ABSTRACT

This chapter provides in-depth concepts related to crimes and the issues, challenges, responsibilities, and obligations of an investigator. The forensic investigation concentrates on two basic things, i.e., postmortem analysis and examination of evidence. The chapter provides in-depth knowledge of all the types of computer crimes and challenges faced while deterring a crime. Finally, readers can gain knowledge about ethical issues on it. This chapter further discusses about the computer laws related to patents, copyrights, trademarks, trade secrets, etc. It also gives the detailed concepts of live system and its analysis. The Windows- and Unix-based system analysis is also discussed in this chapter. It emphasizes the ethics that refers to the moral values in network security. Ethics is a branch of knowledge that shows the moral principles of individuals and how to conduct the activities. This chapter is also about the moral values and behaviors related to investigating a crime. In the past, cyber ethics was also known as computer ethics as most of the work and crime were related to the computer. This chapter focuses on imparting the knowledge about live system investigation on both Windows and Unix operating systems and its ethical issues.