Role of Cyber Security and Cyber Forensics in India

Role of Cyber Security and Cyber Forensics in India

Gulshan Shrivastava (National Institute of Technology Patna, India), Kavita Sharma (National Institute of Technology Kurukshetra, India), Manju Khari (Advanced Institute of Advanced Communication Technologies and Research, India), and Syeda Erfana Zohora (Taif University, Saudi Arabia)
Copyright: © 2018 |Pages: 19
DOI: 10.4018/978-1-5225-4100-4.ch009
OnDemand PDF Download:
No Current Special Offers


This chapter describes cyber forensics, also known as computer forensics, which is a subdivision of digital forensic science, relating to evidence detection in computers and digital storage media. The purpose of cyber forensics is the forensically-sound investigation of digital media with the intent to: identify, preserve, recover, analyze, present facts, and opinions; concerning the digital information. Even though it is generally allied with the analysis of cyber-based crimes, computer forensics may also be used in civil proceedings. Evidence composed from cyber forensic analysis is typically subjected to similar procedures and performs as supplementary digital evidence. With these advancements, it was desired that cyber forensics be to protect users and remain citizen-centric. This chapter shows that there is additional research needed to understand the implications of cyber forensic research to improve detection of cyber crimes.
Chapter Preview


Cyber forensics, which is likewise known by the name of computer forensics, is a branch of digital measurable science, which identifies with confirming found in PCs and computerized stockpiling media. The goal of the cyber forensics is to look at computerized media painstakingly in a forensically solid way with the point of distinguishing, protecting, recuperating, investigating and showing realities and suppositions about the advanced data (Shrivastava, 2017).

In spite of the fact that it is for the most part connected with the examination of a wide assortment of cyber-based wrongdoings, PC legal sciences may likewise be utilized as a part of common procedures. The train includes comparable procedures and standards for data recuperation, yet with extra rules and practices intended to make a legal audit trail.

Proof gathered from digital crime scene investigation examinations are generally subjected to indistinguishable rules and practices from other computerized prove. It has been utilized as a part of various prominent cases and is picking up acknowledgment as very solid inside the U.S. what is more, European court frameworks (Guo et al., 2010).

Scientific strategies and master information are utilized for clarifying the present condition of a digital antiquity, for example, a PC framework, stockpiling medium (e.g. hard disk or CD-ROM), an electronic document (e.g. an email message or JPEG picture) (Gupta et al., 2011). The extent of a scientific investigation fluctuates from straightforward data recovery to recreating a progression of occasions. By and by, it is utilized to explore an assortment of wrongdoings, including child erotic entertainment, fraud, espionage, cyber-stalking, murder, and assault. This train is likewise utilized as a part of common procedures as a type of data gathering (for example, Electronic revelation) (Shrivastava & Gupta, 2014).

In a court, PC criminological confirmation is subjected to the standard necessities for digital prove. This requires the data must be real, dependably got, and admissible. Different nations have particular and diverse sorts of rules and practices for the recuperation of computerized prove. In the United Kingdom, analysts frequently follow Association of Chief Police Officers guidelines that assist them to guarantee the credibility and honesty of proof. While deliberate, the rules are broadly acknowledged in British courts.

National driven administrations like Railways are those sorts of administrations that have been outlined from the point of view of the administration client as opposed to of the legislature. These administrations are essentially planned to remember the advantages of the residents of the nation (i.e. Railroads), which legitimizes the name “national driven” Such administrations are made accessible by the different government associations of the nation and are government financed too. These administrations, for example, Railways, aeronautics administrations, saving money administrations and so forth are made accessible at a reasonable and less expensive rate to general society of the nation with the goal that all classes of individuals can utilize the administrations as per their requirements and conditions.

Both central and state governments have contributed a ton to the Information and Communication Technology (ICT) to improve their working. In this way, a resident-driven way to deal with benefit conveyance is basic if the administration needs to receive the reward of its past interest in the e-administration field. It will likewise help the administrative divisions to streamline their future speculations to receive most extreme pick up in return. In native driven approach, the subjects are dealt with as clients, as on account of the item or administration based organization, while giving the administrations to the resident. A subject driven approach empowers the administration to keep a beware of the nature of administration and enhance it as and when required, which thusly increases the national fulfillment.

While the arrangement of these administrations is basic and need have great importance, developing risk scene is likewise a reality frequenting the internet exchanges. Late bargain of 21.5 million individuals in a monstrous information break at Office of Personnel Management - US, accepted to be one of the greatest ruptures of resident's PII (Personally Identifiable Data) information; additionally, raised the significance of digital security for planning the national administrations.

Complete Chapter List

Search this Book: