
Library Catalogue

| 000 -LEADER | |
|---|---|
| fixed length control field | 03101nam a2200193Ia 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20240516162139.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 180710s2014 xx 000 0 und d |
| 040 ## - CATALOGING SOURCE | |
| Transcribing agency | nls |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Deepak Kaushik |
| 245 ## - TITLE STATEMENT | |
| Title | Techno-Legal Tussle over Electronic Evidence & the Need for a Change: |
| Remainder of title | A Road Towards Generation, Preservation & Admissibility |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Bangalore |
| Name of publisher, distributor, etc. | NLSIU |
| Date of publication, distribution, etc. | 2014 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 93p |
| 505 ## - FORMATTED CONTENTS NOTE | |
| Formatted contents note | TABLE OF CONTENTS<br/>INTRODUCTION ;<br/>1 LEGAL INTERPRETATIONAL ISSUES ;<br/>1.1 TYPES OF EVIDENCE ;<br/>1.2 DOCUMENT ; <br/>1.3 WRITING ;<br/>1.4 PRIMARY OR SECONDARY EVIDENCE ;<br/>1.5 ADMISSIBILITY ;<br/>2 APPLICABILITY OF OLD EVIDENTIARY RULES ;<br/>2.1 RULE AGAINST HEARSAY EVIDENCE ;<br/>2.1.1 The United States ;<br/>2.1.2 The United Kingdom ;<br/>2.1.3 India ;<br/>2.2 BEST EVIDENCE RULE/SECONDARY EVIDENCE RULE ;<br/>3 PROOF, AUTHENTICITY AND AUTHORSHIP ;<br/>3.1 PROOF ;<br/>3.1.1 Proof of Electronic Signature ;<br/>3.1.2 Proof of Electronic Mail ;<br/>3.1.3 Proof of Computer Processes ;<br/>3.2 AUTHENTICITY ;<br/>3.3 AUTHORSHIP ;<br/>4 SOME STANDARDS OF COLLECTION PROCESS UNDER E-EVIDENCES ;<br/>4.1 PRESENCE OF COMPUTER/IT EXPERT(S) IN THE INVESTIGATIVE TEAM: <br/>4.2 TASK ASSIGNMENT: <br/>4.3 PLANNING THE SEARCH AND SEIZURE OPERATION: <br/>4.4 SECURING THE PLACE OF SEARCH AND ELEMENT OF SURPRISE: <br/>4.5 DOCUMENTING THE PLACE OF SEARCH: <br/>4.6 ENQUIRIES FROM THE OCCUPANTS: <br/>4.7 SEIZING THE COMPUTER SYSTEM ITSELF MAY NOT BE PRACTICAL IN MANY CASES: <br/>4.8 REMOVAL OF THE HARD-DISK: <br/>4.9 APPLY THE 'WRITE BLOCKING' SOFTWARE: <br/>4.10 NEED FOR FORENSIC SOFTWARE ON SUSPECT MEDIA: <br/>4.11 PREVENTIVE MEASURES: <br/>4.12 PACKAGING AND TRANSPORTATION OF ELECTRONIC EVIDENCE: <br/>4.13 STORING ELECTRONIC EVIDENCE: <br/>4.14 CHAIN OF CUSTODY: <br/>4.15 PRESERVING THE ORIGINAL: <br/>4.16 "DELETION" MYTHS AND DIGITAL FORENSIC: <br/>5 CYBER FORENSICS RECOVERY AND PRESERVATION PROCESS;<br/>5.1 UNDERSTAND THE SUSPECTS; <br/>5.2 ELECTRONIC EVIDENCE CONSIDERATIONS ;<br/>5.3 SECURE THE MACHINE AND THE DATA;<br/>5.3.1 Examine the machine's surroundings ;<br/>5.3.2 Examine the Live System and record open applications ;<br/>5.3.3 Power down carefully ;<br/>5.3.4 Fully document hardware configuration ;<br/>5.3.5 Duplicate the electronic media (evidence) ;<br/>5.4 E-MAIL REVIEW ;<br/>5.5 E-MAIL HEADERS;<br/>5.6 SORTING THROUGH THE MASSES;<br/>5.7 COMPUTER FORENSIC EXAMPLES;<br/>6 CYBER FORENSIC INITIATIVES AND SOME FORENSIC TOOLS ;<br/>6.1 STRATEGIC APPROACH BY DEITY ;<br/>6.2 HI-TECH CYBER CRIME INVESTIGATION CENTER AT CHI ACADEMY IN COLLABORATION WITH ERNET : <br/>6.3 C-DAC ;<br/>6.3.1 True Back -Disk Imaging Tool ;<br/>6.3.2 Cyber Check-Data Recovery and Analysis Tool.;<br/>6.3.3 Email Tracer-S/W tool for tracing sender of an email ;<br/>6.3.4 Cyber Investigator ;<br/>6.3.5 NeSA (Network Session Analyzer) ;<br/>6.3.6 PDA Imager & Analyzer;<br/>6.3.7 SIM Card Imager & Analyzer ;<br/>6.3.8 Truelmager;<br/>6.3.9 TrueLock;<br/>7 CONCLUSION AND THE NEED FOR A CHANGE ;<br/>8 BIBLIOGRAPHY.<br/> |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Collection of Proff Under E-Evidences |
| -- | Cyber Forensics |
| -- | Electronic Evidence |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Prof. (Dr.) Nagarathana A - Guide |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | <a href="http://opac.nls.ac.in:8081/xmlui/handle/123456789/1682">http://opac.nls.ac.in:8081/xmlui/handle/123456789/1682</a> |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Dissertation |
| Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| . | . | 12.07.2018 | LLM516 | 12.07.2018 | 12.07.2018 | Dissertation |