See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/323676314 Role of Cyber Security and Cyber Forensics in India Chapter · April 2018 DOI: 10.4018/978-1-5225-4100-4.ch009 CITATIONS READS 12 5,272 4 authors: Gulshan Shrivastava Kavita Sharma Galgotias University Galgotias College of Engineering and Technology (GCET) 97 PUBLICATIONS 732 CITATIONS 69 PUBLICATIONS 514 CITATIONS SEE PROFILE SEE PROFILE Manju Khari Syeda Zohora Jawaharlal Nehru University Taif University 146 PUBLICATIONS 1,714 CITATIONS 9 PUBLICATIONS 88 CITATIONS SEE PROFILE Some of the authors of this publication are also working on these related projects: Patent View project Research Paper View project All content following this page was uploaded by Gulshan Shrivastava on 04 April 2018. The user has requested enhancement of the downloaded file. SEE PROFILE 143 Chapter 9 Role of Cyber Security and Cyber Forensics in India Gulshan Shrivastava National Institute of Technology Patna, India Kavita Sharma National Institute of Technology, Kurukshetra, India Manju Khari Advanced Institute of Advanced Communication Technologies and Research, India Syeda Erfana Zohora Taif University, Saudi Arabia ABSTRACT This chapter describes cyber forensics, also known as computer forensics, which is a subdivision of digital forensic science, relating to evidence detection in computers and digital storage media. The purpose of cyber forensics is the forensically-sound investigation of digital media with the intent to: identify, preserve, recover, analyze, present facts, and opinions; concerning the digital information. Even though it is generally allied with the analysis of cyber-based crimes, computer forensics may also be used in civil proceedings. Evidence composed from cyber forensic analysis is typically subjected to similar procedures and performs as supplementary digital evidence. With these advancements, it was desired that cyber forensics be to protect users and remain citizen-centric. This chapter shows that there is additional research needed to understand the implications of cyber forensic research to improve detection of cyber crimes. INTRODUCTION Cyber forensics, which is likewise known by the name of computer forensics, is a branch of digital measurable science, which identifies with confirming found in PCs and computerized stockpiling media. The goal of the cyber forensics is to look at computerized media painstakingly in a forensically solid way with the point of distinguishing, protecting, recuperating, investigating and showing realities and suppositions about the advanced data (Shrivastava, 2017). DOI: 10.4018/978-1-5225-4100-4.ch009 Copyright © 2018, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. Role of Cyber Security and Cyber Forensics in India In spite of the fact that it is for the most part connected with the examination of a wide assortment of cyber-based wrongdoings, PC legal sciences may likewise be utilized as a part of common procedures. The train includes comparable procedures and standards for data recuperation, yet with extra rules and practices intended to make a legal audit trail. Proof gathered from digital crime scene investigation examinations are generally subjected to indistinguishable rules and practices from other computerized prove. It has been utilized as a part of various prominent cases and is picking up acknowledgment as very solid inside the U.S. what is more, European court frameworks (Guo et al., 2010). Scientific strategies and master information are utilized for clarifying the present condition of a digital antiquity, for example, a PC framework, stockpiling medium (e.g. hard disk or CD-ROM), an electronic document (e.g. an email message or JPEG picture) (Gupta et al., 2011). The extent of a scientific investigation fluctuates from straightforward data recovery to recreating a progression of occasions. By and by, it is utilized to explore an assortment of wrongdoings, including child erotic entertainment, fraud, espionage, cyber-stalking, murder, and assault. This train is likewise utilized as a part of common procedures as a type of data gathering (for example, Electronic revelation) (Shrivastava & Gupta, 2014). In a court, PC criminological confirmation is subjected to the standard necessities for digital prove. This requires the data must be real, dependably got, and admissible. Different nations have particular and diverse sorts of rules and practices for the recuperation of computerized prove. In the United Kingdom, analysts frequently follow Association of Chief Police Officers guidelines that assist them to guarantee the credibility and honesty of proof. While deliberate, the rules are broadly acknowledged in British courts. National driven administrations like Railways are those sorts of administrations that have been outlined from the point of view of the administration client as opposed to of the legislature. These administrations are essentially planned to remember the advantages of the residents of the nation (i.e. Railroads), which legitimizes the name “national driven” Such administrations are made accessible by the different government associations of the nation and are government financed too. These administrations, for example, Railways, aeronautics administrations, saving money administrations and so forth are made accessible at a reasonable and less expensive rate to general society of the nation with the goal that all classes of individuals can utilize the administrations as per their requirements and conditions. Both central and state governments have contributed a ton to the Information and Communication Technology (ICT) to improve their working. In this way, a resident-driven way to deal with benefit conveyance is basic if the administration needs to receive the reward of its past interest in the e-administration field. It will likewise help the administrative divisions to streamline their future speculations to receive most extreme pick up in return. In native driven approach, the subjects are dealt with as clients, as on account of the item or administration based organization, while giving the administrations to the resident. A subject driven approach empowers the administration to keep a beware of the nature of administration and enhance it as and when required, which thusly increases the national fulfillment. While the arrangement of these administrations is basic and need have great importance, developing risk scene is likewise a reality frequenting the internet exchanges. Late bargain of 21.5 million individuals in a monstrous information break at Office of Personnel Management - US, accepted to be one of the greatest ruptures of resident’s PII (Personally Identifiable Data) information; additionally, raised the significance of digital security for planning the national administrations. Citizens living in digital era expect increased transparency about the government decisions, services, and data. In addition, these expectations are rising. To instill confidence in services, build trust, provide 144 17 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the product's webpage: www.igi-global.com/chapter/role-of-cyber-security-and-cyber-forensics-inindia/201610?camid=4v1 This title is available in Advances in Information Security, Privacy, and Ethics, InfoSci-Books, InfoSci-Computer Science and Information Technology, Science, Engineering, and Information Technology, InfoSci-Security and Forensics, InfoSci-Security and Forensic Collection. Recommend this product to your librarian: www.igi-global.com/e-resources/library-recommendation/?id=96 Related Content The VESP Model: A Conceptual Model of Supply Chain Vulnerability Arij Lahmar, Habib Chabchoub, François Galasso and Jacques Lamothe (2018). International Journal of Risk and Contingency Management (pp. 42-66). www.igi-global.com/article/the-vesp-model/201074?camid=4v1a Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA Daniela Simi-Draws, Stephan Neumann, Anna Kahlert, Philipp Richter, Rüdiger Grimm, Melanie Volkamer and Alexander Roßnagel (2013). International Journal of Information Security and Privacy (pp. 16-35). www.igi-global.com/article/holistic-and-law-compatible-it-security-evaluation/95140?camid=4v1a Similarity Measure for Obfuscated Malware Analysis P. Vinod, P. R. Rakesh and G. Alphy (2014). Information Security in Diverse Computing Environments (pp. 180-205). www.igi-global.com/chapter/similarity-measure-for-obfuscated-malwareanalysis/114377?camid=4v1a Data Confidentiality on the Semantic Web: Is There an Inference Problem? Csilla Farkas (2006). Web and Information Security (pp. 73-90). www.igi-global.com/chapter/data-confidentiality-semantic-web/31083?camid=4v1a View publication stats