SlideShare a Scribd company logo
1 of 16
© AIR LAW ACADEMY & RESEARCH CENTRE,
NAGPUR
1
“Computer Forensic is the process of
identifying, preserving, analyzing and
presenting the digital evidence in such a
manner that the evidences are legally
acceptable”. ANALYSIS
ACQUISTION
EVIDENCE
REPORTING
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 2
 To find out the criminal which is directly or
indirectly related to cyber world.
 To find out the digital evidence.
 Presenting evidences in a manner that legal
action of the criminal.
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 3
 Employee internet abuse
 Unauthorized disclosure of corporate information.
 Industrial espionage
 Damage assessment
 Criminal fraud and deception cases
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 4
 Criminal Prosecutors: Rely on evidence
obtained from a computer to prosecute suspects
and use as evidence.
 Civil Litigations: Personal and business data
discovered on a computer can be used in fraud,
harassment, or discrimination cases.
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 5
“Any data that is recorded or preserved on any
medium in or by a computer system or other
similar devices, that can be read and understand
by a person or a computer system or other
similar devices”.
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 6
 Persistent Data: Data that remains unaffected
when the computer is turned off.
Example: Hard Drive and storage media.
 Volatile Data: Data that would be lost if the
computer is turned off.
Example: Deleted files, computer history, the
computer’s registry, temporary files and web
browsing history.
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 7
 Admissible- Must be able to be used in court or
elsewhere.
 Authentic- Evidence must be relevant to the
case.
 Complete- Must not lack any information.
 Reliable- No question about authenticity.
 Believable- Clear, easy to understand and
believable by a court.
IR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
8
 Find the evidence, where it is stored.
 Find relevant data- recovery.
 Create order of volatility.
 Collect evidence- use tools.
 Good documentation of all the actions
AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
9
 Acquisition: Physically or remotely obtaining
possession of the computer and external
physical storage devices.
 Identification: This step involves identifying
what data could be recovered and electronically
retrieving it by running various Computer
Forensic tools and software suites.
AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
10
 Evaluation: Evaluating the data recovered to
determine if and how it could be used again the
suspect for prosecution in court.
 Presentation: Presentation of evidence
discovered in a manner which is understood by
lawyers, no technically staff/management, and
suitable as evidence as determined by laws.
AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 11
 Disk imaging software
 Hashing tools
 File recovery programme
 Encryption decoding software
 Password cracking software
AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 12
 Proper knowledge of computer.
 Strong computer science fundamentals.
 Strong system administrative skills.
 Knowledge of the latest forensic tools.
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
13
Digital forensics help to protect from and solve
cases involving:
Theft of intellectual property: This is related to
any act that allow access to customer data and
any confidential information.
Financial Fraud: This is related to anything that
uses fraudulent purchase of victims information
to conduct fraudulent transactions.
AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 14
 Digital evidence accepted into court must prove
that there is no tampering.
 Costs- Producing electronic records and
preserving them is extremely costly.
 Legal practitioners must have extensive
computer knowledge.
IR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
15
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 16
THANK YOU

More Related Content

What's hot

Computer forensics
Computer forensicsComputer forensics
Computer forensicsHiren Selani
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsSCREAM138
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic SoftwaresDhruv Seth
 
Computer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hideComputer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hideAntonio Sanz Alcober
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsZyxware Technologies
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic pptPriya Manik
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingVi Tính Hoàng Nam
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensicsalrawes
 
Digital investigation
Digital investigationDigital investigation
Digital investigationunnilala11
 

What's hot (20)

Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Codebits 2010
Codebits 2010Codebits 2010
Codebits 2010
 
cyber Forensics
cyber Forensicscyber Forensics
cyber Forensics
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic Softwares
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Computer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hideComputer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hide
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
 
Lect 3 Computer Forensics
Lect 3 Computer ForensicsLect 3 Computer Forensics
Lect 3 Computer Forensics
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 

Viewers also liked

The design of forensic computer workstations
The design of forensic computer workstationsThe design of forensic computer workstations
The design of forensic computer workstationsjkvr100
 
MattockFS Computer Forensic File-System
MattockFS Computer Forensic File-SystemMattockFS Computer Forensic File-System
MattockFS Computer Forensic File-SystemRob Meijer
 
