Uploaded by Pirathibban K

digital forensics

advertisement
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/323676314
Role of Cyber Security and Cyber Forensics in India
Chapter · April 2018
DOI: 10.4018/978-1-5225-4100-4.ch009
CITATIONS
READS
12
5,272
4 authors:
Gulshan Shrivastava
Kavita Sharma
Galgotias University
Galgotias College of Engineering and Technology (GCET)
97 PUBLICATIONS 732 CITATIONS
69 PUBLICATIONS 514 CITATIONS
SEE PROFILE
SEE PROFILE
Manju Khari
Syeda Zohora
Jawaharlal Nehru University
Taif University
146 PUBLICATIONS 1,714 CITATIONS
9 PUBLICATIONS 88 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Patent View project
Research Paper View project
All content following this page was uploaded by Gulshan Shrivastava on 04 April 2018.
The user has requested enhancement of the downloaded file.
SEE PROFILE
143
Chapter 9
Role of Cyber Security and
Cyber Forensics in India
Gulshan Shrivastava
National Institute of Technology Patna, India
Kavita Sharma
National Institute of Technology, Kurukshetra, India
Manju Khari
Advanced Institute of Advanced Communication Technologies and Research, India
Syeda Erfana Zohora
Taif University, Saudi Arabia
ABSTRACT
This chapter describes cyber forensics, also known as computer forensics, which is a subdivision of
digital forensic science, relating to evidence detection in computers and digital storage media. The
purpose of cyber forensics is the forensically-sound investigation of digital media with the intent to:
identify, preserve, recover, analyze, present facts, and opinions; concerning the digital information.
Even though it is generally allied with the analysis of cyber-based crimes, computer forensics may also
be used in civil proceedings. Evidence composed from cyber forensic analysis is typically subjected to
similar procedures and performs as supplementary digital evidence. With these advancements, it was
desired that cyber forensics be to protect users and remain citizen-centric. This chapter shows that there
is additional research needed to understand the implications of cyber forensic research to improve detection of cyber crimes.
INTRODUCTION
Cyber forensics, which is likewise known by the name of computer forensics, is a branch of digital measurable science, which identifies with confirming found in PCs and computerized stockpiling media.
The goal of the cyber forensics is to look at computerized media painstakingly in a forensically solid
way with the point of distinguishing, protecting, recuperating, investigating and showing realities and
suppositions about the advanced data (Shrivastava, 2017).
DOI: 10.4018/978-1-5225-4100-4.ch009
Copyright © 2018, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.

Role of Cyber Security and Cyber Forensics in India
In spite of the fact that it is for the most part connected with the examination of a wide assortment of
cyber-based wrongdoings, PC legal sciences may likewise be utilized as a part of common procedures.
The train includes comparable procedures and standards for data recuperation, yet with extra rules and
practices intended to make a legal audit trail.
Proof gathered from digital crime scene investigation examinations are generally subjected to indistinguishable rules and practices from other computerized prove. It has been utilized as a part of various
prominent cases and is picking up acknowledgment as very solid inside the U.S. what is more, European
court frameworks (Guo et al., 2010).
Scientific strategies and master information are utilized for clarifying the present condition of a digital
antiquity, for example, a PC framework, stockpiling medium (e.g. hard disk or CD-ROM), an electronic
document (e.g. an email message or JPEG picture) (Gupta et al., 2011). The extent of a scientific investigation fluctuates from straightforward data recovery to recreating a progression of occasions. By and
by, it is utilized to explore an assortment of wrongdoings, including child erotic entertainment, fraud,
espionage, cyber-stalking, murder, and assault. This train is likewise utilized as a part of common procedures as a type of data gathering (for example, Electronic revelation) (Shrivastava & Gupta, 2014).
In a court, PC criminological confirmation is subjected to the standard necessities for digital prove.
This requires the data must be real, dependably got, and admissible. Different nations have particular and
diverse sorts of rules and practices for the recuperation of computerized prove. In the United Kingdom,
analysts frequently follow Association of Chief Police Officers guidelines that assist them to guarantee the
credibility and honesty of proof. While deliberate, the rules are broadly acknowledged in British courts.
National driven administrations like Railways are those sorts of administrations that have been outlined
from the point of view of the administration client as opposed to of the legislature. These administrations
are essentially planned to remember the advantages of the residents of the nation (i.e. Railroads), which
legitimizes the name “national driven” Such administrations are made accessible by the different government associations of the nation and are government financed too. These administrations, for example,
Railways, aeronautics administrations, saving money administrations and so forth are made accessible
at a reasonable and less expensive rate to general society of the nation with the goal that all classes of
individuals can utilize the administrations as per their requirements and conditions.
Both central and state governments have contributed a ton to the Information and Communication
Technology (ICT) to improve their working. In this way, a resident-driven way to deal with benefit conveyance is basic if the administration needs to receive the reward of its past interest in the e-administration
field. It will likewise help the administrative divisions to streamline their future speculations to receive
most extreme pick up in return. In native driven approach, the subjects are dealt with as clients, as on
account of the item or administration based organization, while giving the administrations to the resident.
A subject driven approach empowers the administration to keep a beware of the nature of administration
and enhance it as and when required, which thusly increases the national fulfillment.
While the arrangement of these administrations is basic and need have great importance, developing
risk scene is likewise a reality frequenting the internet exchanges. Late bargain of 21.5 million individuals in a monstrous information break at Office of Personnel Management - US, accepted to be one of
the greatest ruptures of resident’s PII (Personally Identifiable Data) information; additionally, raised the
significance of digital security for planning the national administrations.
Citizens living in digital era expect increased transparency about the government decisions, services,
and data. In addition, these expectations are rising. To instill confidence in services, build trust, provide
144
17 more pages are available in the full version of this document, which may
be purchased using the "Add to Cart" button on the product's webpage:
www.igi-global.com/chapter/role-of-cyber-security-and-cyber-forensics-inindia/201610?camid=4v1
This title is available in Advances in Information Security, Privacy, and Ethics,
InfoSci-Books, InfoSci-Computer Science and Information Technology,
Science, Engineering, and Information Technology, InfoSci-Security and
Forensics, InfoSci-Security and Forensic Collection. Recommend this product
to your librarian:
www.igi-global.com/e-resources/library-recommendation/?id=96
Related Content
The VESP Model: A Conceptual Model of Supply Chain Vulnerability
Arij Lahmar, Habib Chabchoub, François Galasso and Jacques Lamothe (2018). International Journal of
Risk and Contingency Management (pp. 42-66).
www.igi-global.com/article/the-vesp-model/201074?camid=4v1a
Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO
27001/IT-Grundschutz and KORA
Daniela Simi-Draws, Stephan Neumann, Anna Kahlert, Philipp Richter, Rüdiger Grimm, Melanie Volkamer
and Alexander Roßnagel (2013). International Journal of Information Security and Privacy (pp. 16-35).
www.igi-global.com/article/holistic-and-law-compatible-it-security-evaluation/95140?camid=4v1a
Similarity Measure for Obfuscated Malware Analysis
P. Vinod, P. R. Rakesh and G. Alphy (2014). Information Security in Diverse Computing Environments (pp.
180-205).
www.igi-global.com/chapter/similarity-measure-for-obfuscated-malwareanalysis/114377?camid=4v1a
Data Confidentiality on the Semantic Web: Is There an Inference Problem?
Csilla Farkas (2006). Web and Information Security (pp. 73-90).
www.igi-global.com/chapter/data-confidentiality-semantic-web/31083?camid=4v1a
View publication stats
Download