SlideShare a Scribd company logo
 Computer forensics
definitions
 Need for computer forensics
 Cyber crime
 Types of computer forensics
 Components & steps in
computer forensics
 Principle of exchange
 Brief description of digital
evidence
 Metadata, slack space, swap
files & unalloacted space
 Forensic server
 Initial response
 Creating a forensic image
 Computer forensic
methodology
 Computer forensic toolkit
 Encase by guidance
software
 Methods to hide data
 Pros & cons of computer
forensics.
 Computer forensics
is the process of
identifying ,
preserving ,
analyzing and
presenting the
evidence in a manner
that is legally
acceptable.
 Computer forensics
is the application of
computer
investigation &
analysis in the
interest of
determining potential
legal evidence.
The need of computer forensics in the present age
can be considered as much severe due to the
internet advancements and the dependency on the
internet. The people that gain access to the
computer systems without proper authorization
should be dealt in.
Cyber crime rates are accelerating and computer
forensics is the crucial discipline that has the
power to impede the progress of these cyber
criminals.
 Identity threats
 Email theft
 Software piracy
 Unauthorized access
 Data theft
 Credit card cloning
 Fraud
 Hacking
 Cyber terrorism
 Copyright violation
 Stalking &
harassment
 Denial of service
 Releasing malicious
virus
 Computer fraud
 Stock manipulation
Computer forensics is broadly divided into five
categories namely-
 Disk forensics
 Network forensics
 Email forensics
 Internet forensics
 Source code/portable device forensics
 Identifying(Acquisition)
 Collecting
 Preserving
 Analyzing
 Extracting
 Documenting
 Presenting
 Open a case
 Acquire the evidence
 Create a forensic image
 Index & catalogue the evidence
 Analyze the data(evidence)
 Save evidence to viewable drive
 Create a report of findings
 Admissible your report of findings to legal
proceedings.
When seizing a stand alone computer at the crime
scene:
if the computer is “POWERED OFF” , do not
turn It ON.
if the computer is “POWERED ON” , do not
turn it OFF & do not allow any suspect or
associate to touch it.
“..when a person commits a crime
something is always left at the
scene of the crime that was not
present when the person arrived.”
Volatile
any data that is stored in memory or exist in transit and
will be lost when the computer is turned off.
Volatile data might be key evidence, so it is important
that if the computer is on at the scene of the crime it
remain on.
Persistent
that data which is stored on a hard drive or another
medium and is preserved when the computer is turned
off.
Some forms of digital evidence are:-
 Present / Active (doc’s, spreadsheets, images,
email, etc.)
 Archive (including as backups)
 Deleted (in slack and unallocated space)
 Temporary (cache, print records, Internet usage
records, etc.)
 Encrypted or otherwise hidden
 Compressed or corrupted
 DIGITAL EVIDENCE is fragile.
 DIGITAL EVIDENCE is easily altered if not
handled properly.
 Simply turning a computer on or operating the
computer changes and damages evidence.
 Even the normal operation of the computer can
destroy computer evidence that might be lurking in
unallocated space, file slack, or in the Windows
swap file.
1.Before touching the
computer, place an
unformatted or blank
floppy disk or attach an
external device to copy
all the data, and write
detailed notes about
what is on the
computer’s screen.
2.Photograph the back of
the computer & everything
that is connected to it.
3. Photograph and label the
back of any computer
components with existing
connections to the
computer.
o If u do not have a
computer specialist
on the scene, the
safest way to turn off
a computer is to pull
the plug from the
back of the
computer.
o Disconnect all power
sources; unplug the
power cords from the
wall and the back of
the computer.
Notebook computers
may need to have
their battery
removed.
 The following are the digital evidences always
found at a crime scene system & are the most
important part of investigation.
 These include:
 metadata
 Slack space
 Swap files
 Unallocated space
 Metadata is data about data.
 Metadata is information embedded in the file itself
that contains information about the file.
Metadata does contain useful information about file
but it is limited.
Example:-author
file name , size , location
File properties
Might contain revision comments etc.
 Space not occupied by an active file, but not
available for use by the operating system.
 Every file in a computer fills a minimum amount
of space.
 slack space results when file systems create a
cluster (Windows) or block (Linux) but do not
necessarily use the entire fixed length space that
was allocated.
 Clusters are form because of collection of garbage
and dangling references.
 The swap file is a hidden system file that is used
for virtual memory when there is not enough
physical memory to run programs.
 Space on the hard drive is temporarily swapped
with the RAM as programs are running.
 This swap file contains portions of all documents
and other material a user produces while using the
computer.
 When a user deletes a file, it is flagged as no
