SlideShare a Scribd company logo
1 of 19
COMPUTER FORENSICS
BY – SARFRAJ ANSARI
1.INTRODUCTION
1.1 DEFINITION
“Forensic computing is the process of identifying,
preserving, analyzing and presenting digital evidence in a
manner that is legally acceptable.”(Rodney Mckemmish
1999).
1.2 CHARECTERISTICS OF COMPUTER
FORENSICS
• IDENTIFYING
• PRESERVING
• ANALYZING
• PRESENTING
1.3 NEEDS OF COMPUTER FORENSICS
oTo produce evidence in the court that can lead to the
punishment of the actual.
oTo ensure the integrity of the computer system.
oTo focus on the response to hi-tech offenses, started to
intertwine.
1.4 HISTORY OF COMPUTER FORENSICS
o Began to evolve more than 30 years ago in US when law
enforcement and military investigators started seeing
criminals get technical.
o Over the next decades, and up to today, the field has
exploded. Law enforcement and the military continue to
have a large presence in the information security and
computer forensic field at the local, state and federal level.
o Now a days, Software companies continue to produce
newer and more robust forensic software programs. And
law enforcement and the military continue to identify and
train more and more of their personnel in the response to
crimes involving technology.
1.5 GOAL OF COMPUTER FORENSICS
o The main goal of computer forensic experts is not
only to find the criminal but also to find out the
evidence and the presentation of the evidence in a
manner that leads to legal action of the criminal.
2. CYBER CRIME & EVIDENCE
2.1 CYBER CRIME
Cyber crime occurs when information technology is
used to commit or conceal an offence.
• TYPES OF CYBER CRIME
o Breech of Computer Security
o Fraud/Theft
o Copyright Violations
o Identity Theft
o Narcotics Investigations
o Threats
o Burglary
o Suicide
o Obscenity
o Homicide
o Administrative Investigations
o Sexual Assault
o Stalking
2.2 DIGITAL EVIDENCE
“Any data that is recorded or preserved on any medium in or by a
computer system or other similar device, that can be read or
understand by a person or a computer system or other similar device.
It includes a display, print out or other output of that data.”
o Latent as fingerprint or DNA
o Fragile and can be easily altered, damaged, or destroyed.
o Can be Time sensitive
2.2.1 TYPES OF DIGITAL EVIDENCE
1) PERSISTANT DATA,
Meaning data that remains intact when the computer is turned off.
E.g. hard drives, disk drives and removable storage devices (such as
USB drives or flash drives).
2) VOLATILE DATA,
Which is data that would be lost if the computer is turned off. E.g.
deleted files, computer history, the computer's registry, temporary files
and web browsing history.
2.2.2. 5 RULES OF EVIDENCES
1) Admissible,
• Must be able to be used in court or elsewhere.
2) Authentic,
• Evidence relates to incident in relevant way.
3) Complete (no tunnel vision),
• Exculpatory evidence for alternative suspects.
4) Reliable,
• No question about authenticity & veracity.
5) Believable,
• Clear, easy to understand, and believable by a jury.
2.3 TOP 10 LOCATION FOR EVIDENCE
1) Internet History Files
2) Temporary Internet Files
3) Slack/Unallocated Space
4) Buddy lists, personal chat room records, P2P, others saved areas
5) News groups/club lists/posting
6) Settings, folder structure, file names
7) File Storage Dates
8) Software/Hardware added
9) File Sharing ability
10)E-mails
3.COMPUTER FORENSICS METHODOLOGY
1) Shut Down the Computer
2) Document the Hardware Configuration of The System
3) Transport the Computer System to A Secure Location
4) Make Bit Stream Backups of Hard Disks and Floppy Disks
5) Mathematically Verify Data on All Storage Devices
6) Document the System Date and Time
7) Make a List of Key Search Words
CONT…
8) Evaluate the Windows Swap File
9) Evaluate File Slack
10) Evaluate Unallocated Space (Erased Files)
11) Search Files, File Slack and Unallocated Space for Key Words
12) Document File Names, Dates and Times
13) Identify File, Program and Storage Anomalies
14) Evaluate Program Functionality
15) Document Your Findings
4. APPLICATIONS OF COMPUTER FORENSICS
4.1 APPLICATIONS
• FINANCIAL FRAUD DETECTION
• CRIMINAL PROSECUTION
• CIVIL LITIGATION
• “CORPORATE SECURITY POLICY AND ACCEPTABLS USE VIOLATIONS”
4.2 Skills Required For Computer Forensics
Application
o Programming or computer-related experience
o Broad understanding of operating systems and applications
o Strong analytical skills
o Strong computer science fundamentals
o Strong system administrative skills
o Knowledge of the latest intruder tools
o Knowledge of cryptography and steganography
o Strong understanding of the rules of evidence and evidence handling
o Ability to be an expert witness in a court of law
CONCLUSION
This field will enable crucial electronic evidence to
be found, whether it was lost, deleted, damaged, or
hidden, and used to prosecute individuals that
believe they have successfully beaten the system.
THANK YOU

