Certificate of Proficiency in Digital Evidence & eDiscovery Law Practice in Nigeria

Weekly training modules are based on the textbook: DIGITAL EVIDENCE & eDISCOVERY LAW PRACTICE IN NIGERIA by the Convener of the course Emeka Arinze Esq, LLM, M.I.T (info-tech), CBSP (Certified Biometric & Surveillance Professional, CDEA (Certified Digital Evidence Analyst), CCI (Certified Cybercrime Investigator), CFP (Certified Forensic Professional).

Learn More About Emeka Arinze

WEEK

17

5 hours to complete
System Malfunction and Integrity Violation: A Case for Section 84 of the Evidence Act, 2011. See Chapter 17 of the book for further reading

Whenever criminal activities on a computer network are being reconstructed using digital records and process, every aspect may have some degree of error. The origin and time of the events, as well as who was responsible for the events, can be uncertain. Lost data can give an incomplete picture of the crime. It is even possible that an event never occurred but a digital record was fabricated to misdirect investigators or implicate an innocent person. When evaluating evidence, its reliability and accuracy are of great importance to our jurisprudence, both in investigation and in the probative stages of any particular case. Damage to the integrity of data can often cause more serious harm than confidentiality breaches. Vital information may be modified by malicious program; malicious users or faulty system components. Virus code could be inserted into binary executable, potentially resulting in the loss of all data stored on a system. Operating systems that allow access to raw disks can inadvertently aid an attacker to bypass security checks in the file system and cause damage to stored data.

The Focus of this Weekly Module

Because a computer may malfunction due to mechanical error, software failure, human error, technological obsolescence and malware infection, this weekly module addresses these issues as a necessary foundation for the determination of questions as raised in chapter 18 of the book, dealing with evaluation of section 84 of the Evidence Act.

Gains and Benefit

On completion of the lecture as espoused in the video, reading activity, quiz and assessment, you will be able to understand:

  • the processes through which computer may malfunction;
  • threats that can compromise the function of a computer;
  • hardware and software failure;
  • risks associated with use of obsolete hardware and software;
  • malware infection;
  • evidentiary issues in malware implicated in criminal trial: the case of trojan, bots and adware defence;
  • options available to prosecution in rebuttal to malware defence.
7 Videos (Total 00 min), 1 reading, 1 quiz, 1 assignment SEE ALL
7 videos
Computer Malfunction
Threats that can compromise the function of a computer
Hardware and Software Failure
Risks associated with use of obsolete hardware and software
Malware Infection
Evidentiary issues in malware implicated in criminal trial: the case of trojan, bots and adware defence
Options available to prosecution in rebuttal to malware defence
1 readings
Module Guide
1 quiz
Activity - Answer a 30 min question & answer test
1 assignment
Assignment title goes here