SlideShare a Scribd company logo
1 of 29
Security Technology Forum - CSI 	Security Technology forum will operate to provide a knowledge sharing forum and also provide a platform for  research in emerging technology in the area of Security for Members of CSI.  Vision is to make India safe and secure by use of technology. Mission is to enable Indian technology professionals to understand world class security technology by effectively developing and sharing knowledge assets and best practices.
Contents of the Interaction Concept of Forensic  Need & Purpose of Forensic  Computer Forensic  Role of IT for Forensic  Data Collection / Mining Tools Data Analysis & Reporting  Fraud Detection & Auditing
Forensics – Forensic Science Forensic science (often shortened to forensics) is the application of a broad spectrum of sciences to answer questions of interest to a legal system. This may be in relation to a crime or a civil action. Besides its relevance to a legal system, more generally forensics encompasses the accepted scholarly or scientific methodology and norms under which the facts regarding an event, or an artifact, or some other physical item (such as a corpse) are ascertained as being the case. In that regard the concept is related to the notion of authentication, whereby an interest outside of a legal form exists in determining whether an object is what it purports to be, or is alleged as being.
Computer Forensic The goal of computer forensics is to explain the current state of a digital artifact. The term digital artifact can include a computer system, a storage medium (such as a hard disk or CD-ROM), an electronic document (e.g. an email message or JPEG image) or even a sequence of packets moving over a computer network. The field of computer forensics also has sub branches within it such as firewall forensics, network forensics, database forensics and mobile device forensics.
Simplified Understanding Forensic = Postmortem Computer forensics involves the  preservation,  identification,  extraction,  documentation,  and interpretation of computer media  for evidentiary and/or root cause analysis Recovering Information the naked eye can no longer see.
Need for Computer Forensic Techniques Evidence might be required for a wide range of computer crimes and misuses. The Need for deploying Computer forensic can be  In legal cases, computer forensic techniques are frequently used to analyze computer systems belonging to defendants (in criminal cases) or litigants (in civil cases).  To recover data in the event of a hardware or software failure.  To analyze a computer system after a break-in, for example, to determine how the attacker gained access and what the attacker did.  To gather evidence against an employee that an organization wishes to terminate.  To gain information about how computer systems work for the purpose of debugging, performance optimization, or reverse-engineering.
Reasons For Evidence Wide range of computer crimes and misuses Non-Business Environment: evidence collected by Federal, State and local authorities for crimes relating to:  Theft of trade secrets Fraud Extortion Industrial espionage Position of pornography SPAM investigations Virus/Trojan distribution Homicide investigations Intellectual property breaches Unauthorized use of personal information Forgery Perjury
Reasons For Evidence (cont) Computer related crime and violations include a range of activities including: Business Environment:  Theft of or destruction of intellectual property Unauthorized activity Tracking internet browsing habits Reconstructing Events Inferring intentions Selling company bandwidth Wrongful dismissal claims Sexual harassment Software Piracy
Who Uses Computer Forensics? Criminal Prosecutors Rely on evidence obtained from a computer to prosecute suspects and use as evidence Civil Litigations Personal and business data discovered on a computer can be used in fraud, divorce, harassment, or discrimination cases Insurance Companies Evidence discovered on computer can be  used to mollify costs (fraud, worker’s compensation, arson, etc) Private Corporations Obtained evidence from employee computers can be used as evidence in harassment, fraud, and embezzlement cases
Steps Of Computer Forensics According to many professionals, Computer Forensics is a four (4) step process Acquisition Physically or remotely obtaining possession of the computer, all network mappings from the system, and external physical storage devices Identification This step involves identifying what data could be recovered and electronically retrieving it by running various Computer Forensic tools and software suites
Steps Of Computer Forensics (cont) According to many professionals, Computer Forensics is a four (4) step process Evaluation Evaluating the information/data recovered to  determine if and how it could be used again the suspect for employment termination or prosecution in court Presentation This step involves the presentation of evidence discovered in a manner which is understood by lawyers, non-technically staff/management, and suitable as evidence as determined by United States and internal laws
Handling Information Information and data being sought after and collected in the investigation must be properly handled Volatile Information Network Information Communication between system and the network Active Processes Programs and daemons currently active on the system Logged-on Users Users/employees currently using system Open Files Libraries in use; hidden files; Trojans (rootkit) loaded in system
Handling Information (cont) Non-Volatile Information configuration settings system files  registry settings that are available after reboot Accessed through drive mappings from system This information should investigated and reviewed from a backup copy
Anti-Forensics Software that limits and/or corrupts evidence that could be collected by an investigator Performs data hiding and distortion (HPA & Logic Bombs) Exploits limitations of known and used forensic tools Works both on Windows and LINUX based systems In place prior to or post system acquisition
Evidence Processing Guidelines  Steps of processing evidence  Step 1: Shut down the computer Considerations must be given to volatile information Prevents remote access to machine and destruction of evidence (manual or ant-forensic software) Step 2: Document the Hardware Configuration of The System Note everything about the computer configuration prior to re-locating
Evidence Processing Guidelines (cont) Step 3: Transport the Computer System to A Secure Location Do not leave the computer unattended unless it is locked in a secure location Step 4: Make Bit Stream Backups of Hard Disks and Floppy Disks Step 5: Mathematically Authenticate Data on All Storage Devices Must be able to prove that you did not alter any of the evidence after the computer came into your possession Step 6: Document the System Date and Time Step 7: Make a List of Key Search Words Step 8: Evaluate the Windows Swap File
Evidence Processing Guidelines (cont) Step 9: Evaluate File Slack File slack is a data storage area of which most computer users are unaware; a source of significant security leakage. Step 10: Evaluate Unallocated Space (Erased Files) Step 11: Search Files, File Slack and Unallocated Space for Key Words Step 12: Document File Names, Dates and Times Step 13: Identify File, Program and Storage Anomalies Step 14: Evaluate Program Functionality Step 15: Document Your Findings Step 16: Retain Copies of Software Used
Methods deployed Discovering Data on Computer System Recovering deleted, encrypted, or damaged file information Monitoring live activity Detecting violations of corporate policy
Fraud A fraud is an intentional deception made for personal gain or to damage another individual.  The specific legal definition varies by legal jurisdiction. Fraud is a crime, and is also a civil law violation.  Many hoaxes are fraudulent, although those not made for personal gain are not technically frauds. Defrauding people of money is presumably the most common type of fraud
Fraud – Fast Facts ,[object Object]
  Use of deception & misrepresentation to obtain        	an unjust advantage ,[object Object]
 It is estimated that there has been accelerated growth in economic misappropriation;
 Corporate fraud swing to theft of intellectual property and IT- related incidents;
 About 42 per cent of the cases in India, it was possible to make recoveries from the perpetrator;
Theft, loss of or attack on information are the biggest concerns to companies .,[object Object]
 High staff turnover, implanting of  personnel are the most recurrent cause of exposure to fraud;
 Imperative effect of globalization;
 Increased merger and acquisition between companies.												CONTINUED……

