SlideShare a Scribd company logo
DIGITAL
FORENSICS
BCA (3rd year)
By Riya
Roll no. 4936
Introduction
History
ForensicsVsDigitalForensics
Formaldefinition
NeedandImportance
StepsInvolved
Example
Types&Tools
Pros&Cons
Conclusion
References
ThanksNote
Digital Forensics (D.F.) is a rapidly growing field that involves the recovery,
analysis, and presentation of digital evidence in legal investigations. As
more and more of our lives are conducted in the digital realm, the need for
skilled digital forensics experts has become increasingly important.
In this presentation, we will explore the basics of digital forensics, including
the tools and techniques used to gather and analyze digital evidence with
an example. We will also discuss some of the important key aspects of DNA
in forensics. At last, we will discuss the pros and cons of digital forensics.
HISTORY|
SCIENTISTS INVENTIONS & DISCOVERIES
Alphonse Bertillon
SYSTEM OF ANTHROPOMETRY
It involves measuring various parts of the body to create a unique
identifier for everyone.
Francis Galton
USE OF FINGERPRINTS
Its a way to identify suspects.
Edmond Locard
PRINCIPLE OF EXCHANGE
It states that every contact leaves a trace.
Sir Alec Jeffreys
DNA PROFILING
It is a technique used to identify & distinguish individuals
genetically. It also helps to determine their relationship to others.
FORENSICS
• It refers to the use of scientific
methods and techniques to
investigate crimes.
• It can refer to any type of evidence
or investigation.
• Examples: Analyzing DNA samples,
testing blood spatter patterns, or
examining bullet trajectories.
DIGITAL FORENSICS
• It is a specific branch of forensics
that deals with the investigation of
digital devices and data.
• It focuses specifically on electronic
evidence.
• Examples: Analyzing computer hard
drives, examining mobile-phone
records, or reviewing social media
activity to gather evidence.
"DIGITAL FORENSICS is the use of scientifically
derived and proven methods toward the
preservation, collection, validation, identification,
analysis, interpretation, documentation and
presentation of digital evidence derived from digital
sources for the purpose of facilitating or furthering
the reconstruction of events found to be criminal or
helping to anticipate unauthorized actions shown to
be disruptive to planned operations."
-Dr. Gary Kessler
A renowned digital forensics expert & professor at
Embry-Riddle Aeronautical University.
Need & Importance
01
Investigation
of Cyber
Crimes
Legal Action
Support
Intellectual
Property
Protection
Risk
Management
Forensic
Accounting
Digital forensics
is used to
investigate
cybercrimes such
as hacking and
cyberbullying.
It can be used to
deal with
Copyright and
Patent issue,
trademark issue,
and trade secret
theft.
It can help
organizations to
identify data
breaches, insider
threats, and other
security
incidents.
It is used to
investigate
financial crimes
such as money
laundering, and
fraud.
It can help to
prove or disprove
allegations, as
well as to locate
and recover lost
or deleted data.
02 03 04 05
It involves creating a
forensic image of the
device, which is an exact
copy of the digital data
stored on it.
Steps involved in Digital Forensics Process
01
02
03
04
05
The first step is to identify
the digital devices or
storage media that may
contain relevant evidence.
It involve using specialized
software tools to recover
deleted files, search for
keywords or patterns, or
analyze network traffic.
Finally, the results of the analysis
and interpretation are
documented in a forensic report,
which is typically presented to
the investigating agency or court.
Identification Analysis
Preservation
Interpretation
Reporting
Once the evidence is
identified, it must be
interpreted in the context
of the investigation.
EXAMPLE
01
02
03
04
05
 A company suspects that one of their employees has been
leaking sensitive information to a competitor.
 The company's IT department identifies the employee's
work computer as a potential source of evidence and hires
a digital forensics expert to analyze it.
 The expert preserves the data by creating a forensic
image, then analyzes the image to identify relevant files &
network activity.
 The expert interprets that the employee had been
emailing confidential information to an email address
associated with the competitor.
 The expert documents the findings in a forensic report,
which is presented to the company's management & legal
team as case’s evidence.
Pros & Cons of Digital Forensics
Flexibility
Lost Data Recovery
Business Intelligence
Legal Action Support
Very Expensive
Time-Consuming
Technical Complexity
Potential for Errors
CONCLUSION
Digital forensics is a critical tool for identifying and taking legal
action against cybercrimes, recovering lost data, and protecting
intellectual property. While it has many benefits, such as aiding in
legal investigations and providing business intelligence, it's
important to carefully consider the potential drawbacks, such as
high costs and technical complexity. With the continued growth of
technology, digital forensics will remain an important tool in
ensuring the security and integrity of digital systems and data.
REFERENCES
Forensics:
https://www.crimemuseum.org/crime-library/forensic-investigation/definition-of-forensics
Digital Forensics:
https://en.wikipedia.org/wiki/Digital_forensics
https://www.open.edu/openlearn/science-maths-technology/digital-forensics/content-section-4.2
Digital Forensics Tools:
https://www.sciencedirect.com/science/article/abs/pii/S2666281720301864
A brief Intro to Digital Forensics

More Related Content

What's hot

Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
Dr Raghu Khimani
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
Priya Manik
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
RoshiniVijayakumar1
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
rakesh mishra
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensics
anupriti
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
SCREAM138
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigation
edwardbel
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
DINESH KAMBLE
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
Ambuj Kumar
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Somya Johri
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
Yansi Keim
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
deaneal
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
Filip Maertens
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
noorashams
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
Online
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - NotesKranthi
 
First Responder Officer in Cyber Crime
First Responder Officer in Cyber CrimeFirst Responder Officer in Cyber Crime
First Responder Officer in Cyber Crime
Applied Forensic Research Sciences
 
Technical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsTechnical Challenges in Cyber Forensics
Technical Challenges in Cyber Forensics
Ollie Whitehouse
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 

What's hot (20)

Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensics
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigation
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
 
First Responder Officer in Cyber Crime
First Responder Officer in Cyber CrimeFirst Responder Officer in Cyber Crime
First Responder Officer in Cyber Crime
 
Technical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsTechnical Challenges in Cyber Forensics
Technical Challenges in Cyber Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 

Similar to A brief Intro to Digital Forensics

What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
AliAshraf68199
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
Anyck Turgeon, CFE/GRCP/CEFI/CCIP/C|CISO/CBA
 
Second Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdf
Second Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdfSecond Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdf
Second Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdf
ELIJAH
 
R15 a0533 cf converted
R15 a0533 cf convertedR15 a0533 cf converted
R15 a0533 cf converted
lillian Kobusingye
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
gamemaker762
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
ibraheem ogundele
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
Donald Tabone
 
Evidence and data
Evidence and dataEvidence and data
Evidence and data
Atul Rai
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
YashPatel132112
 
Cyber Forensics|Digital Forensics|Cyber Crime-2023
Cyber Forensics|Digital Forensics|Cyber Crime-2023Cyber Forensics|Digital Forensics|Cyber Crime-2023
Cyber Forensics|Digital Forensics|Cyber Crime-2023
Cyber Security Experts
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
BhagyasriPatel2
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
Surajgroupsvideo
 
Digital Investigation | Digital Forensics | Cyber Crime - 2023
Digital Investigation | Digital Forensics | Cyber Crime - 2023Digital Investigation | Digital Forensics | Cyber Crime - 2023
Digital Investigation | Digital Forensics | Cyber Crime - 2023
Cyber Security Experts
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
Dhiren Gala
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
Johnson Ubah
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
Varun Sehgal
 
CF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCompute Forensics
 
76 s201924
76 s20192476 s201924
76 s201924
IJRAT
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
JIEMS Akkalkuwa
 
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Josh Moulin, MSISA,CISSP
 

Similar to A brief Intro to Digital Forensics (20)

