SlideShare a Scribd company logo
1 of 14
Download to read offline
DIGITAL
FORENSICS
BCA (3rd year)
By Riya
Roll no. 4936
Introduction
History
ForensicsVsDigitalForensics
Formaldefinition
NeedandImportance
StepsInvolved
Example
Types&Tools
Pros&Cons
Conclusion
References
ThanksNote
Digital Forensics (D.F.) is a rapidly growing field that involves the recovery,
analysis, and presentation of digital evidence in legal investigations. As
more and more of our lives are conducted in the digital realm, the need for
skilled digital forensics experts has become increasingly important.
In this presentation, we will explore the basics of digital forensics, including
the tools and techniques used to gather and analyze digital evidence with
an example. We will also discuss some of the important key aspects of DNA
in forensics. At last, we will discuss the pros and cons of digital forensics.
HISTORY|
SCIENTISTS INVENTIONS & DISCOVERIES
Alphonse Bertillon
SYSTEM OF ANTHROPOMETRY
It involves measuring various parts of the body to create a unique
identifier for everyone.
Francis Galton
USE OF FINGERPRINTS
Its a way to identify suspects.
Edmond Locard
PRINCIPLE OF EXCHANGE
It states that every contact leaves a trace.
Sir Alec Jeffreys
DNA PROFILING
It is a technique used to identify & distinguish individuals
genetically. It also helps to determine their relationship to others.
FORENSICS
• It refers to the use of scientific
methods and techniques to
investigate crimes.
• It can refer to any type of evidence
or investigation.
• Examples: Analyzing DNA samples,
testing blood spatter patterns, or
examining bullet trajectories.
DIGITAL FORENSICS
• It is a specific branch of forensics
that deals with the investigation of
digital devices and data.
• It focuses specifically on electronic
evidence.
• Examples: Analyzing computer hard
drives, examining mobile-phone
records, or reviewing social media
activity to gather evidence.
"DIGITAL FORENSICS is the use of scientifically
derived and proven methods toward the
preservation, collection, validation, identification,
analysis, interpretation, documentation and
presentation of digital evidence derived from digital
sources for the purpose of facilitating or furthering
the reconstruction of events found to be criminal or
helping to anticipate unauthorized actions shown to
be disruptive to planned operations."
-Dr. Gary Kessler
A renowned digital forensics expert & professor at
Embry-Riddle Aeronautical University.
Need & Importance
01
Investigation
of Cyber
Crimes
Legal Action
Support
Intellectual
Property
Protection
Risk
Management
Forensic
Accounting
Digital forensics
is used to
investigate
cybercrimes such
as hacking and
cyberbullying.
It can be used to
deal with
Copyright and
Patent issue,
trademark issue,
and trade secret
theft.
It can help
organizations to
identify data
breaches, insider
threats, and other
security
incidents.
It is used to
investigate
financial crimes
such as money
laundering, and
fraud.
It can help to
prove or disprove
allegations, as
well as to locate
and recover lost
or deleted data.
02 03 04 05
It involves creating a
forensic image of the
device, which is an exact
copy of the digital data
stored on it.
Steps involved in Digital Forensics Process
01
02
03
04
05
The first step is to identify
the digital devices or
storage media that may
contain relevant evidence.
It involve using specialized
software tools to recover
deleted files, search for
keywords or patterns, or
analyze network traffic.
Finally, the results of the analysis
and interpretation are
documented in a forensic report,
which is typically presented to
the investigating agency or court.
Identification Analysis
Preservation
Interpretation
Reporting
Once the evidence is
identified, it must be
interpreted in the context
of the investigation.
EXAMPLE
01
02
03
04
05
 A company suspects that one of their employees has been
leaking sensitive information to a competitor.
 The company's IT department identifies the employee's
work computer as a potential source of evidence and hires
a digital forensics expert to analyze it.
 The expert preserves the data by creating a forensic
image, then analyzes the image to identify relevant files &
network activity.
 The expert interprets that the employee had been
emailing confidential information to an email address
associated with the competitor.
 The expert documents the findings in a forensic report,
which is presented to the company's management & legal
team as case’s evidence.
Pros & Cons of Digital Forensics
Flexibility
Lost Data Recovery
Business Intelligence
Legal Action Support
Very Expensive
Time-Consuming
Technical Complexity
Potential for Errors
CONCLUSION
Digital forensics is a critical tool for identifying and taking legal
action against cybercrimes, recovering lost data, and protecting
intellectual property. While it has many benefits, such as aiding in
legal investigations and providing business intelligence, it's
important to carefully consider the potential drawbacks, such as
high costs and technical complexity. With the continued growth of
technology, digital forensics will remain an important tool in
ensuring the security and integrity of digital systems and data.
REFERENCES
Forensics:
https://www.crimemuseum.org/crime-library/forensic-investigation/definition-of-forensics
Digital Forensics:
https://en.wikipedia.org/wiki/Digital_forensics
https://www.open.edu/openlearn/science-maths-technology/digital-forensics/content-section-4.2
Digital Forensics Tools:
https://www.sciencedirect.com/science/article/abs/pii/S2666281720301864
A brief Intro to Digital Forensics

More Related Content

What's hot

What's hot (20)

Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
Database forensics
Database forensicsDatabase forensics
Database forensics
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensics
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 

Similar to A brief Intro to Digital Forensics

CF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCF-Computer-Forensic-Services
CF-Computer-Forensic-Services
Compute Forensics
 
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Josh Moulin, MSISA,CISSP
 

Similar to A brief Intro to Digital Forensics (20)

What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Second Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdf
Second Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdfSecond Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdf
Second Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdf
 
R15 a0533 cf converted
R15 a0533 cf convertedR15 a0533 cf converted
R15 a0533 cf converted
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
Evidence and data
Evidence and dataEvidence and data
Evidence and data
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Cyber Forensics|Digital Forensics|Cyber Crime-2023
Cyber Forensics|Digital Forensics|Cyber Crime-2023Cyber Forensics|Digital Forensics|Cyber Crime-2023
Cyber Forensics|Digital Forensics|Cyber Crime-2023
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Digital Investigation | Digital Forensics | Cyber Crime - 2023
Digital Investigation | Digital Forensics | Cyber Crime - 2023Digital Investigation | Digital Forensics | Cyber Crime - 2023
Digital Investigation | Digital Forensics | Cyber Crime - 2023
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
CF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCF-Computer-Forensic-Services
CF-Computer-Forensic-Services
 
76 s201924
76 s20192476 s201924
76 s201924
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
 

More from Manik Bhola

More from Manik Bhola (20)

HCF Vs LCM: A New Approach with real life Scenario
HCF  Vs  LCM: A New Approach with real life ScenarioHCF  Vs  LCM: A New Approach with real life Scenario
HCF Vs LCM: A New Approach with real life Scenario
 
Become a Maths Topper: Avoid Common Mistakes
Become a Maths Topper: Avoid Common MistakesBecome a Maths Topper: Avoid Common Mistakes
Become a Maths Topper: Avoid Common Mistakes
 
Congruency vs Equality
Congruency vs EqualityCongruency vs Equality
Congruency vs Equality
 
Understanding Secularism (Class 8 | Civics)
Understanding Secularism (Class 8 | Civics)Understanding Secularism (Class 8 | Civics)
Understanding Secularism (Class 8 | Civics)
 
Algebraic Terms: Step by Step Approach.pdf
Algebraic Terms: Step by Step Approach.pdfAlgebraic Terms: Step by Step Approach.pdf
Algebraic Terms: Step by Step Approach.pdf
 
Word Problems: Answer in just 6 steps
Word Problems: Answer in just 6 stepsWord Problems: Answer in just 6 steps
Word Problems: Answer in just 6 steps
 
Algebraic Expression Maths Lesson Plan in detail
Algebraic Expression Maths Lesson Plan in detailAlgebraic Expression Maths Lesson Plan in detail
Algebraic Expression Maths Lesson Plan in detail
 
Women Empowerment in India
Women Empowerment in IndiaWomen Empowerment in India
Women Empowerment in India
 
Adjective worksheet
Adjective worksheetAdjective worksheet
Adjective worksheet
 
System Development Life Cycle (Notes)
System Development Life Cycle (Notes)System Development Life Cycle (Notes)
System Development Life Cycle (Notes)
 
Computer Virus and its Types (Mob View)
Computer Virus and its Types (Mob View)Computer Virus and its Types (Mob View)
Computer Virus and its Types (Mob View)
 
Mail merge in MS word MobView
Mail merge in MS word MobViewMail merge in MS word MobView
Mail merge in MS word MobView
 
Types of Natural vegetation in India
Types of Natural vegetation in IndiaTypes of Natural vegetation in India
Types of Natural vegetation in India
 
Class 11 Gravitation MobView
Class 11 Gravitation MobViewClass 11 Gravitation MobView
Class 11 Gravitation MobView
 
Class 11 Mechanical Properties of Solids MobView
Class 11 Mechanical Properties of Solids MobViewClass 11 Mechanical Properties of Solids MobView
Class 11 Mechanical Properties of Solids MobView
 
Class 6 Growth of New Ideas
Class 6 Growth of New IdeasClass 6 Growth of New Ideas
Class 6 Growth of New Ideas
 
Life in Villages and Towns Class 6
Life in Villages and Towns Class 6Life in Villages and Towns Class 6
Life in Villages and Towns Class 6
 
Democracy (a brief view)
Democracy (a brief view)Democracy (a brief view)
Democracy (a brief view)
 
Microorganisms Class 8
Microorganisms Class 8Microorganisms Class 8
Microorganisms Class 8
 
Structure of a cell
Structure of a cellStructure of a cell
Structure of a cell
 

Recently uploaded

Recently uploaded (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

A brief Intro to Digital Forensics

  • 3. Digital Forensics (D.F.) is a rapidly growing field that involves the recovery, analysis, and presentation of digital evidence in legal investigations. As more and more of our lives are conducted in the digital realm, the need for skilled digital forensics experts has become increasingly important. In this presentation, we will explore the basics of digital forensics, including the tools and techniques used to gather and analyze digital evidence with an example. We will also discuss some of the important key aspects of DNA in forensics. At last, we will discuss the pros and cons of digital forensics.
  • 4. HISTORY| SCIENTISTS INVENTIONS & DISCOVERIES Alphonse Bertillon SYSTEM OF ANTHROPOMETRY It involves measuring various parts of the body to create a unique identifier for everyone. Francis Galton USE OF FINGERPRINTS Its a way to identify suspects. Edmond Locard PRINCIPLE OF EXCHANGE It states that every contact leaves a trace. Sir Alec Jeffreys DNA PROFILING It is a technique used to identify & distinguish individuals genetically. It also helps to determine their relationship to others.
  • 5. FORENSICS • It refers to the use of scientific methods and techniques to investigate crimes. • It can refer to any type of evidence or investigation. • Examples: Analyzing DNA samples, testing blood spatter patterns, or examining bullet trajectories. DIGITAL FORENSICS • It is a specific branch of forensics that deals with the investigation of digital devices and data. • It focuses specifically on electronic evidence. • Examples: Analyzing computer hard drives, examining mobile-phone records, or reviewing social media activity to gather evidence.
  • 6. "DIGITAL FORENSICS is the use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal or helping to anticipate unauthorized actions shown to be disruptive to planned operations." -Dr. Gary Kessler A renowned digital forensics expert & professor at Embry-Riddle Aeronautical University.
  • 7. Need & Importance 01 Investigation of Cyber Crimes Legal Action Support Intellectual Property Protection Risk Management Forensic Accounting Digital forensics is used to investigate cybercrimes such as hacking and cyberbullying. It can be used to deal with Copyright and Patent issue, trademark issue, and trade secret theft. It can help organizations to identify data breaches, insider threats, and other security incidents. It is used to investigate financial crimes such as money laundering, and fraud. It can help to prove or disprove allegations, as well as to locate and recover lost or deleted data. 02 03 04 05
  • 8. It involves creating a forensic image of the device, which is an exact copy of the digital data stored on it. Steps involved in Digital Forensics Process 01 02 03 04 05 The first step is to identify the digital devices or storage media that may contain relevant evidence. It involve using specialized software tools to recover deleted files, search for keywords or patterns, or analyze network traffic. Finally, the results of the analysis and interpretation are documented in a forensic report, which is typically presented to the investigating agency or court. Identification Analysis Preservation Interpretation Reporting Once the evidence is identified, it must be interpreted in the context of the investigation.
  • 9. EXAMPLE 01 02 03 04 05  A company suspects that one of their employees has been leaking sensitive information to a competitor.  The company's IT department identifies the employee's work computer as a potential source of evidence and hires a digital forensics expert to analyze it.  The expert preserves the data by creating a forensic image, then analyzes the image to identify relevant files & network activity.  The expert interprets that the employee had been emailing confidential information to an email address associated with the competitor.  The expert documents the findings in a forensic report, which is presented to the company's management & legal team as case’s evidence.
  • 10.
  • 11. Pros & Cons of Digital Forensics Flexibility Lost Data Recovery Business Intelligence Legal Action Support Very Expensive Time-Consuming Technical Complexity Potential for Errors
  • 12. CONCLUSION Digital forensics is a critical tool for identifying and taking legal action against cybercrimes, recovering lost data, and protecting intellectual property. While it has many benefits, such as aiding in legal investigations and providing business intelligence, it's important to carefully consider the potential drawbacks, such as high costs and technical complexity. With the continued growth of technology, digital forensics will remain an important tool in ensuring the security and integrity of digital systems and data.