SlideShare a Scribd company logo
1 of 26
Download to read offline
COMPUTER
FORENSICS
By Group :-G10
Group Members are as:1:Pradeep Kumar
2:Parvez
3:Surender Singh
CONTENTS
Definition of Computer Forensics
History of Computer Forensics
Steps Of Computer Forensics
Certifications for Computer Forensic
Computer Forensic Requirements
Collecting Evidence
Uses of Computer forensics
Advantages of Computer Forensics
Disadvantages of Computer Forensics
Computer forensics labs and centers in India
Conclusion
THE FIELD OF
COMPUTER FORENSICS
What is Computer Forensics?


Computer forensics involves the
preservation, identification, extraction,
documentation, and interpretation of computer
media for evidentiary and root cause analysis



Computer forensics is the process of
identifying, preserving, and analyzing data and
technical items for evidence that will be used
in court
THE FIELD OF
COMPUTER FORENSICS
Used to obtain potential legal evidence
 Evidence might be required for a wide range of
computer crimes and misuses
 Multiple methods of computer forensics are:
 Discovering data on computer system
 Recovering deleted, encrypted, or damaged
file information
 Monitoring live activity
 Detecting violations of corporate policy
 Information collected assists in arrests,
prosecution, termination of employment, and
preventing future illegal activity

THE FIELD OF
COMPUTER FORENSICS
 Example:-

Recovering thousands of deleted emails
 Performing investigation post employment
termination
 Recovering evidence post formatting hard
drive

HISTORY OF COMPUTER
FORENSICS
1970s
 First crimes cases involving computers, mainly financial fraud
1980’s
 Financial investigators and courts realize that in some cases all the
records and evidences were only on computers.
 Norton Utilities, “Un-erase” tool created
 Association of Certified Fraud Examiners began to seek training in
what became computer forensics
 SEARCH High Tech Crimes training created
 Regular classes began to be taught to Federal agents in California
and at FLETC in Georgia
 HTCIA formed in Southern California
HISTORY OF COMPUTER
FORENSICS
1984
 FBI Magnetic Media Program created... this later becomes
the Computer Analysis and Response Team (CART)
1993
 First International Conference on Computer Evidence held
1995
 International Organization on Computer Evidence (IOCE)
formed
HISTORY OF COMPUTER
FORENSICS
1997
 The G8 countries declared that "Law enforcement personnel
must be trained and equipped to address high-tech crimes" in
the Moscow
1998
 In March G8 appointed IICE to create international
principles for the procedures relating to digital evidence
1998
 INTERPOL Forensic Science Symposium
HISTORY OF COMPUTER
FORENSICS
1999
 FBI CART case load exceeds 2000 cases,
 examining 17 terabytes of data
2000
 First FBI Regional Computer Forensic Laboratory
established

2003
 FBI CART case load exceeds 6500 cases,
 examining 782 terabytes of data
STEPS OF COMPUTER
FORENSICS


According to many professionals, Computer Forensics is
a four (4) step process
 Acquisition


Physically or remotely obtaining possession of the
computer, all network mappings from the system,
and external physical storage devices

 Identification


This step involves identifying what data could be
recovered and electronically retrieving it by
running various Computer Forensic tools and
software
suites
STEPS OF COMPUTER
FORENSICS
 Evaluation


Evaluating the information/data recovered to
determine if and how it could be used again the
suspect for employment termination or prosecution
in court

 Presentation


This step involves the presentation of evidence
discovered in a manner which is understood by
lawyers, non-technically staff/management, and
suitable as evidence as determined by United States
and internal laws
CERTIFICATION FOR COMPUTER
INVESTIGATIVE SPECIALISTS

CEECS (Certified Electronic Evidence Collection Specialist
Certification)
 Awarded to individuals who complete the CEECS regional
certification course
 Also awarded to individuals in the Certified Forensic
Computer Examiner course that successfully pass the written
test
CERTIFICATION FOR
FORENSIC COMPUTER
EXAMINER
Internal Certification Training Program