What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Second Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdf
Second Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdfSecond Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdf
Second Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdf
 
R15 a0533 cf converted
R15 a0533 cf convertedR15 a0533 cf converted
R15 a0533 cf converted
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
Evidence and data
Evidence and dataEvidence and data
Evidence and data
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Cyber Forensics|Digital Forensics|Cyber Crime-2023
Cyber Forensics|Digital Forensics|Cyber Crime-2023Cyber Forensics|Digital Forensics|Cyber Crime-2023
Cyber Forensics|Digital Forensics|Cyber Crime-2023
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Digital Investigation | Digital Forensics | Cyber Crime - 2023
Digital Investigation | Digital Forensics | Cyber Crime - 2023Digital Investigation | Digital Forensics | Cyber Crime - 2023
Digital Investigation | Digital Forensics | Cyber Crime - 2023
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
CF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCF-Computer-Forensic-Services
CF-Computer-Forensic-Services
 
76 s201924
76 s20192476 s201924
76 s201924
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
 

More from Manik Bhola

HCF Vs LCM: A New Approach with real life Scenario
HCF  Vs  LCM: A New Approach with real life ScenarioHCF  Vs  LCM: A New Approach with real life Scenario
HCF Vs LCM: A New Approach with real life Scenario
Manik Bhola
 
Become a Maths Topper: Avoid Common Mistakes
Become a Maths Topper: Avoid Common MistakesBecome a Maths Topper: Avoid Common Mistakes
Become a Maths Topper: Avoid Common Mistakes
Manik Bhola
 
Congruency vs Equality
Congruency vs EqualityCongruency vs Equality
Congruency vs Equality
Manik Bhola
 
Understanding Secularism (Class 8 | Civics)
Understanding Secularism (Class 8 | Civics)Understanding Secularism (Class 8 | Civics)
Understanding Secularism (Class 8 | Civics)
Manik Bhola
 
Algebraic Terms: Step by Step Approach.pdf
Algebraic Terms: Step by Step Approach.pdfAlgebraic Terms: Step by Step Approach.pdf
Algebraic Terms: Step by Step Approach.pdf
Manik Bhola
 
Word Problems: Answer in just 6 steps
Word Problems: Answer in just 6 stepsWord Problems: Answer in just 6 steps
Word Problems: Answer in just 6 steps
Manik Bhola
 
Algebraic Expression Maths Lesson Plan in detail
Algebraic Expression Maths Lesson Plan in detailAlgebraic Expression Maths Lesson Plan in detail
Algebraic Expression Maths Lesson Plan in detail
Manik Bhola
 
Women Empowerment in India
Women Empowerment in IndiaWomen Empowerment in India
Women Empowerment in India
Manik Bhola
 
Adjective worksheet
Adjective worksheetAdjective worksheet
Adjective worksheet
Manik Bhola
 
System Development Life Cycle (Notes)
System Development Life Cycle (Notes)System Development Life Cycle (Notes)
System Development Life Cycle (Notes)
Manik Bhola
 
Computer Virus and its Types (Mob View)
Computer Virus and its Types (Mob View)Computer Virus and its Types (Mob View)
Computer Virus and its Types (Mob View)
Manik Bhola
 
Mail merge in MS word MobView
Mail merge in MS word MobViewMail merge in MS word MobView
Mail merge in MS word MobView
Manik Bhola
 
Types of Natural vegetation in India
Types of Natural vegetation in IndiaTypes of Natural vegetation in India
Types of Natural vegetation in India
Manik Bhola
 
Class 11 Gravitation MobView
Class 11 Gravitation MobViewClass 11 Gravitation MobView
Class 11 Gravitation MobView
Manik Bhola
 
Class 11 Mechanical Properties of Solids MobView
Class 11 Mechanical Properties of Solids MobViewClass 11 Mechanical Properties of Solids MobView
Class 11 Mechanical Properties of Solids MobView
Manik Bhola
 
