SlideShare a Scribd company logo
1 of 32
Digital Forensic
By-
FORnSEC Solutions
Digital Forensic
• Digital forensics (sometimes known as digital forensic
science) is a branch of forensic science that includes the
recovery and cyber crime investigation of the information
found in digital devices often in relation to computer crime.
Digital forensics includes several sub-branches :
• Computer Forensics
• Mobile Forensics
• Network Forensic
Computer forensic:- Computer forensics (also known
as computer forensic science) is a branch of digital forensics and
cyber investigation pertaining to evidence found in computers
and digital storage media.
Mobile Forensic:- Mobile device forensics is a branch of digital
forensics relating to recovery of digital evidence or data from
a mobile device under forensically sound conditions.
Network Forensic:- Network forensics is a sub-branch of digital
forensics relating to the monitoring and analysis of computer
network traffic for the purposes of information gathering, legal
evidence, or intrusion detection.
Digital evidence
• Digital evidence is information stored or transmitted in binary form that may
be relied on in court. It can be found on a computer hard drive, a mobile phone,
a personal digital assistant (PDA), a CD, and a flash card in a digital camera,
among other place s.
A device which holds the data as long as it
has power supply connected to it and cannot
hold the memory when there is no power
supply connected to it is called Volatile
memory
A device which can hold data in it even if
it is not connected to any power source is
called Non Volatile Memory
Examples of digital Evidence
Searching and Seizing of Digital Evidence
Searching :- The first step is to identify the valuable evidence
present at the crime scene.
Seizure:- After searching of evidence , we need to physical
seize the evidence for further investigation
Collection of Evidence from Crime Scene
There are a number of evidences that can be obtained from
the crime scene such as
• Physical Evidence
• Digital Evidence
Physical Evidences
Digital Evidence
Collection of Physical Evidence
Dried Material Collection Technique
• With gloved hands, slightly moisten the swab with distilled water. (The swab should be
damp but not overly wet.)
• Thoroughly rub the stained area using a single moistened swab for a small stain and
multiple swabs for a large stain. When only a small amount of the stain is available,
• concentrate as much of the stain as possible on the tip of the swab.
• Air-dry the swabs.
• Place each swab into separate package.
• This package may be placed inside a paper envelope
• Collect a substrate/control sample from an unstained area using the same techniques
Continued..
Procedure for Computer Evidence Seizure
The activities/procedures for securing a suspected computer incident
scene include
• Securing the scene
 Shutting down the computer
 Labeling the evidence
 Documenting the evidence
 Transporting the evidence
 Providing chain-of-custody
 Documentation
• Photograph the Scene
• If the computer is ON then photograph the screen
and note down the names of programs being run.
• Do not switch off the computer. Simply pull the
power cord from behind the back of the computer.
• Open the computer and inspect the inside for
unusual connections or configuration.
• Disconnect the Power cables to all the storage hard
drives
Documentation
• Detailed notes should be maintained during all aspects of the
scene processing.
• This not only includes the usual who, what, where, when but
overall observations of the scene.
• A evidence/property document should contain entries with a
description of the items (model and serial number), any visible
markings present on the item, the condition of the item, the
manner it was marked for evidence and the location from within
the scene it was seized.
• Every item of evidence has its own characteristics, but should be
identified in a manner it can be easily identified at a later date.
Items should be collected as found and documented.
What are the Steps in the Mobile Forensics Process?
Mobile Phone Seizure Box
Airplane Mode
Cyber Crime
• Cyber crime are the crimes that involve digital evidences
such as computer, mobile and internet.
Classification of Cyber Crime:
 Cyber crimes against individual
 Cyber crimes against property
 Cyber crimes against government and society
Cyber crimes against individual
Cyber crimes against property
Cyber crimes against government and society
Cyber Forensic Investigation Steps:
1. Identify the computer crime
2. Collect preliminary evidence
3. Obtain court/higher authority permission for seizure (if necessary).
4. Perform first responder tool.
5. Seize evidence at the crime.
6. Create two-bit stream copies of the evidence
7. Generate SHA1 checksum on the image.
8.Maintain chain of custody.
9. Transport evidence to the forensic laboratory
10. Store the original evidence in a secure location
11. Analyze the image copy for evidence.
12. Prepare a forensic report.
13 Submit Report to Client.
14 If required, attend the court and testify as an expert.
Cyber Forensic Tools
EnCase
• Originally developed for law enforcement
• Built around case management
• Integrated Windows-based graphical user
interface (GUI)
• Multiple Features
Forensic Toolkit (FTK)
• Another Tool Suite
• Acquires & Examines Electronic Data
• Imaging Tool
• File Viewer
Cellebrite
• Tool for mobile phone, smartphone, and
PDA forensics.
• Compatible with over 2,500 mobile phones
(including GSM, TDMA, CDMA, iDEN).
TYPES OF FORENSIC SOFTWARE
 Cloning And Imaging Tool
 WriteProtection Tool
 Data Recovery/Analysis Tools
 Mobile Data Analysis Tool
 Audio/Video Forensic Tool
 Incidence Response Tool
 CDR Analysis Tool
 Password Recovery Tools
 Mac Forensic Tool
Ransomware
• Ransomware is a type of malware that attempt to extort money from a
computer user by infecting and taking control of the victim’s machine or
files or documents stored on it.
• Typically, the ransomware will either lock the computer to prevent
normal usage, or encrypt the documents and files on it to prevent access
to the saved data.
Bitcoin
• Bitcoin is a cryptocurrency and worldwide payment
system.
• A Peer-to-Peer Electronic Cash System.
• A distributed, decentralized digital currency system
Who created Bitcoin?
• October 31, 2008,
• Satoshi Nakamoto published white paper titled Bitcoin.
• A peer to peer Electronic cash system via “The Cryptography Mailing
List”
• January 3, 2009,
• Satoshi release Bitcoin source code and software client to the world.
Demo
Best Cyber Crime Investigation Service Provider | Fornsec Solutions

More Related Content

What's hot

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedurenewbie2019
 
Digital investigation
Digital investigationDigital investigation
Digital investigationunnilala11
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic SoftwaresDhruv Seth
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingVi Tính Hoàng Nam
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Muzzammil Wani
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic pptPriya Manik
 
computer forensics
computer forensicscomputer forensics
computer forensicsshivi123456
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensicsMarco Alamanni
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer ForensicsDaksh Verma
 
Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.guestcf6f5b
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 

What's hot (20)

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
Chap 1 general introduction to computer forensics
Chap 1  general introduction to computer forensicsChap 1  general introduction to computer forensics
Chap 1 general introduction to computer forensics
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic Softwares
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensics
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 

Similar to Best Cyber Crime Investigation Service Provider | Fornsec Solutions

mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptxAmbuj Kumar
 
Computer Forensics (1).pptx
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptxGautam708801
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...Danny609Davidson
 
Uncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsUncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsParaben Corporation
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsN.Jagadish Kumar
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenesprimeteacher32
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxgouriuplenchwar63
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidenceOnline
 
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...William782Delaney
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1Jinalkakadiya
 
Digital forensic
Digital forensicDigital forensic
Digital forensicChandan Sah
 

Similar to Best Cyber Crime Investigation Service Provider | Fornsec Solutions (20)

mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
Difference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptxDifference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptx
 
Computer Forensics (1).pptx
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptx
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
 
cyber forensics
cyber forensicscyber forensics
cyber forensics
 
Uncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsUncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic tools
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection tools
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
 
First Responder Officer in Cyber Crime
First Responder Officer in Cyber CrimeFirst Responder Officer in Cyber Crime
First Responder Officer in Cyber Crime
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
 
Digital forensic
Digital forensicDigital forensic
Digital forensic
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 

Recently uploaded

Namakkal ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Namakkal ESCORT SERVICE❤CALL GIRL
Namakkal ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Namakkal ESCORT SERVICE❤CALL GIRLNamakkal ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Namakkal ESCORT SERVICE❤CALL GIRL
Namakkal ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Namakkal ESCORT SERVICE❤CALL GIRLkantirani197
 
Hosur ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Hosur ESCORT SERVICE❤CALL GIRL
Hosur ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Hosur ESCORT SERVICE❤CALL GIRLHosur ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Hosur ESCORT SERVICE❤CALL GIRL
Hosur ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Hosur ESCORT SERVICE❤CALL GIRLkantirani197
 
BHADRAK Call Girls JAMSHEDPUR Just Call 93480*64116 Top Class Call Girl Servi...
BHADRAK Call Girls JAMSHEDPUR Just Call 93480*64116 Top Class Call Girl Servi...BHADRAK Call Girls JAMSHEDPUR Just Call 93480*64116 Top Class Call Girl Servi...
BHADRAK Call Girls JAMSHEDPUR Just Call 93480*64116 Top Class Call Girl Servi...poojas707976
 
BERHAMPUR Call Girls JAMSHEDPUR Just Call 93480*64116 Top Class Call Girl Ser...
BERHAMPUR Call Girls JAMSHEDPUR Just Call 93480*64116 Top Class Call Girl Ser...BERHAMPUR Call Girls JAMSHEDPUR Just Call 93480*64116 Top Class Call Girl Ser...
BERHAMPUR Call Girls JAMSHEDPUR Just Call 93480*64116 Top Class Call Girl Ser...poojas707976
 
💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...
💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...
💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...Cara Menggugurkan Kandungan 087776558899
 
Prince Armahs(Tinky) Brochure, for Funeral service
Prince Armahs(Tinky) Brochure, for Funeral servicePrince Armahs(Tinky) Brochure, for Funeral service
Prince Armahs(Tinky) Brochure, for Funeral serviceednyonat
 

Recently uploaded (10)

BHUBANESWAR CALL GIRL IN SEIRVEC ODIA ❣️72051SIYA37929❣️ CASH PAYMENT ONLY CA...
BHUBANESWAR CALL GIRL IN SEIRVEC ODIA ❣️72051SIYA37929❣️ CASH PAYMENT ONLY CA...BHUBANESWAR CALL GIRL IN SEIRVEC ODIA ❣️72051SIYA37929❣️ CASH PAYMENT ONLY CA...
BHUBANESWAR CALL GIRL IN SEIRVEC ODIA ❣️72051SIYA37929❣️ CASH PAYMENT ONLY CA...
 
9565589233 Whatsapp Free Nude Video Call Service Porn Girls Porn Videos
9565589233 Whatsapp Free Nude Video Call Service Porn Girls Porn Videos9565589233 Whatsapp Free Nude Video Call Service Porn Girls Porn Videos
9565589233 Whatsapp Free Nude Video Call Service Porn Girls Porn Videos
 
Namakkal ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Namakkal ESCORT SERVICE❤CALL GIRL
Namakkal ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Namakkal ESCORT SERVICE❤CALL GIRLNamakkal ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Namakkal ESCORT SERVICE❤CALL GIRL
Namakkal ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Namakkal ESCORT SERVICE❤CALL GIRL
 
Hosur ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Hosur ESCORT SERVICE❤CALL GIRL
Hosur ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Hosur ESCORT SERVICE❤CALL GIRLHosur ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Hosur ESCORT SERVICE❤CALL GIRL
Hosur ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Hosur ESCORT SERVICE❤CALL GIRL
 
BHADRAK Call Girls JAMSHEDPUR Just Call 93480*64116 Top Class Call Girl Servi...
BHADRAK Call Girls JAMSHEDPUR Just Call 93480*64116 Top Class Call Girl Servi...BHADRAK Call Girls JAMSHEDPUR Just Call 93480*64116 Top Class Call Girl Servi...
BHADRAK Call Girls JAMSHEDPUR Just Call 93480*64116 Top Class Call Girl Servi...
 
BERHAMPUR Call Girls JAMSHEDPUR Just Call 93480*64116 Top Class Call Girl Ser...
BERHAMPUR Call Girls JAMSHEDPUR Just Call 93480*64116 Top Class Call Girl Ser...BERHAMPUR Call Girls JAMSHEDPUR Just Call 93480*64116 Top Class Call Girl Ser...
BERHAMPUR Call Girls JAMSHEDPUR Just Call 93480*64116 Top Class Call Girl Ser...
 
KENDUJHAR ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND TO ...
KENDUJHAR ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND TO ...KENDUJHAR ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND TO ...
KENDUJHAR ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND TO ...
 
💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...
💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...
💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...
 
KHORDHA ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND TO HA...
KHORDHA ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND TO HA...KHORDHA ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND TO HA...
KHORDHA ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND TO HA...
 
Prince Armahs(Tinky) Brochure, for Funeral service
Prince Armahs(Tinky) Brochure, for Funeral servicePrince Armahs(Tinky) Brochure, for Funeral service
Prince Armahs(Tinky) Brochure, for Funeral service
 

Best Cyber Crime Investigation Service Provider | Fornsec Solutions

  • 2. Digital Forensic • Digital forensics (sometimes known as digital forensic science) is a branch of forensic science that includes the recovery and cyber crime investigation of the information found in digital devices often in relation to computer crime.
  • 3. Digital forensics includes several sub-branches : • Computer Forensics • Mobile Forensics • Network Forensic
  • 4. Computer forensic:- Computer forensics (also known as computer forensic science) is a branch of digital forensics and cyber investigation pertaining to evidence found in computers and digital storage media. Mobile Forensic:- Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions. Network Forensic:- Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection.
  • 5. Digital evidence • Digital evidence is information stored or transmitted in binary form that may be relied on in court. It can be found on a computer hard drive, a mobile phone, a personal digital assistant (PDA), a CD, and a flash card in a digital camera, among other place s.
  • 6. A device which holds the data as long as it has power supply connected to it and cannot hold the memory when there is no power supply connected to it is called Volatile memory A device which can hold data in it even if it is not connected to any power source is called Non Volatile Memory
  • 8. Searching and Seizing of Digital Evidence Searching :- The first step is to identify the valuable evidence present at the crime scene. Seizure:- After searching of evidence , we need to physical seize the evidence for further investigation
  • 9. Collection of Evidence from Crime Scene There are a number of evidences that can be obtained from the crime scene such as • Physical Evidence • Digital Evidence
  • 12. Collection of Physical Evidence Dried Material Collection Technique • With gloved hands, slightly moisten the swab with distilled water. (The swab should be damp but not overly wet.) • Thoroughly rub the stained area using a single moistened swab for a small stain and multiple swabs for a large stain. When only a small amount of the stain is available, • concentrate as much of the stain as possible on the tip of the swab. • Air-dry the swabs. • Place each swab into separate package. • This package may be placed inside a paper envelope • Collect a substrate/control sample from an unstained area using the same techniques
  • 14. Procedure for Computer Evidence Seizure The activities/procedures for securing a suspected computer incident scene include • Securing the scene  Shutting down the computer  Labeling the evidence  Documenting the evidence  Transporting the evidence  Providing chain-of-custody  Documentation
  • 15. • Photograph the Scene • If the computer is ON then photograph the screen and note down the names of programs being run. • Do not switch off the computer. Simply pull the power cord from behind the back of the computer. • Open the computer and inspect the inside for unusual connections or configuration. • Disconnect the Power cables to all the storage hard drives
  • 16. Documentation • Detailed notes should be maintained during all aspects of the scene processing. • This not only includes the usual who, what, where, when but overall observations of the scene. • A evidence/property document should contain entries with a description of the items (model and serial number), any visible markings present on the item, the condition of the item, the manner it was marked for evidence and the location from within the scene it was seized. • Every item of evidence has its own characteristics, but should be identified in a manner it can be easily identified at a later date. Items should be collected as found and documented.
  • 17. What are the Steps in the Mobile Forensics Process? Mobile Phone Seizure Box Airplane Mode
  • 18. Cyber Crime • Cyber crime are the crimes that involve digital evidences such as computer, mobile and internet. Classification of Cyber Crime:  Cyber crimes against individual  Cyber crimes against property  Cyber crimes against government and society
  • 19. Cyber crimes against individual
  • 21. Cyber crimes against government and society
  • 22. Cyber Forensic Investigation Steps: 1. Identify the computer crime 2. Collect preliminary evidence 3. Obtain court/higher authority permission for seizure (if necessary). 4. Perform first responder tool. 5. Seize evidence at the crime. 6. Create two-bit stream copies of the evidence 7. Generate SHA1 checksum on the image. 8.Maintain chain of custody. 9. Transport evidence to the forensic laboratory 10. Store the original evidence in a secure location 11. Analyze the image copy for evidence. 12. Prepare a forensic report. 13 Submit Report to Client. 14 If required, attend the court and testify as an expert.
  • 24. EnCase • Originally developed for law enforcement • Built around case management • Integrated Windows-based graphical user interface (GUI) • Multiple Features
  • 25. Forensic Toolkit (FTK) • Another Tool Suite • Acquires & Examines Electronic Data • Imaging Tool • File Viewer
  • 26. Cellebrite • Tool for mobile phone, smartphone, and PDA forensics. • Compatible with over 2,500 mobile phones (including GSM, TDMA, CDMA, iDEN).
  • 27. TYPES OF FORENSIC SOFTWARE  Cloning And Imaging Tool  WriteProtection Tool  Data Recovery/Analysis Tools  Mobile Data Analysis Tool  Audio/Video Forensic Tool  Incidence Response Tool  CDR Analysis Tool  Password Recovery Tools  Mac Forensic Tool
  • 28. Ransomware • Ransomware is a type of malware that attempt to extort money from a computer user by infecting and taking control of the victim’s machine or files or documents stored on it. • Typically, the ransomware will either lock the computer to prevent normal usage, or encrypt the documents and files on it to prevent access to the saved data.
  • 29. Bitcoin • Bitcoin is a cryptocurrency and worldwide payment system. • A Peer-to-Peer Electronic Cash System. • A distributed, decentralized digital currency system
  • 30. Who created Bitcoin? • October 31, 2008, • Satoshi Nakamoto published white paper titled Bitcoin. • A peer to peer Electronic cash system via “The Cryptography Mailing List” • January 3, 2009, • Satoshi release Bitcoin source code and software client to the world.
  • 31. Demo