More Related Content

What's hot

4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)JIEMS Akkalkuwa
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsSCREAM138
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer ForensicsNeilg42
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumOWASP Khartoum
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics OverviewYansi Keim
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its toolsKathirvel Ayyaswamy
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1anilinvns
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsFilip Maertens
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic pptPriya Manik
 
Cyber Crimes & Cyber Forensics
Cyber Crimes & Cyber ForensicsCyber Crimes & Cyber Forensics
Cyber Crimes & Cyber Forensicsjahanzebmunawar
 

What's hot (20)

4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
Cyber Security 1215
Cyber Security 1215Cyber Security 1215
Cyber Security 1215
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Cyber Crimes & Cyber Forensics
Cyber Crimes & Cyber ForensicsCyber Crimes & Cyber Forensics
Cyber Crimes & Cyber Forensics
 

Viewers also liked

Computer forensic
Computer forensicComputer forensic
Computer forensicbhavithd
 
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic ExaminersBoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic ExaminersBoyarMiller
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesIsaiah Edem
 
Document clustering for forensic analysis an approach for improving compute...
Document clustering for forensic   analysis an approach for improving compute...Document clustering for forensic   analysis an approach for improving compute...
Document clustering for forensic analysis an approach for improving compute...Madan Golla
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 
Aids direct marketing
Aids direct marketingAids direct marketing
Aids direct marketingAdpr Son
 
Information Gathering Over Twitter
Information Gathering Over TwitterInformation Gathering Over Twitter
Information Gathering Over TwitterBrian Baskin
 
