SlideShare uma empresa Scribd logo
1 de 18
Baixar para ler offline
Module LIX - Ethics in Computer
Forensics
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Objective
• Computer Forensics Ethics
• Procedure to Implement Ethics
• Challenges in Teaching Computer Forensics Ethics
• Ethics in Preparation of Forensic Equipments
• Ethics of Computer Forensic Investigator
• Ethics in Obtaining the Evidence
• Ethics in Documenting Evidence
• Ethics in Bringing Evidence to Courtroom
This module will familiarize you with:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
Computer Forensics Ethics
Ethics in preparation of
Forensic Equipments
Challenges in Teaching
Computer Forensics Ethics
Ethics in Bringing Evidence
to Courtroom
Ethics in Documenting
Evidence
Ethics in Obtaining the
Evidence
Ethics of Computer Forensic
Investigator
Procedure to Implement Ethics
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Computer Forensic Ethics
Ethics refers to the behavior of a person in relation to a
subject
It tells about the norms that distinguishes between the
acceptable and unacceptable behavior
Organizations implement policies to provide guidelines for
ethics
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Importance of Computer Ethics
Computer ethics help computer professionals how to behave in a
forensic domain
It will teach how to avoid computer abuse, computer failure,
corruption of the evidence
The advance of computing technology will continue to create
temporary policy vacuums
The use of computing permanently transforms certain ethical
issues to the degree that their alterations require independent
study
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Ethical Predicaments
Discovery of the confidential data which is non-related to the case
Acknowledgement of errors may create problems to overcome
Removing bias from investigation
Time-consuming nature of the computer investigations
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
The Ethical Requirements
During Investigation
• Investigator should carry required tasks that he/she has
accepted for the assignment
Thoroughness:
• Examinations and tests within the investigation should be
related to the issues
Relevance:
• The work of the criminalist should be reviewed
Reviewability:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Ethics in Preparation of Forensic
Equipments
Equipment must be monitored and documented to ensure that a minimum
performance level is always maintained
Only suitable and fully functional equipments shall be employed
The manufacturer’s operation manual and other relevant documentation for
each piece of equipment should be accessible
Ethics
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Ethics of Computer Forensic
Investigator
• Refuse any evidence because that may cause failure in
the case
• Expose confidential matters without having any
authorized permission
• Work against the law
• Exceed assignments beyond his/her skills
• Present the training, credentials, or association
membership in a wrong way
• Provide personal or prejudice opinions
• Cross authorization limits in conducting examinations
Computer forensic investigator
should not:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Maintaining Professional Conduct
Professional conduct determines the credibility of a forensic
investigator
Always dress professionally – wear a tie and a coat
Investigators must display the highest level of ethics and moral
integrity, as well as confidentiality
Discuss the case at hand only with the person who has the right to
know
Keep the case investigation information confidential
Learn about the latest crime investigation techniques for better
investigation
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Ethics in Logical Security
• Privacy and confidentiality
• Integrity - Ensuring that data and programs are not
modified without proper authority
• Consistency - Ensuring that the data and behavior of
the computing systems do not change with the time
• Controlling access to resources
Ethics involved in logical security of
computer:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Ethics in Obtaining the
Evidence
No outsiders should be allowed in the incident area except the
authorized investigators
Hire a skilled person for searching evidence who can examine the
scene in an efficient and proactive manner
Use the latest technology and devices for capturing the evidence
The evidence captured should be safely placed:
• Physical evidence should be placed in a secured covers
• Digital evidence should be stored in a digital media
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Ethics while Preserving the
Evidence
Have a secured work station to preserve the evidence
Avoid the access for outsiders to the evidence protected area
Avoid complexity when dealing with evidence that result in evidence loss or
evidence identity loss
Take proper care while labeling the evidence, which is used to identify them
individually
Do not test on the original evidence; it will result in tampering of the
evidence
Computer forensics professional should maintain the secrecy and privacy of
the customer
Maintain integrity, accuracy ,and authenticity of the evidence
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Ethics in Documenting Evidence
Evidence should be documented properly to make it acceptable in the court
of the law
Do not misdirect the evidence from the original one
Document the evidence in the manner of their occurrence
Document all the evidence exactly in the manner of the evidence acquired
and the case proceedings
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Ethics in Bringing Evidence to
Courtroom
The original evidence and documents should be submitted to the court
Do not give the evidence to other parties to avoid tampering the
evidence in the last stage
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Summary
Ethics form a major part in the society and the computer world
It tells about the norms that distinguishes between the acceptable and unacceptable
behavior
Computer ethics help computer professionals on how to behave in a forensic domain
Equipment must be monitored and documented to ensure proper performance is
maintained
Hire a skilled person for searching evidence who can examine the scene in an efficient and
proactive manner
Evidence should be documented efficiently to make it acceptable in the court room
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Mais conteúdo relacionado

