SQL Database Design For Developers at php[tek] 2024
Cyber Forensic - Policing the Digital Domain
1. March 7, 2009 Cyber Forensic Dr. Partha Pratim Das Interra Systems (India) Pvt. Ltd. Policing the Digital Domain Soft Computing Techniques and their Applications Ramkrishna Mission Vidyamandir, Belur
The Processes include: Specification Development Process : After a tool category and at least one tool is selected by the steering committee NIST and law enforcement staff develops a requirements, assertions and test cases document (called the tool category specification). The tool category specification is posted to the web for peer review by members of the computer forensics community and for public comment by other interested parties. Relevant comments and feedback are then incorporated into the specification. Finally a test environment is designed for the tool category. Tool Test Process : After a category specification has been developed and a tool selected, NIST goes ahead with the test process. It acquires the tool to be tested, reviews the tool documentation, selects relevant test cases depending on features supported by the tool, develops the test strategy, executes tests and finally produces test report. Steering Committee and Vendor, then reviews the test report. At the end, NIST posts support software & test report to web.
CATEGORIES OF CYBER LAWS • Laws Relating to Digital Contracts • Laws Relating to Digital Property • Laws Relating to Digital Rights • Law of Cyber Crimes
CATEGORIES OF CYBER LAWS • Laws Relating to Digital Contracts • Laws Relating to Digital Property • Laws Relating to Digital Rights • Law of Cyber Crimes
Cyber Action Teams (CATs) : These are small, highly-trained teams of FBI agents, analysts, and computer forensics and malicious code experts who travel the world on a moment’s notice to respond to fast-moving cyber threats. Computer Crimes Task Force : An FBI agent takes a call from an Internet scam victim. Down the hall in a computer lab, a police detective poses undercover as a teenage girl in an online chat room. Steps away, a forensic examiner is breaking passwords and decrypting files on a suspected hacker’s computer. Internet Crime Complaint Center (IC3) [13]: The FBI and the National White Collar Crime Center have set up a clearinghouse for triaging cyber crime complaints called the Internet Crime Complaint Center, or IC3. Based in West Virginia, it works closely with a range of law enforcement agencies and private sector organizations.