The design of forensic computer workstations
The design of forensic computer workstationsThe design of forensic computer workstations
The design of forensic computer workstationsjkvr100
 
MattockFS Computer Forensic File-System
MattockFS Computer Forensic File-SystemMattockFS Computer Forensic File-System
MattockFS Computer Forensic File-SystemRob Meijer
 
Forensic Analyst
Forensic AnalystForensic Analyst
Forensic AnalystBaileyShupe
 
Electornic evidence collection
Electornic evidence collectionElectornic evidence collection
Electornic evidence collectionFakrul Alam
 
Crime Scene Investigation
Crime Scene InvestigationCrime Scene Investigation
Crime Scene InvestigationLovable Raisin
 
Communication skills in english
Communication skills in englishCommunication skills in english
Communication skills in englishAqib Memon
 
Lecture1
Lecture1Lecture1
Lecture1rjaeh
 

Viewers also liked (20)

Computer forensic
Computer forensicComputer forensic
Computer forensic
 
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic ExaminersBoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting Crimes
 
Document clustering for forensic analysis an approach for improving compute...
Document clustering for forensic   analysis an approach for improving compute...Document clustering for forensic   analysis an approach for improving compute...
Document clustering for forensic analysis an approach for improving compute...
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
A2 Cloning animals
A2 Cloning animalsA2 Cloning animals
A2 Cloning animals
 
Aids direct marketing
Aids direct marketingAids direct marketing
Aids direct marketing
 
File000174
File000174File000174
File000174
 
Information Gathering Over Twitter
Information Gathering Over TwitterInformation Gathering Over Twitter
Information Gathering Over Twitter
 
The design of forensic computer workstations
The design of forensic computer workstationsThe design of forensic computer workstations
The design of forensic computer workstations
 
MattockFS Computer Forensic File-System
MattockFS Computer Forensic File-SystemMattockFS Computer Forensic File-System
MattockFS Computer Forensic File-System
 
Forensic Analyst
Forensic AnalystForensic Analyst
Forensic Analyst
 
Electornic evidence collection
Electornic evidence collectionElectornic evidence collection
Electornic evidence collection
 
Crime Scene Investigation
Crime Scene InvestigationCrime Scene Investigation
Crime Scene Investigation
 
Capturing forensics image
Capturing forensics imageCapturing forensics image
Capturing forensics image
 
File000173
File000173File000173
File000173
 
Communication skills in english
Communication skills in englishCommunication skills in english
Communication skills in english
 
Lecture1
Lecture1Lecture1
Lecture1
 

Similar to Business Intelligence (BI) Tools For Computer Forensic

Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics SlidesVarun Sehgal
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemsMayank Diwakar
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricsMayank Diwakar
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic pptSuchita Rawat
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptSurajgroupsvideo
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsZyxware Technologies
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensicsRahul Baghla
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxDaniyaHuzaifa
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxssuser2bf502
 
computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfGnanavi2
 
Computer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital WorldComputer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital Worldrahulmonikasharma
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortressSTO STRATEGY
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
 

Similar to Business Intelligence (BI) Tools For Computer Forensic (20)

Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdf
 
Computer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital WorldComputer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital World
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortress
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 

More from Dhiren Gala

Big Data for Retail
Big Data for RetailBig Data for Retail
Big Data for RetailDhiren Gala
 
Microsoft SQL Server 2012
Microsoft SQL Server 2012 Microsoft SQL Server 2012
Microsoft SQL Server 2012 Dhiren Gala
 
MAIA Intelligence profiled on DQ Channel Tree
MAIA Intelligence profiled on DQ Channel TreeMAIA Intelligence profiled on DQ Channel Tree
MAIA Intelligence profiled on DQ Channel TreeDhiren Gala
 
XBRL on SaaS Platform
XBRL on SaaS PlatformXBRL on SaaS Platform
XBRL on SaaS PlatformDhiren Gala
 
Barriers to Business Intelligence (BI)
Barriers to Business Intelligence (BI)Barriers to Business Intelligence (BI)
Barriers to Business Intelligence (BI)Dhiren Gala
 
Compliance to Compete
Compliance to CompeteCompliance to Compete
Compliance to CompeteDhiren Gala
 