Mais procurados (20)

File000167
File000167File000167
File000167
 
File000113
File000113File000113
File000113
 
File000114
File000114File000114
File000114
 
File000117
File000117File000117
File000117
 
File000115
File000115File000115
File000115
 
File000120
File000120File000120
File000120
 
File000170
File000170File000170
File000170
 
File000171
File000171File000171
File000171
 
File000119
File000119File000119
File000119
 
File000158
File000158File000158
File000158
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
Chap 1 general introduction to computer forensics
Chap 1  general introduction to computer forensicsChap 1  general introduction to computer forensics
Chap 1 general introduction to computer forensics
 
CS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IVCS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IV
 
CS6004 Cyber Forensics - UNIT V
CS6004 Cyber Forensics - UNIT VCS6004 Cyber Forensics - UNIT V
CS6004 Cyber Forensics - UNIT V
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
 
File000173
File000173File000173
File000173
 
File000154
File000154File000154
File000154
 

Destaque (20)

File000139
File000139File000139
File000139
 
File000145
File000145File000145
File000145
 
File000150
File000150File000150
File000150
 
File000135
File000135File000135
File000135
 
File000148
File000148File000148
File000148
 
File000169
File000169File000169
File000169
 
File000142
File000142File000142
File000142
 
File000136
File000136File000136
File000136
 
File000165
File000165File000165
File000165
 
File000157
File000157File000157
File000157
 
File000161
File000161File000161
File000161
 
File000122
File000122File000122
File000122
 
File000174
File000174File000174
File000174
 
File000141
File000141File000141
File000141
 
[Gerard blokdijk, claire_engle,_jackie_brewster]_i(book_see.org) (1)
[Gerard blokdijk, claire_engle,_jackie_brewster]_i(book_see.org) (1)[Gerard blokdijk, claire_engle,_jackie_brewster]_i(book_see.org) (1)
[Gerard blokdijk, claire_engle,_jackie_brewster]_i(book_see.org) (1)
 
File000155
File000155File000155
File000155
 
File000175
File000175File000175
File000175
 
File000149
File000149File000149
File000149
 
File000128
File000128File000128
File000128
 
Investigating server logs
Investigating server logsInvestigating server logs
Investigating server logs
 

Semelhante a File000172

Computer Forensics (1).pptx
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptxGautam708801
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 
Ceh v5 module 17 physical security
Ceh v5 module 17 physical securityCeh v5 module 17 physical security
Ceh v5 module 17 physical securityVi Tính Hoàng Nam
 
Accreditation of clinical trials
Accreditation of clinical trialsAccreditation of clinical trials
Accreditation of clinical trialsmanisha verma
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidenceOnline
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensicsRahul Baghla
 
Importance of Due Diligence Before In-Licensing Technology
Importance of Due Diligence Before In-Licensing TechnologyImportance of Due Diligence Before In-Licensing Technology
Importance of Due Diligence Before In-Licensing TechnologyOrigiin IP Solutions LLP
 
Professional societies
Professional societiesProfessional societies
Professional societiesSulman Ahmed
 
