SlideShare a Scribd company logo
1 of 18
DIGITAL FORENSIC
&
IT'S PROCEDURE
Presented By;
Bhupeshkumar Nanhe
Assist. Professor,
Dept. of Forensic Science
SoS, JECRC University, Jaipur (RJ), India
INTRODUCTION TO COMPUTER FORENSIC
• Digital Forensics is defined as the process of
preservation, identification, extraction, and
documentation of computer evidence which can be
used by the court of law.
• It is a science of finding evidence from digital media
like a computer, mobile phone, server, or network.
• Digital Forensics helps the forensic team to analyzes,
inspect, identifies, and preserve the digital evidence
residing on various types of electronic devices.
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
PROCESS OF COMPUTER FORENSIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
• Identification
• It is the first step in the computer forensic process. The identification process
mainly includes things like what evidence is present, where it is stored, and
lastly, how it is stored (in which format).
• Electronic storage media can be personal computers, Mobile phones, PDAs,
etc.
PROCESS OF COMPUTER FORENSIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
• Preservation
• In this phase, data is isolated, secured, and preserved. It includes preventing
people from using the digital device so that digital evidence is not tampered
with.
PROCESS OF COMPUTER FORENSIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
• Analysis
• In this step, investigation agents reconstruct
fragments of data and draw conclusions based
on evidence found.
• Various tools and techniques used by digital
forensic investigator for the purpose of
extraction of truth.
PROCESS OF COMPUTER FORENSIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
ANALYSIS OF DIGITAL EVIDENCE
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
• Documentation
• In this process, a record of all the visible data must be created. It helps in
recreating the crime scene and reviewing it. It Involves proper documentation
of the crime scene along with photographing, sketching, and crime-scene
mapping.
PROCESS OF COMPUTER FORENSIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
• Presentation
• In this last step, the process of
summarization and explanation of
conclusions is done.
• Presentation should be in easy to
understand manner and with proper
reference.
PROCESS OF COMPUTER FORENSIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
• Disk Forensics:
• It deals with extracting data from storage media by searching active, modified,
or deleted files.
• Network Forensics:
• It is a sub-branch of digital forensics. It is related to monitoring and analysis of
computer network traffic to collect important information and legal evidence.
TYPES OF DIGITAL FORENSIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
• Wireless Forensics:
• It is a division of network forensics. The
main aim of wireless forensics is to
offers the tools need to collect and
analyze the data from wireless network
traffic.
• Database Forensics:
• It is a branch of digital forensics relating
to the study and examination of
databases and their related metadata.
TYPES OF DIGITAL FORENSIC (Conti..)
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
TYPES OF DIGITAL FORENSIC (Conti..)
• Malware Forensics:
• This branch deals with the identification
of malicious code, to study their payload,
viruses, worms, etc.
• Email Forensics
• Deals with recovery and analysis of
emails, including deleted emails,
calendars, and contacts.
TYPES OF DIGITAL FORENSIC (Conti..)
• Memory Forensics:
• It deals with collecting data from
system memory (system
registers, cache, RAM) in raw
form and then carving the data
from Raw dump.
• Mobile Phone Forensics:
• It mainly deals with the
examination and analysis of
mobile devices. It helps to
retrieve phone and SIM contacts,
call logs, incoming, and outgoing
SMS/MMS, Audio, videos, etc.
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
TOOLS USED IN COMPUTER FORENIC
• Forensic Imaging
A forensic image
(forensic copy) is a bit-by-bit,
sector-by-sector direct copy of a
physical storage device,
including all files, folders and
unallocated, free and slack
space.
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
• Forensic Imaging Tools
TOOLS USED IN COMPUTER FORENIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
• Recovery Forensics
Forensic data recovery is the
extraction of data from damaged
evidence sources in a forensically
sound manner.
It can be done with the help of tools
such as Recuva, Disk Drill, etc.
TOOLS USED IN COMPUTER FORENIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
• Recovery Forensic Tools
TOOLS USED IN COMPUTER FORENIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
THANK YOU !!!
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in

More Related Content

What's hot

Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidenceOnline
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsdeaneal
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital ForensicsManik Bhola
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics sunanditaAnand
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
Digital forensic
Digital forensicDigital forensic
Digital forensicChandan Sah
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsN.Jagadish Kumar
 
computer forensics
computer forensicscomputer forensics
computer forensicsshivi123456
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsFilip Maertens
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptSurajgroupsvideo
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologiesurjarathi
 

What's hot (20)

Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
 
L5 Cyber Crime.pptx
L5 Cyber Crime.pptxL5 Cyber Crime.pptx
L5 Cyber Crime.pptx
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Digital forensic
Digital forensicDigital forensic
Digital forensic
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection tools
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologies
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 

Similar to L6 Digital Forensic Investigation Tools.pptx

computerforensicppt-160201192341.pdf
computerforensicppt-160201192341.pdfcomputerforensicppt-160201192341.pdf
computerforensicppt-160201192341.pdfGnanavi2
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensicsJohnson Ubah
 
Systematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation ModelSystematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation ModelCSCJournals
 
Automated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data AcquisitionAutomated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data AcquisitionIJERA Editor
 
Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...Clinton DSouza
 
Zuo Wei 2016
Zuo Wei 2016Zuo Wei 2016
Zuo Wei 2016Wei Zuo
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesBRNSSPublicationHubI
 
AUTOMATED PROCTORING SYSTEM
AUTOMATED PROCTORING SYSTEMAUTOMATED PROCTORING SYSTEM
AUTOMATED PROCTORING SYSTEMIRJET Journal
 
Lie detector
Lie detectorLie detector
Lie detectorankit jha
 
CRIME PREDICTION AND ANALYSIS USING MACHINE LEARNING
CRIME PREDICTION AND ANALYSIS USING MACHINE LEARNINGCRIME PREDICTION AND ANALYSIS USING MACHINE LEARNING
CRIME PREDICTION AND ANALYSIS USING MACHINE LEARNINGMLRITMCSD
 
Presentation (1).pdf
Presentation (1).pdfPresentation (1).pdf
Presentation (1).pdfSOUMYAR27
 
10.computer technology in Research
10.computer technology in Research10.computer technology in Research
10.computer technology in ResearchAsir John Samuel
 
Uncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsUncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsParaben Corporation
 

Similar to L6 Digital Forensic Investigation Tools.pptx (20)

computerforensicppt-160201192341.pdf
computerforensicppt-160201192341.pdfcomputerforensicppt-160201192341.pdf
computerforensicppt-160201192341.pdf
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
 
Systematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation ModelSystematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation Model
 
Automated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data AcquisitionAutomated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data Acquisition
 
Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...
 
Zuo Wei 2016
Zuo Wei 2016Zuo Wei 2016
Zuo Wei 2016
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Computer Forensics.pptx
Computer Forensics.pptxComputer Forensics.pptx
Computer Forensics.pptx
 
The Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptxThe Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptx
 
Scope of Cyber forensics
Scope of Cyber forensicsScope of Cyber forensics
Scope of Cyber forensics
 
AUTOMATED PROCTORING SYSTEM
AUTOMATED PROCTORING SYSTEMAUTOMATED PROCTORING SYSTEM
AUTOMATED PROCTORING SYSTEM
 
Lie detector
Lie detectorLie detector
Lie detector
 
Word
WordWord
Word
 
CRIME PREDICTION AND ANALYSIS USING MACHINE LEARNING
CRIME PREDICTION AND ANALYSIS USING MACHINE LEARNINGCRIME PREDICTION AND ANALYSIS USING MACHINE LEARNING
CRIME PREDICTION AND ANALYSIS USING MACHINE LEARNING
 
Post-Genesis Digital Forensics Investigation
Post-Genesis Digital Forensics InvestigationPost-Genesis Digital Forensics Investigation
Post-Genesis Digital Forensics Investigation
 
Presentation (1).pdf
Presentation (1).pdfPresentation (1).pdf
Presentation (1).pdf
 
Anits dip
Anits dipAnits dip
Anits dip
 
10.computer technology in Research
10.computer technology in Research10.computer technology in Research
10.computer technology in Research
 
Uncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsUncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic tools
 

More from Bhupeshkumar Nanhe

More from Bhupeshkumar Nanhe (7)

Questioned Document.pptx
Questioned Document.pptxQuestioned Document.pptx
Questioned Document.pptx
 
L1 Basics of Forensic Science & FSL.pptx
L1 Basics of Forensic Science & FSL.pptxL1 Basics of Forensic Science & FSL.pptx
L1 Basics of Forensic Science & FSL.pptx
 
Incident response process
Incident response processIncident response process
Incident response process
 
Biometrics
BiometricsBiometrics
Biometrics
 
Geoforensic
Geoforensic Geoforensic
Geoforensic
 
Fingerprint Classification
Fingerprint ClassificationFingerprint Classification
Fingerprint Classification
 