An Introduction To XBRL
An Introduction To XBRLAn Introduction To XBRL
An Introduction To XBRLDhiren Gala
 
XBRL Presentation
XBRL PresentationXBRL Presentation
XBRL PresentationDhiren Gala
 
Financial Consolidation Management
Financial Consolidation ManagementFinancial Consolidation Management
Financial Consolidation ManagementDhiren Gala
 
Experiments with Social Media & Networking
Experiments with Social Media & NetworkingExperiments with Social Media & Networking
Experiments with Social Media & NetworkingDhiren Gala
 
Best Deployment: Raymond opts for 1KEY FCM - Financial Consolidation
Best Deployment: Raymond opts for 1KEY FCM - Financial ConsolidationBest Deployment: Raymond opts for 1KEY FCM - Financial Consolidation
Best Deployment: Raymond opts for 1KEY FCM - Financial ConsolidationDhiren Gala
 
KPI Dashboard for Port Terminals
KPI Dashboard for Port TerminalsKPI Dashboard for Port Terminals
KPI Dashboard for Port TerminalsDhiren Gala
 
Business Intelligence in Logistics
Business Intelligence in LogisticsBusiness Intelligence in Logistics
Business Intelligence in LogisticsDhiren Gala
 
Business Intelligence in Pharma
Business Intelligence in PharmaBusiness Intelligence in Pharma
Business Intelligence in PharmaDhiren Gala
 
Marketing Analytics with Business Intelligence
Marketing Analytics with Business IntelligenceMarketing Analytics with Business Intelligence
Marketing Analytics with Business IntelligenceDhiren Gala
 
BI at work for Port Operations
BI at work for Port OperationsBI at work for Port Operations
BI at work for Port OperationsDhiren Gala
 
Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010
Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010
Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010Dhiren Gala
 
India's first Business Intelligence (BI)
India's first Business Intelligence (BI)India's first Business Intelligence (BI)
India's first Business Intelligence (BI)Dhiren Gala
 
Business Intelligence (BI) for Manufacturing
Business Intelligence (BI) for ManufacturingBusiness Intelligence (BI) for Manufacturing
Business Intelligence (BI) for ManufacturingDhiren Gala
 

More from Dhiren Gala (20)

Big Data for Retail
Big Data for RetailBig Data for Retail
Big Data for Retail
 
Microsoft SQL Server 2012
Microsoft SQL Server 2012 Microsoft SQL Server 2012
Microsoft SQL Server 2012
 
MAIA Intelligence profiled on DQ Channel Tree
MAIA Intelligence profiled on DQ Channel TreeMAIA Intelligence profiled on DQ Channel Tree
MAIA Intelligence profiled on DQ Channel Tree
 
XBRL on SaaS Platform
XBRL on SaaS PlatformXBRL on SaaS Platform
XBRL on SaaS Platform
 
Barriers to Business Intelligence (BI)
Barriers to Business Intelligence (BI)Barriers to Business Intelligence (BI)
Barriers to Business Intelligence (BI)
 
Compliance to Compete
Compliance to CompeteCompliance to Compete
Compliance to Compete
 
XBRL Overview
XBRL OverviewXBRL Overview
XBRL Overview
 
An Introduction To XBRL
An Introduction To XBRLAn Introduction To XBRL
An Introduction To XBRL
 
XBRL Presentation
XBRL PresentationXBRL Presentation
XBRL Presentation
 
Financial Consolidation Management
Financial Consolidation ManagementFinancial Consolidation Management
Financial Consolidation Management
 
Experiments with Social Media & Networking
Experiments with Social Media & NetworkingExperiments with Social Media & Networking
Experiments with Social Media & Networking
 
Best Deployment: Raymond opts for 1KEY FCM - Financial Consolidation
Best Deployment: Raymond opts for 1KEY FCM - Financial ConsolidationBest Deployment: Raymond opts for 1KEY FCM - Financial Consolidation
Best Deployment: Raymond opts for 1KEY FCM - Financial Consolidation
 
KPI Dashboard for Port Terminals
KPI Dashboard for Port TerminalsKPI Dashboard for Port Terminals
KPI Dashboard for Port Terminals
 
Business Intelligence in Logistics
Business Intelligence in LogisticsBusiness Intelligence in Logistics
Business Intelligence in Logistics
 
Business Intelligence in Pharma
Business Intelligence in PharmaBusiness Intelligence in Pharma
Business Intelligence in Pharma
 