Lecture Eleven-Cyber Crime Related Evidence (1).pptx
Lecture Eleven-Cyber Crime Related Evidence (1).pptxLecture Eleven-Cyber Crime Related Evidence (1).pptx
Lecture Eleven-Cyber Crime Related Evidence (1).pptxSanjayDahal8
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic SoftwaresDhruv Seth
 
Electronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic ExaminersElectronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic ExaminersBoyarMiller
 
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docxBerkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docxAASTHA76
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public InvestigationsCTIN
 

Semelhante a File000172 (20)

Computer Forensics (1).pptx
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptx
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Ceh v5 module 17 physical security
Ceh v5 module 17 physical securityCeh v5 module 17 physical security
Ceh v5 module 17 physical security
 
Accreditation of clinical trials
Accreditation of clinical trialsAccreditation of clinical trials
Accreditation of clinical trials
 
Lect 3 Computer Forensics
Lect 3 Computer ForensicsLect 3 Computer Forensics
Lect 3 Computer Forensics
 
Lect 4 computer forensics
Lect 4 computer forensicsLect 4 computer forensics
Lect 4 computer forensics
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Lect 2 computer forensics
Lect 2 computer forensicsLect 2 computer forensics
Lect 2 computer forensics
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Importance of Due Diligence Before In-Licensing Technology
Importance of Due Diligence Before In-Licensing TechnologyImportance of Due Diligence Before In-Licensing Technology
Importance of Due Diligence Before In-Licensing Technology
 
Professional societies
Professional societiesProfessional societies
Professional societies
 
Daniel_CISSP_Dom7__1_.pdf
Daniel_CISSP_Dom7__1_.pdfDaniel_CISSP_Dom7__1_.pdf
Daniel_CISSP_Dom7__1_.pdf
 
Lecture Eleven-Cyber Crime Related Evidence (1).pptx
Lecture Eleven-Cyber Crime Related Evidence (1).pptxLecture Eleven-Cyber Crime Related Evidence (1).pptx
Lecture Eleven-Cyber Crime Related Evidence (1).pptx
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic Softwares
 
Cyber
CyberCyber
Cyber
 
Electronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic ExaminersElectronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic Examiners
 
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docxBerkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
 
CHFI.pdf
CHFI.pdfCHFI.pdf
CHFI.pdf
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public Investigations
 

Mais de Desmond Devendran (12)

Siam key-facts
Siam key-factsSiam key-facts
Siam key-facts
 
Siam foundation-process-guides
Siam foundation-process-guidesSiam foundation-process-guides
Siam foundation-process-guides
 
Siam foundation-body-of-knowledge
Siam foundation-body-of-knowledgeSiam foundation-body-of-knowledge
Siam foundation-body-of-knowledge
 
Enterprise service-management-essentials
Enterprise service-management-essentialsEnterprise service-management-essentials
Enterprise service-management-essentials
 
Service Integration and Management
Service Integration and Management Service Integration and Management
Service Integration and Management
 
Diagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_enDiagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_en
 
CHFI 1
CHFI 1CHFI 1
CHFI 1
 
File000162
File000162File000162
File000162
 
File000160
File000160File000160
File000160
 
File000159
File000159File000159
File000159
 
File000156
File000156File000156
File000156
 
File000153
File000153File000153
File000153
 

Último

AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...Daniel Zivkovic
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideHironori Washizaki
 

Último (20)

AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
 

File000172

  • 1. Module LIX - Ethics in Computer Forensics
  • 2. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Objective • Computer Forensics Ethics • Procedure to Implement Ethics • Challenges in Teaching Computer Forensics Ethics • Ethics in Preparation of Forensic Equipments • Ethics of Computer Forensic Investigator • Ethics in Obtaining the Evidence • Ethics in Documenting Evidence • Ethics in Bringing Evidence to Courtroom This module will familiarize you with:
  • 3. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Flow Computer Forensics Ethics Ethics in preparation of Forensic Equipments Challenges in Teaching Computer Forensics Ethics Ethics in Bringing Evidence to Courtroom Ethics in Documenting Evidence Ethics in Obtaining the Evidence Ethics of Computer Forensic Investigator Procedure to Implement Ethics
  • 4. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Computer Forensic Ethics Ethics refers to the behavior of a person in relation to a subject It tells about the norms that distinguishes between the acceptable and unacceptable behavior Organizations implement policies to provide guidelines for ethics
  • 5. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Importance of Computer Ethics Computer ethics help computer professionals how to behave in a forensic domain It will teach how to avoid computer abuse, computer failure, corruption of the evidence The advance of computing technology will continue to create temporary policy vacuums The use of computing permanently transforms certain ethical issues to the degree that their alterations require independent study
  • 6. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Ethical Predicaments Discovery of the confidential data which is non-related to the case Acknowledgement of errors may create problems to overcome Removing bias from investigation Time-consuming nature of the computer investigations
  • 7. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited The Ethical Requirements During Investigation • Investigator should carry required tasks that he/she has accepted for the assignment Thoroughness: • Examinations and tests within the investigation should be related to the issues Relevance: • The work of the criminalist should be reviewed Reviewability:
  • 8. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Ethics in Preparation of Forensic Equipments Equipment must be monitored and documented to ensure that a minimum performance level is always maintained Only suitable and fully functional equipments shall be employed The manufacturer’s operation manual and other relevant documentation for each piece of equipment should be accessible Ethics
  • 9. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Ethics of Computer Forensic Investigator • Refuse any evidence because that may cause failure in the case • Expose confidential matters without having any authorized permission • Work against the law • Exceed assignments beyond his/her skills • Present the training, credentials, or association membership in a wrong way • Provide personal or prejudice opinions • Cross authorization limits in conducting examinations Computer forensic investigator should not:
  • 10. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Maintaining Professional Conduct Professional conduct determines the credibility of a forensic investigator Always dress professionally – wear a tie and a coat Investigators must display the highest level of ethics and moral integrity, as well as confidentiality Discuss the case at hand only with the person who has the right to know Keep the case investigation information confidential Learn about the latest crime investigation techniques for better investigation
  • 11. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Ethics in Logical Security • Privacy and confidentiality • Integrity - Ensuring that data and programs are not modified without proper authority • Consistency - Ensuring that the data and behavior of the computing systems do not change with the time • Controlling access to resources Ethics involved in logical security of computer:
  • 12. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Ethics in Obtaining the Evidence No outsiders should be allowed in the incident area except the authorized investigators Hire a skilled person for searching evidence who can examine the scene in an efficient and proactive manner Use the latest technology and devices for capturing the evidence The evidence captured should be safely placed: • Physical evidence should be placed in a secured covers • Digital evidence should be stored in a digital media
  • 13. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Ethics while Preserving the Evidence Have a secured work station to preserve the evidence Avoid the access for outsiders to the evidence protected area Avoid complexity when dealing with evidence that result in evidence loss or evidence identity loss Take proper care while labeling the evidence, which is used to identify them individually Do not test on the original evidence; it will result in tampering of the evidence Computer forensics professional should maintain the secrecy and privacy of the customer Maintain integrity, accuracy ,and authenticity of the evidence
  • 14. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Ethics in Documenting Evidence Evidence should be documented properly to make it acceptable in the court of the law Do not misdirect the evidence from the original one Document the evidence in the manner of their occurrence Document all the evidence exactly in the manner of the evidence acquired and the case proceedings
  • 15. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Ethics in Bringing Evidence to Courtroom The original evidence and documents should be submitted to the court Do not give the evidence to other parties to avoid tampering the evidence in the last stage
  • 16. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Summary Ethics form a major part in the society and the computer world It tells about the norms that distinguishes between the acceptable and unacceptable behavior Computer ethics help computer professionals on how to behave in a forensic domain Equipment must be monitored and documented to ensure proper performance is maintained Hire a skilled person for searching evidence who can examine the scene in an efficient and proactive manner Evidence should be documented efficiently to make it acceptable in the court room
  • 17. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 18. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited