You are on page 1of 5

Chapter 5

IT Act and Cyber law (10marks)

5.1 Introduction to Deleted File Recovery Formatted Partition Recovery, Data Recovery Tools, Data
Recovery Procedures and Ethics.
5.2 Introduction to Cyber Crimes – Hacking, Cracking, Viruses, Virus Attacks, Pornography, Software
Piracy, Intellectual property, Legal System of Information Technology, Mail Bombs,
Bug Exploits, Cyber Crime Investigation
5.3 Introduction Cyber Laws- Introduction to IT act 2000 and IT act 2008, Introduction to the cyber laws.
HOW File Recovery Possible ?

FILE ALLOCATION TABLE

FAT Structure
CYBER CRIME / COMPUTER CRIME
• HACKING
• CRACKING
• SOFTWARE PIRACY
• MAIL BOMBS
• BUG EXPLOIT
• INTELLECTUAL PROPERTY
• CYBER CRIME INVESTGATION
• LEGAL SYSTEM OF INFORMATION TECHNOLOGY
• HACKING :
theft of information by an illegal way.
• CRACKING :
Bypassing passwords OR program licenses
• VIRUS :
Damaging soft assets on computer OR network
• SOFTWARE PIRACY :
Illegal use OR sell of commercial software's.
• MAIL BOMBS :
Overflow of mails to stop mail server OR individual user
• BUG EXPLOIT :
Running a code to gain control of system by using a BUG.
• INTELLECTUAL PROPERTY : (copy right act)
Business name
Invention/ Research Papers
Suite of software
• CYBER CRIME INVESTGATION
• LEGAL SYSTEM OF INFORMATION TECHNOLOGY
Data Recovery Procedures and Ethics
Standard ethical procedures that need to be followed are
1. Incident Identification
2. Preparation of Investigation:
• decide tools for recovery.
• decide monitoring technics
• decide authorization of team.
3. Decide a Well defined approach:
• In order to minimize the impact on victim computer system.
4. Collection of evidence
• Incorporated with dates, time and place.
• Eliminate the evidence that cannot be produced in the court.
5. Presentation of evidence in court in a ethical manner.
6. Return evidence to victim.

You might also like