You are on page 1of 10

c

cc
 c
c
 c c
c c
c
c
c  c c
 
 c cc
c  c! " #c c$  %c
c
 #c&c'
c
 ()(*+,+c
 c
c

ICOM6027-E-crimes: digital crime scenes and legal sanctions

Prof: Dr. Michael Kwan

c c
ð  


 cc c
c cc c
 cc c   c cc c
  c  ccc
  c c c c cc    c   cc c c   c!"c
# ccc  $ccc
%   cc &c'c c c c!  c(c) * c#c
+  c,  c'$ccc
,c+ *c-  c c(   cc% c)  c!- c.c $cc/c
, c0c
(  cc1c
c( cc23c
c

c 

   
c

ð 
c

c c c ccc  cc&c

2c c)* cc   c   c


4c ,c)  c   cc c 5  cc
c -cc c  c  cc c cc c c
6c - c
 c  c  c c c c ccc c
c

 
 
    
c

c cc c   c ccc  c  c c  c!c$c


 c c 5 c
 c  c   c  c c c c c c
 cc  c c  ccc  c c   cc c c  cc c
cc c   c cc  7  c  ccc   c cc  c c

%c c cc  c  c cc,c c  c  c c
  c

c c c c  c
%c c,+c
c cc
 c  c    c c
 c   c c c 5  c c c  c,+c c
%c c    cc,+c
  cc
%cc c   cc

c c c c cc c  c cc* c c * c
 c  c* c c c c  c  c  c * c
   cc  c   c c c   c 8 cc  c*
 c,+c   cc c   c c c  c  c c*    c c *
 c cc

 c c c  cc  c cc,c+ c  ccc cc
 c  c  cc c c c cc
%c' c c   cc c c

%c  c cc   c c  cc   c c   c c c c
 cc c c c  c  c

c 
=  
c c

  

       

  
 
   ð  
c c
%cc c c cc9 .   !"# ccc  $c
 8 c c cc cc c c  c c  cccc
c   c c c c c# c c  c  *  8 c c
 c: ;c c c c c  c cc c c
   + c c c c c c9 . c  c c
c c  cc  c c   c# c c  cc
   c c cc c  cc 8 c c c c c
 ccc   c   cc
c c c   cc# c c  c  c  c c  c
   c  c9 . c  c c c   c c* c,+c  c
c
%c  c c c' *+ cc9 . c  c   c c c
c * c  c  c# c c   c 8 cc  c  c
 c c c cc
c

!   



"# 

   ð   
$  %
  & ' #( 
c
c 9 . c   c c,+c  ccc cc  c
  cc c c cc  c  cc c c cc   c  c
) c c+  c   c c c c,+c  c+ c c  c cc
  c c   c c c  c  c cc c  c
!) c.+  $c%   c,+c  cc cc c c c c
  c c c c c  c  c  cc c c   cc
 cc  c c  c7  c  cc c  c cc cc cc
  c,+c  c
c 'c c c  c) c c+  c ;c c  c,+c  c c
  c  c c ccc c
c  c c    c,+c  c
 <  c c   c,+c  c <  c c c c cc
%c

c
c cc  c
%cc,+c  c9 . c  c
%cc   c
  < cc,+c  c  c) c c+  ;c,+c c   c   cc
 cc( c  c c,+c c  cc cc c  c
  c  c  c  c c  c cc   c c  ccc  c
 c c  cc!2$c

' & 

%)   
! $ )
*


c

c 9 . c c  c c c cc c  cc *


 c,+c  c7  c  c c ccc c c cc  c c
 c c c  c9 . c c  c c c,+c  c cc
 c- c.c c c  c c cc c ccc   c  c
 c   c'c cc c  c cc c  c c c c c c
  cc c

- c.c c 5 c  c c   cc c   c cc
 c c=%;c&c  c c  c c   c  c c   c  c!4$c c
   c  c  c  c c c c  c+c   c c  cc
5 c cc c cc  cc   cc

c  c  cc c c   c  c c c cc c c c


  c cc c c c c c c cc  cc c c c
c  c c c c c cc c c c c c c c
cc c' c c ccc cccc  c c c   c c  c

c 
'



c

c -c 8 c  c  cc cc  c c c


   c c c    c,c c  cc c  c
c c
  cc c c   c c c c    c cc c c
 c
c ccc
c  c  c c c c c
c   c  ccc
cc cc

c
cc c c c 5 c
%cc c  ccc  c   c%  c c
c c cc>)-c  c c c7c' c(c c c c  c#4#c
  cc c c c ;c c  c c  c cc c  c
 c c c c cc c cc  c cc ;c cc  ccc c
ccc c c c c ccc  cc c  cc
 c   cc   c%  c c ;c  c c c  c cc  cc
 c 5 cc   c c   c  cc c c c
c
c  c  cc
  c,+c  c
cc  c c c  &cXMaximizing the ability of an
environment to collect credible digital evidencewhile minimizing the cost of an incident
response?c

c
c cc   cc,+c  c  c c c c
c cc  c,+c
  c c  cc cc 5 c
%c c,+c7  c,+c  ;c c c
   c cccc
;c  c cc+ c  c  cc cc
c cc
 c  cc   c
ccc cc  c c c c
  c c c' c c  c c c  cccc cc  cc cc cc
 c cc c   c  c

c  cc c   c c c c cc c c c  c


+c   cc c c c c@c cc,#cc c  c c ccc,#cc c
   cc c c  c c Ac cc  ccc
c c c cc  c c' c
 cc  ccc   ccc  c c
%c c  c

c %  c cc  c cc ccc  c  ccccc   c


 8 cc c 5c c c c c6 c&c c  c!,+c  < c c c
c c   c c $c+cc  cc c c c * c,+c  c  c c
 c8 cc c  c
c  ccc ccc  c c cc   cc%  c,+c
  < ccc cc c < c   cc c c <  c c c c
c c c  c  c cc

c ,+c  cc  c' * c!  c c $cc  cc c
%  c c
%c c c 8 c c * c c c c c c  *
9 c" % c  cc c  ccc  c c  c   c  c+c
   c c c cc  c c c c cc c9-'
c  c c c
5   c c%%c   c c  c c cc   cc  c  cc c
c  cc  c c c c cc c


c

c  cc cc c   cc  c c


 c  c   c
 c c  c  c c  cc,+c c  c c c   c c cc
  c c  cc  c
 c  c    c c < c,+c
  cc c  cc   c 8 c' c c c   cc c
   c c cc c cc c 5c &c7>c >c
-)-)B cc

c +c   c    c  c c c c c c,+c+ c c
   cc  c cc  cc  cc   c( c
 c  c c 8 c c cc ccc c cc,+c
  c   c'c c c  c c c c c
 c c' *+ cc c
 
  
2cð c c
 
c   c c  
c   c!pecifying digital forensics: A
forensics policy approach.   c'c11 4c=%c&c)  cc4330c

4c£ c£ c c c£ 


 Digital Forensics- Meeting the Challenges of !cientific Evidence.
c&c'  c cc c433/c

c 
 c  c c cðinning the battles, losing the war? Rethinking methodology for
forensic computing research. " c&c%  c433/c