SlideShare a Scribd company logo
1 of 23
BY:-
AMRITANSHU KAUSHIK
CSE 𝟑 𝒓𝒅
Year
1
CONTENTS:-
Defining Computer Forensics
Characteristics
Needs
History
Goal
Cyber Crime & Evidence
Rules Of Handling Evidence
Top 10 Location For Evidence
Computer Forensics Methodology
Applications of Computer Forensics
Who Uses Computer Forensics
Skills Requirements for Computer Forensics 2
What is Computer Forensics?
• “Forensic computing is the process of identifying,
preserving, analyzing and presenting digital evidence in a
manner that is legally acceptable.”(Rodney Mckemmish
1999).
• Evidence might be required for a wide range of computer
crimes and misuses.
• Information collected assists in arrests, prosecution,
termination of employment, and preventing future illegal
activity
3
CHARECTERISTICS OF
COMPUTER FORENSICS
• IDENTIFYING
• PRESERVING
• ANALYZING
• PRESENTING
4
NEEDS OF COMPUTER FORENSICS
oTo produce evidence in the court that can
lead to the punishment of the actual.
oTo ensure the integrity of the computer
system.
oTo focus on the response to hi-tech
offenses, started to intertwine.
5
HISTORY OF COMPUTER FORENSICS
o Began to evolve more than 30 years ago in US when law
enforcement and military investigators started seeing
criminals get technical.
o Over the next decades, and up to today, the field has
exploded. Law enforcement and the military continue to
have a large presence in the information security and
computer forensic field at the local, state and federal
level.
o Now a days, Software companies continue to produce
newer and more robust forensic software programs. And
law enforcement and the military continue to identify
and train more and more of their personnel in the
response to crimes involving technology. 6
GOAL OF COMPUTER FORENSICS
• The main goal of computer forensic
experts is not only to find the criminal but
also to find out the evidence and the
presentation of the evidence in a manner
that leads to legal action of the criminal.
7
CYBER CRIME & EVIDENCE
• CYBER CRIME
• Cyber crime occurs when information
technology is used to commit or conceal an
offence.
8
TYPES OF CYBER CRIME
o Forgery
o Breech of Computer Security
o Fraud/Theft
o Copyright Violations
o Identity Theft
o Threats
o Burglary
o Homicide
o Administrative Investigations
o Cyber Terrorism
o Sales and Investment Fraud
o Electronic Fund Transfer Fraud 9
10
Cybercrime: Top 20 Countries
11
Evidence
 An item does not become officially a piece of evidence
until a court admits it.
 Much of forensics practice concerns how to collect,
preserve and analyze these items without compromising
their potential to be admitted as evidence in a court of
law.
12
DIGITAL EVIDENCE
• “Any data that is recorded or preserved on any medium
in or by a computer system or other similar device, that
can be read or understand by a person or a computer
system or other similar device. It includes a display, print
out or other output of that data.”
13
TYPES OF DIGITAL EVIDENCE
1) PERSISTANT DATA
Meaning data that remains intact when the
computer is turned off. E.g. hard drives, disk drives and
removable storage devices (such as USB drives or flash
drives).
2) VOLATILE DATA,
Meaning data that would be lost if the computer is
turned off. E.g. deleted files, computer history, the
computer's registry, temporary files and web browsing
history. 14
5 RULES OF EVIDENCES
1) Admissible
• Must be able to be used in court or elsewhere.
2) Authentic
• Evidence relates to incident in relevant way.
3) Complete (no tunnel vision)
• Exculpatory evidence for alternative suspects.
4) Reliable
• No question about authenticity & veracity.
5) Believable
• Clear, easy to understand, and believable by a jury.
15
TOP 10 LOCATION FOR EVIDENCE
1) Internet History Files
2) Temporary Internet Files
3) Slack/Unallocated Space
4) Buddy lists, personal chat room records, others saved
areas
5) News groups/club lists/posting
6) Settings, folder structure, file names
7) File Storage Dates
8) Software/Hardware added
9) File Sharing ability
10) E-mails
16
COMPUTER FORENSICS METHODOLOGY
1) Shut Down the Computer
2) Document the Hardware Configuration of
The System
3) Transport the Computer System to A Secure
Location
4) Make Bit Stream Backups of Hard Disks and
Floppy Disks
5) Mathematically Verify Data on All Storage
Devices
6) Document the System Date and Time
7) Make a List of Key Search Words 17
CONT…
8) Evaluate the Windows Swap File
9) Evaluate File Slack
10) Evaluate Unallocated Space (Erased Files)
11) Search Files, File Slack and Unallocated
Space for Key Words
12) Document File Names, Dates and Times
13) Identify File, Program and Storage
Anomalies
14) Evaluate Program Functionality
15) Document Your Findings
18
APPLICATIONS :-
• FINANCIAL FRAUD DETECTION
• CRIMINAL PROSECUTION
• CIVIL LITIGATION
• “CORPORATE SECURITY POLICY AND VIOLATIONS”
19
Who Uses Computer Forensics?
Criminal Prosecutors
Rely on evidence obtained from a computer to
prosecute suspects and use as evidence.
Civil Litigations
Personal and business data discovered on a computer
can be used in fraud, harassment, or discrimination
cases.
Private Corporations
Obtained evidence from employee computers can be
used as evidence in harassment, fraud, and
embezzlement cases. 20
Who UsesComputerForensics?(cont..)
Law Enforcement Officials
Rely on computer forensics to backup search warrants
and post-seizure handling.
Individual/Private Citizens
Obtain the services of professional computer forensic
specialists to support claims of harassment, abuse, or
wrongful termination from employment.
21
Skills Required For
Computer Forensics Application
o Programming or computer-related experience
o Broad understanding of operating systems and
applications
o Strong analytical skills
oStrong computer science fundamentals
o Strong system administrative skills
o Knowledge of the latest intruder tools
o Knowledge of cryptography and steganography
oStrong understanding of the rules of evidence and
evidence handling
o Ability to be an expert witness in a court of law
22
`
23

