SlideShare a Scribd company logo
1 of 42
Computer Science
Presentation
PRESENTED TO: PROF. MUHAMMAD HAMID
In the name of Allah, Most Gracious & Most Merciful.
 Definition
 History of Computer Forensics
 Main Objectives
 Who uses Forensic Science
 Computer Crimes
 Tips for Computer Crimes
 Steps of Computer Forensics
 Forensic Science Laboratory
 Forensic Equipment’s
 Skills Required for Computer Forensics
 Disadvantages of Computer Forensics
 Conclusion
Definition
Forensic Science is the application of science
to criminal and civil laws and involves the
preservation, identification, extraction and
documentation for evidentiary and root cause
analysis.
History of Computer Forensics
• It is difficult to pinpoint when computer forensics history began.
• Most experts agree that the field of computer forensics began to evolve more
than 30 years ago.
• The field began in the United States, in large part, when law enforcement and
military investigators started seeing criminals get technical.
Main Objectives
Find Digital Evidences
Analyzing Evidences
Catching Criminals
Digital Evidence
• Definition
Digital evidence is defined as information and data of value to an
investigation that is stored on, received or transmitted by an electronic device.
•Properties
i. Admissible
ii. Authentic
iii. Complete
iv. Reliable
v. Believable
Where to Find It?
Computer
Devices
Visited Websites Encrypted
Memory Devices
Social Media
Analyzing Evidences
• Latent fingerprints and impressions which develops
latent fingerprints; analyzes and compares fingerprints,
footwear and tire impressions; and runs fingerprints
through the Automated Fingerprint Identification System.
• The trace evidence department runs GSR analysis,
and identifies and compares samples of soil, glass,
fibers and paint.
•The chemistry section conducts analysis and comparison of illicit drugs, explosives and
unknown chemicals.
•The computer crimes team recovers evidence from computers and performs computer
enhancement on audio or video evidence.
•The medical section include Serology and DNA,
which conducts body fluid analysis, including DNA
analysis for blood stains, semen and hair for
identification and comparison.
Catching Criminals
Following Forensic methods are used in catching criminals:
DNA Testing Fingerprinting Using GPS
CCTV
Operating
System
Face Sketch ID
System
Who Uses Forensic Science
Who
Uses
Forensic
Sciences
Digital
Forensic
Research
Information
Warfare
Critical
Infrastructure
Research
Business &
Industry
Military
Operations
Law
Enforcement
Courts
FBI
The Federal Bureau of Investigation is the domestic
intelligence and security service of the United States
and its principal federal law enforcement agency.
 FBI's focus is on stopping terrorism, corruption,
organized crime, cyber crime and civil rights
violations, as well as investigating serious crimes such
as major thefts or murders.
CID
Crime Investigation Department will assist and
support the district police either by taking up the
entire investigation of a case, or by sending one or
more of the specialist investigating officers or
civilian experts to the district Police, including visits
to scenes of crime, providing technical support and
criminal intelligence.
NAB
National Accountability Bureau is a federal
executive agency of the Government of Pakistan,
with the mandate to deal with corruption
prevention, raise public awareness, and enforce
of anti-corruption measures.
 The NAB has its headquarters in the federal
capital and has five regional offices in four
provinces.
Computer Crimes
Any Crime where computer is a tool, target, or both.
Tips for Computer Crimes
Use Antivirus software's
Uninstall unnecessary software
Maintain Backup
Check security settings
Never give your full name & address to strangers
Learn more about internet privacy
Steps of Computer
Forensics
Steps of Computer Forensics
Identification
Documentation
Preservation Extraction
Interpretation Presentation
Identification
Identify Evidence
Identify type of information available
Determine how best to retrieve it
Preservation
Preserve evidence with least amount of change
possible
Must be able to account for any change
Chain of custody
Extraction
Extraction refers to the recovery of data from
whatever media the data is stored on.
Documentation
It is important to precisely record location and
status of computers, storage media, other electronic
devices, and traditional evidence.
Interpretation
Interpretation is required to ensure the evidential
weight of recovered digital evidence is clear.
Presentation
 Evidence will be accepted in court on:
 Manner of presentation
 Qualification of the presenter
 Credibility of the process used to
preserve and analyze evidence
Forensic Science
Laboratory
A forensic science laboratory is a scientific
laboratory specializing in forensic science.
Forensic Laboratories in Pakistan
 NFSA (National Forensic Science Agency)
 The agency provides forensic services, training and guidance to Law Enforcement
Agencies (LEAs), Government departments and Forensic bodies.
 PFSA (Punjab Forensic Science Agency)
 Receives physical evidence from Law Enforcement Agencies on criminal and civil
cases and analyzing the forensic evidence.
Forensic
Laboratory
Equipment’s
Atomic Spectroscopy
Arc Spark Spectrometer (Spark Emission Spectrometer)
Atomic Absorption Auto-Samplers
Atomic Fluorescence Spectrometer (AFS)
Evidence Storage
Evidence Drying Cabinet
Laboratory and Industrial Freezers
Fingerprint Analysis
 Fingerprint Development Chamber
Fuming Chamber / Cyanoacrylate Fuming Chamber
DNAAnalysis
 Automated DNA Sequencer
 PCR Technology
Skills
Required For
Computer
Forensic
Application
PROGRAMMING OR
COMPUTER-RELATED
EXPERIENCE.
BROAD UNDERSTANDING
OF OPERATING SYSTEM &
APPLICATIONS.
STRONG ANALYTICAL
SKILLS.
Skills
(continued…)
STRONG
COMPUTER
SCIENCE
FUNDAMENTALS
.
STRONG
SYSTEM
ADMINISTRAT
IVE SKILLS.
KNOWLEDGE
OF THE LATEST
INTRUDER
TOOLS.
Skills
(continued…)
KNOWLEDGE OF THE
CRYPTOGRAPHY.
KNOWLEDGE OF THE
STEGANOGRAPHY.
STRONG UNDERSTANDING OF THE
RULES OF EVIDENCE & EVIDENCE
HANDLING.
ABILITY TO BE AN EXPERT
WITNESS IN A COURT OF LAW.
Disadvantages of
Computer Forensics
 Costs
Preserving electronic records & preserving
them is extremely costly.
 Presents the potential for exposing privileged
documents.
 Legal practitioners must have extensive
computer knowledge.
Conclusion
With computers becoming more and more involved in our everyday life, both
professionally and socially, there is a need for computer forensic. This field will
enable crucial electronic evidence to be found whether it was lost, deleted,
damaged or hidden, and used to prosecute individuals that believe they have
successfully beaten the system.
This Photo by Unknown Author is licensed under CC BY
Computer Forensics & Cyber Crimes

More Related Content

What's hot

Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic pptPriya Manik
 
C:\Documents And Settings\Jferral\Desktop\Roe Temps\Fingerprint Department\Fi...
C:\Documents And Settings\Jferral\Desktop\Roe Temps\Fingerprint Department\Fi...C:\Documents And Settings\Jferral\Desktop\Roe Temps\Fingerprint Department\Fi...
C:\Documents And Settings\Jferral\Desktop\Roe Temps\Fingerprint Department\Fi...ROE14
 
CS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IVCS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IVArthyR3
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber lawPrashant Angadi
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
Neeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence actNeeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence actNeeraj Aarora
 
NYDOC Protocol For VideoConfering Inmates
NYDOC Protocol For VideoConfering InmatesNYDOC Protocol For VideoConfering Inmates
NYDOC Protocol For VideoConfering InmatesTodd Spodek
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20worldAqib Memon
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Witness protection in punjab
Witness protection in punjabWitness protection in punjab
Witness protection in punjabLangrial
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 

What's hot (17)

Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
C:\Documents And Settings\Jferral\Desktop\Roe Temps\Fingerprint Department\Fi...
C:\Documents And Settings\Jferral\Desktop\Roe Temps\Fingerprint Department\Fi...C:\Documents And Settings\Jferral\Desktop\Roe Temps\Fingerprint Department\Fi...
C:\Documents And Settings\Jferral\Desktop\Roe Temps\Fingerprint Department\Fi...
 
Vipul pdf
Vipul pdfVipul pdf
Vipul pdf
 
Cyber law01
Cyber law01Cyber law01
Cyber law01
 
CS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IVCS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IV
 
File000154
File000154File000154
File000154
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Neeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence actNeeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence act
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
NYDOC Protocol For VideoConfering Inmates
NYDOC Protocol For VideoConfering InmatesNYDOC Protocol For VideoConfering Inmates
NYDOC Protocol For VideoConfering Inmates
 
Cyber evidence at crime scene
Cyber evidence at crime sceneCyber evidence at crime scene
Cyber evidence at crime scene
 
File000114
File000114File000114
File000114
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Witness protection in punjab
Witness protection in punjabWitness protection in punjab
Witness protection in punjab
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 

Similar to Computer Forensics & Cyber Crimes

Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtCell Site Analysis (CSA)
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesICFECI
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsZyxware Technologies
 
Forensic investigation
Forensic investigationForensic investigation
Forensic investigationAsadMalik120
 
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdf
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdfforensicscienceinpakistan-150214040113-conversion-gate01 (1).pdf
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdfalizain9604
 
Forensic science in pakistan
Forensic science in pakistanForensic science in pakistan
Forensic science in pakistanawaisajaz
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptSurajgroupsvideo
 
Latihan2 comp-forensic
Latihan2 comp-forensicLatihan2 comp-forensic
Latihan2 comp-forensicsabtolinux
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxDaniyaHuzaifa
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxssuser2bf502
 
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docxRunning head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docxtoltonkendal
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital ForensicsManik Bhola
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Sagar Rahurkar
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic Science5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic ScienceICFECI
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 

Similar to Computer Forensics & Cyber Crimes (20)

Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics services
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
Forensic investigation
Forensic investigationForensic investigation
Forensic investigation
 
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdf
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdfforensicscienceinpakistan-150214040113-conversion-gate01 (1).pdf
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdf
 
Forensic science in pakistan
Forensic science in pakistanForensic science in pakistan
Forensic science in pakistan
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Latihan2 comp-forensic
Latihan2 comp-forensicLatihan2 comp-forensic
Latihan2 comp-forensic
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docxRunning head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic Science5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic Science
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 

Recently uploaded

Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)Basil Achie
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSebastiano Panichella
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...NETWAYS
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxmavinoikein
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSebastiano Panichella
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptssuser319dad
 

Recently uploaded (20)

Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.ppt
 

Computer Forensics & Cyber Crimes

Editor's Notes

  1. Catching Criminals in various types of Frauds The evidence includes many forms such as finger prints, DNA test or complete files on computer hard drives etc.