SlideShare a Scribd company logo
1 of 16
Lessons on Fraud Awareness -Digital Forensics Basic Concepts-
LESSON – V
Author
Narayanarao Kolluru
B .Com ; FCA; CFFE-(IFS-Pune),CFE-(West Virginia university)
www.fraudsdetection.com & LinkedIn
YouTube Channel: CA Narayanarao Kolluru
(All information on my ppts. Is from web ,my research articles, internet news and some related books, put in a concise form into points for easy understanding)
WHAT IS DIGITAL FORENSICS?
LOOKING INTO EVIDENCES
EXTRACTION & ANALYSIS &Reporting of DATA .
<FROM>
LAPTOPS-COMPUTERS-MOBILES-DATA STORAGE DEVISES-INTERNET & www.Data.
Meaning of Digital Forensics:
A new milestone in the era of Forensics.
In the earlier Lesson Four- Cyber Crimes and Frauds, concept was explained.
Frauds are there at all the Four corners of the world.
Cyber frauds are the top most method by which frauds are committed due to the Technology
development, Internet usage by one and all and online transacting and online working at present due to
the COVID 19 pandemic.
DIGITAL FORENSICS : Digital forensics or computer forensics a forensic science ( “Forensic” means
evidence collected is allowed in courts of law),dealing with recovery and investigation of the data and
material recovered from computers and other such devises. 80% of Frauds and crimes are cyber crimes
,hence the importance of digital forensics.
Digital forensics is the Scientific process of analyzing, storing and identifying and then documenting all
the digital evidence collected for presenting in courts of law as and when required as evidence with
respect to all Cyber crimes. There is increase in the misuse of ICT (Information Communications
Technology), which is facilitating to cyber frauds and crimes across the world, for all illegal activities.
Data is collected using various high end tools to extract digital footprints ,even if data is erased totally,
data foot prints save all the history of data used on the storage devise, like computers, mobile phones
and internet.
Different Stages in Digital Forensics:
All Electronic Evidence is Digital evidence.
Digital forensics is conducted by a Computer Forensics Investigator, whose report a fraud examiner can
utilise in his evidence in case of financial frauds and crimes. The information is extracted from digital foot
prints where necessary,
 Identify the purpose of Digital Forensics.
 Identify the resources required.
 Analysis of the data by use of proper tools & Techniques of data analytics.
 Process the data and interpret .
 Document the results of process and interpretation, with diagrams, sketches, tables as needed.
 Proper presentation by summarizing the conclusions of the analysis of data; Report writing.
 Properly securing and preserving the data for future use and for presenting as evidence in courts of law.
 Recovering unallocated, free and slack spaces. Looking for hidden files, identifying unauthorised users
A brief about Filing System of various Data………..
……….Necessary for Forensic analysis
• It is important to understand about filing systems in the context of digital Forensics:
• File systems are nothing but a place to store the data on computer and other devises like a filing
cabinet.
• Different Types pf Data storing:
• FAT or FAT32 Systems : File Allocation Table. Most commonly found in operating systems.
• Boot Sector : The set of information needed by the operating system of a computer is called the
boot sector.
• NTFS File System: New Technology File Systems, provides a quick file system recovery on very
large disks ,and performs, read, write and search functions.
Different Branches of Digital Forensic :
The following are some of the several branches of Digital Forensics:
1.Net work Forensics
2.Fire wall Forensics
3.Data base Forensics
4.Mobile devise Forensics
5.E-Mail Forensics
6.Computer Forensics
Brief description of different branches of Digital Forensics:
1.Network Forensics- <Meaning & Methods>
Network forensics is of utmost importance as it deals with the packets of data that flow through
the net work and internet with laptops, mobiles and tabs connected for communication.
Network forensics monitors the data flow over the networks to collect and detect attacks and
analyse the nature of attacks and the attackers behind such harmful and criminal activities. The
data and information is collected across different websites different equipment like firewalls and
IDS-Intrusion detecting systems.
Several technical challenges are encountered by the digital forensic investigator under this
network forensic collection of data: despite encrypting the traffic.
Under network forensics-analysis of information collected on Ethernet, TCP & IP protocols,
Internet data flow, Wireless net work data flows, E-mail servers, web servers are all examined.
The two methods of collecting data are:1.”Catch it as you can” 2. “Stop, look and listen”.
Brief description of different branches of Digital Forensics:
Network Forensics- <Tools of Net Work Forensics>
Packet analyser or sniffers: Is a computer software or hardware which intercept and record data
from network and store such data. This is used by computer professionals as well cyber criminals
can check content of files and communications that are passed over the internet and net works.
Tcpdump, Wireshark /shark and tstat are all popular protocol analysers. These tools allow one to
capture packets as they pass through, which can be analysed latter.
There are specific programmes for detecting intrusions, matching regular expressions, extract files
or pictures ,sniff passwords, HTTP sessions, social engineering.
Brief description of different branches of Digital Forensics
2. Firewall Forensics
Firewall forensics is of importance as the log contains all incoming and outgoing data. It uses
firewall log files to collect and analyses the data.
This helps as a source of evidence when there is any attack on computers.
t is thus a principle branch of computer/digital forensics field.
However it requires an expert to decode the log files and extract the information contained .
Also Firewall forensic data after it is extracted and analyzed will assist the security administrator
to make correct judgement and take appropriate decisions.
