

| Item type | Current library | Status | Barcode | |
|---|---|---|---|---|
|
|
. | Not for loan | LLM516 |
TABLE OF CONTENTS
INTRODUCTION ;
1 LEGAL INTERPRETATIONAL ISSUES ;
1.1 TYPES OF EVIDENCE ;
1.2 DOCUMENT ;
1.3 WRITING ;
1.4 PRIMARY OR SECONDARY EVIDENCE ;
1.5 ADMISSIBILITY ;
2 APPLICABILITY OF OLD EVIDENTIARY RULES ;
2.1 RULE AGAINST HEARSAY EVIDENCE ;
2.1.1 The United States ;
2.1.2 The United Kingdom ;
2.1.3 India ;
2.2 BEST EVIDENCE RULE/SECONDARY EVIDENCE RULE ;
3 PROOF, AUTHENTICITY AND AUTHORSHIP ;
3.1 PROOF ;
3.1.1 Proof of Electronic Signature ;
3.1.2 Proof of Electronic Mail ;
3.1.3 Proof of Computer Processes ;
3.2 AUTHENTICITY ;
3.3 AUTHORSHIP ;
4 SOME STANDARDS OF COLLECTION PROCESS UNDER E-EVIDENCES ;
4.1 PRESENCE OF COMPUTER/IT EXPERT(S) IN THE INVESTIGATIVE TEAM:
4.2 TASK ASSIGNMENT:
4.3 PLANNING THE SEARCH AND SEIZURE OPERATION:
4.4 SECURING THE PLACE OF SEARCH AND ELEMENT OF SURPRISE:
4.5 DOCUMENTING THE PLACE OF SEARCH:
4.6 ENQUIRIES FROM THE OCCUPANTS:
4.7 SEIZING THE COMPUTER SYSTEM ITSELF MAY NOT BE PRACTICAL IN MANY CASES:
4.8 REMOVAL OF THE HARD-DISK:
4.9 APPLY THE 'WRITE BLOCKING' SOFTWARE:
4.10 NEED FOR FORENSIC SOFTWARE ON SUSPECT MEDIA:
4.11 PREVENTIVE MEASURES:
4.12 PACKAGING AND TRANSPORTATION OF ELECTRONIC EVIDENCE:
4.13 STORING ELECTRONIC EVIDENCE:
4.14 CHAIN OF CUSTODY:
4.15 PRESERVING THE ORIGINAL:
4.16 "DELETION" MYTHS AND DIGITAL FORENSIC:
5 CYBER FORENSICS RECOVERY AND PRESERVATION PROCESS;
5.1 UNDERSTAND THE SUSPECTS;
5.2 ELECTRONIC EVIDENCE CONSIDERATIONS ;
5.3 SECURE THE MACHINE AND THE DATA;
5.3.1 Examine the machine's surroundings ;
5.3.2 Examine the Live System and record open applications ;
5.3.3 Power down carefully ;
5.3.4 Fully document hardware configuration ;
5.3.5 Duplicate the electronic media (evidence) ;
5.4 E-MAIL REVIEW ;
5.5 E-MAIL HEADERS;
5.6 SORTING THROUGH THE MASSES;
5.7 COMPUTER FORENSIC EXAMPLES;
6 CYBER FORENSIC INITIATIVES AND SOME FORENSIC TOOLS ;
6.1 STRATEGIC APPROACH BY DEITY ;
6.2 HI-TECH CYBER CRIME INVESTIGATION CENTER AT CHI ACADEMY IN COLLABORATION WITH ERNET :
6.3 C-DAC ;
6.3.1 True Back -Disk Imaging Tool ;
6.3.2 Cyber Check-Data Recovery and Analysis Tool.;
6.3.3 Email Tracer-S/W tool for tracing sender of an email ;
6.3.4 Cyber Investigator ;
6.3.5 NeSA (Network Session Analyzer) ;
6.3.6 PDA Imager & Analyzer;
6.3.7 SIM Card Imager & Analyzer ;
6.3.8 Truelmager;
6.3.9 TrueLock;
7 CONCLUSION AND THE NEED FOR A CHANGE ;
8 BIBLIOGRAPHY.
Collection of Proff Under E-Evidences Cyber Forensics Electronic Evidence