longer needed, but it remains on the system
until it is overwritten.
 The remaining files are in unallocated disk
space, where clusters/blocks are not assigned
but may contain data.
PHYSICAL
INVESTIGATION
 It includes identifying or
locating physical
evidence such as
removal of computer
hardware or making
attempts to reach
connected physical
devices.
LOGICAL
INVESTIGATION
 It is referred to as digital
investigation it means
analyzing file & data in
the system. It requires a
well defined security
policy.
 Forensic server is a system which contains forensic
toolkits for investigation with dual-bootable
window/linux installed.
 The activities performed in a forensic analysis may
easily tax the average computer.
 It is desirable to have as much physical RAM, as well
as a fast processor , enough drive space to hold the
operating system, several forensic tools, as well as all
of the forensic images collected from the subject’s
computer.
 The first activity performed by law enforcement at a
physical crime is to restrict access by surrounding the
crime scene with yellow tape.
 The second rule is to document the crime scene and all
activities performed.
 Bag-and-tag of all potential evidence.
 Search for ‘sticky notes’ or any other written
documentation near the computer.
 Take any computer manuals in case they are needed for
reference back at the forensics lab.
The first step after acquiring digital
evidence is to create an exact physical
copy of the evidence. This copy is often
called a bit-stream image, forensic
duplicate, or forensic image. Creating a
forensic image is important for a legal
standpoint, courts look favorably upon
forensic images because it demonstrates
that all of the evidence was captured.
 shut down the computer.
 Document the hardware configuration of the system.
 Transport the computer system to a secure location.
 Make bit stream back ups of hard disk and floppy disk.
 Mathematically authenticate data on all storage
devices.
 Document the system date and time.
 Make a list of key search words.
 Evaluate the window swap file.
 Evaluate file slack.
 Evaluate unallocated space.
 Search file slack and unallocated space for key words.
 Document file names, dates and times.
 Identify file, program and storage anomalies.
 Evaluate program functionally.
 Document every activity and findings.
 EnCase by Guidance Software
 Forensic Tool Kit by Access Data
 SMART by ASR Data
 The Sleuth kit(TSK)
 ProDiscover by technology pathways
 The image master
 Data and password recovery toolkit
 Maresware by Mares & Associates
 DataLifter by StepaNet Communications
 EnCase is considered as the leader in stand-alone
forensic analysis.
 This means it is a bundled software package that
provides multiple forensic tools within the box.
 EnCase is Windows-based and can acquire and
analyze data using the local or network-based
versions of the tool.
 EnCase can analyze many file system formats,
including FAT, NTFS, Ext2/3, CD-ROMs, and
DVDs. EnCase also supports Microsoft Windows
dynamic disks.
 EnCase allows you to list the files and directories,
recover deleted files, conduct keyword searches,
view all graphic images, make timelines of file
activity, and use hash databases to identify known
files.
 It also has its own scripting language, called
EnScript, which allows you to automate many
tasks.
 The EnCase Enterprise Edition is a network
enabled incident response system which offers
immediate and complete forensic analysis.
 Some of its impressive features are:-
 Enterprise Edition – Centralized monitoring and
real-time investigation.
 Snapshot – Capture of RAM contents, running
programs, open files and ports.
 Organizes results into case file & provides case
management for multiple cases.
 Maintains chain of custody.
 Tools for incident response to respond to emerging
threats.
 Supports real-time and post-mortem investigations.
It consists of three components:
 The first of these components is the Examiner
software. This software is installed on a secure system
where investigations are performed.
 The second component is called SAFE, which stands
for Secure Authentication of EnCase. SAFE is a server
which is used to authenticate users, administer access
rights, maintain logs of EnCase transactions, and
provide for secure data transmission.
 The final component is Servlet, an efficient software
component installed on servers to establish
connectivity between the Examiner, SAFE, and the
devices being investigated.
 Encryption
 Using a key algorithm to convert simple text into
cipher text.
 Changing the file extension
 changing a .docx to .jpg file.
 Steganography
 Steganography simply takes one piece of
information and hides it within another. Computer
files, such as images, sound recordings, and slack
space contain unused or insignificant areas of data.
 With its help, we can
catch criminal.
 Can prevent data theft.
 Recover hidden &
deleted files.
 Computer forensics
ethics let the
investigation process
remain in legal rules &
laws.
 Privacy of client is
compromised.
 some sensitive data or
information that is
important to the client
may be lost in order to
find the evidence.
 It is an expensive
process.
Computer forensics

More Related Content

What's hot

Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
Manu Mathew Cherian
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensicsRahul Baghla
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
Yansi Keim
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
Online
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Somya Johri
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Oldsun
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Mithileysh Sathiyanarayanan
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
Chaitanya Dhareshwar
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
Dr Raghu Khimani
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
Novizul Evendi
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
unnilala11
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
Ambuj Kumar
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
vishnuv43
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - NotesKranthi
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
primeteacher32
 

What's hot (20)

Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Data recovery
Data recoveryData recovery
Data recovery
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 

Viewers also liked

Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
Lalit Garg
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
prashant3535
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Roberto Ellis
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
Sarwar Hossain Rafsan
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
Online
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20worldAqib Memon
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - NotesKranthi
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
Shreya Singireddy
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
Kabul Education University
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic Softwares
Dhruv Seth
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its roleSudeshna Basak
 
computer forensics
computer forensicscomputer forensics
computer forensicsAkhil Kumar
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
Filip Maertens
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays Worldgueste0d962
 

Viewers also liked (20)

Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
 
computer forensics
computer forensics computer forensics
computer forensics
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic Softwares
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its role
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to Computer forensics

Latest presentation
Latest presentationLatest presentation
Latest presentation
Adetunji Adeoje
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
Agape Inc
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
pranjal dutta
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
Suchita Rawat
 
ResearchPaperITDF2435
ResearchPaperITDF2435ResearchPaperITDF2435
ResearchPaperITDF2435Manuel Garza
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docxLecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
smile790243
 
Cyber&digital forensics report
Cyber&digital forensics reportCyber&digital forensics report
Cyber&digital forensics reportyash sawarkar
 
Introduction to Forensics and Steganography by Pardhasaradhi C
Introduction to Forensics and Steganography by Pardhasaradhi CIntroduction to Forensics and Steganography by Pardhasaradhi C
Introduction to Forensics and Steganography by Pardhasaradhi C
n|u - The Open Security Community
 
Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Damir Delija
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Vikas Jain
 
Digital Forensics in the Archive
Digital Forensics in the ArchiveDigital Forensics in the Archive
Digital Forensics in the Archive
GarethKnight
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Bense Tony
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
Varun Sehgal
 
Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation
Vipin George
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaCTIN
 
Automated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data AcquisitionAutomated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data Acquisition
IJERA Editor
 

Similar to Computer forensics (20)

Latest presentation
Latest presentationLatest presentation
Latest presentation
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Fs Ch 18
Fs Ch 18Fs Ch 18
Fs Ch 18
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
ResearchPaperITDF2435
ResearchPaperITDF2435ResearchPaperITDF2435
ResearchPaperITDF2435
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docxLecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
 
Cyber&digital forensics report
Cyber&digital forensics reportCyber&digital forensics report
Cyber&digital forensics report
 
Introduction to Forensics and Steganography by Pardhasaradhi C
Introduction to Forensics and Steganography by Pardhasaradhi CIntroduction to Forensics and Steganography by Pardhasaradhi C
Introduction to Forensics and Steganography by Pardhasaradhi C
 
Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital Forensics in the Archive
Digital Forensics in the ArchiveDigital Forensics in the Archive
Digital Forensics in the Archive
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
intro to forensics
intro to forensicsintro to forensics
intro to forensics
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Automated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data AcquisitionAutomated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data Acquisition
 

Recently uploaded

Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 

Recently uploaded (20)

Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 

Computer forensics

  • 1.
  • 2.  Computer forensics definitions  Need for computer forensics  Cyber crime  Types of computer forensics  Components & steps in computer forensics  Principle of exchange  Brief description of digital evidence  Metadata, slack space, swap files & unalloacted space  Forensic server  Initial response  Creating a forensic image  Computer forensic methodology  Computer forensic toolkit  Encase by guidance software  Methods to hide data  Pros & cons of computer forensics.
  • 3.  Computer forensics is the process of identifying , preserving , analyzing and presenting the evidence in a manner that is legally acceptable.  Computer forensics is the application of computer investigation & analysis in the interest of determining potential legal evidence.
  • 4. The need of computer forensics in the present age can be considered as much severe due to the internet advancements and the dependency on the internet. The people that gain access to the computer systems without proper authorization should be dealt in. Cyber crime rates are accelerating and computer forensics is the crucial discipline that has the power to impede the progress of these cyber criminals.
  • 5.  Identity threats  Email theft  Software piracy  Unauthorized access  Data theft  Credit card cloning  Fraud  Hacking  Cyber terrorism  Copyright violation  Stalking & harassment  Denial of service  Releasing malicious virus  Computer fraud  Stock manipulation
  • 6. Computer forensics is broadly divided into five categories namely-  Disk forensics  Network forensics  Email forensics  Internet forensics  Source code/portable device forensics
  • 7.  Identifying(Acquisition)  Collecting  Preserving  Analyzing  Extracting  Documenting  Presenting
  • 8.  Open a case  Acquire the evidence  Create a forensic image  Index & catalogue the evidence  Analyze the data(evidence)  Save evidence to viewable drive  Create a report of findings  Admissible your report of findings to legal proceedings.
  • 9.
  • 10. When seizing a stand alone computer at the crime scene: if the computer is “POWERED OFF” , do not turn It ON. if the computer is “POWERED ON” , do not turn it OFF & do not allow any suspect or associate to touch it.
  • 11.
  • 12. “..when a person commits a crime something is always left at the scene of the crime that was not present when the person arrived.”
  • 13. Volatile any data that is stored in memory or exist in transit and will be lost when the computer is turned off. Volatile data might be key evidence, so it is important that if the computer is on at the scene of the crime it remain on. Persistent that data which is stored on a hard drive or another medium and is preserved when the computer is turned off.
  • 14. Some forms of digital evidence are:-  Present / Active (doc’s, spreadsheets, images, email, etc.)  Archive (including as backups)  Deleted (in slack and unallocated space)  Temporary (cache, print records, Internet usage records, etc.)  Encrypted or otherwise hidden  Compressed or corrupted
  • 15.  DIGITAL EVIDENCE is fragile.  DIGITAL EVIDENCE is easily altered if not handled properly.  Simply turning a computer on or operating the computer changes and damages evidence.  Even the normal operation of the computer can destroy computer evidence that might be lurking in unallocated space, file slack, or in the Windows swap file.
  • 16. 1.Before touching the computer, place an unformatted or blank floppy disk or attach an external device to copy all the data, and write detailed notes about what is on the computer’s screen.
  • 17. 2.Photograph the back of the computer & everything that is connected to it. 3. Photograph and label the back of any computer components with existing connections to the computer.
  • 18. o If u do not have a computer specialist on the scene, the safest way to turn off a computer is to pull the plug from the back of the computer. o Disconnect all power sources; unplug the power cords from the wall and the back of the computer. Notebook computers may need to have their battery removed.
  • 19.  The following are the digital evidences always found at a crime scene system & are the most important part of investigation.  These include:  metadata  Slack space  Swap files  Unallocated space
  • 20.  Metadata is data about data.  Metadata is information embedded in the file itself that contains information about the file. Metadata does contain useful information about file but it is limited. Example:-author file name , size , location File properties Might contain revision comments etc.
  • 21.  Space not occupied by an active file, but not available for use by the operating system.  Every file in a computer fills a minimum amount of space.  slack space results when file systems create a cluster (Windows) or block (Linux) but do not necessarily use the entire fixed length space that was allocated.  Clusters are form because of collection of garbage and dangling references.
  • 22.
  • 23.  The swap file is a hidden system file that is used for virtual memory when there is not enough physical memory to run programs.  Space on the hard drive is temporarily swapped with the RAM as programs are running.  This swap file contains portions of all documents and other material a user produces while using the computer.
