891.
•GENERAL CLAUSES ACT,1897
•IT ACT 2000
Add a footer 4
5. Basically cyber law is a list of sections and acts which is
basically used in cases of cyber crimes and cyber threats.
To make our digital life safe by defending us from cyber threats
Add a footer 5
Role of
cyber
law
6. FR
.
Add a footer 6
Resource
• https://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?article=4284&context=californialawrevi
ew
Title- Robotics and the Lessons of Cyberlaw
Publication year- 2015
Author-Ryan calo
Writer-Ryan calo
Journal- California Law Review
https://www.ijntr.org/downhttps://www.ijntr.org/download_data/IJNTR03050003.pdfload_d
ata/IJNTR03050003.pdf
Title-Cyber Crime Problem Areas, Legal Areas and the Cyber Crime Law
Publication year-2017
Author-Dr mir mohammad azad
Writer-syeda shajia sharmin, Advocate Kazi Nafiul Mazid
Journal-International Journal of New Technology and Research
7. Add a footer 7
Cyber forensics
Computer forensics (also known as computer forensic
science) is a branch of digital forensic science pertaining to
evidence found in computers and digital storage media. The
goal of computer forensics is to examine digital media in a
forensically sound manner with the aim of identifying,
preserving, recovering, analyzing and presenting facts and
opinions about the digital information.
Although it is most often associated with the investigation
of a wide variety of computer crime, computer forensics
may also be used in civil proceedings. The discipline
involves similar techniques and principles to data recovery,
but with additional guidelines and practices designed to
create a legal audit trail.
Evidence from computer forensics investigations is usually
subjected to the same guidelines and practices of other
digital evidence. It has been used in a number of high-
profile cases and is becoming widely accepted as reliable
within U.S. and European court systems
8. FR
8
Computer Forensics Investigation
Procedure
Pro-
tect
Computer forensics investigations entails carrying out a structured
investigation while documenting a chain of evidence to discover exactly what
happened on a computer and who was responsible for it. The main priority
of computer forensics is accuracy. Forensic practitioners must follow strict
guidelines and maintain the highest standards of work ethics to achieve
accuracy because emphasis must be on evidential integrity and security. A
Computer Forensic investigation must follow a rigid set of methods to ensure
that computer evidence is correctly obtained. These steps are outlined
below:
Disco
-ver
Protect subject computer system from alteration, data
corruption, virus infection, and physical damage
Uncover all files: normal, hidden, deleted, encrypted, and
password- protected.
9. Rev
eal
Acc
ess
Rec
over
t
Recover as many of the deleted files as possible.
Reveal the contents of hidden and temporary files.
Access the protected and encrypted files, if legal.
Anal
yze
Analyze all relevant data, including data located in unallocated
file space and file slack
10. Rep
ort
Print out a listing of all relevant files, and provide an overall
opinion on the system examination.
techn
ology Provide expert testimony or consultation, if required.
11. Techniques in Computer Forensics Investigation
A number of techniques are used during computer forensics investigations, these include;
Cross-drive analysis: This is the forensic technique that correlates information found on multiple hard drives. The process, still being researched, can
be used to identify social networks and to perform anomaly detection (Garfinkel, 2006).
Live analysis: The examination of computers from within the operating system using custom forensics or existing sys-admin tools to extract evidence.
The practice is useful when dealing with Encrypting File Systems, for example, where the encryption keys may be collected and, in some instances, the
logical hard drive volume may be imaged (known as a live acquisition) before the computer is shut down.
Deleted files: A common technique used in computer forensics is the recovery of deleted files. Modern forensic software have their own tools for
recovering or carving out deleted data, Aaron et al, (2009). Most operating systems and file systems do not always erase physical file data, allowing
investigators to reconstruct it from the physical disk sectors. File carving involves searching for known file headers within the disk image and
reconstructing deleted materials.
Stochastic forensics: This method uses stochastic properties of the computer system to investigate activities lacking digital artifacts. Its chief use is to
investigate data theft. One of the techniques used to hide data is via
steganography: One of the techniques used to hide data is via the process of hiding data inside of a picture or digital image. An example would be to
hide pornographic images of children or other information that a given criminal does not want to have discovered. Computer forensics professionals
can fight this by looking at the hash of the file and comparing it to the original image (if available.) While the image appears exactly the same, the hash
changes as the data changes (Dunbar, 2001).
12. Major challenges in CF
1. The lack of real data sources
2. The young and ever changing nature of the field
3. The dependency on tools
4. The lack of published error rates for the various widely used digital forensics tools
5. The lack of basic research in this domain (cite our paper)
6. The lack of agreed upon standards and processes
7. The limitation of the hardware standards being used during the acquisition of data
8. The volatility of the evidence – such as RAM
9. The continuous change in technology
10. The use of anti forensics techniques and tools
11. The lack of a common body of knowledge
13. https://www.aaai.org/ocs/index.php/SSS/SSS15/paper/viewFile/10227/10092
Title-Data Sources for Advancing Cyber Forensics: What the Social World Has to Offer
Publication year- 2015
Author-Ibrahim Baggili
Writer- Frank Breitinger
Journal-UNH Cyber Forensics Research & Education Group / Lab
https://www.ajol.info/index.php/stech/article/viewFile/154713/144296
Title-Computer Forensics Investigation; Implications for Improved Cyber Security in Nigeria
Publication year- 2017
Author-Chigozie-Okwum, Chioma C, Michael, Daniel O.
Writer-Ugboaja, Samuel G.
Journal-african journals online
14. Computer forensics is the process of using the
latest knowledge of science and technology with
computer sciences to collect, analyze and
present proofs to the criminal or civil courts.
.Forensics is the process which deals in finding
evidence and recovering the data.
Role of
cyber
forensics
15. BIOMETRICS
Biometrics is the technical term for body measurements and calculations. It
refers to metrics related to human characteristics. Biometrics authentication
(or realistic authentication)is used in computer science as a form of
identification and access control.It is also used to identify individuals in
groups that are under surveillance.
Biometric identifiers are the distinctive, measurable characteristics used to
label and describe individuals.Biometric identifiers are often categorized as
physiological versus behavioral characteristics.Physiological characteristics are
related to the shape of the body. Examples include, but are not limited to
fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris
recognition, retina and odour/scent. Behavioral characteristics are related to
the pattern of behavior of a person, including but not limited to typing
rhythm, gait, and voice.Some researchers have coined the term
behaviometrics to describe the latter class of biometrics.
More traditional means of access control include token-based identification
systems, such as a driver's license or passport, and knowledge-based
identification systems, such as a password or personal identification number.
Since biometric identifiers are unique to individuals, they are more reliable in
verifying identity than token and knowledge-based methods; however, the
collection of biometric identifiers raises privacy concerns about the ultimate
use of this information.
17. FRFace recogn ition tech n ology is a comb in ation of variou s
other technologies and their features and characteristics
makes face recogn ition a b etter p erformer d ep en d in g
u p on th e ap p lication .
Iris recognition is a high reliable biometric security system that acquires increased
attention. The human iris is an annular region between the black pupil and the white
sclera. The texture of iris is unique to each subject. The iris is first localized with two
circles in the image. Then the iris part is unwrapped to a rectangular region where the
iris texture is analyzed. In general the whole procedure of feature Extraction of iris
recognition system includes two steps. Initial, an arrangement of one-dimensional (1-
D) force signs is built keeping in mind the end goal to adequately portray the most
imperative data in the first two-dimensional (2-D) picture. Second, utilizing a specific
class of dyadic wavelets, a position arrangement of neigh bourhood sharp variety
focuses in such flags is recorded
A fingerprint scanner typically works by first recording fingerprint scans of all
authorized individuals for a particular system or facility. These scans are saved within a
database. The user requiring access puts their finger on a hardware scanner, which
scans and copies the input from the individual and looks for any similarity within the
already-stored scans. If there is a positive match, the individual is granted access.
Fingerprint scanners most commonly use an individual's thumbprint as identification.
18. FR
Add a footer 18
How face recognition works
Genetic algorithm is used in detecting and extracting the
facial features from the video stream by eigen technique.The
feature based Genetic algorithm is chosen as it deals with
geometrical elements of the human face also in oreder to
perform math calculus in change detection mechanism.
19. FR
Add a footer 19
The process of iris recognition consisting
of the following
Finding an Iris in an Image
Iris Feature Encoding by 2D Wavelet Demodulation
Recognising iris
20. FR
Add a footer 20
How fingerprint recognition work
method of identifying the identity of an individual based on the
comparison of two fingerprints .It consists of three parts: a) fingerprint
enrollment b) fingerprint verification c) Fingerprint identification.
Fingerprint Enrollment: The fingerprint is captured by putting it on the
fingerprint device’s sensor. It is very important phase because the
captured image quality depends on way it is put on the sensor.
21. FR
Add a footer 21
Fingerprint Verification: Verification is typically used
for fingerprint positive recognition, used to prevent
the use of the same identity by multiple people.
There is one-to-one mapping between template
and individual’s fingerprint.
Fingerprint Identification: A match is found
between each individual and templates of all the
users in the database. The system recognizes an
individual by conducting a one to many comparison
with an individual’s identity.
The analysis of fingerprints to find a match requires
the comparison of several fingerprint feature
pattern which includes patterns like minutiae
points, ridge orientation
22. FR
Add a footer 22
http://14.139.205.163:8080/jspui/bitstream/123456789/144/1/2016PGCAIS06.pdf
Title-ENHANCED RSA KEY GENERATION MODELING USING FINGERPRINT BIOMETRIC
Publication year- 2016
Author-neha bansal
Writer-neha bansal
Journal- DEPARTMENT OF COMPUTER APPLICATIONS
NATIONAL INSTITUTE OF TECHNOLOGY
https://www.bedicon.org/wp-
content/uploads/2018/01/laws_topic4_source1.pdf
Title-comparing FINGERPRINT BIOMETRIC authentication
Publication year- 2017
Author-obi ogbanufe
Writer-dan j kim
Journal-Decision Support Systems
and Electronic Commerce
https://pdfs.semanticscholar.org/dc97/ceb1faf945e780a92be651b022a82e3bff5a.pdf
Title-50 years of biometric research: Accomplishments, challenges, and opportunities
Publication year- 2016
Author-AnilK.Jain , Karthik Nandakumar
Writer-Arun Ross
Journal-pattern recognition letters