Computer

forensics is simply the
application of computer investigation and
analysis techniques.
Computer forensics invo...
Computer Forensics is
the discovery,
collection, and analysis
of evidence found on
computers and
networks.
1978

the Florida Computer Crime Act was
the 1st law to help deal with computer fraud
and intrusion.
Responding to compu...
Acquisition(Preservation)
 Identification– Technical Analysis
 Evaluation– What the Lawyers Do
 Presentation

Four

1.

2.
3.
4.

forensic principles = success
Minimize data loss
Record everything
Analyze all data collected
Report ...
In

Computer Information System /Information
Technology :
95% or world’s information is being
generated and stored in a ...
Computer

Forensic Analysis
Electronic Discovery
Electronic Evidence Discovery
Digital Discovery
Data Recovery
Data ...
Tools

are used to analyze digital data
& prove or disprove criminal activity.
Used in 2 Phases of Computer
Forensics:
...
Acquisition Tools
Data Discovery Tools
Internet History Tools
Image Viewers
E-mail Viewers
Password

Cracking Tools
...
Workstations

- Copy & Analysis
Drive Imaging System
Drive Wiper
Bridge
•
•

Imaging Device

Write Blocker
SATA, SCSI,...
Identity

Theft
Electronic Fraud (ACH or Credit Card)
Website Defacement / Denial of
Service
Unauthorized Access / Mis...
Steganography
Email

Forensic Techniques
Internet Forensic Techniques
Password cracking Techniques
Criminal
Domestic

Security
Internal
Marketing
Information

a problem.

and evidence is used to solve

Scientist

does the job of solving a crime
through analyzing dat...
computer forensics
computer forensics
computer forensics
Upcoming SlideShare
Loading in...5
×

computer forensics

136

Published on

i make my ppt using different effects.its my seminar ppt ..
enjoy

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
136
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

computer forensics

  1. 1. Computer forensics is simply the application of computer investigation and analysis techniques. Computer forensics involves the preservation, identification, extraction, documentation, and interpretation of computer media for root cause analysis. Computer forensics is a branch of digital forensic science.
  2. 2. Computer Forensics is the discovery, collection, and analysis of evidence found on computers and networks.
  3. 3. 1978 the Florida Computer Crime Act was the 1st law to help deal with computer fraud and intrusion. Responding to computer crime in the 80’s and 90’s law enforcement training programs were started at SEARCH, FLETC and NW3C. 1984 FBI Computer Analysis and Response Team (CART). 1991 International Law Enforcement meeting to discuss computer forensics & the need for standardized approach.
  4. 4. Acquisition(Preservation)  Identification– Technical Analysis  Evaluation– What the Lawyers Do  Presentation 
  5. 5. Four 1. 2. 3. 4. forensic principles = success Minimize data loss Record everything Analyze all data collected Report your findings
  6. 6. In Computer Information System /Information Technology : 95% or world’s information is being generated and stored in a digital form.  Only about one third of documentary evidence is printed out.  Any data that can be stored and read by an electronic device.
  7. 7. Computer Forensic Analysis Electronic Discovery Electronic Evidence Discovery Digital Discovery Data Recovery Data Discovery Computer Analysis Computer Examination
  8. 8. Tools are used to analyze digital data & prove or disprove criminal activity. Used in 2 Phases of Computer Forensics: Acquisition – Images systems & gathers evidence Analysis – Examines data & recovers deleted content
  9. 9. Acquisition Tools Data Discovery Tools Internet History Tools Image Viewers E-mail Viewers Password Cracking Tools Open Source Tools Mobile Device tools (PDA/Cell Phone) Large Storage Analysis Tools
  10. 10. Workstations - Copy & Analysis Drive Imaging System Drive Wiper Bridge • • Imaging Device Write Blocker SATA, SCSI, IDE, USB SCSI Bridge
  11. 11. Identity Theft Electronic Fraud (ACH or Credit Card) Website Defacement / Denial of Service Unauthorized Access / Misuse of Access Cyber bulling Trade Secret Theft National Security Issues
  12. 12. Steganography Email Forensic Techniques Internet Forensic Techniques Password cracking Techniques
  13. 13. Criminal Domestic Security Internal Marketing
  14. 14. Information a problem. and evidence is used to solve Scientist does the job of solving a crime through analyzing data. Using forensic science, it is easier to track the history and trace events related to the crime. Using analysis Tools and Utilities.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×