The world of computer forensics


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

The world of computer forensics

  1. 1. The World Of Computer Forensics<br />Know the Secrets<br />
  2. 2. What is Computer Forensics?<br />Computer forensics is the investigation and analysis of a suspects computer, to uncover evidence of a crime. For instance, theft of trade secrets, theft or destruction of intellectual property, or fraud. Computer forensics specialists have an impressive arsenal of methods for recovering deleted, encrypted, or damaged files to reveal information stored in a computer.<br />
  3. 3. Methods Used in Computer Forensics<br />A computer forensics specialist has several targets in the process of identifying and attempting to retrieve evidence on a computer system.<br />He must first protect the suspect computer system from any damage or alteration, any corruption of the files, and the possible introduction of a virus during the forensic examination.<br />
  4. 4. The examination itself starts with a search for every file on the system. This includes not only existing normal files, but remains of deleted files, and any hidden, encrypted, or password-protected files.<br />Once these are found, the next step is to recover as much information as possible from any deleted files, reveal the contents of hidden files, and read any temporary or swap files used by applications and the operating system. If any protected or encrypted files are on the system, these will need to be broken into.<br />
  5. 5. He will then analyze all the information that can be found in the usually inaccessible areas of the hard drive. This will include all the 'unallocated' space on a disk, that while currently unused may have previously been used to store information.<br />Other areas to search are the 'slack' space in a file; this is the unused area at the end of a file structure, found in the last assigned disk cluster, that while it may be unused now is another possible region that may have been in use earlier.<br />
  6. 6. When all this is done he will produce an overall analysis of the computer system listing all the possibly relevant files, and any discovered file data he has revealed.<br />Usually he will offer an expert opinion of the general system layout, file structures, discovered data, and the authorship of files as well as any attempts that have been made to hide, delete, protect, or encrypt stored information.<br />
  7. 7. Situations in Which Computer Forensics is Needed<br />There are many types of both criminal and civil proceedings that employ computer forensics specialists.<br />Computer evidence can be used in any case where incriminating documents are likely to be found on the computer: homicides, financial fraud, and child pornography to give a few examples. Civil cases frequently make use of business and personal records found on computer systems, mainly in fraud, divorce, discrimination, and harassment cases.<br />
  8. 8. Insurance Companies too can mitigate their costs by using discovered computer evidence of possible fraudulent accident claims, arson, and compensation cases.<br /> Corporations frequently hire computer forensics specialists to uncover computer evidence relating to sexual harassment, embezzlement, and theft of trade secrets or other confidential information.<br />
  9. 9. Law Enforcement Officials often call for assistance in making pre-search warrant preparations and the handling of seized computer equipment. Though comparatively rare, private individuals may hire computer forensics specialists to support or fight claims of wrongful termination, sexual harassment, or age discrimination. <br />
  10. 10. © 2005 - 2011 copyright <br />By : LB<br />THE END<br />