Must successfully complete two week training course
offered by IACIS and correspondence proficiency
problems

External Certification Testing Process
Not a training course
 Testing process
Active Law Enforcement
Individuals qualified for IACIS membership


Recertification


Every three years must complete recertification process
Must be in good standing with IACIS
Complete proficiency test
A COMPUTER FORENSIC
SPECIALIST PROMISES TO:







Do not delete, damage or alter any evidence
Protect the computer and files against a virus
Handle all evidence properly to prevent any future
damage
Keep a log of all work done and by whom
Keep any Client-Attorney information that is gained
confidential
COMPUTER FORENSIC
REQUIREMENTS




Hardware
 Familiarity with all internal and external
devices/components of a computer
 Thorough understanding of hard drives and settings
 Understanding motherboards and the various chipsets
used
 Power connections
 Memory
BIOS
 Understanding how the BIOS works
 Familiarity with the various settings and limitations of
the BIOS
COMPUTER FORENSIC
REQUIREMENTS


Operation Systems
Windows 3.1/95/98/ME/NT/2000/2003/XP
 DOS
 UNIX
 LINUX






Software
 Familiarity with most popular software packages
such as MS Office
Forensic Tools
 Familiarity with computer forensic techniques and the
software packages that could be used
COLLECTING EVIDENCE


Make Exact copies of all
hard drives & disks using
computer software




Protect the Computer
system




Date and Time stamped on each file;
used for timeline

Avoid deletion, damage, viruses
and corruption

Discover files






Normal Files
Deleted Files
Password Protected Files
Hidden Files
Encrypted Files








Reveal all contents of
hidden files used by
application and operating
system
Access contents of
password protected files if
legally able to do so
Analyze data
Print out analysis






Computer System
All Files and data
Overall opinion

Provide expert
consultation/testimony
USES OF COMPUTER
FORENSICS


Criminal Prosecutors




Civil Litigations




Rely on evidence obtained from a computer to
prosecute suspects and use as evidence
Personal and business data discovered on a computer
can be used in fraud, divorce, harassment, or
discrimination cases

Insurance Companies


Evidence discovered on computer can be
used to mollify costs (fraud, worker’s
compensation, arson, etc)
USES OF COMPUTER
FORENSICS


Private Corporations




Law Enforcement Officials




Obtained evidence from employee computers can
be used as evidence in harassment, fraud, and
embezzlement cases
Rely on computer forensics to backup search warrants
and post-seizure handling

Individual/Private Citizens


Obtain the services of professional computer forensic
specialists to support claims of harassment, abuse, or
wrongful termination from employment
ADVANTAGES OF COMPUTER
FORENSICS
Ability to search
through a massive
amount of data
 Quickly
 Thoroughly
 In

any language
DISADVANTAGES OF
COMPUTER FORENSICS


Digital evidence accepted
into court




must prove that there is no
tampering
all evidence must be fully
accounted for
computer forensic specialists
must have complete knowledge
of legal requirements, evidence
handling and storage and
documentation procedures
DISADVANTAGES OF
COMPUTER FORENSICS


Costs


producing electronic records & preserving them is
extremely costly ,

Presents the potential for exposing privileged
documents
 Legal practitioners must have extensive
computer knowledge

COMPUTER FORENSICS LABS
AND CENTERS IN INDIA
1.
2.

3.

4.
5.
6.
7.

cyber college, Dehradun
Secure India (A Group of Cyber Security Specialists),
Muzaffarnagar, Uttar Pradesh
E2Labs Research & Development Center, Hyderabad,
Andhra Pradesh
Agape Inc, Nagpur, Maharashtra
Appin Technology Lab, Hyderabad, Andhra Pradesh
Shoeb Online, Mumbai, Maharashtra
ForensicsGuru.com, New Delhi

8.

I.TECH COMPUTERS - DATA FORENSICS & DATA
RECOVERY, Mumbai

9.

Indiaforensic Center of Studies , Pune
Focus Forensics Technology Private Limited,Delhi

10.
CONCLUSION
With computers becoming more and more
involved in our everyday lives, both
professionally and socially, there is a need for
computer forensics. This field will enable crucial
electronic evidence to be found, whether it was
lost, deleted, damaged, or hidden, and used to
prosecute individuals that believe they have
successfully beaten the system.
REFERENCES
http://www.allstateinvestigation.com/ComputerForens
icServices.htm
 Computer Forensics, Inc. http://www.forensics.com/
 http://www.computer-forensic.com/index.html
 http://www.forensicsresearch.com/index.php/computer-forensics/tools/

QUERY
?

More Related Content

What's hot

Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeAung Thu Rha Hein
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigationedwardbel
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenesprimeteacher32
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensicsnoorashams
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domainppd1961
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidencerakesh mishra
 

What's hot (20)

Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigation
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domain
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Memory Forensics
Memory ForensicsMemory Forensics
Memory Forensics
 

Viewers also liked

Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...GarethKnight
 
Cyberwar poster english
Cyberwar poster englishCyberwar poster english
Cyberwar poster englishAbbas Badran
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card SecurityPrav_Kalyan
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays Worldgueste0d962
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsSagar Rahurkar
 
Chapter 3 cmp forensic
Chapter 3 cmp forensicChapter 3 cmp forensic
Chapter 3 cmp forensicshahhardik27
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationFirewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationGopal Sakarkar
 

Viewers also liked (15)

Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...
 
Cyberwar poster english
Cyberwar poster englishCyberwar poster english
Cyberwar poster english
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
Chapter 3 cmp forensic
Chapter 3 cmp forensicChapter 3 cmp forensic
Chapter 3 cmp forensic
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Smart card system ppt
Smart card system ppt Smart card system ppt
Smart card system ppt
 
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationFirewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
 
Smart card
Smart cardSmart card
Smart card
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
 

Similar to Computer +forensics

computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfGnanavi2
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics SlidesVarun Sehgal
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensicsLalit Garg
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxDaniyaHuzaifa
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxssuser2bf502
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesIsaiah Edem
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)JIEMS Akkalkuwa
 
computer forensics
computer forensicscomputer forensics
computer forensicsshivi123456
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsZaid Amla
 
Evidence and data
Evidence and dataEvidence and data
Evidence and dataAtul Rai
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic pptSuchita Rawat
 

Similar to Computer +forensics (20)

computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdf
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
File000166
File000166File000166
File000166
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
R15 a0533 cf converted
R15 a0533 cf convertedR15 a0533 cf converted
R15 a0533 cf converted
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Chap 1 general introduction to computer forensics
Chap 1  general introduction to computer forensicsChap 1  general introduction to computer forensics
Chap 1 general introduction to computer forensics
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting Crimes
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Evidence and data
Evidence and dataEvidence and data
Evidence and data
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 

More from Rahul Baghla

More from Rahul Baghla (10)

Holography
HolographyHolography
Holography
 
Sensor technology
Sensor technologySensor technology
Sensor technology
 
Lifi technology
Lifi technologyLifi technology
Lifi technology
 
Hacking
HackingHacking
Hacking
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Computer virus
Computer virusComputer virus
Computer virus
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 

Recently uploaded

Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneUiPathCommunity
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 

Recently uploaded (20)

Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyone
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 

Computer +forensics

  • 1. COMPUTER FORENSICS By Group :-G10 Group Members are as:1:Pradeep Kumar 2:Parvez 3:Surender Singh
  • 2. CONTENTS Definition of Computer Forensics History of Computer Forensics Steps Of Computer Forensics Certifications for Computer Forensic Computer Forensic Requirements Collecting Evidence Uses of Computer forensics Advantages of Computer Forensics Disadvantages of Computer Forensics Computer forensics labs and centers in India Conclusion
  • 3. THE FIELD OF COMPUTER FORENSICS What is Computer Forensics?  Computer forensics involves the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and root cause analysis  Computer forensics is the process of identifying, preserving, and analyzing data and technical items for evidence that will be used in court
  • 4. THE FIELD OF COMPUTER FORENSICS Used to obtain potential legal evidence  Evidence might be required for a wide range of computer crimes and misuses  Multiple methods of computer forensics are:  Discovering data on computer system  Recovering deleted, encrypted, or damaged file information  Monitoring live activity  Detecting violations of corporate policy  Information collected assists in arrests, prosecution, termination of employment, and preventing future illegal activity 
  • 5. THE FIELD OF COMPUTER FORENSICS  Example:- Recovering thousands of deleted emails  Performing investigation post employment termination  Recovering evidence post formatting hard drive 
  • 6. HISTORY OF COMPUTER FORENSICS 1970s  First crimes cases involving computers, mainly financial fraud 1980’s  Financial investigators and courts realize that in some cases all the records and evidences were only on computers.  Norton Utilities, “Un-erase” tool created  Association of Certified Fraud Examiners began to seek training in what became computer forensics  SEARCH High Tech Crimes training created  Regular classes began to be taught to Federal agents in California and at FLETC in Georgia  HTCIA formed in Southern California
  • 7. HISTORY OF COMPUTER FORENSICS 1984  FBI Magnetic Media Program created... this later becomes the Computer Analysis and Response Team (CART) 1993  First International Conference on Computer Evidence held 1995  International Organization on Computer Evidence (IOCE) formed
  • 8. HISTORY OF COMPUTER FORENSICS 1997  The G8 countries declared that "Law enforcement personnel must be trained and equipped to address high-tech crimes" in the Moscow 1998  In March G8 appointed IICE to create international principles for the procedures relating to digital evidence 1998  INTERPOL Forensic Science Symposium
  • 9. HISTORY OF COMPUTER FORENSICS 1999  FBI CART case load exceeds 2000 cases,  examining 17 terabytes of data 2000  First FBI Regional Computer Forensic Laboratory established 2003  FBI CART case load exceeds 6500 cases,  examining 782 terabytes of data
  • 10. STEPS OF COMPUTER FORENSICS  According to many professionals, Computer Forensics is a four (4) step process  Acquisition  Physically or remotely obtaining possession of the computer, all network mappings from the system, and external physical storage devices  Identification  This step involves identifying what data could be recovered and electronically retrieving it by running various Computer Forensic tools and software suites
  • 11. STEPS OF COMPUTER FORENSICS  Evaluation  Evaluating the information/data recovered to determine if and how it could be used again the suspect for employment termination or prosecution in court  Presentation  This step involves the presentation of evidence discovered in a manner which is understood by lawyers, non-technically staff/management, and suitable as evidence as determined by United States and internal laws
  • 12. CERTIFICATION FOR COMPUTER INVESTIGATIVE SPECIALISTS CEECS (Certified Electronic Evidence Collection Specialist Certification)  Awarded to individuals who complete the CEECS regional certification course  Also awarded to individuals in the Certified Forensic Computer Examiner course that successfully pass the written test
  • 13. CERTIFICATION FOR FORENSIC COMPUTER EXAMINER Internal Certification Training Program  Must successfully complete two week training course offered by IACIS and correspondence proficiency problems External Certification Testing Process Not a training course  Testing process Active Law Enforcement Individuals qualified for IACIS membership  Recertification  Every three years must complete recertification process Must be in good standing with IACIS Complete proficiency test
