Page 41 - cyber law new
P. 41
17MCSC09 CYBER SECURITY AND CYBER LAW
A complete justice must be provided to the victims of cybercrimes by way
of compensatory remedy and offenders to be punished with highest type of
punishment so that it will anticipate the criminals of cybercrime.
Notes
1.30 Misuse of technology
Cyber-criminals should be aware that no matter where in the world you commit
cybercrime, even from remote places, you can and will be identified and held accountable
for your actions.
1.31 Computer Forensics Defined
Judd Robbins‘, an explanation of Computer Forensics, definition of computer forensics
is as follows: Computer forensics is simply the application of computer investigation and
analysis techniques in the interests of determining potential legal evidence. Evidence
might be sought in a wide range of computer crime or misuse, including but not limited
to theft of trade secrets, theft of or destruction of intellectual property, and fraud.
Jerry Wegman, an Associate Professor of Business Law, states, Computer forensics
has developed as an indispensable tool for law enforcement. But in the digital world,
as in the physical l world, the goals of law enforcement are balanced with the goals
of maintaining personal liberty and privacy. Computer forensic investigators must be
aware of the legal environment in which they work, or they risk having the evidence
they obtain being ruled inadmissible.
Ms. Erin Kenneally further defines computer forensics by stating, Since forensic
science is the application of a scientific discipline to the law, the essence of all forensic
disciplines concerns the principles applied to the detection, collection, preservation,
and analysis of evidence to ensure its admissibility in legal proceedings. Computer
forensics refers to the tools and techniques to recover, preserve, and examine data stored
or transmitted in binary form.
Computer forensics is the application of investigation and analysis techniques
to gather and preserve evidence from a particular computing device in a way that is
suitable for presentation in a court of law. The goal of computer forensics is to perform
a structured investigation while maintaining a documented chain of evidence to find out
exactly what happened on a computing device and who was responsible for it.
Forensic investigators typically follow a standard set of procedures: After physically
isolating the device in question to make sure it cannot be accidentally contaminated,
investigators make a digital copy of the device's storage media. Once the original media
has been copied, it is locked in a safe or other secure facility to maintain its pristine
condition. All investigation is done on the digital copy.
Self Learning Material 41