Marketing Analytics with Business Intelligence
Marketing Analytics with Business IntelligenceMarketing Analytics with Business Intelligence
Marketing Analytics with Business Intelligence
 
BI at work for Port Operations
BI at work for Port OperationsBI at work for Port Operations
BI at work for Port Operations
 
Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010
Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010
Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010
 
India's first Business Intelligence (BI)
India's first Business Intelligence (BI)India's first Business Intelligence (BI)
India's first Business Intelligence (BI)
 
Business Intelligence (BI) for Manufacturing
Business Intelligence (BI) for ManufacturingBusiness Intelligence (BI) for Manufacturing
Business Intelligence (BI) for Manufacturing
 

Recently uploaded

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 

Recently uploaded (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 

Business Intelligence (BI) Tools For Computer Forensic

  • 1.
  • 2. Security Technology Forum - CSI Security Technology forum will operate to provide a knowledge sharing forum and also provide a platform for  research in emerging technology in the area of Security for Members of CSI. Vision is to make India safe and secure by use of technology. Mission is to enable Indian technology professionals to understand world class security technology by effectively developing and sharing knowledge assets and best practices.
  • 3. Contents of the Interaction Concept of Forensic Need & Purpose of Forensic Computer Forensic Role of IT for Forensic Data Collection / Mining Tools Data Analysis & Reporting Fraud Detection & Auditing
  • 4. Forensics – Forensic Science Forensic science (often shortened to forensics) is the application of a broad spectrum of sciences to answer questions of interest to a legal system. This may be in relation to a crime or a civil action. Besides its relevance to a legal system, more generally forensics encompasses the accepted scholarly or scientific methodology and norms under which the facts regarding an event, or an artifact, or some other physical item (such as a corpse) are ascertained as being the case. In that regard the concept is related to the notion of authentication, whereby an interest outside of a legal form exists in determining whether an object is what it purports to be, or is alleged as being.
  • 5. Computer Forensic The goal of computer forensics is to explain the current state of a digital artifact. The term digital artifact can include a computer system, a storage medium (such as a hard disk or CD-ROM), an electronic document (e.g. an email message or JPEG image) or even a sequence of packets moving over a computer network. The field of computer forensics also has sub branches within it such as firewall forensics, network forensics, database forensics and mobile device forensics.
  • 6. Simplified Understanding Forensic = Postmortem Computer forensics involves the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and/or root cause analysis Recovering Information the naked eye can no longer see.
  • 7. Need for Computer Forensic Techniques Evidence might be required for a wide range of computer crimes and misuses. The Need for deploying Computer forensic can be In legal cases, computer forensic techniques are frequently used to analyze computer systems belonging to defendants (in criminal cases) or litigants (in civil cases). To recover data in the event of a hardware or software failure. To analyze a computer system after a break-in, for example, to determine how the attacker gained access and what the attacker did. To gather evidence against an employee that an organization wishes to terminate. To gain information about how computer systems work for the purpose of debugging, performance optimization, or reverse-engineering.
  • 8. Reasons For Evidence Wide range of computer crimes and misuses Non-Business Environment: evidence collected by Federal, State and local authorities for crimes relating to: Theft of trade secrets Fraud Extortion Industrial espionage Position of pornography SPAM investigations Virus/Trojan distribution Homicide investigations Intellectual property breaches Unauthorized use of personal information Forgery Perjury
  • 9. Reasons For Evidence (cont) Computer related crime and violations include a range of activities including: Business Environment: Theft of or destruction of intellectual property Unauthorized activity Tracking internet browsing habits Reconstructing Events Inferring intentions Selling company bandwidth Wrongful dismissal claims Sexual harassment Software Piracy
  • 10. Who Uses Computer Forensics? Criminal Prosecutors Rely on evidence obtained from a computer to prosecute suspects and use as evidence Civil Litigations Personal and business data discovered on a computer can be used in fraud, divorce, harassment, or discrimination cases Insurance Companies Evidence discovered on computer can be used to mollify costs (fraud, worker’s compensation, arson, etc) Private Corporations Obtained evidence from employee computers can be used as evidence in harassment, fraud, and embezzlement cases