Class 6 Growth of New Ideas
Class 6 Growth of New IdeasClass 6 Growth of New Ideas
Class 6 Growth of New Ideas
Manik Bhola
 
Life in Villages and Towns Class 6
Life in Villages and Towns Class 6Life in Villages and Towns Class 6
Life in Villages and Towns Class 6
Manik Bhola
 
Democracy (a brief view)
Democracy (a brief view)Democracy (a brief view)
Democracy (a brief view)
Manik Bhola
 
Microorganisms Class 8
Microorganisms Class 8Microorganisms Class 8
Microorganisms Class 8
Manik Bhola
 
Structure of a cell
Structure of a cellStructure of a cell
Structure of a cell
Manik Bhola
 

More from Manik Bhola (20)

HCF Vs LCM: A New Approach with real life Scenario
HCF  Vs  LCM: A New Approach with real life ScenarioHCF  Vs  LCM: A New Approach with real life Scenario
HCF Vs LCM: A New Approach with real life Scenario
 
Become a Maths Topper: Avoid Common Mistakes
Become a Maths Topper: Avoid Common MistakesBecome a Maths Topper: Avoid Common Mistakes
Become a Maths Topper: Avoid Common Mistakes
 
Congruency vs Equality
Congruency vs EqualityCongruency vs Equality
Congruency vs Equality
 
Understanding Secularism (Class 8 | Civics)
Understanding Secularism (Class 8 | Civics)Understanding Secularism (Class 8 | Civics)
Understanding Secularism (Class 8 | Civics)
 
Algebraic Terms: Step by Step Approach.pdf
Algebraic Terms: Step by Step Approach.pdfAlgebraic Terms: Step by Step Approach.pdf
Algebraic Terms: Step by Step Approach.pdf
 
Word Problems: Answer in just 6 steps
Word Problems: Answer in just 6 stepsWord Problems: Answer in just 6 steps
Word Problems: Answer in just 6 steps
 
Algebraic Expression Maths Lesson Plan in detail
Algebraic Expression Maths Lesson Plan in detailAlgebraic Expression Maths Lesson Plan in detail
Algebraic Expression Maths Lesson Plan in detail
 
Women Empowerment in India
Women Empowerment in IndiaWomen Empowerment in India
Women Empowerment in India
 
Adjective worksheet
Adjective worksheetAdjective worksheet
Adjective worksheet
 
System Development Life Cycle (Notes)
System Development Life Cycle (Notes)System Development Life Cycle (Notes)
System Development Life Cycle (Notes)
 
Computer Virus and its Types (Mob View)
Computer Virus and its Types (Mob View)Computer Virus and its Types (Mob View)
Computer Virus and its Types (Mob View)
 
Mail merge in MS word MobView
Mail merge in MS word MobViewMail merge in MS word MobView
Mail merge in MS word MobView
 
Types of Natural vegetation in India
Types of Natural vegetation in IndiaTypes of Natural vegetation in India
Types of Natural vegetation in India
 
Class 11 Gravitation MobView
Class 11 Gravitation MobViewClass 11 Gravitation MobView
Class 11 Gravitation MobView
 
Class 11 Mechanical Properties of Solids MobView
Class 11 Mechanical Properties of Solids MobViewClass 11 Mechanical Properties of Solids MobView
Class 11 Mechanical Properties of Solids MobView
 
Class 6 Growth of New Ideas
Class 6 Growth of New IdeasClass 6 Growth of New Ideas
Class 6 Growth of New Ideas
 
Life in Villages and Towns Class 6
Life in Villages and Towns Class 6Life in Villages and Towns Class 6
Life in Villages and Towns Class 6
 
Democracy (a brief view)
Democracy (a brief view)Democracy (a brief view)
Democracy (a brief view)
 
Microorganisms Class 8
Microorganisms Class 8Microorganisms Class 8
Microorganisms Class 8
 
Structure of a cell
Structure of a cellStructure of a cell
Structure of a cell
 

Recently uploaded

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 

Recently uploaded (20)

