Cf Repeted
Cf Repeted
• Types: Live Acquisition (data from powered-on systems) and Dead Acquisition
(from powered-off systems).
• Chain of Custody: Document who handled the evidence, when, and why.
• Court Role: Assist the court in understanding technical details relevant to the
case.
3. Explain Digital and Electronic Signatures under IT Act
• Legal Status: Both are legally recognized under the IT Act 2000.
• Private Key: Used in Digital Signatures to encrypt data and ensure its integrity.
• Digital Signature ensures non-repudiation (the sender cannot deny sending the
data).
• Deposition is sworn testimony given outside of court, used for legal purposes.
• Guidelines:
• The Chain of Custody tracks the handling of evidence to ensure its integrity.
• Begins with the collection of evidence and ends when it's presented in court.
• Ensures that the evidence presented in court is the same as originally collected.
• Web server logs capture data about requests made to a web server.
• Ensure legal compliance when obtaining social media evidence (subpoena may
be required).
• Social media companies often maintain logs, IP addresses, and other data.
• Forensic Tools: Use tools like FTK Imager or EnCase to create image files.
• Verify the Evidence: Check that the storage device is not tampered with.
• Create an Exact Copy: The forensic image should be a bit-for-bit copy of the
original data.
• Hashing: Use MD5 or SHA1 to generate hashes before and after the acquisition.
• Integrity Check: Verify the image is identical to the original using hashing.