Computer forensic


Published on

Published in: Technology, Education

Computer forensic

  1. 1. 1<br />WELCOME<br />COMPUTERFORENSICS<br />
  2. 2. 2<br /> Submitted By:<br /> Bhavith D 5th Sem CS 497IS08003<br />Submitted To:<br />MISS MOOKAMBIKA<br /> (COMPUTER SCIENCE Department)<br />
  3. 3. 3<br />INTRODUCTION<br />The first thing that pops up to mind might be a Crime Scene Investigator.<br />The science behind computer forensics is not much different from the science between crime scene forensics. <br />
  4. 4. 4<br />What is Computer Forensics<br />Computer forensics relates to the application of <br /><ul><li> Identifying sources of digital evidence</li></ul> Securing and preserving identified evidence<br /> Analyzing the evidence<br /> Documenting legally admissible evidence<br />
  5. 5. 5<br />PRINCIPLE<br /> Serves both the public and private sectors.<br /> Provide evidence and to prevent criminal computer related<br /> activity.<br /> The first is to identify sources of digital evidence.<br /> The second is to preserve that evidence from loss, change or<br /> corruption.<br /> The third step in the process is to analyze the evidence, and <br /> The fourth is to present the evidence within the context it is<br /> required.<br />
  6. 6. 6<br />MODERN HISTORY<br />In 16th-century, Europe medical practitioners in army and university settings began to gather information on cause and manner of death. <br />In the late 18th century, writings on these topics began to appear. <br />This investigation was expanded, in 1806, by German chemist Valentin Ross.<br />
  7. 7. 7<br />USES OF COMPUTER FORENSICS<br />Criminal<br />Domestic<br />Security<br />Internal<br />Marketing<br />
  8. 8. 8<br />WORKING OF COMPUTER FORENSICS<br />Workings of computer storage devices and the major operating systems.<br />The ability to work well in a high pressure environment <br />A good understanding of atleast one major programming language. <br />
  9. 9. 9<br />CIRCUIT DESIGN<br />       <br />  Computer Forensics<br />
  10. 10. 10<br />TYPES OF COMPUTER FORENSICS<br />Hacking<br />Phishing <br />Computer Viruses <br />Identity Theft<br />Cyber stalking<br />
  11. 11. 11<br />INVESTIGATION REPORT SERVICES<br />Hidden hard drive information <br />Open locked files<br />Country & federal<br />
  14. 14. 14<br />BENEFITS<br />Information and evidence to solve a problem.<br />Scientist does the job of solving a crime through analyzing data.<br />Using forensic science, it is easier to track the history and trace events related to the crime.<br />Using analysis Tools and Utilities.<br />
  15. 15. 15<br />CONCLUSION<br />How they will carry out an onsite acquisition. <br />Tools may fail, time constraints can be severe.<br />Maintenance of their tools and development.<br />
  16. 16. 16<br />THANK YOU<br />