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 

A brief Intro to Digital Forensics

  • 3. Digital Forensics (D.F.) is a rapidly growing field that involves the recovery, analysis, and presentation of digital evidence in legal investigations. As more and more of our lives are conducted in the digital realm, the need for skilled digital forensics experts has become increasingly important. In this presentation, we will explore the basics of digital forensics, including the tools and techniques used to gather and analyze digital evidence with an example. We will also discuss some of the important key aspects of DNA in forensics. At last, we will discuss the pros and cons of digital forensics.
  • 4. HISTORY| SCIENTISTS INVENTIONS & DISCOVERIES Alphonse Bertillon SYSTEM OF ANTHROPOMETRY It involves measuring various parts of the body to create a unique identifier for everyone. Francis Galton USE OF FINGERPRINTS Its a way to identify suspects. Edmond Locard PRINCIPLE OF EXCHANGE It states that every contact leaves a trace. Sir Alec Jeffreys DNA PROFILING It is a technique used to identify & distinguish individuals genetically. It also helps to determine their relationship to others.
  • 5. FORENSICS • It refers to the use of scientific methods and techniques to investigate crimes. • It can refer to any type of evidence or investigation. • Examples: Analyzing DNA samples, testing blood spatter patterns, or examining bullet trajectories. DIGITAL FORENSICS • It is a specific branch of forensics that deals with the investigation of digital devices and data. • It focuses specifically on electronic evidence. • Examples: Analyzing computer hard drives, examining mobile-phone records, or reviewing social media activity to gather evidence.
  • 6. "DIGITAL FORENSICS is the use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal or helping to anticipate unauthorized actions shown to be disruptive to planned operations." -Dr. Gary Kessler A renowned digital forensics expert & professor at Embry-Riddle Aeronautical University.
  • 7. Need & Importance 01 Investigation of Cyber Crimes Legal Action Support Intellectual Property Protection Risk Management Forensic Accounting Digital forensics is used to investigate cybercrimes such as hacking and cyberbullying. It can be used to deal with Copyright and Patent issue, trademark issue, and trade secret theft. It can help organizations to identify data breaches, insider threats, and other security incidents. It is used to investigate financial crimes such as money laundering, and fraud. It can help to prove or disprove allegations, as well as to locate and recover lost or deleted data. 02 03 04 05
  • 8. It involves creating a forensic image of the device, which is an exact copy of the digital data stored on it. Steps involved in Digital Forensics Process 01 02 03 04 05 The first step is to identify the digital devices or storage media that may contain relevant evidence. It involve using specialized software tools to recover deleted files, search for keywords or patterns, or analyze network traffic. Finally, the results of the analysis and interpretation are documented in a forensic report, which is typically presented to the investigating agency or court. Identification Analysis Preservation Interpretation Reporting Once the evidence is identified, it must be interpreted in the context of the investigation.
  • 9. EXAMPLE 01 02 03 04 05  A company suspects that one of their employees has been leaking sensitive information to a competitor.  The company's IT department identifies the employee's work computer as a potential source of evidence and hires a digital forensics expert to analyze it.  The expert preserves the data by creating a forensic image, then analyzes the image to identify relevant files & network activity.  The expert interprets that the employee had been emailing confidential information to an email address associated with the competitor.  The expert documents the findings in a forensic report, which is presented to the company's management & legal team as case’s evidence.
  • 10.
  • 11. Pros & Cons of Digital Forensics Flexibility Lost Data Recovery Business Intelligence Legal Action Support Very Expensive Time-Consuming Technical Complexity Potential for Errors
  • 12. CONCLUSION Digital forensics is a critical tool for identifying and taking legal action against cybercrimes, recovering lost data, and protecting intellectual property. While it has many benefits, such as aiding in legal investigations and providing business intelligence, it's important to carefully consider the potential drawbacks, such as high costs and technical complexity. With the continued growth of technology, digital forensics will remain an important tool in ensuring the security and integrity of digital systems and data.