Cyber Crime and Cyber Terrorism


  the evidence should be admissible and excepted in the court of law 2



Download 5,67 Mb.
Pdf ko'rish
bet98/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   94   95   96   97   98   99   100   101   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

1. 
the evidence should be admissible and excepted in the court of law
2. 
the evidence needs to be authentic and not contaminated
3. 
the evidence needs to the whole piece, not just indicative parts
4. 
the evidence has to be reliable, dependable
5. 
the evidence needs to be believable
Digital evidence, as compared to hard evidence, are difficult to find, in terms of de-
fining the nature of the data, and classifying it as a digital evidence that is worthy to 
be presented in court.
Proving evidence which is reliable has been proven to be a difficult task, not just 
because the nature of evidence, but also the wide scope and environment in which the 
evidence are extracted from.
In a corporate environment, the forensic investigator team will need to iden-
tify, contain and maintain the integrity of the evidence, and differentiate whether 


93
 
Digital forensics laboratory preparation and training
the piece of evidence is relevant or not to the current crime being investigated, and 
whether it would stand a chance in finding the culprit and charging them through 
legal proceedings.
Among the considerations that needs to be evaluated by the investigator when 
dealing with collecting digital evidence are the expenses, cost and lost incurred and 
the availability of the service during and after the incident.
The lack of expertise by law enforcement to understand the intricacies of e-crime, 
the wide demographics it covered and most of all jurisdiction issues was an excel-
lent opportunity for those in the private sector, by presenting a niche and a need in 
the market for private individuals to offer the service of computer forensics. A lot of 
private companies emerged offering initially data recovery services and eventually 
computer forensic services.
At the same time a variety of computer tools came onto the market such as, 
Encase, FTK, Helix, Paraben Cell Seizure, MOBILedit, BitPim, etc. The tools both 
software and hardware automated the processing of computer evidence and did not 
require an in-depth thought process or knowledge of computer science in order to 
operate them. This made life easy for those who had to process computer evidence 
but also gave a false sense of security and the belief that if one could use these tools 
adequately it validated their claim of being an expert.
These tools and services have become heavily relied upon by law enforcement and 
with the lack of proper evaluating processes in place for tools and services, individuals 
and companies without the appropriate qualifications, understanding or enough experi-
ence are unfortunately being relied upon as experts in the field of computer forensics.

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   94   95   96   97   98   99   100   101   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish