SlideShare a Scribd company logo
1 of 23
Computer Forensics In Fighting
Crimes
Paul Umoren
OUTLINES
DEFINITION OF COMPUTER
FORENSICS
COOMPUTER FORENSICS TECHNIGUES
SCOPE OF COMPUTER FORENSIC
COMPUTER FORENSICS PROCESS
IMPORTANCE OF COMPUTER
FORENSICS
ITEMS USE FOR EXAMINATION
COMPUTER FORENSICS CASES
COMMON MISTAKES MADE
DURING A COMPUTER FORENSIC
ANALYSIS
CONCLUSION
QUESTIONS
REFERENCES
DEFINITION:
This is the discovery, collection,
and analysis of evidence found
on computers and networks to
investigate and establish faces in
criminal or civil courts.
COMPUTER FORENSICS TECHNIQUES:
Cross-drive analysis: A forensic technique
that correlates information found on multiple
HDD
Live analysis: The practice is useful when
dealing with Encrypting File System and
recovery of RAM data when the system was
shutdown
Deleted files: This is a common technique
TECHNIQUES CONTNUE:
Analysis of chat logs: This involves the
Analysis of log files
Reviewing of trace nodes
SCOPE OF COMPUTER FORENSIC:
It focuses on computers and networks for
finding crimes evidence for government,
private business and other sectors of
organization.
Computers: (examination of computer
media, program, data & log files, Internet
messaging conversation, internet chat, e-
mail, etc)
SCOPE CONTINUES:
Networks: (analysis of server contents,
server and router log files, packet traffic
and information obtain from Internet
access providers.)
It is critical for Law enforcement as an
evidence gathering and criminal
investigation tool
COMPUTER FORENSICS PROCESS:
Acquisition/Preserve the media (The
original drives need be imaged, make
copies of original)
Extract evidence (this depends on the
type of investigation,the specialist needs
to determine what kind of information on
the computer is pertinent to the case)
PROCESS CONTUNUES:
Analysis: (The most tasking part, the
information retrieve can be incriminating
or exculpatory.)
Reporting/Documentation: (Configuration
of the computer and BIOS settings to
every step taken and pertinent evidence
that is found should be reported and
WHY COMPUTER FORENSICS?
Computer forensics allows for the general
integrity of your network infrastructure and
ensures that your organization’s private
information remains private.
Protection From employee abuse, as well as
protects your company from violating
government regulations such as those rules
regarding customer data privacy.
WHY COMPUTER FORENSICS? CONTS.
CUT DOWN COST: (Working with
professionals who have both technological and
practical understandings of computer forensics
and electronic discovery can also cut costs for
your company)
ANTITERRORISM :It is important as an
antiterrorism tool for both criminal persecution
and intelligent gathering.
COMPUTER FORENSICS TOOLS:
The Forensics Recovery of Digital
Evidence
Guidance Software’s EnCase
Ultimate Toolkit
The FireChief hardware A portable Tableau write blocker attached to a
Hard Drive
SOME ITEMS USE FOR EXAMINATION:
COMPUTER FORENSICS CASES :
Soham murders
The alibi of the killer was disproved when
mobile phone records of the person he claimed
to be with showed she was out of town at the
time.
BTK Killer(Dennis Rader was convicted of a
string of serial killings that occurred over a
period of sixteen years)
COMPUTER FORENSICS CASES CONTS. :
Joseph E. Duncan III (Forensic investigators
found a spreadsheet in which Duncan was
planning his murders; this helped prove he was
planning the crimes.)
Sharon Lopatka (After going through
hundreds of emails, investigators were able to
find her killer, Robert Glass.)
COMPUTER FORENSICS CASES CONTS. :
Dr. Conrad Murray (Michael
Jackson’s doctor was convicted
partially by digital evidence on his
computer. This evidence included
medical documentation showing
lethal amounts of propofol.)
COMMON MISTAKES MADE DURING A
COMPUTER FORENSIC ANALYSIS:
Using the internal IT staff to conduct a
computer forensics investigation
Waiting until the last minute to perform a
computer forensics exam
Too narrowly limiting the scope of
computer forensics
COMMON MISTAKES CONTINUES:
Not being prepared to preserve
electronic evidence
Not selecting a qualified computer
forensics team
COMPUTER FORENSIC CERTIFICATIONS:
ISFCE Certified Computer Examine
IACRB Certified Computer Forensics Examine
IACIS offers the Certified Computer Forensic
Examiner (CFCE) program.
Asian School of Cyber Laws offers
international level certifications in Digital
Evidence Analysis and in Digital Forensic
Investigation
CONCLUSION:
Though this area is a bit new to some
people in computing, but it is very important
to battle cybercrimes in the society which is
difficult to handle in the real world
scenarios. Large companies should be able
to train some of their IT staff in computer
forensics which could become asset to the
company.
QUESTIONS:
REFERENCES:
Michael G. Noblett; Mark M. Pollitt, Lawrence A. Presley
(October 2000). "Recovering and examining computer forensic
evidence”
Leigland, R (September 2004). "A Formalization of Digital
Forensics".
A Yasinsac; RF Erbacher, DG Marks, MM Pollitt (2003).
"Computer forensics education". IEEE Security & Privacy.
CiteSeerX: 10.1.1.1.9510.
www.google.com
Wikipedia, the free encyclopedia.htm
Shelly, Cashman Vermaat (2006);Discovery Computers A

More Related Content

What's hot

Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
gueste0d962
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
Milap Oza
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
Kranthi
 

What's hot (20)

Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Chap 1 general introduction to computer forensics
Chap 1  general introduction to computer forensicsChap 1  general introduction to computer forensics
Chap 1 general introduction to computer forensics
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
 
Digital Forensic Case Study
Digital Forensic Case StudyDigital Forensic Case Study
Digital Forensic Case Study
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigation
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 

Viewers also liked

Computer forensic
Computer forensicComputer forensic
Computer forensic
bhavithd
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
Cell Site Analysis (CSA)
 
What Is Evidence?
What Is Evidence?What Is Evidence?
What Is Evidence?
nikkiec89
 
Identifying and Collecting Digital Evidence Webinar
Identifying and Collecting Digital Evidence WebinarIdentifying and Collecting Digital Evidence Webinar
Identifying and Collecting Digital Evidence Webinar
Case IQ
 
Electornic evidence collection
Electornic evidence collectionElectornic evidence collection
Electornic evidence collection
Fakrul Alam
 
Lecture1
Lecture1Lecture1
Lecture1
rjaeh
 
Access lesson 02 Creating a Database
Access lesson 02 Creating a DatabaseAccess lesson 02 Creating a Database
Access lesson 02 Creating a Database
Aram SE
 

Viewers also liked (20)

Computer forensic
Computer forensicComputer forensic
Computer forensic
 
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic ExaminersBoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Document clustering for forensic analysis an approach for improving compute...
Document clustering for forensic   analysis an approach for improving compute...Document clustering for forensic   analysis an approach for improving compute...
Document clustering for forensic analysis an approach for improving compute...
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
 
Evidence based policy
Evidence based policy Evidence based policy
Evidence based policy
 
What Is Evidence?
What Is Evidence?What Is Evidence?
What Is Evidence?
 
Identifying and Collecting Digital Evidence Webinar
Identifying and Collecting Digital Evidence WebinarIdentifying and Collecting Digital Evidence Webinar
Identifying and Collecting Digital Evidence Webinar
 
The design of forensic computer workstations
The design of forensic computer workstationsThe design of forensic computer workstations
The design of forensic computer workstations
 
MattockFS Computer Forensic File-System
MattockFS Computer Forensic File-SystemMattockFS Computer Forensic File-System
MattockFS Computer Forensic File-System
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Electornic evidence collection
Electornic evidence collectionElectornic evidence collection
Electornic evidence collection
 
Capturing forensics image
Capturing forensics imageCapturing forensics image
Capturing forensics image
 
File000173
File000173File000173
File000173
 
Lecture1
Lecture1Lecture1
Lecture1
 
OWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security SessionOWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security Session
 
Access lesson 02 Creating a Database
Access lesson 02 Creating a DatabaseAccess lesson 02 Creating a Database
Access lesson 02 Creating a Database
 

Similar to Computer Forensics in Fighting Crimes

computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdf
Gnanavi2
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
ssuser2bf502
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
forensicsnation
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
forensicsnation
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
Aqib Memon
 

Similar to Computer Forensics in Fighting Crimes (20)

Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdf
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 

More from Isaiah Edem (8)

Sleep and Dreams
Sleep and DreamsSleep and Dreams
Sleep and Dreams
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Outdated Technology
Outdated TechnologyOutdated Technology
Outdated Technology
 
Green Computing
Green ComputingGreen Computing
Green Computing
 
Importanc of softwaretesting
Importanc of softwaretestingImportanc of softwaretesting
Importanc of softwaretesting
 
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy InvasionCyber Security & User's Privacy Invasion
Cyber Security & User's Privacy Invasion
 
Fear
FearFear
Fear
 
Redis IU
Redis IURedis IU
Redis IU
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Computer Forensics in Fighting Crimes

  • 1. Computer Forensics In Fighting Crimes Paul Umoren
  • 2. OUTLINES DEFINITION OF COMPUTER FORENSICS COOMPUTER FORENSICS TECHNIGUES SCOPE OF COMPUTER FORENSIC COMPUTER FORENSICS PROCESS IMPORTANCE OF COMPUTER FORENSICS
  • 3. ITEMS USE FOR EXAMINATION COMPUTER FORENSICS CASES COMMON MISTAKES MADE DURING A COMPUTER FORENSIC ANALYSIS CONCLUSION QUESTIONS REFERENCES
  • 4. DEFINITION: This is the discovery, collection, and analysis of evidence found on computers and networks to investigate and establish faces in criminal or civil courts.
  • 5. COMPUTER FORENSICS TECHNIQUES: Cross-drive analysis: A forensic technique that correlates information found on multiple HDD Live analysis: The practice is useful when dealing with Encrypting File System and recovery of RAM data when the system was shutdown Deleted files: This is a common technique
  • 6. TECHNIQUES CONTNUE: Analysis of chat logs: This involves the Analysis of log files Reviewing of trace nodes
  • 7. SCOPE OF COMPUTER FORENSIC: It focuses on computers and networks for finding crimes evidence for government, private business and other sectors of organization. Computers: (examination of computer media, program, data & log files, Internet messaging conversation, internet chat, e- mail, etc)
  • 8. SCOPE CONTINUES: Networks: (analysis of server contents, server and router log files, packet traffic and information obtain from Internet access providers.) It is critical for Law enforcement as an evidence gathering and criminal investigation tool
  • 9. COMPUTER FORENSICS PROCESS: Acquisition/Preserve the media (The original drives need be imaged, make copies of original) Extract evidence (this depends on the type of investigation,the specialist needs to determine what kind of information on the computer is pertinent to the case)
  • 10. PROCESS CONTUNUES: Analysis: (The most tasking part, the information retrieve can be incriminating or exculpatory.) Reporting/Documentation: (Configuration of the computer and BIOS settings to every step taken and pertinent evidence that is found should be reported and
  • 11. WHY COMPUTER FORENSICS? Computer forensics allows for the general integrity of your network infrastructure and ensures that your organization’s private information remains private. Protection From employee abuse, as well as protects your company from violating government regulations such as those rules regarding customer data privacy.
  • 12. WHY COMPUTER FORENSICS? CONTS. CUT DOWN COST: (Working with professionals who have both technological and practical understandings of computer forensics and electronic discovery can also cut costs for your company) ANTITERRORISM :It is important as an antiterrorism tool for both criminal persecution and intelligent gathering.
  • 13. COMPUTER FORENSICS TOOLS: The Forensics Recovery of Digital Evidence Guidance Software’s EnCase Ultimate Toolkit The FireChief hardware A portable Tableau write blocker attached to a Hard Drive
  • 14. SOME ITEMS USE FOR EXAMINATION:
  • 15. COMPUTER FORENSICS CASES : Soham murders The alibi of the killer was disproved when mobile phone records of the person he claimed to be with showed she was out of town at the time. BTK Killer(Dennis Rader was convicted of a string of serial killings that occurred over a period of sixteen years)
  • 16. COMPUTER FORENSICS CASES CONTS. : Joseph E. Duncan III (Forensic investigators found a spreadsheet in which Duncan was planning his murders; this helped prove he was planning the crimes.) Sharon Lopatka (After going through hundreds of emails, investigators were able to find her killer, Robert Glass.)
  • 17. COMPUTER FORENSICS CASES CONTS. : Dr. Conrad Murray (Michael Jackson’s doctor was convicted partially by digital evidence on his computer. This evidence included medical documentation showing lethal amounts of propofol.)
  • 18. COMMON MISTAKES MADE DURING A COMPUTER FORENSIC ANALYSIS: Using the internal IT staff to conduct a computer forensics investigation Waiting until the last minute to perform a computer forensics exam Too narrowly limiting the scope of computer forensics
  • 19. COMMON MISTAKES CONTINUES: Not being prepared to preserve electronic evidence Not selecting a qualified computer forensics team
  • 20. COMPUTER FORENSIC CERTIFICATIONS: ISFCE Certified Computer Examine IACRB Certified Computer Forensics Examine IACIS offers the Certified Computer Forensic Examiner (CFCE) program. Asian School of Cyber Laws offers international level certifications in Digital Evidence Analysis and in Digital Forensic Investigation
  • 21. CONCLUSION: Though this area is a bit new to some people in computing, but it is very important to battle cybercrimes in the society which is difficult to handle in the real world scenarios. Large companies should be able to train some of their IT staff in computer forensics which could become asset to the company.
  • 23. REFERENCES: Michael G. Noblett; Mark M. Pollitt, Lawrence A. Presley (October 2000). "Recovering and examining computer forensic evidence” Leigland, R (September 2004). "A Formalization of Digital Forensics". A Yasinsac; RF Erbacher, DG Marks, MM Pollitt (2003). "Computer forensics education". IEEE Security & Privacy. CiteSeerX: 10.1.1.1.9510. www.google.com Wikipedia, the free encyclopedia.htm Shelly, Cashman Vermaat (2006);Discovery Computers A