More Related Content

What's hot

Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 
Computer Networks
Computer NetworksComputer Networks
Computer Networkslogicgate
 
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...John Bambenek
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed webNitish Joshi
 
E discovery3
E discovery3E discovery3
E discovery3elijaht
 
About Internet
About InternetAbout Internet
About Internetj790129
 
Group pp
Group ppGroup pp
Group pparstni
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1Jinalkakadiya
 
Communication 2
Communication 2Communication 2
Communication 2KZCheng
 
E Mail Ppt 2
E Mail Ppt 2E Mail Ppt 2
E Mail Ppt 2kevpatel
 
Com Slideshow 2
Com Slideshow 2Com Slideshow 2
Com Slideshow 2dlombana
 
Digital Crime & Forensics - Report
Digital Crime & Forensics - ReportDigital Crime & Forensics - Report
Digital Crime & Forensics - Reportprashant3535
 
Rescuing and preserving old software
Rescuing and preserving old softwareRescuing and preserving old software
Rescuing and preserving old softwareNathan Wade
 
Downloading
DownloadingDownloading
Downloadingarstni
 

What's hot (20)

Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 
E discovery3
E discovery3E discovery3
E discovery3
 
About Internet
About InternetAbout Internet
About Internet
 
Quality of information
Quality of informationQuality of information
Quality of information
 
Group pp
Group ppGroup pp
Group pp
 
Electronic discovery
Electronic discoveryElectronic discovery
Electronic discovery
 
Meeting 4 ok
Meeting 4 okMeeting 4 ok
Meeting 4 ok
 
Internet
InternetInternet
Internet
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
 
Communication 2
Communication 2Communication 2
Communication 2
 
resume 2
resume 2resume 2
resume 2
 
E Mail Ppt 2
E Mail Ppt 2E Mail Ppt 2
E Mail Ppt 2
 
Com Slideshow 2
Com Slideshow 2Com Slideshow 2
Com Slideshow 2
 
Digital Crime & Forensics - Report
Digital Crime & Forensics - ReportDigital Crime & Forensics - Report
Digital Crime & Forensics - Report
 
Internet
InternetInternet
Internet
 
Rescuing and preserving old software
Rescuing and preserving old softwareRescuing and preserving old software
Rescuing and preserving old software
 
Downloading
DownloadingDownloading
Downloading
 

Similar to computer forensics

computerforensicsppt-111006063922-phpapp01.pdf
computerforensicsppt-111006063922-phpapp01.pdfcomputerforensicsppt-111006063922-phpapp01.pdf
computerforensicsppt-111006063922-phpapp01.pdfGnanavi2
 
computer forensics by amritanshu kaushik
computer forensics by amritanshu kaushikcomputer forensics by amritanshu kaushik
computer forensics by amritanshu kaushikamritanshu4u
 
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02satyabwati
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20worldAqib Memon
 
computer forensics
computer forensicscomputer forensics
computer forensicsAkhil Kumar
 
Digital&computforensic
Digital&computforensicDigital&computforensic
Digital&computforensicRahul Badekar
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxDaniyaHuzaifa
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxssuser2bf502
 
Forensic investigation
Forensic investigationForensic investigation
Forensic investigationinfosecindia
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsdeaneal
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfGnanavi2
 
Computer forensics libin
Computer forensics   libinComputer forensics   libin
Computer forensics libinlibinp
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collectiongagan deep
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensicsLalit Garg
 

Similar to computer forensics (20)

computerforensicsppt-111006063922-phpapp01.pdf
computerforensicsppt-111006063922-phpapp01.pdfcomputerforensicsppt-111006063922-phpapp01.pdf
computerforensicsppt-111006063922-phpapp01.pdf
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
computer forensics by amritanshu kaushik
computer forensics by amritanshu kaushikcomputer forensics by amritanshu kaushik
computer forensics by amritanshu kaushik
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Digital&computforensic
Digital&computforensicDigital&computforensic
Digital&computforensic
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
Forensic investigation
Forensic investigationForensic investigation
Forensic investigation
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
Computer forensics libin
Computer forensics   libinComputer forensics   libin
Computer forensics libin
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
IT forensic
IT forensicIT forensic
IT forensic
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collection
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 

Recently uploaded

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 

Recently uploaded (20)

