Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet105/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   101   102   103   104   105   106   107   108   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

99
 
Conclusions
gave evidence in more than 700 police cases, some of them involving rape and drink-
driving, Morrison, 48, of Hyde, Tameside, was found guilty of 22 counts of perjury at 
Minshull Street Crown Court in Manchester and given a 5-year jail sentence. His claims 
to be a forensic scientist were bogus, and the BSc and PhD qualifications he claimed 
were in fact bought from a university that existed only on the internet.
One thing is for sure having a form of accreditations will force government, aca-
demics, researches and those working in the field of computer forensics to set more 
appropriate standards and controls for those who handle, analyze and investigate 
computer evidence.
THE CFM METHODOLOGY
The CFM consists of four phases namely Identify, Acquire, Preserve and Report:
1. 
Identify:
Source of digital evidence.
2. 
Acquire:
Taking an image of the media as it was found.
3. 
Preserve:
Chain of custody as well as the integrity of the data itself making 
sure no information has been added or altered.
4. 
Report:
To report all findings and processes used.
The persons carrying out the above must adhere to standard evidence rules, i.e., 
Police and Criminal Evidence Act (PACE) 1984 in criminal matters, that are admis-
sible in a court of law. The Home Office current PACE codes came into effect on 27th 
of October 2013 (
The Police and Criminal Act, 1984
).
Stage 4 requires more detailed decomposition into the necessary methods for the 
analysis and classification of the data for use as evidence and as a historical record. 
In the field of computer forensics there is still a lot to be done, i.e., standardizing pro-
cedures, etc. The field in itself has various branches of digital forensics, for example, 
Internet Forensics, Network Forensics and Mobile phone Forensics to name but a 
few. Customized guidelines for these branches will enable the scientists to ensure the 
quality of both the process and the data collected.
It is also important to extend the CFM to include a fifth phase that of Review and 
Improve in the light of empirical data which can be classified, organized and mined 
for maximizing the effectiveness of the processes.
CONCLUSIONS
With all the above the most important thing people forget and this is by all, is that 
in this field the practical experience and the theoretical skills you acquire from aca-
demic institutes go hand-in-hand. You cannot call yourself an expert if you have all 
the experience in the world and lack the basic understanding of computer science.
There is concern within law enforcement, government and the private sector as to 
the lack of consensus to a standardize approach to training courses and lack of funds 
for research.



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   101   102   103   104   105   106   107   108   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish