Greetings, everyone! I’m back again with a new article. In this write-up, I will explain everything by making a formal report on the topic named (“Cyber Crime And Digital Investigation”) after gaining exceptional knowledge from the course name (“Technology and its Legal, Social and Ethical Context”) during the university period.
If you’re ready, let’s get started with our report writing.
The Commence:
Introduction:
With the start of the “introduction section,” in the report. In the introduction section, I shall introduce my first topic, “Cybercrime,” by providing a brief definition of Cybercrime and discussing the impact and some common examples.
Cybercrime:
Cybercrime is any criminal activity that involves a computer, network devices, or network. While most Cybercrime is done to make money for the perpetrators, some Cybercrime is done to harm computers or devices directly or networks to disseminate viruses or other items.
Cybercrime has a major financial impact and can comprise a wide range of profit-driven criminal activities, such as ransomware assaults, email and internet fraud, identity theft, and credit card fraud. Because of the epidemic, cybercrime is projected to increase in regularity in 2021 as more people settle into remote work patterns, making backup data protection even more crucial.
Some of the more commonly seen cybercrime attacks include distributed DoS (DDoS) attacks, often used to shut down systems and networks. By overwhelming a network’s ability to respond to connection requests, this attack turns the network’s own communications protocol against it. To access corporate networks, phishing techniques are deployed. This can be done by sending phishing emails to employees who then click on links that propagate infections throughout their computers and into the company’s networks.
Well first, I will introduce my second topic, “digital investigation,” by providing a brief definition of digital investigation as well as including the digital investigation process and some of the most common types.
Digital investigation:
A digital investigation is a process to answer questions about digital states and events. The basic digital investigation process frequently occurs by all computer users when they, for example, search for a file on their computer.
Formulating and testing hypotheses regarding the status of a computer is part of the digital investigation process. We must create hypotheses since we are unable to observe digital events and states firsthand and hence lack knowledge of facts. To examine the condition of digital data, we must employ tools, which render these observations indirect. Digital investigation entails the following steps i.e. Identification, Preservation, Analysis, Documentation, and Presentation.
The digital investigation, on the other hand, contains some of the most common sorts: Database forensics, Email forensics, Malware forensics, etcetera.
Body Section:
With the start of the “body section,” in the report. In the body section part of the first section of the question, I will present a short explanation of Technology and the impact of technology in our lives its positive and negative impacts. Well, I will also present a brief explanation of technology ethics and the associated ethics role related to Technology.
Technology
Technology refers to the set of skills, information, experience, and techniques that people use to change, transform, and use their environment to develop tools, machines, and products that fulfill our needs and desires. We live in a world filled with cutting-edge technology advancements that we find beneficial and handy in our daily lives. Technology has just become an integral part of our lives over the last few decades, whether we know it or not.
The Impact of Technology on Our Lives
Technology has increasingly been a part of our daily lives over the last two to three decades, to the point that it has taken over our lives. Although it is said that technology has enhanced our lives, is it feasible that this rapid technological development is harmless? While there is no denying that many of us are technologically dependent, it’s vital to remember that technology may have both a positive and detrimental impact on our everyday lives in every way. In addition to this report, we look closely at the positive and negative impact of technology on our lives.
Positive Impact of Technology on Society:
Smartphone Revolution:
Cell phones were largely used for calling and sending texts just over a decade ago. Phones can do anything from taking high-resolution photos to viewing pixel-perfect videos, browsing the internet, and playing graphic-intensive games. In a nutshell, smartphones and applications have transformed the way we work, interact, and entertain ourselves. Furthermore, the rapid proliferation of smartphones is directly linked to the growing expansion of e-commerce and internet-based businesses.
Education (EdTech):
We currently have a variety of learning platforms that aggregate courses for various age groups, as well as courses from other disciplines and companies. They frequently include practice videos and interactive boards. However, the impact of technology on education is not limited to virtual learning. Virtual reality, Artificial Intelligence, and learning sciences technology combine to create a more immersive and holistic learning experience in the classroom.
Healthcare & wellness advancements:
With technology, we can help people who, in decades gone by, have debilitating illnesses or death. 3D printing is quickly becoming one of the most popular medical technologies. One emerging topic is the printing of implants and joints for use during surgery, while the ability to print organ tissue is being examined, researched, and developed. Think of a future where organ donation is no longer necessary because we can grow bio-matched replacements as required. AI is already being used to assist in surgery and reduce dosage errors. Society has a lot to thank technology for in a health context.
The Negative impact on our lives:
Robotics and Artificial Intelligence:
Artificial Intelligence (AI) and robots have moved from science fiction to reality thanks to advances achieved by the scientific and engineering communities. Intelligent machines are now a part of our daily lives, even if we do not have human-like robots like those depicted in movies. Sophisticated machines that can work with little or no human involvement are also referred to as sophisticated robots. Many people believe that the implementation of robotics and AI will lead to mass layoffs and unemployment.
Social media’s impact on mental health:
Instant satisfaction is a key component of social media. Several studies have found that extended exposure to social media might contribute to feelings of loneliness and separation. FOMO (Fear of missing out) is a common concept that is closely linked to excessive social media use. It is especially dangerous to children since, even if people are aware that the information is harmful, they are nonetheless exposed to it.
As expected, it’s not as simple as that. There is a huge value and significant drawbacks to technology, as ever there has been. That said, while there are negative aspects to technology, and we should be aware of these and continue to work to mitigate them, the overall impact appears to be positive. When anything new comes into our lives, we have to ascertain whether or not is good or bad for us. Technology is simply another tool, and as such, it is up to us what we do with it and how we use it.
Now, the first section of one more question I will discuss shortly is “technology ethics”, as well as the “Roles of ethics in technology” and “Importance of ethics in technology”.
Technology Ethics:
Technology ethics is the application of ethical thinking to the practical concerns of technology. The reason technology ethics is growing in prominence is that new technologies give us more power to act, which means that we have to make choices we did not have to make before.
When we think of ethical issues, we do not usually think about technology. Even though it is not at the top of our minds when we think about ethical issues, technology poses an ethical dilemma for producers and consumers alike.
· Role of ethics in technology:
Technology ethics refers to a set of concepts that can be applied to govern technology, such as risk management and individual rights. They are mostly used to comprehend and resolve moral dilemmas relating to the creation and implementation of various types of technology.
· Importance of ethics in Information technology:
Information technology ethics are crucial because they foster a culture of trust, accountability, honesty, and excellence in resource management. In addition to preventing conflict and dishonesty, ethics support privacy, the confidentiality of information, and illegal access to computer networks.
· Ethics also change with technology:
The other major issue in technology that brings in ethics is the interface between technology and computers. Bioethics has thus emerged as ethics in the field of medical technology. Whereas we cannot talk of controlling technology and innovation, the better way is to adapt and change.
Issues involved in a chosen topic:
In the body section part of the second section of the question, I will present a brief explanation of my topic “Cybercrime and digital investigation” and include some issues or challenges such as ethical, legal, and social involvement in the chosen topic.
Brief description of the chosen topic:
Cybercrime:
Cybercrime is any criminal activity that involves a computer, networked device, or network. Most, but not all, cybercrime is done by profit-driven cybercriminals or hackers. Individuals or groups can commit cybercrime.
Digital investigation:
A digital investigation is a process to answer questions about digital states and events. The basic digital investigation process frequently occurs by all computer users when they, for example, search for a file on their computer.
Issues/Challenges Involved in Cybercrime:
In this report, I will discuss “Cybercrime” issues/Challenges, which are social, legal, and ethical.
Ethical issue:
The moral values and behaviors, as well as the professional standards of all organization employees, are the foundations of all secure systems, and they are the source of the majority of the problem. The following are some instances of security difficulties that a company could encounter:
· Confidentiality & Privacy:
The Computer can be used to intimidate, deceive, or defraud victims symbolically. Attorneys, government agencies, and companies are increasingly using piles of computer-generated data to perplex their audiences legally.
The computer has made invasions of our privacy much easier and perhaps more hazardous than they were before the computer. Individuals’ data is collected and kept in a variety of digital files. The illegal commercial use of electronic data breaches of confidentiality through revealing confidential data to other parties, for investigation purposes are all potential privacy risks.
· Patent and Copyright Law:
A patent can protect the unique and secret aspects of an idea. It is very difficult to obtain a patent compared to a copyright. With computer software, complete disclosure is required; the patent holder must disclose the complete details of a program to allow a skilled programmer to build the program.
Copyright law provides a very significant legal tool for use in protecting computer software, both before a security breach and certainly after a security breach. This type of breach could deal with the misappropriation of data, computer programs, documentation, or similar material. (Schou 2019)
Legal issue:
Cybercrimes pose unique legal issues because it is usually international.
International cybercrime cannot be investigated and prosecuted by a single international entity. Cybercrime investigations necessitate local cooperation, which is often required in hostile environments such as Russia or China.
This is also an issue of jurisdiction, for serious cybercrimes, the country of the victim will want to request the extradition of the perpetrator.
There is also no clear definition of cybercrime at the international level so countries have different standards for defining various forms of cybercrime such as intellectual property violations, privacy violations, and child pornography.
Social issue:
Cybercriminals make use of the Internet’s anonymity, secrecy, and interconnection to assault the core underpinnings of our modern information society. Cybercrime can involve botnets, computer viruses, cyberbullying, and cyberstalking. Cybercriminals cost the global economy
billions of dollars each year, and law enforcement officials have struggled to keep up. Police are attempting to utilize the same tools that cyber thieves use to commit crimes to prevent them and bring those responsible to justice.
Issues/Challenges involved in the digital investigation:
Now, in this report, I am going to discuss “digital investigation” challenges/issues.
Digital forensics investigation methods face some major challenges at the time of practical implementation. Digital forensic challenges are categorized into three major heads:
· Technology challenges:
As technology develops, crimes and criminals are also developed with it. Digital forensic experts use forensic tools for collecting shreds of evidence against criminals and criminals use such tools for hiding, and altering digital forensics, this process is called Anti- forensics technique.
Some of the Anti-forensic techniques are categorized into the following types:
· Encryption,
· Data hiding in stored space
· Covert Channel
· Legal challenges:
The presentation of digital evidence is more difficult than its collection because there are many instances where the legal framework acquires a soft approach and does not recognize every aspect of cyber forensics, as in
Jagdeo Singh V. The State and Ors, case Hon’ble High Court of Delhi held that “while dealing with the admissibility of an intercepted telephone call in a CD and CDR which was without a certificate under Sec. Besides, most of the time electronic evidence is challenged in court due to its integrity.
· Resource challenges:
As the rate of crime increases the number of data increases and the burden to analyze such huge data also increases on a digital forensic expert because digital evidence is more sensitive as compared to physical evidence it can easily disappear.
Some of the types of resource challenges are:
· Change in technology
· Volume and replication
Potential ethical implications for the future in the chosen topic:
In the body section part of the third section of the question, I will present future challenges/issues of “Cybercrime and digital investigation”.
Issues/Challenges regarding Cybercrime in the future:
Now, in this report, I will present some of the new and emerging technology clusters expected to have a significant impact on cybercrime over the next decade:
· Internet of Things:
Data acquired by IoT devices are becoming increasingly vulnerable to theft, corruption, destruction, extortion, and sale. IoT devices are also expected to broaden the reach of cyber-attacks and introduce new vulnerabilities in complex IT systems and surroundings.
· Privacy-Enhancing Technologies (PETs):
Malicious actors could use PETs to carry out illegal operations anonymously and covertly, making it more difficult to detect, monitor, and investigate criminal conduct. Malicious actors could use PETs to gain access to secret or private information.