  • 24.  When a user deletes a file, it is flagged as no longer needed, but it remains on the system until it is overwritten.  The remaining files are in unallocated disk space, where clusters/blocks are not assigned but may contain data.
  • 25.
  • 26. PHYSICAL INVESTIGATION  It includes identifying or locating physical evidence such as removal of computer hardware or making attempts to reach connected physical devices. LOGICAL INVESTIGATION  It is referred to as digital investigation it means analyzing file & data in the system. It requires a well defined security policy.
  • 27.
  • 28.  Forensic server is a system which contains forensic toolkits for investigation with dual-bootable window/linux installed.  The activities performed in a forensic analysis may easily tax the average computer.  It is desirable to have as much physical RAM, as well as a fast processor , enough drive space to hold the operating system, several forensic tools, as well as all of the forensic images collected from the subject’s computer.
  • 29.  The first activity performed by law enforcement at a physical crime is to restrict access by surrounding the crime scene with yellow tape.  The second rule is to document the crime scene and all activities performed.  Bag-and-tag of all potential evidence.  Search for ‘sticky notes’ or any other written documentation near the computer.  Take any computer manuals in case they are needed for reference back at the forensics lab.
  • 30. The first step after acquiring digital evidence is to create an exact physical copy of the evidence. This copy is often called a bit-stream image, forensic duplicate, or forensic image. Creating a forensic image is important for a legal standpoint, courts look favorably upon forensic images because it demonstrates that all of the evidence was captured.
  • 31.  shut down the computer.  Document the hardware configuration of the system.  Transport the computer system to a secure location.  Make bit stream back ups of hard disk and floppy disk.  Mathematically authenticate data on all storage devices.  Document the system date and time.  Make a list of key search words.  Evaluate the window swap file.  Evaluate file slack.  Evaluate unallocated space.
  • 32.  Search file slack and unallocated space for key words.  Document file names, dates and times.  Identify file, program and storage anomalies.  Evaluate program functionally.  Document every activity and findings.
  • 33.  EnCase by Guidance Software  Forensic Tool Kit by Access Data  SMART by ASR Data  The Sleuth kit(TSK)  ProDiscover by technology pathways  The image master  Data and password recovery toolkit  Maresware by Mares & Associates  DataLifter by StepaNet Communications
  • 34.  EnCase is considered as the leader in stand-alone forensic analysis.  This means it is a bundled software package that provides multiple forensic tools within the box.  EnCase is Windows-based and can acquire and analyze data using the local or network-based versions of the tool.  EnCase can analyze many file system formats, including FAT, NTFS, Ext2/3, CD-ROMs, and DVDs. EnCase also supports Microsoft Windows dynamic disks.
  • 35.  EnCase allows you to list the files and directories, recover deleted files, conduct keyword searches, view all graphic images, make timelines of file activity, and use hash databases to identify known files.  It also has its own scripting language, called EnScript, which allows you to automate many tasks.  The EnCase Enterprise Edition is a network enabled incident response system which offers immediate and complete forensic analysis.
  • 36.  Some of its impressive features are:-  Enterprise Edition – Centralized monitoring and real-time investigation.  Snapshot – Capture of RAM contents, running programs, open files and ports.  Organizes results into case file & provides case management for multiple cases.  Maintains chain of custody.  Tools for incident response to respond to emerging threats.  Supports real-time and post-mortem investigations.
  • 37. It consists of three components:  The first of these components is the Examiner software. This software is installed on a secure system where investigations are performed.  The second component is called SAFE, which stands for Secure Authentication of EnCase. SAFE is a server which is used to authenticate users, administer access rights, maintain logs of EnCase transactions, and provide for secure data transmission.  The final component is Servlet, an efficient software component installed on servers to establish connectivity between the Examiner, SAFE, and the devices being investigated.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.  Encryption  Using a key algorithm to convert simple text into cipher text.  Changing the file extension  changing a .docx to .jpg file.  Steganography  Steganography simply takes one piece of information and hides it within another. Computer files, such as images, sound recordings, and slack space contain unused or insignificant areas of data.
  • 46.
  • 47.
  • 48.
  • 49.  With its help, we can catch criminal.  Can prevent data theft.  Recover hidden & deleted files.  Computer forensics ethics let the investigation process remain in legal rules & laws.  Privacy of client is compromised.  some sensitive data or information that is important to the client may be lost in order to find the evidence.  It is an expensive process.