Electornic evidence collection
Electornic evidence collectionElectornic evidence collection
Electornic evidence collectionFakrul Alam
 
Forensic Science - 01 What is forensic science?
Forensic Science - 01 What is forensic science?Forensic Science - 01 What is forensic science?
Forensic Science - 01 What is forensic science?Ian Anderson
 
Elements Of Forensic Science
Elements Of Forensic ScienceElements Of Forensic Science
Elements Of Forensic Scienceannperry09
 
Computer forensic
Computer forensicComputer forensic
Computer forensicbhavithd
 
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic ExaminersBoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic ExaminersBoyarMiller
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesIsaiah Edem
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
 
Document clustering for forensic analysis an approach for improving compute...
Document clustering for forensic   analysis an approach for improving compute...Document clustering for forensic   analysis an approach for improving compute...
Document clustering for forensic analysis an approach for improving compute...Madan Golla
 
7 Forensic Science Powerpoint Chapter 07 Forensic Anthropology
7  Forensic Science Powerpoint Chapter 07 Forensic Anthropology7  Forensic Science Powerpoint Chapter 07 Forensic Anthropology
7 Forensic Science Powerpoint Chapter 07 Forensic AnthropologyGrossmont College
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumOWASP Khartoum
 
Introduction to forensic science
Introduction to forensic scienceIntroduction to forensic science
Introduction to forensic scienceAbby Varghese
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsFilip Maertens
 
Principles of forensic science
Principles of forensic sciencePrinciples of forensic science
Principles of forensic scienceBhoopendra Singh
 
Implementing and Running SIEM: Approaches and Lessons
Implementing  and Running SIEM: Approaches and LessonsImplementing  and Running SIEM: Approaches and Lessons
Implementing and Running SIEM: Approaches and LessonsAnton Chuvakin
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...IBM Security
 

Viewers also liked (20)

The design of forensic computer workstations
The design of forensic computer workstationsThe design of forensic computer workstations
The design of forensic computer workstations
 
MattockFS Computer Forensic File-System
MattockFS Computer Forensic File-SystemMattockFS Computer Forensic File-System
MattockFS Computer Forensic File-System
 
Electornic evidence collection
Electornic evidence collectionElectornic evidence collection
Electornic evidence collection
 
Capturing forensics image
Capturing forensics imageCapturing forensics image
Capturing forensics image
 
File000173
File000173File000173
File000173
 
Forensic Science - 01 What is forensic science?
Forensic Science - 01 What is forensic science?Forensic Science - 01 What is forensic science?
Forensic Science - 01 What is forensic science?
 
Elements Of Forensic Science
Elements Of Forensic ScienceElements Of Forensic Science
Elements Of Forensic Science
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic ExaminersBoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting Crimes
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Document clustering for forensic analysis an approach for improving compute...
Document clustering for forensic   analysis an approach for improving compute...Document clustering for forensic   analysis an approach for improving compute...
Document clustering for forensic analysis an approach for improving compute...
 
7 Forensic Science Powerpoint Chapter 07 Forensic Anthropology
7  Forensic Science Powerpoint Chapter 07 Forensic Anthropology7  Forensic Science Powerpoint Chapter 07 Forensic Anthropology
7 Forensic Science Powerpoint Chapter 07 Forensic Anthropology
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
 
Introduction to forensic science
Introduction to forensic scienceIntroduction to forensic science
Introduction to forensic science
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Principles of forensic science
Principles of forensic sciencePrinciples of forensic science
Principles of forensic science
 
Implementing and Running SIEM: Approaches and Lessons
Implementing  and Running SIEM: Approaches and LessonsImplementing  and Running SIEM: Approaches and Lessons
Implementing and Running SIEM: Approaches and Lessons
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...
 

Similar to Computer forensic ppt

Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics SlidesVarun Sehgal
 
Evidence and data
Evidence and dataEvidence and data
Evidence and dataAtul Rai
 
CS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IVCS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IVArthyR3
 
76 s201924
76 s20192476 s201924
76 s201924IJRAT
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxDaniyaHuzaifa
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxssuser2bf502
 
computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfGnanavi2
 
Ethical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsEthical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsShanaAneevan
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensicsRahul Baghla
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Sagar Rahurkar
 
Maintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docxMaintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docxsmile790243
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesBRNSSPublicationHubI
 
Computer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdfComputer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdffeetshoemart
 
Smartphones are smarter than you thought geo bellas
Smartphones are smarter than you thought   geo bellasSmartphones are smarter than you thought   geo bellas
Smartphones are smarter than you thought geo bellasGeoBellas
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensicsJohnson Ubah
 

Similar to Computer forensic ppt (20)

Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Evidence and data
Evidence and dataEvidence and data
Evidence and data
 
CS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IVCS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IV
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
76 s201924
76 s20192476 s201924
76 s201924
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdf
 
Ethical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsEthical Hacking And Computer Forensics
Ethical Hacking And Computer Forensics
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 
Maintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docxMaintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docx
 
Cyber
CyberCyber
Cyber
 
Cyber Security 1215
Cyber Security 1215Cyber Security 1215
Cyber Security 1215
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Computer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdfComputer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdf
 
Smartphones are smarter than you thought geo bellas
Smartphones are smarter than you thought   geo bellasSmartphones are smarter than you thought   geo bellas
Smartphones are smarter than you thought geo bellas
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
 

Recently uploaded

如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Oishi8
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
Offences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKINGOffences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKINGPRAKHARGUPTA419620
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 

Recently uploaded (20)

如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to Service
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
Offences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKINGOffences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKING
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 

Computer forensic ppt

  • 1. © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 1
  • 2. “Computer Forensic is the process of identifying, preserving, analyzing and presenting the digital evidence in such a manner that the evidences are legally acceptable”. ANALYSIS ACQUISTION EVIDENCE REPORTING © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 2
  • 3.  To find out the criminal which is directly or indirectly related to cyber world.  To find out the digital evidence.  Presenting evidences in a manner that legal action of the criminal. © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 3
  • 4.  Employee internet abuse  Unauthorized disclosure of corporate information.  Industrial espionage  Damage assessment  Criminal fraud and deception cases © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 4
  • 5.  Criminal Prosecutors: Rely on evidence obtained from a computer to prosecute suspects and use as evidence.  Civil Litigations: Personal and business data discovered on a computer can be used in fraud, harassment, or discrimination cases. © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 5
  • 6. “Any data that is recorded or preserved on any medium in or by a computer system or other similar devices, that can be read and understand by a person or a computer system or other similar devices”. © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 6
  • 7.  Persistent Data: Data that remains unaffected when the computer is turned off. Example: Hard Drive and storage media.  Volatile Data: Data that would be lost if the computer is turned off. Example: Deleted files, computer history, the computer’s registry, temporary files and web browsing history. © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 7
  • 8.  Admissible- Must be able to be used in court or elsewhere.  Authentic- Evidence must be relevant to the case.  Complete- Must not lack any information.  Reliable- No question about authenticity.  Believable- Clear, easy to understand and believable by a court. IR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 8
  • 9.  Find the evidence, where it is stored.  Find relevant data- recovery.  Create order of volatility.  Collect evidence- use tools.  Good documentation of all the actions AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 9
  • 10.  Acquisition: Physically or remotely obtaining possession of the computer and external physical storage devices.  Identification: This step involves identifying what data could be recovered and electronically retrieving it by running various Computer Forensic tools and software suites. AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 10
  • 11.  Evaluation: Evaluating the data recovered to determine if and how it could be used again the suspect for prosecution in court.  Presentation: Presentation of evidence discovered in a manner which is understood by lawyers, no technically staff/management, and suitable as evidence as determined by laws. AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 11
  • 12.  Disk imaging software  Hashing tools  File recovery programme  Encryption decoding software  Password cracking software AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 12
  • 13.  Proper knowledge of computer.  Strong computer science fundamentals.  Strong system administrative skills.  Knowledge of the latest forensic tools. © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 13
  • 14. Digital forensics help to protect from and solve cases involving: Theft of intellectual property: This is related to any act that allow access to customer data and any confidential information. Financial Fraud: This is related to anything that uses fraudulent purchase of victims information to conduct fraudulent transactions. AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 14
  • 15.  Digital evidence accepted into court must prove that there is no tampering.  Costs- Producing electronic records and preserving them is extremely costly.  Legal practitioners must have extensive computer knowledge. IR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 15
  • 16. © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 16 THANK YOU