Brief description of different branches of Digital Forensics
3. Data Base Forensics
Another very important concept of digital forensics is Data Base forensics. Data base forensics
deals with the meta data and time stamps which show who accessed the data and the various
actions performed .This analysis is important when there are breaches of the systems and devises
and data is stolen or misused.
A data base may be defines as the data collected and stored on any computer or other devises
using the internet and web browsing or any other data compiled in the organisation and various
files stored on the devises. Hence data base forensics helps in case of any wrong doing or fraud by
any insider or outsider.
There are various data bases like end user, operational, distributed ,centralised etc.
 The goal pf data base forensics is fact finding and recreating the truth.
Data base forensic experts use various tools for verifying the data on ”read only data” mode so
that there will not be any changes accidental or otherwise of the data collected.
Brief description of different branches of Digital Forensics
4. Mobile Device Forensics
The data extraction from mobile phones is frequently used in all cyber crime/ Frauds.
It takes about four to eight hours to extract all the data from a mobile phone.
Even deleted data also can be retrieved for investigation.
Police and investigators use “Tower Dumps” without any warrant in their investigation of any
crime or fraud, to get details of all voice messages, pictures, call logs, text messages, E-mails,
social apps. Interacting, etc from the Telephone Towers which are in the vicinity of the fraud or
crime or based on any clue.
How far is collecting data from Tower dumps is legal has to be examined as in the process of crime
investigation even the data of persons not related to the fraud or crime also collected!!
The process of Mobile forensics involves-Seizure of the mobile and preserve it for chain of
custody, Put in Airplane mode and switch off Wi-Fi, disable hotspots, clone the devise Sim card,
use phone jammers from any interference and finally use a Faraday Box or Bag with built in power
source to safeguard the mobile as well to guard during transportation to lab etc.
Brief description of different branches of Digital Forensics
5. E-Mail Forensics
 Next important source of evidence in the process of investigation is information retrieved from
e-mails. This gives data about the sender,receiver,content,time sent, to help the investigators, in
any fraud or criminal probe.
E-mail communications over the internet and various devises like computers, mobile or Tab is of
high importance. Also the digital analysis of email is very important to trace fake e-mails
addresses misrepresenting as if from a genuine sender to the recipient. Despite many security
protocols the Cyber criminals still manage to send spam mails, phishing e-mails, distributing hate
mail, child pornography, worms, viruses and Trojan horses.
There are several tools to investigate E-mails, the following are some of them to cite as an example:
E-Mail Tracker Pro :analyses the headers, to identify the IP address of the machine that sent the
email. This e mail can pin point the city from where the mail has most likely come from.
E-Mail Tracer: It is an email migration and conversion tool, which supports various mail formats.
It can detect deleted e-mails.
Access Data's FTK: This helps in analysis, Decryption and pass word cracking and supports popular
encryption technologies.
Brief description of different branches of Digital Forensics
6.Computer Forensics
Crime is not solved by technology but by people
Meaning:
Under computer forensics, techniques are used to analyze, search and preserve information and
secure it for producing as evidence in a court of law.
One TERA byte (TB) of data takes approximately 5 hours to create a forensic image.
The process involves extracting through scientific methods data, validate the data, analyze the
data ,document and present the data in a Report format with detailed .
There are various hardware and software tools available for computer forensics.
The computer forensic tools perform - Acquition of data, extraction, validation ,reconstruction
and reporting.
There are several tools like FTK, Encase I Look, Bulk extractor ,CAINE , The Sleuth Kit etc ( need
detailed study separately)
Importance of chain of custody: Meaning……..
In the context of collection of evidence
Forensic Sciences-Chain Of Custody:(A Brief Note)
In Forensic Sciences the most important aspect is Chain Of Custody.
What it means is the total flow of actions taken from beginning till the end. All the steps taken at
the outset till investigation process the flow of events must be properly documented. The reason
being all forensic cases end up in courts, and the judiciary will take their deliberations and final
conclusions based only on Facts and Evidence, to the satisfaction of the courts.
Hence to present a case “Chain of Custody” is very important process. If there is no proper and
clear chain of custody latter there will be allegations of improper care of the evidence collected
which may result in the courts acquitting the guilty in the case involved, due to poor evidence and
poor chain of custody.
Note on Cyber Law…………………………
In the modern day a Thief can steal more with a computer than a gun and a Terrorist can create more havoc
then with a Bomb!!
• Meaning:
• Cyber Laws deal the legal matters concerned cyber space.
• They deal with freedom of expression, privacy.
• Deal with copyright violations, harassment over internet, trade secrets , computer hardware &
software.
• Cyber law is very important aspect as it deals with internet, world wide web and cyber space in
the present day usage of technology .
• The need for a separate law became necessary all over the world as normal laws cannot deal with
intangible dimensions of cyber space.
• Subsequently the persons involved are tried under other laws of the legal system viz:Criminal
laws, civil laws and other regulatory laws.
• There is also Information and technology act to deal with cyber crimes.
End of Lesson FIVE
DIGITAL FORENSICS

More Related Content

What's hot

Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry BrianHuntMSFCPACRISC
 
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWultra
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Ashish Chauhan
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250Chris Crowe
 
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Netpluz Asia Pte Ltd
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignStephanie Holman
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18Symantec
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcMert Akın
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessGreg Wartes, MCP
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionEMC
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
The Proactive Approach to Cyber Security
The Proactive Approach to Cyber SecurityThe Proactive Approach to Cyber Security
The Proactive Approach to Cyber SecurityNathan Desfontaines
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameTatainteractive1
 

What's hot (20)

The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
 
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking Apps
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250
 
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwc
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
 
Little book of cyber scams
Little book of cyber scamsLittle book of cyber scams
Little book of cyber scams
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
The Proactive Approach to Cyber Security
The Proactive Approach to Cyber SecurityThe Proactive Approach to Cyber Security
The Proactive Approach to Cyber Security
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 

Similar to Lessons on Fraud Awareness - Digital Forensics Basic Concepts

What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
Cyber crime - and digital device.pptx
Cyber crime - and digital device.pptxCyber crime - and digital device.pptx
Cyber crime - and digital device.pptxAlAsad4
 
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...Danny609Davidson
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricsMayank Diwakar
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)JIEMS Akkalkuwa
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensicsijtsrd
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop newforensicsnation
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsZyxware Technologies
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshopforensicsnation
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
 
TOOLS AND TECHNIQUES FOR NETWORK FORENSICS
TOOLS AND TECHNIQUES FOR NETWORK FORENSICSTOOLS AND TECHNIQUES FOR NETWORK FORENSICS
TOOLS AND TECHNIQUES FOR NETWORK FORENSICSIJNSA Journal
 
Computer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital WorldComputer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital Worldrahulmonikasharma
 

Similar to Lessons on Fraud Awareness - Digital Forensics Basic Concepts (20)

What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Cyber crime - and digital device.pptx
Cyber crime - and digital device.pptxCyber crime - and digital device.pptx
Cyber crime - and digital device.pptx
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
The Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptxThe Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptx
 