  • 14. A COMPUTER FORENSIC SPECIALIST PROMISES TO:      Do not delete, damage or alter any evidence Protect the computer and files against a virus Handle all evidence properly to prevent any future damage Keep a log of all work done and by whom Keep any Client-Attorney information that is gained confidential
  • 15. COMPUTER FORENSIC REQUIREMENTS   Hardware  Familiarity with all internal and external devices/components of a computer  Thorough understanding of hard drives and settings  Understanding motherboards and the various chipsets used  Power connections  Memory BIOS  Understanding how the BIOS works  Familiarity with the various settings and limitations of the BIOS
  • 16. COMPUTER FORENSIC REQUIREMENTS  Operation Systems Windows 3.1/95/98/ME/NT/2000/2003/XP  DOS  UNIX  LINUX    Software  Familiarity with most popular software packages such as MS Office Forensic Tools  Familiarity with computer forensic techniques and the software packages that could be used
  • 17. COLLECTING EVIDENCE  Make Exact copies of all hard drives & disks using computer software   Protect the Computer system   Date and Time stamped on each file; used for timeline Avoid deletion, damage, viruses and corruption Discover files      Normal Files Deleted Files Password Protected Files Hidden Files Encrypted Files     Reveal all contents of hidden files used by application and operating system Access contents of password protected files if legally able to do so Analyze data Print out analysis     Computer System All Files and data Overall opinion Provide expert consultation/testimony
  • 18. USES OF COMPUTER FORENSICS  Criminal Prosecutors   Civil Litigations   Rely on evidence obtained from a computer to prosecute suspects and use as evidence Personal and business data discovered on a computer can be used in fraud, divorce, harassment, or discrimination cases Insurance Companies  Evidence discovered on computer can be used to mollify costs (fraud, worker’s compensation, arson, etc)
  • 19. USES OF COMPUTER FORENSICS  Private Corporations   Law Enforcement Officials   Obtained evidence from employee computers can be used as evidence in harassment, fraud, and embezzlement cases Rely on computer forensics to backup search warrants and post-seizure handling Individual/Private Citizens  Obtain the services of professional computer forensic specialists to support claims of harassment, abuse, or wrongful termination from employment
  • 20. ADVANTAGES OF COMPUTER FORENSICS Ability to search through a massive amount of data  Quickly  Thoroughly  In any language
  • 21. DISADVANTAGES OF COMPUTER FORENSICS  Digital evidence accepted into court    must prove that there is no tampering all evidence must be fully accounted for computer forensic specialists must have complete knowledge of legal requirements, evidence handling and storage and documentation procedures
  • 22. DISADVANTAGES OF COMPUTER FORENSICS  Costs  producing electronic records & preserving them is extremely costly , Presents the potential for exposing privileged documents  Legal practitioners must have extensive computer knowledge 
  • 23. COMPUTER FORENSICS LABS AND CENTERS IN INDIA 1. 2. 3. 4. 5. 6. 7. cyber college, Dehradun Secure India (A Group of Cyber Security Specialists), Muzaffarnagar, Uttar Pradesh E2Labs Research & Development Center, Hyderabad, Andhra Pradesh Agape Inc, Nagpur, Maharashtra Appin Technology Lab, Hyderabad, Andhra Pradesh Shoeb Online, Mumbai, Maharashtra ForensicsGuru.com, New Delhi 8. I.TECH COMPUTERS - DATA FORENSICS & DATA RECOVERY, Mumbai 9. Indiaforensic Center of Studies , Pune Focus Forensics Technology Private Limited,Delhi 10.
  • 24. CONCLUSION With computers becoming more and more involved in our everyday lives, both professionally and socially, there is a need for computer forensics. This field will enable crucial electronic evidence to be found, whether it was lost, deleted, damaged, or hidden, and used to prosecute individuals that believe they have successfully beaten the system.
  • 25. REFERENCES http://www.allstateinvestigation.com/ComputerForens icServices.htm  Computer Forensics, Inc. http://www.forensics.com/  http://www.computer-forensic.com/index.html  http://www.forensicsresearch.com/index.php/computer-forensics/tools/ 