Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
76Activity
0 of .
Results for:
No results containing your search query
P. 1
Cyber Crime Investigation and Cyber forensic

Cyber Crime Investigation and Cyber forensic

Ratings:

5.0

(1)
|Views: 6,681|Likes:
Published by Cool hunk

More info:

Categories:Types, Research
Published by: Cool hunk on May 30, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/09/2013

pdf

text

original

 
Cyber Crime Investigation and Forensics
1
A PROJECT REPORTONCYBER CRIME INVESTIGATION AND FORENSICSContents:
CYBER CRIME INVESTATION ------------------------------------------------------------------
4--31
What Is Cyber Crime---------------------------------------------------------------------------
4--4
Examples Include---------------------------------------------------------------------------4
Definition------------------------------------------------------------------------------------4
Reasons For Cyber Crime---------------------------------------------------------------------
4--5
Capacity To Store Data In Comparatively Small Space-------------------------------5
Easy To Access------------------------------------------------------------------------------5
Complex--------------------------------------------------------------------------------------5
Negligence-----------------------------------------------------------------------------------5
Loss Of Evidence---------------------------------------------------------------------------5
Cyber Criminals---------------------------------------------------------------------------------
5--6
Children And Adolescents Between The Age Group Of 6 – 18 Years --------------6
Organized Hackers--------------------------------------------------------------------------6
Professional Hackers / Crackers ----------------------------------------------------------6
Discontented Employees-------------------------------------------------------------------6
Mode And Manner Of Committing Cyber Crime----------------------------------------
6--8
Unauthorized Access To Computer Systems Or Networks / Hacking---------------6
 
Cyber Crime Investigation and Forensics
2
Theft Of Information Contained In Electronic Form-----------------------------------7
Email Bombing------------------------------------------------------------------------------7
Data Diddling--------------------------------------------------------------------------------7
Salami Attacks-------------------------------------------------------------------------------7
Denial Of Service Attack-------------------------------------------------------------------7
Virus / Worm Attacks----------------------------------------------------------------------7
Logic Bombs---------------------------------------------------------------------------------8
Trojan Attacks-------------------------------------------------------------------------------8
Internet Time Thefts------------------------------------------------------------------------8
Web Jacking---------------------------------------------------------------------------------8
Understand The Fundamentals---------------------------------------------------------------
9--9
Classification Of Cyber Crime--------------------------------------------------------------
9--10
Computer As Target------------------------------------------------------------------------9
Computer As An Instrumentality---------------------------------------------------------9
Computer As An Incidental Or Other Crime-------------------------------------------10
Crime Associated With The Prevalence Of Computers------------------------------10
Why Learn About Cyber Crime----------------------------------------------------------
10--10
Types Of Cyber Crime----------------------------------------------------------------------
10--14
Email Related Crime------------------------------------------------------------------------
14--14
Case Studies-----------------------------------------------------------------------------------
15--20
Case No.1------------------------------------------------------------------------------15--16
Case No.2------------------------------------------------------------------------------17--18
Case No.3-----------------------------------------------------------------------------------19
Case No.4-----------------------------------------------------------------------------------20
Characteristics Of Computer Crime-----------------------------------------------------
21--21
Prevention Of Cyber Crime----------------------------------------------------------------
21--22
Questionnaire ---------------------------------------------------------------------------------
23--25
Relevance Of Evidence----------------------------------------------------------------------
26--26
Indian Evidence Act (Amended)
----------------------------------------------------------26--26
When Oral Admission As To Contents Of Electronic Records Are Relevant—
26--27
 
Cyber Crime Investigation and Forensics
3
Opinion As To Digital Signature Where Relevant-------------------------------------
27--27
Proof As To Digital Signature-------------------------------------------------------------
27--27
Proof As To Verification Of Digital Signature-----------------------------------------
27
--
27
Admissibility Of Electronic Records-----------------------------------------------------
27--28
Presumption As To Electronic Records And Digital Signatures-------------------
28--28
Presumption As To Electronic Messages------------------------------------------------
28--29
Presumption As To Electronic Records Five Years Old-----------------------------
29--29
Recent Amendments-------------------------------------------------------------------------
29--29
Important Amendments To IT Act-------------------------------------------------------
29--30
Cyber Terrorism Is Defined In Section 66F--------------------------------------------
30--31
Important Amendments To IPC----------------------------------------------------------
31--31
Important Amendments To CRPC-------------------------------------------------------
32--32
Our Analysis-----------------------------------------------------------------------------------
32--32
Conclusion-------------------------------------------------------------------------------------
32--32
Establishment of PUNE cyber cell--------------------------------------------------------
33--33
FORENSICS-------------------------------------------------------------------------------------------
34--39
What Is Cyber Forensics--------------------------------------------------------------------
34--34
Different Type’s Of Storage Media-------------------------------------------------------
35--35
Electronic Evidence Precautions----------------------------------------------------------
35--35
Computer Forensics-------------------------------------------------------------------------
36--36
Electronic Evidence Considerations------------------------------------------------------
36--36
Incident Response----------------------------------------------------------------------------
36--36
Collecting Volatile Data---------------------------------------------------------------------
37--37
Imaging Electronic Media (Evidence)----------------------------------------------------
37--37
Forensic Analysis-----------------------------------------------------------------------------
37--37
Reasons for Evidence------------------------------------------------------------------------
37--38
Evidence Processing Guidelines-----------------------------------------------------------
38--39
Conclusion-------------------------------------------------------------------------------------
39--39

Activity (76)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
ak_1234 liked this
Raj Bhadoriya liked this
Bad Police liked this
Babak Khoramdin liked this
ivneetsinghanand liked this
Krishna Patel liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->