Scope of Cyber forensics
Scope of Cyber forensicsScope of Cyber forensics
Scope of Cyber forensics
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensics
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
R15 a0533 cf converted
R15 a0533 cf convertedR15 a0533 cf converted
R15 a0533 cf converted
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
TOOLS AND TECHNIQUES FOR NETWORK FORENSICS
TOOLS AND TECHNIQUES FOR NETWORK FORENSICSTOOLS AND TECHNIQUES FOR NETWORK FORENSICS
TOOLS AND TECHNIQUES FOR NETWORK FORENSICS
 
Computer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital WorldComputer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital World
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 

More from Kolluru N Rao

Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 
Part iii WHISTLE BLOWERS
Part iii WHISTLE BLOWERSPart iii WHISTLE BLOWERS
Part iii WHISTLE BLOWERSKolluru N Rao
 
Lessons on fraud awareness part-ii
Lessons on fraud awareness part-iiLessons on fraud awareness part-ii
Lessons on fraud awareness part-iiKolluru N Rao
 
Forensic accounting vs fraud examination
Forensic accounting vs fraud examinationForensic accounting vs fraud examination
Forensic accounting vs fraud examinationKolluru N Rao
 
Forensic accounting vs fraud examination
Forensic accounting vs fraud examinationForensic accounting vs fraud examination
Forensic accounting vs fraud examinationKolluru N Rao
 

More from Kolluru N Rao (8)

Money laundering
Money launderingMoney laundering
Money laundering
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Part iii WHISTLE BLOWERS
Part iii WHISTLE BLOWERSPart iii WHISTLE BLOWERS
Part iii WHISTLE BLOWERS
 
Lessons on fraud awareness part-ii
Lessons on fraud awareness part-iiLessons on fraud awareness part-ii
Lessons on fraud awareness part-ii
 
Part 1-frauds
Part 1-fraudsPart 1-frauds
Part 1-frauds
 
Forensic accounting vs fraud examination
Forensic accounting vs fraud examinationForensic accounting vs fraud examination
Forensic accounting vs fraud examination
 
Forensic accounting vs fraud examination
Forensic accounting vs fraud examinationForensic accounting vs fraud examination
Forensic accounting vs fraud examination
 
Fraudsdetection
FraudsdetectionFraudsdetection
Fraudsdetection
 

Recently uploaded

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 

Recently uploaded (20)

