AN APPROCH FOR MANAGEMENT OF DIGITAL CRIME SCENE
Main Article Content
Abstract
For every law enforcement agency investigator, cyber forensic professional’s and investigators facing a challenge of Digital Crime Scene. In day-to-day life, the accused person or victim person may use high technology to ease their respective jobs. So, both persons can have the different intentions for using the technology. Accused person may be aware about technology used but the victim person might be unaware about the technology used such as digital payment options called digital wallet, different mobile application looking a very attractive or the application used for remote connection. Digital wallet is one of simplest example of cash transactions and the purpose may be commit a crime either intentionally or unintentionally. This kind of crimes are executed with secure locations with different digital medias such as hard drives, pen drives, hidden cameras, server’s, skimmers etc. So, to investigate this kind of crime such as data leaks from server, laptop, computers, corporate digital medias the investigator or concerned authority should raid the location along with Digital Forensic Expert, search and seizure warrant or permission letters. So, the objective of this paper is to explain the requirements and summarize the guidance for law enforcement agencies or corporate entity about management of digital crime scene- procedures, roles for investigator and cyber forensic expert, documentation required on digital crime scene. This article is very useful to the students looking career in Digital forensics, law enforcement agencies and corporate digital forensic service provider
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY-NC-ND 4.0 DEED).
You are free to:
- Share — copy and redistribute the material in any medium or format
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- NonCommercial — You may not use the material for commercial purposes .
- NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
Rights of Authors
Authors retain the following rights:
1. Copyright and other proprietary rights relating to the article, such as patent rights,
2. the right to use the substance of the article in future works, including lectures and books,
3. the right to reproduce the article for own purposes, provided the copies are not offered for sale,
4. the right to self-archive the article.