ASCL certified Cyber Law Prosecutor

The latest version of this course is available at:
http://www.asianlaws.org/dcl.php

With the surge in the use of Internet and the electronic medium for business transactions as well as inter-personal communication, there has been an unprecedented growth in the crimes being perpetrated through the electronic medium.

These crimes are commonly known as 'Cyber Crimes' and include acts such as Data theft, Email abuse, Data alteration, Unauthorized access, Computer virus attacks, denial of service attacks etc.

By constitution, the nature of information or evidence stored in the electronic medium is transient.

Naturally, prosecuting of cyber crimes vis-à-vis the prosecuting of conventional crimes is a more complex issue.

This course aims to equip the participants with the requisite knowledge to successfully and efficiently prosecute cyber crimes.

COURSE OBJECTIVES

  1. To understand basic issues involved in cyber crime prosecution.
  2. To learn the rules of Computer Forensics and understand the issues in collection and analysis of electronic evidence.
  3. To prepare proper documentation for successful prosecution of cyber crime.

COURSE CONTENTS

  1. Basic Computer and Network concepts
  2. Cyber crime
  3. Cyber Crime Investigation
  4. Cyber Law
  5. Cyber Crimes and the Law

ASCL Computer Emergency Response Team

The Computer Emergency Response Team of Asian School of Cyber Laws (ASCL-CERT) was established in late 1999 to enable corporate India to battle the ever-growing wave of computer crime and computer abuse.

ASCL-CERT team consists of IT and legal professionals. To learn more on the ASCL-CERT, please email us at info@asianlaws.org.

On 1st March, 2003, the ASCL-CERT published the Computer Crime & Abuse Report (India) 2001-02. The report can be obtained in PDF and in HTML form.

  1. This report analyzes 6266 incidents of computer crime and abuse from 1st January 2001 through 31st December, 2002
  2. These incidents range from obscene, threatening and defamatory emails to computer aided sabotage, source code thefts and even attempted cyber murders!
  3. Incidents were reported by over 600 organisations from the IT, Manufacturing, Financial services, Education, Telecom, Health care, Other Services and other sectors.
  4. The types of computer crime and abuse incidents include data theft email abuse, unauthorized access, data alteration, targeted virus attacks, denial of service attacks.

Some findings of the report:

  1. The occurrence of a computer crime incident is most likely in September, least likely in August, more likely on a Monday, Friday or Saturday and least likely on a Sunday.
  2. A disgruntled former employee is more likely to commit a computer crime than a business rival.
  3. Two thirds of data theft incidents are attributable to employees (current as well as former).
  4. The average cost of a data theft attack is Rs. 1.8 lakh, with the cost ranging between Rs 20,000 and Rs. 1.87 crore.
  5. In 97% of incidents involving obscene emails, the victims are female employees.
  6. 55% of unauthorized access incidents were traced to persons within the victim organization.
  7. Almost 60% of computer crime incidents are likely to occur in the first six months of a year.