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 

computer forensics

  • 1. COMPUTER FORENSICS BY – SARFRAJ ANSARI
  • 2. 1.INTRODUCTION 1.1 DEFINITION “Forensic computing is the process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally acceptable.”(Rodney Mckemmish 1999).
  • 3. 1.2 CHARECTERISTICS OF COMPUTER FORENSICS • IDENTIFYING • PRESERVING • ANALYZING • PRESENTING
  • 4. 1.3 NEEDS OF COMPUTER FORENSICS oTo produce evidence in the court that can lead to the punishment of the actual. oTo ensure the integrity of the computer system. oTo focus on the response to hi-tech offenses, started to intertwine.
  • 5. 1.4 HISTORY OF COMPUTER FORENSICS o Began to evolve more than 30 years ago in US when law enforcement and military investigators started seeing criminals get technical. o Over the next decades, and up to today, the field has exploded. Law enforcement and the military continue to have a large presence in the information security and computer forensic field at the local, state and federal level. o Now a days, Software companies continue to produce newer and more robust forensic software programs. And law enforcement and the military continue to identify and train more and more of their personnel in the response to crimes involving technology.
  • 6. 1.5 GOAL OF COMPUTER FORENSICS o The main goal of computer forensic experts is not only to find the criminal but also to find out the evidence and the presentation of the evidence in a manner that leads to legal action of the criminal.
  • 7. 2. CYBER CRIME & EVIDENCE 2.1 CYBER CRIME Cyber crime occurs when information technology is used to commit or conceal an offence.
  • 8. • TYPES OF CYBER CRIME o Breech of Computer Security o Fraud/Theft o Copyright Violations o Identity Theft o Narcotics Investigations o Threats o Burglary o Suicide o Obscenity o Homicide o Administrative Investigations o Sexual Assault o Stalking
  • 9. 2.2 DIGITAL EVIDENCE “Any data that is recorded or preserved on any medium in or by a computer system or other similar device, that can be read or understand by a person or a computer system or other similar device. It includes a display, print out or other output of that data.” o Latent as fingerprint or DNA o Fragile and can be easily altered, damaged, or destroyed. o Can be Time sensitive
  • 10. 2.2.1 TYPES OF DIGITAL EVIDENCE 1) PERSISTANT DATA, Meaning data that remains intact when the computer is turned off. E.g. hard drives, disk drives and removable storage devices (such as USB drives or flash drives). 2) VOLATILE DATA, Which is data that would be lost if the computer is turned off. E.g. deleted files, computer history, the computer's registry, temporary files and web browsing history.
  • 11. 2.2.2. 5 RULES OF EVIDENCES 1) Admissible, • Must be able to be used in court or elsewhere. 2) Authentic, • Evidence relates to incident in relevant way. 3) Complete (no tunnel vision), • Exculpatory evidence for alternative suspects. 4) Reliable, • No question about authenticity & veracity. 5) Believable, • Clear, easy to understand, and believable by a jury.
  • 12. 2.3 TOP 10 LOCATION FOR EVIDENCE 1) Internet History Files 2) Temporary Internet Files 3) Slack/Unallocated Space 4) Buddy lists, personal chat room records, P2P, others saved areas 5) News groups/club lists/posting 6) Settings, folder structure, file names 7) File Storage Dates 8) Software/Hardware added 9) File Sharing ability 10)E-mails
  • 13. 3.COMPUTER FORENSICS METHODOLOGY 1) Shut Down the Computer 2) Document the Hardware Configuration of The System 3) Transport the Computer System to A Secure Location 4) Make Bit Stream Backups of Hard Disks and Floppy Disks 5) Mathematically Verify Data on All Storage Devices 6) Document the System Date and Time 7) Make a List of Key Search Words
  • 14. CONT… 8) Evaluate the Windows Swap File 9) Evaluate File Slack 10) Evaluate Unallocated Space (Erased Files) 11) Search Files, File Slack and Unallocated Space for Key Words 12) Document File Names, Dates and Times 13) Identify File, Program and Storage Anomalies 14) Evaluate Program Functionality 15) Document Your Findings
  • 15. 4. APPLICATIONS OF COMPUTER FORENSICS 4.1 APPLICATIONS • FINANCIAL FRAUD DETECTION • CRIMINAL PROSECUTION • CIVIL LITIGATION • “CORPORATE SECURITY POLICY AND ACCEPTABLS USE VIOLATIONS”
  • 16. 4.2 Skills Required For Computer Forensics Application o Programming or computer-related experience o Broad understanding of operating systems and applications o Strong analytical skills o Strong computer science fundamentals o Strong system administrative skills o Knowledge of the latest intruder tools o Knowledge of cryptography and steganography o Strong understanding of the rules of evidence and evidence handling o Ability to be an expert witness in a court of law
  • 18. This field will enable crucial electronic evidence to be found, whether it was lost, deleted, damaged, or hidden, and used to prosecute individuals that believe they have successfully beaten the system.