· Blockchain and Distributed Ledger Technologies (DLTs):
Transactions could be manipulated for malevolent purposes, such as stopping transactions from being performed when they get digitalized and processed by DLTs. DLTs could also be used to store potentially difficult-to-remove disruptive or improper content.
· Autonomous Devices and Systems:
Autonomous systems could be used to carry out covert criminal acts, develop new criminal operation tactics, or launch large-scale, automated attacks. They may also complicate forensic investigations and make it more difficult to pinpoint the source of crimes perpetrated by autonomous devices.
Issues/Challenges regarding digital forensic investigation in the future
Now, in this report, I shall present some of the challenges/issues that must be addressed if digital forensics efforts are to be effective in combatting cybercrime:
· Privacy-preserving investigations:
People nowadays transfer many parts of their lives into cyberspace, particularly through online social networks or social media sites. Unfortunately, gathering data to reconstruct and locate an attack might jeopardize users’ privacy and is associated with other issues when cloud computing is used.
· Explosion of Complexity:
Evidence is no longer confined to a single host but is now dispersed over a variety of physical and virtual sites, including online social networks, cloud resources, and personal network-attached storage units. As a result, additional skills, techniques, and time are required to reconstruct evidence entirely and correctly.
· Rise of anti-forensic techniques:
Defensive measures encompass encryption, obfuscation, and cloaking techniques, including information hiding.
Cooperation among international jurisdictions notwithstanding, investigating cybercrime and collecting evidence is essential in building airtight cases for law enforcement. For that, security experts need the best tools to investigate.
· Legitimacy:
Modern infrastructures are becoming complex and virtualized, often shifting their complexity at the border (such as in fog computing) or delegating some duties to third parties (such as in platform-as-a-service frameworks).
Possible way out for the resolutions to mitigate ethical tensions in the chosen topic:
In the body section part of the fourth section of the question, I am going to find some possible ways out for the resolution to mitigate ethical tensions of the chosen topic.
Possible way out for the resolutions to mitigate ethical tension of Cybercrime:
In this report, I am going to present some tips and best practices that will help to solve the issues of “Cybercrime”:
· Education and Cyber Security Awareness:
This is one of the most effective cyber security countermeasures, and it’s a sure-fire winner.
Employees should be educated on how to avoid and prevent suspicious activities on their computers:
1. Stop and think before clicking on links or ads.
2. Ensure websites are trustworthy before entering credentials.
By educating employees on what to look for will increase the company’s ability to recognize Cybercrime early and in many cases prevent Cybercrime. This should be also communicated since it will benefit both the company’s cyber hygiene and the employee’s data security. Training should begin at the top and work its way down the business.
· Collect security logs and analyze for suspicious or abnormal activities:
An important activity and best practice for companies is to make sure security logs are being collected and analyzed for suspicious activities. In many situations looking at security, logs will likely identify abnormal action. For example, look for credential logins or application executions that occurred during non-business hours.
· Keep systems and applications patched and up to date:
Maintaining up-to-date systems and apps, as well as applying the most recent security patches, will prevent most hackers and cybercriminals from obtaining access to systems via known exploits and vulnerabilities. This is not a foolproof defense, but it will make it more difficult for cybercriminals to carry out a successful breach. (Carson 2016)
Possible way out for the resolutions to mitigate ethical tension of Digital forensic investigation:
Now, in this report, I will present a brief explanation that will help to solve the digital forensic investigation challenges.
We all know that we have a difficult job, whether we are in law enforcement, a government agency, or a corporate and we are aware of the difficulties we confront when investigating crimes. There will be mountains of data to collect from laptops, hard drives, desktop computers, mobile devices, smartwatches, and all other internet-connected gadgets.
Officers, courts, attorneys, and victims waiting on your investigation findings, a never-ending backlog of fresh cases, and a shortage of resources to evaluate the evidence no matter what you’ve been handed. We require a powerful forensic tool that you can rely on to provide you the ability to locate the unknown Opentext knows what it takes to conduct an investigation and bring a case to a conclusion, delivered by a digital forensic investigation pioneer.
