The final and stable version of Backtrack 4 series is a wonderful penetration testing, cyber security and cyber forensics tool. It is not only a powerful utility but is also useful for multiple purposes. The best part is that it is available to the security and forensics community free of cost.Although Backtrack has always been a good tool but its team(s) must be congratulated for not only
Cyber Laws all over the World are intentionally designed to violate civil rights like privacy, speech and expression, etc. They are also intentionally formulated to facilitate “Internet Censorship” and “E-Surveillance” beyond the legitimate limits of “National Security”. This approach is more dangerous and is detrimental to the national security in the long run.The Google’s episode regarding
Cyber Forensics v. E-Discovery
Take an example of a security breach like hacking in an organisation.
The management of the organisation decides to trace the origin of this breach. After proper analysis they come to know about the source of that breach. Till this stage it is only an E-Discovery. The management can take whatever preventive or remedial measure as it may deem fit.
If the management decides to take a “Legal Action” against the offender, it has to prove the acquired digital evidence before the Court of Law. Mere E-Discovery may not be enough to prove the guilt of the accused as legal requirements regarding evidence and procedural laws must also be complied with. When the E-Discovery is “Law Compliant” it becomes “Cyber Forensics”.
Similarly, there are certain laws that require individuals and organisation to exercise “Cyber Law Due Diligence” and “Statutory Cyber Law Compliances”. These requirements may fall either in the category of E-Discovery or Cyber Forensics as per the facts and circumstances of each case.
Live v. Dead Forensics
Cyber Forensics may be live or dead. Traditionally, Cyber Forensics Investigations were performed after pulling the plug and then subsequently imaging the media under investigation. The contemporary practice is to perform live analysis to get useful volatile data that is lost the moment a computer is turned off or after the pulling of the plug.
Cyber Forensics Services Of Perry4Law
Policy And Law Making
Similarly, Perry4Law has also played a key role in suggesting useful provisions regarding Cyber Security in India and Cyber Forensics in India. It has also provided Guidelines and Policies for Protecting and Safeguarding the Critical ICT Infrastructure Protection in India. Besides, it has been providing ICT Trends of India for many years and is the only Firm that has provided ICT Strategies of India to the GOI.
We have been providing ICT trends in India since 2005-06. The ICT Trends in India 2009 and subsequent trends have discussed both the positive and negative aspects of Indian ICT Policies and Strategies.
Perry4Law and Perry4Law Techno Legal Base (PTLB) have also provided Cyber Crimes Trends in India 2012, Cyber Law Trends in India 2012, Cyber Security Trends in India 2012, etc. Previous years trends have also been provided by Perry4Law and PTLB to give various stakeholders a good look of Cyber Forensics And ICT Environment of India.
Legal Enablement Of ICT Systems In India
Law Enforcement and Intelligence Agencies
Perry4Law has provided its suggestion regarding Legal Enablement Of Law Enforcement And Intelligence Agencies In India. It has also provided its suggestions regarding Crime and Criminal Tracking Network and Systems (CCTNS) of India, National Intelligence Grid (Natgrid) Project of India, Central Monitoring System (CMS) Project of India, etc. Measures for effective and strong Wireless Security and prevention against Cyber Crimes and Cyber Terrorism have also been suggested by it.