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 

Lessons on Fraud Awareness - Digital Forensics Basic Concepts

  • 1. Lessons on Fraud Awareness -Digital Forensics Basic Concepts- LESSON – V Author Narayanarao Kolluru B .Com ; FCA; CFFE-(IFS-Pune),CFE-(West Virginia university) www.fraudsdetection.com & LinkedIn YouTube Channel: CA Narayanarao Kolluru (All information on my ppts. Is from web ,my research articles, internet news and some related books, put in a concise form into points for easy understanding)
  • 2. WHAT IS DIGITAL FORENSICS? LOOKING INTO EVIDENCES EXTRACTION & ANALYSIS &Reporting of DATA . <FROM> LAPTOPS-COMPUTERS-MOBILES-DATA STORAGE DEVISES-INTERNET & www.Data.
  • 3. Meaning of Digital Forensics: A new milestone in the era of Forensics. In the earlier Lesson Four- Cyber Crimes and Frauds, concept was explained. Frauds are there at all the Four corners of the world. Cyber frauds are the top most method by which frauds are committed due to the Technology development, Internet usage by one and all and online transacting and online working at present due to the COVID 19 pandemic. DIGITAL FORENSICS : Digital forensics or computer forensics a forensic science ( “Forensic” means evidence collected is allowed in courts of law),dealing with recovery and investigation of the data and material recovered from computers and other such devises. 80% of Frauds and crimes are cyber crimes ,hence the importance of digital forensics. Digital forensics is the Scientific process of analyzing, storing and identifying and then documenting all the digital evidence collected for presenting in courts of law as and when required as evidence with respect to all Cyber crimes. There is increase in the misuse of ICT (Information Communications Technology), which is facilitating to cyber frauds and crimes across the world, for all illegal activities. Data is collected using various high end tools to extract digital footprints ,even if data is erased totally, data foot prints save all the history of data used on the storage devise, like computers, mobile phones and internet.
  • 4. Different Stages in Digital Forensics: All Electronic Evidence is Digital evidence. Digital forensics is conducted by a Computer Forensics Investigator, whose report a fraud examiner can utilise in his evidence in case of financial frauds and crimes. The information is extracted from digital foot prints where necessary,  Identify the purpose of Digital Forensics.  Identify the resources required.  Analysis of the data by use of proper tools & Techniques of data analytics.  Process the data and interpret .  Document the results of process and interpretation, with diagrams, sketches, tables as needed.  Proper presentation by summarizing the conclusions of the analysis of data; Report writing.  Properly securing and preserving the data for future use and for presenting as evidence in courts of law.  Recovering unallocated, free and slack spaces. Looking for hidden files, identifying unauthorised users
  • 5. A brief about Filing System of various Data……….. ……….Necessary for Forensic analysis • It is important to understand about filing systems in the context of digital Forensics: • File systems are nothing but a place to store the data on computer and other devises like a filing cabinet. • Different Types pf Data storing: • FAT or FAT32 Systems : File Allocation Table. Most commonly found in operating systems. • Boot Sector : The set of information needed by the operating system of a computer is called the boot sector. • NTFS File System: New Technology File Systems, provides a quick file system recovery on very large disks ,and performs, read, write and search functions.
  • 6. Different Branches of Digital Forensic : The following are some of the several branches of Digital Forensics: 1.Net work Forensics 2.Fire wall Forensics 3.Data base Forensics 4.Mobile devise Forensics 5.E-Mail Forensics 6.Computer Forensics
  • 7. Brief description of different branches of Digital Forensics: 1.Network Forensics- <Meaning & Methods> Network forensics is of utmost importance as it deals with the packets of data that flow through the net work and internet with laptops, mobiles and tabs connected for communication. Network forensics monitors the data flow over the networks to collect and detect attacks and analyse the nature of attacks and the attackers behind such harmful and criminal activities. The data and information is collected across different websites different equipment like firewalls and IDS-Intrusion detecting systems. Several technical challenges are encountered by the digital forensic investigator under this network forensic collection of data: despite encrypting the traffic. Under network forensics-analysis of information collected on Ethernet, TCP & IP protocols, Internet data flow, Wireless net work data flows, E-mail servers, web servers are all examined. The two methods of collecting data are:1.”Catch it as you can” 2. “Stop, look and listen”.
  • 8. Brief description of different branches of Digital Forensics: Network Forensics- <Tools of Net Work Forensics> Packet analyser or sniffers: Is a computer software or hardware which intercept and record data from network and store such data. This is used by computer professionals as well cyber criminals can check content of files and communications that are passed over the internet and net works. Tcpdump, Wireshark /shark and tstat are all popular protocol analysers. These tools allow one to capture packets as they pass through, which can be analysed latter. There are specific programmes for detecting intrusions, matching regular expressions, extract files or pictures ,sniff passwords, HTTP sessions, social engineering.
  • 9. Brief description of different branches of Digital Forensics 2. Firewall Forensics Firewall forensics is of importance as the log contains all incoming and outgoing data. It uses firewall log files to collect and analyses the data. This helps as a source of evidence when there is any attack on computers. t is thus a principle branch of computer/digital forensics field. However it requires an expert to decode the log files and extract the information contained . Also Firewall forensic data after it is extracted and analyzed will assist the security administrator to make correct judgement and take appropriate decisions.