  • 11. Steps Of Computer Forensics According to many professionals, Computer Forensics is a four (4) step process Acquisition Physically or remotely obtaining possession of the computer, all network mappings from the system, and external physical storage devices Identification This step involves identifying what data could be recovered and electronically retrieving it by running various Computer Forensic tools and software suites
  • 12. Steps Of Computer Forensics (cont) According to many professionals, Computer Forensics is a four (4) step process Evaluation Evaluating the information/data recovered to determine if and how it could be used again the suspect for employment termination or prosecution in court Presentation This step involves the presentation of evidence discovered in a manner which is understood by lawyers, non-technically staff/management, and suitable as evidence as determined by United States and internal laws
  • 13. Handling Information Information and data being sought after and collected in the investigation must be properly handled Volatile Information Network Information Communication between system and the network Active Processes Programs and daemons currently active on the system Logged-on Users Users/employees currently using system Open Files Libraries in use; hidden files; Trojans (rootkit) loaded in system
  • 14. Handling Information (cont) Non-Volatile Information configuration settings system files registry settings that are available after reboot Accessed through drive mappings from system This information should investigated and reviewed from a backup copy
  • 15. Anti-Forensics Software that limits and/or corrupts evidence that could be collected by an investigator Performs data hiding and distortion (HPA & Logic Bombs) Exploits limitations of known and used forensic tools Works both on Windows and LINUX based systems In place prior to or post system acquisition
  • 16. Evidence Processing Guidelines Steps of processing evidence Step 1: Shut down the computer Considerations must be given to volatile information Prevents remote access to machine and destruction of evidence (manual or ant-forensic software) Step 2: Document the Hardware Configuration of The System Note everything about the computer configuration prior to re-locating
  • 17. Evidence Processing Guidelines (cont) Step 3: Transport the Computer System to A Secure Location Do not leave the computer unattended unless it is locked in a secure location Step 4: Make Bit Stream Backups of Hard Disks and Floppy Disks Step 5: Mathematically Authenticate Data on All Storage Devices Must be able to prove that you did not alter any of the evidence after the computer came into your possession Step 6: Document the System Date and Time Step 7: Make a List of Key Search Words Step 8: Evaluate the Windows Swap File
  • 18. Evidence Processing Guidelines (cont) Step 9: Evaluate File Slack File slack is a data storage area of which most computer users are unaware; a source of significant security leakage. Step 10: Evaluate Unallocated Space (Erased Files) Step 11: Search Files, File Slack and Unallocated Space for Key Words Step 12: Document File Names, Dates and Times Step 13: Identify File, Program and Storage Anomalies Step 14: Evaluate Program Functionality Step 15: Document Your Findings Step 16: Retain Copies of Software Used
  • 19. Methods deployed Discovering Data on Computer System Recovering deleted, encrypted, or damaged file information Monitoring live activity Detecting violations of corporate policy
  • 20. Fraud A fraud is an intentional deception made for personal gain or to damage another individual. The specific legal definition varies by legal jurisdiction. Fraud is a crime, and is also a civil law violation. Many hoaxes are fraudulent, although those not made for personal gain are not technically frauds. Defrauding people of money is presumably the most common type of fraud
  • 21.
  • 22.
  • 23. It is estimated that there has been accelerated growth in economic misappropriation;
  • 24. Corporate fraud swing to theft of intellectual property and IT- related incidents;
  • 25. About 42 per cent of the cases in India, it was possible to make recoveries from the perpetrator;
  • 26.
  • 27. High staff turnover, implanting of personnel are the most recurrent cause of exposure to fraud;
  • 28. Imperative effect of globalization;
  • 29. Increased merger and acquisition between companies. CONTINUED……
  • 30.
  • 31. Reacting appropriately to situations where chances of fraud or corruption allegations are found to be high;
  • 32. Providing appropriate training and promulgating relevant codes of conduct to ensure employees and contractors are aware of their responsibilities in combating fraud and corruption; and
  • 33.
  • 34. Build chain of events;
  • 36. Model scenarios.Review existing control system Identify week points regarding information system and e-surveillance. Identify origins and causes of loss Assess fraud risk Develop recommendations for follow-up actions Design compatible business process and policies Training to develop immune with contemporary environment
  • 37. Software for Analysis & Audit of Commercial Data
  • 38.
  • 39.
  • 40. Thank You CA Ashwin Dedhia Director , Solutions MAIA Intelligence