computer forensics


Published on

i make my ppt using different effects.its my seminar ppt ..

Published in: Education
  • Be the first to comment

computer forensics

  1. 1. Computer forensics is simply the application of computer investigation and analysis techniques. Computer forensics involves the preservation, identification, extraction, documentation, and interpretation of computer media for root cause analysis. Computer forensics is a branch of digital forensic science.
  2. 2. Computer Forensics is the discovery, collection, and analysis of evidence found on computers and networks.
  3. 3. 1978 the Florida Computer Crime Act was the 1st law to help deal with computer fraud and intrusion. Responding to computer crime in the 80’s and 90’s law enforcement training programs were started at SEARCH, FLETC and NW3C. 1984 FBI Computer Analysis and Response Team (CART). 1991 International Law Enforcement meeting to discuss computer forensics & the need for standardized approach.
  4. 4. Acquisition(Preservation)  Identification– Technical Analysis  Evaluation– What the Lawyers Do  Presentation 
  5. 5. Four 1. 2. 3. 4. forensic principles = success Minimize data loss Record everything Analyze all data collected Report your findings
  6. 6. In Computer Information System /Information Technology : 95% or world’s information is being generated and stored in a digital form.  Only about one third of documentary evidence is printed out.  Any data that can be stored and read by an electronic device.
  7. 7. Computer Forensic Analysis Electronic Discovery Electronic Evidence Discovery Digital Discovery Data Recovery Data Discovery Computer Analysis Computer Examination
  8. 8. Tools are used to analyze digital data & prove or disprove criminal activity. Used in 2 Phases of Computer Forensics: Acquisition – Images systems & gathers evidence Analysis – Examines data & recovers deleted content
  9. 9. Acquisition Tools Data Discovery Tools Internet History Tools Image Viewers E-mail Viewers Password Cracking Tools Open Source Tools Mobile Device tools (PDA/Cell Phone) Large Storage Analysis Tools
  10. 10. Workstations - Copy & Analysis Drive Imaging System Drive Wiper Bridge • • Imaging Device Write Blocker SATA, SCSI, IDE, USB SCSI Bridge
  11. 11. Identity Theft Electronic Fraud (ACH or Credit Card) Website Defacement / Denial of Service Unauthorized Access / Misuse of Access Cyber bulling Trade Secret Theft National Security Issues
  12. 12. Steganography Email Forensic Techniques Internet Forensic Techniques Password cracking Techniques
  13. 13. Criminal Domestic Security Internal Marketing
  14. 14. Information a problem. and evidence is used to solve Scientist does the job of solving a crime through analyzing data. Using forensic science, it is easier to track the history and trace events related to the crime. Using analysis Tools and Utilities.