Digital evidence admissibility & appreciation
Duration: 3 Days
Day 1
Day 2
Day 3
Day 1
- Introduction to Cyber Crime
- Cyber Space
- Jurisdiction
- Modus Operandi of Cyber Crime
- Types of Cyber Crime
- Advances and Bottlenecks
- Cyber Profiling
- Global Cyber crimes
- E-mail Frauds
- Spoofed E-mails
- Disposable E-mails
- Proxy Based E-mails
- Admissibility & Appreciation of E-mails
- Chain of Custody
- Seizure of Device
- Documenting
- Evidence collection
- Sealing and packaging
Day 2
- O/S Forensics
- Memory Viewer
- Verifying & Creating HASH Value
- Disk Imaging
- Collection of Disk Information, Settings & Evidence
- Mobile Forensics
- Extracting data
- Data recovery
- Analysis and mining
- Documentation
- Admissibility of Electronic Evidence
- Provisions of acceptance of Electronic Evidence
- Threshold requirement of Electronic Evidence
- Section 65B Certificate
Day 3
- Appreciation of Electronic Evidence
- Implications
- Recommendations
- Conclusion
- Interpretation of Forensic Report
- Documentation
- Cyber Law
- Preamble of IT ACT 2000
- Amendments in IT ACT 2000
- Penalties & Adjudications
- Caselets