Encase forensically is the powerful digital forensic solution you need for a toolset that can manage the acquisition, analysis, and reporting from a range of devices, assisting in the discovery of evidence and presenting facts necessary for closure. Unlike other tools that may rely solely on what is visible to the operating system. Encase forensic digs deeper to uncover more evidence and allows for speedy triage of digital evidence in the field or the lab to prioritize the collection and decryption of evidence from a wide range of devices. Create intuitive case reports for field agents by processing acquired data in a consistent automated manner. Perform deep drive forensic examination to find important evidence, including deleted objects.
Current policies, laws, and regulations implemented in Nepal and brief critical awareness of international law:
In the body section part of the fifth section of the question, I am going to discuss current laws and regulations implemented in Nepal and brief critical awareness of international law of the chosen topic.
Current law and regulation of Cybercrime implemented in Nepal and outside of Nepal, i.e., the UK (international law).
In this report, I would like to present current laws and regulations of “Cybercrime” implemented in Nepal and outside of Nepal, i.e., the UK (international law).
Law and regulation of Cybercrime implemented in Nepal:
· Nepal does not have a separate Cyber Law.
· Cyber Law is incorporated with the “Electronic Transaction Act (ETA) 2063” which was passed on 4th December 2006
· Before 2004, Cybercrimes were dealt with under the Public Offence Act.
· The Act is divided into 12 sections and 80 clauses.
· Electronic Transaction Act 2063 does not fully incorporate Cyber Law.
· As per the ETA, if anyone is found violating cybercrime, he/she will be punished for a minimum of 6 months to a maximum of 3 years in jail and has to pay a minimum of 50 thousand to a maximum of three lakhs as a penalty.
Law and regulation of Cybercrime implemented in the UK:
In UK Law: “significant number of acts, directives, and regulations to consider when it comes to malicious computer hacking and careers in offensive security, such as penetration testing”.
· Computer Misuse Act 1990 — amended twice
· Crime and Courts Act 2013
· Data Protection Act 2018
· Extradition Act 2003
· Human Rights Act 1998
· Police and Justice Act 2006 (Campus 4.0 n.d.)
2.9.2 Current law and regulation of Digital forensic investigation implemented in Nepal and outside of Nepal, i.e., the UK (international law):
Digital forensics investigation is a new science that involves finding evidence from digital media, such as computers, mobile phones, or networks. Forensic investigation teams analyze, inspect, identify, preserve digital evidence, and use it to help them investigate crimes related to digital devices. A digital forensics investigation can lead you in the direction of understanding what information was compromised.
In this report, I would like to present current laws and regulations of “Digital forensic investigation” implemented in Nepal and outside of Nepal, i.e., the UK (international law).
Law and regulation of Digital forensic investigation implemented in Nepal:
· Nepal Police established the Forensic Science Laboratory in 1960.
· The Judicial Reform Commission (1983), recognizing the need for a modern forensic science laboratory in Nepal, advocated the development of a well-equipped and independent forensic science laboratory in the country. From 1986 until 1995, the National Forensic Science Laboratory was established and operated under the auspices of the Nepal Academy of Science and Technology (NAST).
· From 1995 to 2000, the laboratory was under the Ministry of Law, Justice & Parliamentary Affairs as an autonomous organization. As per the decision of the Government of Nepal, this laboratory is now running as an autonomous organization under the Ministry of Education, Science & Technology.
· Royal Judiciary Reform Commission decided to merge the Nepal Police Forensic Laboratory with the National Forensic Science Laboratory in 2045 BS (Around 1990 A.D). His Majesty’s Government of Nepal re-established the Central Police Forensic Science Laboratory as per the decision of 2051–10–11 BS (25th January 1995 A.D)
· The Crime Investigation Department has a Biology Unit, DNA Profiling Unit, Explosive Unit, Physics Unit, Voice Detection Unit, and Digital Forensic Units.
· The Criminal Investigation Bureau (CIB) was founded in 2010 as the national agency in charge of investigating complex criminal cases.
· The Nepal Police has established a Digital Forensics Technology (10th December 2015).
Law and regulation of Digital forensic investigation implemented in the UK:
National and international regulation regulates the inspection of digital media. In civil investigations, for example, laws may limit analysts’ ability to conduct examinations. National regulations limit the amount of information that can be seized during a criminal inquiry. The PACE Act, for example, governs the seizure of evidence by law enforcement in the United Kingdom. During its existence early in the field, the “International Organization on Computer Evidence” was one agency that worked to establish compatible international standards for the seizure of evidence.
In the UK, the same laws covering computer crime can also affect forensic investigators. The 1990 Computer Misuse Act legislates against unauthorized access to computer material; this is a particular concern for civil investigators who have more limitations than law enforcement.
One area of digital forensics where courts are still uncertain is an individual’s right to privacy. Law enforcement and civil investigators are limited in their capacity to intercept and obtain evidence under the US Electronic Communications Privacy Act. The act distinguishes between stored communication (e.g., email archives) and communication that has been transmitted (such as VOIP).
The ECPA also affects corporations’ authority to probe their employees’ computers and communications, a topic about which there is an ongoing controversy.
Similar to the ECPA, Article 5 of the European Convention on Human Rights outlines privacy limitations and restricts the processing and sharing of personal data both inside the EU and with third countries. The Regulation of Investigatory Powers Act establishes the legal authority of UK law enforcement to conduct digital forensics investigations.
2.10 Impact of Global Influences on Technological Development:
In the body section part of the sixth section of the question, I am going to explain in brief the impact of global influences on technological developments.
In most circumstances, technology is not developed here. We people depend on global-based developed technology and we must use our technology. When technology advances on a global scale, it has an impact on our lives. However, we already know technology is not developed here. But still we people are waiting for global-based technologies such as smartphones, smartwatches, laptops, and etcetera. While using international-based technology have to face ethical issues.
Ethics is the set of guiding principles that provide a way of acting morally during decision-making. Some decisions may not have any possible implications. However, we face ethical dilemmas every day at the workplace. Some of the ethical challenges are as:
· Data privacy:
Data privacy is one of the major challenges faced by contemporary firms. European Union defines data privacy as well as keeping data protected from unauthorized access. They have provided a comprehensive guideline for the firms operating in their geography.
· Intellectual property:
Finally, we have the challenges related to intellectual property. On one side of the equation, we have the firms. It is expensive and effortful to manage intellectual property. Firms like IBM and Samsung file thousands of patents every year. In 2019 alone, about 333k patents were filed in the United States.
While we all know that using international-based technology, we also face ethical issues at the same time. So, while we are giving priority to technology embracement or acceptance. At the same time, we should also give priority to ethical issue management and we should make an already legal framework and create awareness. After that implementing any type of technology can have a positive impact on lives. Otherwise, technology has a negative impact.
Findings:
While working on the “Cybercrime and digital investigation” topic in the report writing, at first, I presented a short explanation of the term “technology.” During report writing, I have found out and written down some positive and negative impacts of technology in our lives. Well, in this report writing, I have found out some present and future issues regarding Cybercrime and digital investigation. After writing some issues, I have mentioned some possible ways for resolutions to mitigate Ethical tension regarding my topic. Well, after mentioning some ethical implications, I
have found out and written down the law regarding Cybercrime and digital investigation. In the end, I have found out and noted the impact of global influences on technological developments. While exploring the last question, I found out the answer regarding the question that in most circumstances, technology is not developed here. We people depend on global-based developed technology and we must use our technology. When technology advances on a global scale, it has an impact on our lives. While we all know that using international-based technology, we also face ethical issues at the same time.
Discussion:
In the “Discussion Section,” I want to discuss research regarding my topic “Cybercrime and digital investigation” which I have done in my report writing. Well, in this report writing at first I have researched the term “technology” and its impact of technology in our lives. After researching some terms regarding technology, I have explored the present and future
issues of my topic. Well, after researching and discussing some issues of Cybercrime and digital investigation, I have analyzed a possible way out for the resolutions to mitigate ethical tension regarding the topic. In the end, I explore through laws of Cybercrime and digital investigation, where I have discussed some laws. Moreover, I have investigated and discussed the impact of global influences on technological development.
Conclusion
In the “Conclusion section,” As expected, it’s not as simple as that. There are huge value and significant drawbacks to technology, as ever there have been. That said, while there are negative aspects to technology, and we should be aware of these and continue to work to mitigate them, the overall impact appears to be positive. When anything new comes into our lives, we have to ascertain whether or not is good or bad for us. Technology is simply another tool, and as such it is up to us what we do with it and how we use it. It’s almost impossible to create something that doesn’t have potentially negative implications, but we shouldn’t let those prevent us from unlocking the benefits we can also access.
Ethics is unquestionably one of humanity’s most critical prerequisites. Furthermore, the world would have been an evil and chaotic place if ethics had not existed. Moreover, humanity’s growth is impossible without ethics. Well, Cybercrime is any criminal activity that involves a computer, networked device, or network. In addition, Cybercrime has some sorts of issues such as Ethical, Social, and many more. These issues are increasing day by day and affecting our lives. Well, after knowing some issues of Cybercrime next one is the digital forensic investigation, which had also some sort of issues. In the future also, we have to face such types of issues from Cybercrime and digital forensic investigation. To control such types of Cybercrime issues we have to take some steps such as Increase Education and Cyber Security Awareness, and Keeping systems and applications patched up to date. In addition, Cyber laws protect information access, privacy, communications, intellectual property (IP), and freedom of speech related to the use of the Internet, websites, email, computers, cell phones, software, and hardware, such as data storage devices, to prevent or reduce large-scale damage from cybercriminal activities. Since digital devices like computers are prone to criminal attacks, digital forensics is becoming more important. Understanding digital forensic processes will aid in the collection of critical information that can be utilized to prosecute a suspect who has hacked into a digital device or network. Electronic means are used to produce, collect, and distribute a tremendous volume of data.
In most circumstances, technology is not developed here. We people depend on global-based developed technology and we must use our technology. When technology advances on a global scale, it has an impact on our lives. While we all know that using international-based technology, we also face ethical issues at the same time. So, while we are giving priority to technology embracement or acceptance. At the same time, we should also give priority to ethical issue management and we should make an already legal framework and create awareness. After that, implementing any type of technology can have a positive impact on our lives. Otherwise, technology has a negative impact.
Recommendation:
In the “recommendation section,” I want to recommend that it is not quite possible to remove the technology to avoid all the risks. Yet we as parents can moderate the use of gadgets and reduce the negative impact of technology on our children so they to make the best of the Tech Age. Monitor and limit the use of technology. It’s of great importance to know how much and in what way your kid uses devices. Teach responsibility and conscious behavior. Then, I want to tell you that it may not be possible to completely eradicate cybercrime and ensure complete internet security. We have to develop clear policies and procedures for the business and employees and use two-factor authentication apps or physical security keys. Digital forensics helps to solve crimes with the help of data from
devices to help law enforcement, and federal agencies solve a crime, and businesses protect their data and intellectual property. At last, I want to tell you that while we use international-based technology, we also face ethical issues at the same time. So, while we are giving priority to technology embracement or acceptance. At the same time, we should also give priority to ethical issue management and we should make an already legal framework and create awareness. After that, implementing any type of technology can have a positive impact on our lives. Otherwise, technology has a negative impact.
Resources:
1. Brush, K. (2020) What Is Cybercrime? Effects, Examples, And Prevention [online] available from <https://searchsecurity.techtarget.com/definition/cybercrime> [20 September 2021]
2. Carrier, B. (2006) Digital Investigation And Digital Forensic Basics [online] available from <https://digital-evidence.org/di_basics.html> [20 September 2021]
3. What Is Technology — Technology Definition (n.d.) available from <http://what-is.info/what-is-technology.html> [20 September 2021]
4. Writer, S. (2017) The Impact Of Technology In Our Lives And The Future Of Technology [online] available from <https://www.totalphase.com/blog/2017/05/impact-technology-lives-future-technology/> [20 September 2021]
5. Paterska, P. (2021) “Positive & Negative Impact Of Technology On Society”. [ 2021] available from <https://www.elpassion.com/blog/positive-negative-impact-of-tech-on-society> [20 September 2021]
6. Group, S. (2019) “Technology: A Positive Or Negative Impact On Society?”. [ 2019] available from <https://www.spidergroup.com/blog/technology-a-positive-or-negative-impact-on-society> [20 September 2021]
7. Green, B. (n.d.) Technology Ethics — Markkula Center For Applied Ethics [online] available from <https://www.scu.edu/ethics/focus-areas/technology-ethics/#:~:text=Technology%20ethics%20is%20the%20application,t%20have%20to%20make%20before.> [20 September 2021]
8. Davis, B. (2021) What Is The Role Of Ethics In Technology Use? [online] available from <https://www.mvorganizing.org/what-is-the-role-of-ethics-in-technology-use/#:~:text=Ethics%20in%20information%20technology%20is,to%20prevent%20conflict%20and%20dishonesty.> [20 September 2021]
9. Schou, C. (2019) National Information Assurance Training And Education Center [online] available from <https://www.niatec.iri.isu.edu/ViewPage.aspx?id=153&rebuild=true> [20 September 2021]
10. Political/Legal Issues (n.d.) available from <https://cps182cybercrime.wordpress.com/politicallegal-issues/> [20 September 2021]
11. Rahaman, M. (2016) “Cyber Crime Affects Society In Different Ways”. The Financial Express 1
12. Challenges Faced By Digital Forensics (2021) available from <https://legaldesire.com/challenges-faced-by-digital-forensics/> [20 September 2021]
13. Bellasio, J. (2020) Technology And The Future Of Cybercrime [online] available from <https://www.rand.org/randeurope/research/projects/technological-developments-and-the-future-of-cybercrime.html> [20 September 2021]
14. CAMERON, L. (2018) Future Of Digital Forensics Must Face Six Challenges Posed By Cybercrime [online] available from <https://publications.computer.org/security-and-privacy/2018/03/01/digital-forensics-security-challenges-cybercrime/> [20 September 2021]
15. Carson, J. (2016) 5 Steps To Recognize And Combat Cyber Crime [online] available from <https://thycotic.com/company/blog/2016/10/18/5-steps-recognizing-combating-cyber-crime/> [20 September 2021]
16. Campus 4.0 (n.d.) available from <https://campus.softwarica.edu.np/modules/technology-and-its-legal-social-and-ethical-context/computer-and-crime-digital-investigation-part-ii> [20 September 2021]
17. Campus 4.0 (n.d.) available from <https://campus.softwarica.edu.np/modules/technology-and-its-legal-social-and-ethical-context/computer-and-crime-digital-investigation-part-iii> [20 September 2021]
18. PACKETLABS (2021) available from <https://www.packetlabs.net/digital-forensics/> [20 September 2021]
19. Campus 4.0 (n.d.) available from <https://campus.softwarica.edu.np/modules/technology-and-its-legal-social-and-ethical-context/computer-and-crime-digital-investigation-part-%E2%80%93-iv> [20 September 2021]
20. Mishra, A. (2021) Ethical Issues Of Technology In 2021: A Definitive Guide [online] available from <https://managementweekly.org/ethical-issues-of-technology/> [20 September 2021]
That’s all for this blog, I hope you guys enjoyed this form of learning. ❤
Till then keep learning, keep exploring, and do hacking………………………
You can follow me on Social Media:
Linkedin: https://www.linkedin.com/in/rohit-ray-19284b232/
GitHub: https://github.com/rohit273
Twitter: https://twitter.com/RHittttt
Instagram: https://www.instagram.com/ro_hit.exe/
Please follow and subscribe for more awesome upcoming blogs.
Bye until Next time.