computer forensics
Upcoming SlideShare
Loading in...5

Like this? Share it with your network


computer forensics

Uploaded on

i make my ppt using different effects.its my seminar ppt .. ...

i make my ppt using different effects.its my seminar ppt ..

More in: Education
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads


Total Views
On Slideshare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. Computer forensics is simply the application of computer investigation and analysis techniques. Computer forensics involves the preservation, identification, extraction, documentation, and interpretation of computer media for root cause analysis. Computer forensics is a branch of digital forensic science.
  • 2. Computer Forensics is the discovery, collection, and analysis of evidence found on computers and networks.
  • 3. 1978 the Florida Computer Crime Act was the 1st law to help deal with computer fraud and intrusion. Responding to computer crime in the 80’s and 90’s law enforcement training programs were started at SEARCH, FLETC and NW3C. 1984 FBI Computer Analysis and Response Team (CART). 1991 International Law Enforcement meeting to discuss computer forensics & the need for standardized approach.
  • 4. Acquisition(Preservation)  Identification– Technical Analysis  Evaluation– What the Lawyers Do  Presentation 
  • 5. Four 1. 2. 3. 4. forensic principles = success Minimize data loss Record everything Analyze all data collected Report your findings
  • 6. In Computer Information System /Information Technology : 95% or world’s information is being generated and stored in a digital form.  Only about one third of documentary evidence is printed out.  Any data that can be stored and read by an electronic device.
  • 7. Computer Forensic Analysis Electronic Discovery Electronic Evidence Discovery Digital Discovery Data Recovery Data Discovery Computer Analysis Computer Examination
  • 8. Tools are used to analyze digital data & prove or disprove criminal activity. Used in 2 Phases of Computer Forensics: Acquisition – Images systems & gathers evidence Analysis – Examines data & recovers deleted content
  • 9. Acquisition Tools Data Discovery Tools Internet History Tools Image Viewers E-mail Viewers Password Cracking Tools Open Source Tools Mobile Device tools (PDA/Cell Phone) Large Storage Analysis Tools
  • 10. Workstations - Copy & Analysis Drive Imaging System Drive Wiper Bridge • • Imaging Device Write Blocker SATA, SCSI, IDE, USB SCSI Bridge
  • 11. Identity Theft Electronic Fraud (ACH or Credit Card) Website Defacement / Denial of Service Unauthorized Access / Misuse of Access Cyber bulling Trade Secret Theft National Security Issues
  • 12. Steganography Email Forensic Techniques Internet Forensic Techniques Password cracking Techniques
  • 13. Criminal Domestic Security Internal Marketing
  • 14. Information a problem. and evidence is used to solve Scientist does the job of solving a crime through analyzing data. Using forensic science, it is easier to track the history and trace events related to the crime. Using analysis Tools and Utilities.