  • 10. Brief description of different branches of Digital Forensics 3. Data Base Forensics Another very important concept of digital forensics is Data Base forensics. Data base forensics deals with the meta data and time stamps which show who accessed the data and the various actions performed .This analysis is important when there are breaches of the systems and devises and data is stolen or misused. A data base may be defines as the data collected and stored on any computer or other devises using the internet and web browsing or any other data compiled in the organisation and various files stored on the devises. Hence data base forensics helps in case of any wrong doing or fraud by any insider or outsider. There are various data bases like end user, operational, distributed ,centralised etc.  The goal pf data base forensics is fact finding and recreating the truth. Data base forensic experts use various tools for verifying the data on ”read only data” mode so that there will not be any changes accidental or otherwise of the data collected.
  • 11. Brief description of different branches of Digital Forensics 4. Mobile Device Forensics The data extraction from mobile phones is frequently used in all cyber crime/ Frauds. It takes about four to eight hours to extract all the data from a mobile phone. Even deleted data also can be retrieved for investigation. Police and investigators use “Tower Dumps” without any warrant in their investigation of any crime or fraud, to get details of all voice messages, pictures, call logs, text messages, E-mails, social apps. Interacting, etc from the Telephone Towers which are in the vicinity of the fraud or crime or based on any clue. How far is collecting data from Tower dumps is legal has to be examined as in the process of crime investigation even the data of persons not related to the fraud or crime also collected!! The process of Mobile forensics involves-Seizure of the mobile and preserve it for chain of custody, Put in Airplane mode and switch off Wi-Fi, disable hotspots, clone the devise Sim card, use phone jammers from any interference and finally use a Faraday Box or Bag with built in power source to safeguard the mobile as well to guard during transportation to lab etc.
  • 12. Brief description of different branches of Digital Forensics 5. E-Mail Forensics  Next important source of evidence in the process of investigation is information retrieved from e-mails. This gives data about the sender,receiver,content,time sent, to help the investigators, in any fraud or criminal probe. E-mail communications over the internet and various devises like computers, mobile or Tab is of high importance. Also the digital analysis of email is very important to trace fake e-mails addresses misrepresenting as if from a genuine sender to the recipient. Despite many security protocols the Cyber criminals still manage to send spam mails, phishing e-mails, distributing hate mail, child pornography, worms, viruses and Trojan horses. There are several tools to investigate E-mails, the following are some of them to cite as an example: E-Mail Tracker Pro :analyses the headers, to identify the IP address of the machine that sent the email. This e mail can pin point the city from where the mail has most likely come from. E-Mail Tracer: It is an email migration and conversion tool, which supports various mail formats. It can detect deleted e-mails. Access Data's FTK: This helps in analysis, Decryption and pass word cracking and supports popular encryption technologies.
  • 13. Brief description of different branches of Digital Forensics 6.Computer Forensics Crime is not solved by technology but by people Meaning: Under computer forensics, techniques are used to analyze, search and preserve information and secure it for producing as evidence in a court of law. One TERA byte (TB) of data takes approximately 5 hours to create a forensic image. The process involves extracting through scientific methods data, validate the data, analyze the data ,document and present the data in a Report format with detailed . There are various hardware and software tools available for computer forensics. The computer forensic tools perform - Acquition of data, extraction, validation ,reconstruction and reporting. There are several tools like FTK, Encase I Look, Bulk extractor ,CAINE , The Sleuth Kit etc ( need detailed study separately)
  • 14. Importance of chain of custody: Meaning…….. In the context of collection of evidence Forensic Sciences-Chain Of Custody:(A Brief Note) In Forensic Sciences the most important aspect is Chain Of Custody. What it means is the total flow of actions taken from beginning till the end. All the steps taken at the outset till investigation process the flow of events must be properly documented. The reason being all forensic cases end up in courts, and the judiciary will take their deliberations and final conclusions based only on Facts and Evidence, to the satisfaction of the courts. Hence to present a case “Chain of Custody” is very important process. If there is no proper and clear chain of custody latter there will be allegations of improper care of the evidence collected which may result in the courts acquitting the guilty in the case involved, due to poor evidence and poor chain of custody.
  • 15. Note on Cyber Law………………………… In the modern day a Thief can steal more with a computer than a gun and a Terrorist can create more havoc then with a Bomb!! • Meaning: • Cyber Laws deal the legal matters concerned cyber space. • They deal with freedom of expression, privacy. • Deal with copyright violations, harassment over internet, trade secrets , computer hardware & software. • Cyber law is very important aspect as it deals with internet, world wide web and cyber space in the present day usage of technology . • The need for a separate law became necessary all over the world as normal laws cannot deal with intangible dimensions of cyber space. • Subsequently the persons involved are tried under other laws of the legal system viz:Criminal laws, civil laws and other regulatory laws. • There is also Information and technology act to deal with cyber crimes.
  • 16. End of Lesson FIVE DIGITAL FORENSICS