More Related Content

What's hot (20)

Digital investigation
Digital investigationDigital investigation
Digital investigation
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Email investigation
Email investigationEmail investigation
Email investigation
 
Memory Forensics
Memory ForensicsMemory Forensics
Memory Forensics
 
Stegano Forensics
Stegano ForensicsStegano Forensics
Stegano Forensics
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Incident response
Incident responseIncident response
Incident response
 
Memory forensics
Memory forensicsMemory forensics
Memory forensics
 
Memory Forensics
Memory ForensicsMemory Forensics
Memory Forensics
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
Windows Forensic 101
Windows Forensic 101Windows Forensic 101
Windows Forensic 101
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Malware forensics
Malware forensicsMalware forensics
Malware forensics
 
computer forensics
computer forensicscomputer forensics
computer forensics
 

Similar to computer forensics by amritanshu kaushik

Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02satyabwati
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxDaniyaHuzaifa
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxssuser2bf502
 
computer forensics
computer forensicscomputer forensics
computer forensicsAmit Singh
 
Digital&computforensic
Digital&computforensicDigital&computforensic
Digital&computforensicRahul Badekar
 
computerforensicsppt-111006063922-phpapp01.pdf
computerforensicsppt-111006063922-phpapp01.pdfcomputerforensicsppt-111006063922-phpapp01.pdf
computerforensicsppt-111006063922-phpapp01.pdfGnanavi2
 
Forensic investigation
Forensic investigationForensic investigation
Forensic investigationinfosecindia
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Muzzammil Wani
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1Jinalkakadiya
 
computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfGnanavi2
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20worldAqib Memon
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh tManesh T
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptSurajgroupsvideo
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 

Similar to computer forensics by amritanshu kaushik (20)

Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Digital&computforensic
Digital&computforensicDigital&computforensic
Digital&computforensic
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
computerforensicsppt-111006063922-phpapp01.pdf
computerforensicsppt-111006063922-phpapp01.pdfcomputerforensicsppt-111006063922-phpapp01.pdf
computerforensicsppt-111006063922-phpapp01.pdf
 
Forensic investigation
Forensic investigationForensic investigation
Forensic investigation
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdf
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh t
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Latest presentation
Latest presentationLatest presentation
Latest presentation
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 

Recently uploaded

The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 

Recently uploaded (20)

The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 

computer forensics by amritanshu kaushik

  • 2. CONTENTS:- Defining Computer Forensics Characteristics Needs History Goal Cyber Crime & Evidence Rules Of Handling Evidence Top 10 Location For Evidence Computer Forensics Methodology Applications of Computer Forensics Who Uses Computer Forensics Skills Requirements for Computer Forensics 2
  • 3. What is Computer Forensics? • “Forensic computing is the process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally acceptable.”(Rodney Mckemmish 1999). • Evidence might be required for a wide range of computer crimes and misuses. • Information collected assists in arrests, prosecution, termination of employment, and preventing future illegal activity 3
  • 4. CHARECTERISTICS OF COMPUTER FORENSICS • IDENTIFYING • PRESERVING • ANALYZING • PRESENTING 4
  • 5. NEEDS OF COMPUTER FORENSICS oTo produce evidence in the court that can lead to the punishment of the actual. oTo ensure the integrity of the computer system. oTo focus on the response to hi-tech offenses, started to intertwine. 5
  • 6. HISTORY OF COMPUTER FORENSICS o Began to evolve more than 30 years ago in US when law enforcement and military investigators started seeing criminals get technical. o Over the next decades, and up to today, the field has exploded. Law enforcement and the military continue to have a large presence in the information security and computer forensic field at the local, state and federal level. o Now a days, Software companies continue to produce newer and more robust forensic software programs. And law enforcement and the military continue to identify and train more and more of their personnel in the response to crimes involving technology. 6
  • 7. GOAL OF COMPUTER FORENSICS • The main goal of computer forensic experts is not only to find the criminal but also to find out the evidence and the presentation of the evidence in a manner that leads to legal action of the criminal. 7
  • 8. CYBER CRIME & EVIDENCE • CYBER CRIME • Cyber crime occurs when information technology is used to commit or conceal an offence. 8
  • 9. TYPES OF CYBER CRIME o Forgery o Breech of Computer Security o Fraud/Theft o Copyright Violations o Identity Theft o Threats o Burglary o Homicide o Administrative Investigations o Cyber Terrorism o Sales and Investment Fraud o Electronic Fund Transfer Fraud 9
  • 10. 10
  • 11. Cybercrime: Top 20 Countries 11
  • 12. Evidence  An item does not become officially a piece of evidence until a court admits it.  Much of forensics practice concerns how to collect, preserve and analyze these items without compromising their potential to be admitted as evidence in a court of law. 12
  • 13. DIGITAL EVIDENCE • “Any data that is recorded or preserved on any medium in or by a computer system or other similar device, that can be read or understand by a person or a computer system or other similar device. It includes a display, print out or other output of that data.” 13
  • 14. TYPES OF DIGITAL EVIDENCE 1) PERSISTANT DATA Meaning data that remains intact when the computer is turned off. E.g. hard drives, disk drives and removable storage devices (such as USB drives or flash drives). 2) VOLATILE DATA, Meaning data that would be lost if the computer is turned off. E.g. deleted files, computer history, the computer's registry, temporary files and web browsing history. 14
  • 15. 5 RULES OF EVIDENCES 1) Admissible • Must be able to be used in court or elsewhere. 2) Authentic • Evidence relates to incident in relevant way. 3) Complete (no tunnel vision) • Exculpatory evidence for alternative suspects. 4) Reliable • No question about authenticity & veracity. 5) Believable • Clear, easy to understand, and believable by a jury. 15
  • 16. TOP 10 LOCATION FOR EVIDENCE 1) Internet History Files 2) Temporary Internet Files 3) Slack/Unallocated Space 4) Buddy lists, personal chat room records, others saved areas 5) News groups/club lists/posting 6) Settings, folder structure, file names 7) File Storage Dates 8) Software/Hardware added 9) File Sharing ability 10) E-mails 16
  • 17. COMPUTER FORENSICS METHODOLOGY 1) Shut Down the Computer 2) Document the Hardware Configuration of The System 3) Transport the Computer System to A Secure Location 4) Make Bit Stream Backups of Hard Disks and Floppy Disks 5) Mathematically Verify Data on All Storage Devices 6) Document the System Date and Time 7) Make a List of Key Search Words 17
  • 18. CONT… 8) Evaluate the Windows Swap File 9) Evaluate File Slack 10) Evaluate Unallocated Space (Erased Files) 11) Search Files, File Slack and Unallocated Space for Key Words 12) Document File Names, Dates and Times 13) Identify File, Program and Storage Anomalies 14) Evaluate Program Functionality 15) Document Your Findings 18
  • 19. APPLICATIONS :- • FINANCIAL FRAUD DETECTION • CRIMINAL PROSECUTION • CIVIL LITIGATION • “CORPORATE SECURITY POLICY AND VIOLATIONS” 19
  • 20. Who Uses Computer Forensics? Criminal Prosecutors Rely on evidence obtained from a computer to prosecute suspects and use as evidence. Civil Litigations Personal and business data discovered on a computer can be used in fraud, harassment, or discrimination cases. Private Corporations Obtained evidence from employee computers can be used as evidence in harassment, fraud, and embezzlement cases. 20
  • 21. Who UsesComputerForensics?(cont..) Law Enforcement Officials Rely on computer forensics to backup search warrants and post-seizure handling. Individual/Private Citizens Obtain the services of professional computer forensic specialists to support claims of harassment, abuse, or wrongful termination from employment. 21
  • 22. Skills Required For Computer Forensics Application o Programming or computer-related experience o Broad understanding of operating systems and applications o Strong analytical skills oStrong computer science fundamentals o Strong system administrative skills o Knowledge of the latest intruder tools o Knowledge of cryptography and steganography oStrong understanding of the rules of evidence and evidence handling o Ability to be an expert witness in a court of law 22
  • 23. ` 23