Bhavana Shivankar
Bhavana ShivankarBhavana Shivankar
Bhavana Shivankar
 

Recently uploaded

Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptxanandsmhk
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡anilsa9823
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptxRajatChauhan518211
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPirithiRaju
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...ssifa0344
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsSumit Kumar yadav
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...Sérgio Sacani
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisDiwakar Mishra
 
Zoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdfZoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdfSumit Kumar yadav
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRDelhi Call girls
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxAleenaTreesaSaji
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSarthak Sekhar Mondal
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfmuntazimhurra
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfnehabiju2046
 

Recently uploaded (20)

Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptx
 
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questions
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
 
Zoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdfZoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdf
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptx
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdf
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 

L6 Digital Forensic Investigation Tools.pptx

  • 1. DIGITAL FORENSIC & IT'S PROCEDURE Presented By; Bhupeshkumar Nanhe Assist. Professor, Dept. of Forensic Science SoS, JECRC University, Jaipur (RJ), India
  • 2. INTRODUCTION TO COMPUTER FORENSIC • Digital Forensics is defined as the process of preservation, identification, extraction, and documentation of computer evidence which can be used by the court of law. • It is a science of finding evidence from digital media like a computer, mobile phone, server, or network. • Digital Forensics helps the forensic team to analyzes, inspect, identifies, and preserve the digital evidence residing on various types of electronic devices. Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in
  • 3. PROCESS OF COMPUTER FORENSIC Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
  • 4. • Identification • It is the first step in the computer forensic process. The identification process mainly includes things like what evidence is present, where it is stored, and lastly, how it is stored (in which format). • Electronic storage media can be personal computers, Mobile phones, PDAs, etc. PROCESS OF COMPUTER FORENSIC Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in
  • 5. • Preservation • In this phase, data is isolated, secured, and preserved. It includes preventing people from using the digital device so that digital evidence is not tampered with. PROCESS OF COMPUTER FORENSIC Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in
  • 6. • Analysis • In this step, investigation agents reconstruct fragments of data and draw conclusions based on evidence found. • Various tools and techniques used by digital forensic investigator for the purpose of extraction of truth. PROCESS OF COMPUTER FORENSIC Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in
  • 7. ANALYSIS OF DIGITAL EVIDENCE Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in
  • 8. • Documentation • In this process, a record of all the visible data must be created. It helps in recreating the crime scene and reviewing it. It Involves proper documentation of the crime scene along with photographing, sketching, and crime-scene mapping. PROCESS OF COMPUTER FORENSIC Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in
  • 9. • Presentation • In this last step, the process of summarization and explanation of conclusions is done. • Presentation should be in easy to understand manner and with proper reference. PROCESS OF COMPUTER FORENSIC Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in
  • 10. • Disk Forensics: • It deals with extracting data from storage media by searching active, modified, or deleted files. • Network Forensics: • It is a sub-branch of digital forensics. It is related to monitoring and analysis of computer network traffic to collect important information and legal evidence. TYPES OF DIGITAL FORENSIC Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in
  • 11. • Wireless Forensics: • It is a division of network forensics. The main aim of wireless forensics is to offers the tools need to collect and analyze the data from wireless network traffic. • Database Forensics: • It is a branch of digital forensics relating to the study and examination of databases and their related metadata. TYPES OF DIGITAL FORENSIC (Conti..) Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in
  • 12. TYPES OF DIGITAL FORENSIC (Conti..) • Malware Forensics: • This branch deals with the identification of malicious code, to study their payload, viruses, worms, etc. • Email Forensics • Deals with recovery and analysis of emails, including deleted emails, calendars, and contacts.
  • 13. TYPES OF DIGITAL FORENSIC (Conti..) • Memory Forensics: • It deals with collecting data from system memory (system registers, cache, RAM) in raw form and then carving the data from Raw dump. • Mobile Phone Forensics: • It mainly deals with the examination and analysis of mobile devices. It helps to retrieve phone and SIM contacts, call logs, incoming, and outgoing SMS/MMS, Audio, videos, etc. Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
  • 14. TOOLS USED IN COMPUTER FORENIC • Forensic Imaging A forensic image (forensic copy) is a bit-by-bit, sector-by-sector direct copy of a physical storage device, including all files, folders and unallocated, free and slack space. Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
  • 15. • Forensic Imaging Tools TOOLS USED IN COMPUTER FORENIC Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in
  • 16. • Recovery Forensics Forensic data recovery is the extraction of data from damaged evidence sources in a forensically sound manner. It can be done with the help of tools such as Recuva, Disk Drill, etc. TOOLS USED IN COMPUTER FORENIC Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in
  • 17. • Recovery Forensic Tools TOOLS USED IN COMPUTER FORENIC Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
  • 18. THANK YOU !!! Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in