SlideShare a Scribd company logo
COMPUTER 
FORENSICS 
A Need of Modern Crimes 
-Daksh 
Verma
INTRODUCTION
O Computer Forensics is the process of 
identifying, preserving, analyzing and 
presenting digital evidence in a manner 
that is legally acceptable. 
O Method used to investigate and analyze 
data maintained on or retrieved from 
electronic data storage media for the 
purposes of presentation in a court of law, 
civil or administrative proceeding.
Important Data 
Persistent Data Volatile Data 
O Data which is 
preserved when the 
computer is turned 
off. 
O Data stored on hard 
drives, external 
memory. 
O Data which is lost 
when the computer 
is turned off. 
O Data stored in 
registers, cache 
memory, RAM. 
Another categorization of data is Ambient Data and Active Data
NEED 
O To produce evidence in the court that can 
lead to punishment of the actual. 
O To ensure the integrity of the computer 
system. 
O To focus on the response to the hi-tech 
offences, started to intertwine.
ADVANTAGES 
O Catch the culprit or the criminal who is 
involved in the crime related to the 
computers. 
O To Organizations: 
 Recovering lost data 
 Advice on how to safeguard data from theft
CYBER CRIMES
O Cyber crimes occur when information 
technology is used to commit or conceal 
an offence. 
O “Digital Evidence is any probative 
information stored or transmitted in digital 
form that a party to a court case may use 
at trial.” 
O 2 Types: 
 Persistent Data 
 Volatile Data
Types of Cyber Crimes 
O Hacking 
O Theft 
O Cyber Stalking 
O Identity Theft 
O Malicious Software 
O Child soliciting and Abuse 
O Email-Spoofing 
O Copyright Violations
Characteristics of Digital 
Evidence 
O Admissible 
Must be able to be used in court 
O Authenticate 
Evidence relates to incident in relevant way 
O Complete 
Exculpatory evidence for alternate suspects 
O Reliable 
No question about authenticity and veracity 
O Believable 
Clear, easy to understand & believable by 
jury
Top Spots for Evidence 
O Temporary Files 
O File Slack 
O Unallocated Space 
O Internet History Files 
O E-mails 
O File Storage Dates 
O Settings, Folder Structures, File Names 
O Storage Devices
Popular Cases 
O BTK Serial Killer 
Evidence: File’s metadata on floppy disk 
O U.S. Navy Football Star Rape Case 
Evidence: IM keywords and HTML 
coding 
O Industrial Espionage Case 
Evidence: Stolen engineering drawings
THE PROCESS
ACQUISITION 
• Physically or remotely obtaining possession of 
computer, network mappings, external storage devices. 
IDENTIFICATION 
• Identifying what data could be recovered 
• Retrieving data using various tools 
EVALUATION 
• Evaluating how retrieved data can be used against the 
suspect. 
PRESENTATION 
• Presentation of evidence in a form understandable by 
non-technical persons.
Steps to Retrieve Evidence 
1. Shut down the computer 
2. Document the hardware configuration of the 
system 
3. Transport the computer system to a secure 
location 
4. Make bit stream backups of hard disks and 
storage devices 
5. Mathematically authenticated data on all 
storage devices 
6. Document the system date and time 
7. Make a list of key search words
Steps to Retrieve Evidence 
8. Evaluate the Windows swap file 
9. Evaluate file slack 
10. Evaluate unallocated space 
11. Search files, file slack, unallocated space for 
key words 
12. Document file names, date and time 
13. Identify file, storage and program anomalies 
14. Document your findings
TOOLS USED
GETFREE 
O Used to analyze Unallocated Space 
O Unallocated space contains the deleted 
files and the associated file slack 
O Automatically calculates the size of and 
captures the Unallocated space 
O Captures the contents of Windows swap 
file for analysis with other tools 
O Dos-based for speed and ease-of-use
GETSLACK 
O Used to analyze File Slack 
O Network logons and passwords or 
passwords used in file encryption can be 
found in file slack. 
O Calculates the size of and captures the 
File Slack 
O Dos-based for speed and ease-of-use
Forensic Graphics File 
Extractor 
O Automatically extract exact copies of 
graphics file images 
O Searches Windows Swap File and 
Unallocated Space for patterns of BMP, 
GIF and JPG file images 
O Reconstructs partial or complete image 
files in one highly accurate operation. The 
accuracy of this process is dependent 
upon the degree of fragmentation involved
APPLICATIONS 
O Financial Fraud Detection 
O Criminal Prosecution 
O Civil Litigation 
O Corporate Security Policy and Acceptable 
Use Violations
CONCLUSION 
O With increase in technology, cyber crimes 
increasing. 
O Computer forensics is a vital part of the 
computer security process. 
O As more knowledge is obtained about how 
crimes are committed with the use of 
computers, more forensic tools can be 
fine tuned to gather evidence more 
efficiently and combat the crime wave on 
technology.

More Related Content

What's hot

CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
Operating System Forensics
Operating System ForensicsOperating System Forensics
Operating System Forensics
ArunJS5
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
Manu Mathew Cherian
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
abdullah roomi
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
Avinash Mavuru
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
Parsons Corporation
 
computer forensics
computer forensicscomputer forensics
computer forensics
Vaibhav Tapse
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
primeteacher32
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Oldsun
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Mithileysh Sathiyanarayanan
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
Online
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
One97 Communications Limited
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
Manu Mathew Cherian
 
Browser forensics
Browser forensicsBrowser forensics
Browser forensics
Prince Boonlia
 
Network forensic
Network forensicNetwork forensic
Network forensic
Manjushree Mashal
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
rakesh mishra
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
unnilala11
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
Anpumathews
 

What's hot (20)

CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Operating System Forensics
Operating System ForensicsOperating System Forensics
Operating System Forensics
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Browser forensics
Browser forensicsBrowser forensics
Browser forensics
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 

Similar to Computer Forensics

Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to Know
Winston & Strawn LLP
 
computer forensics
computer forensicscomputer forensics
computer forensicsAkhil Kumar
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
Novizul Evendi
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02satyabwati
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
Lalit Garg
 
Latest presentation
Latest presentationLatest presentation
Latest presentation
Adetunji Adeoje
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
Gnanavi2
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
Ramesh Ogania
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
pranjal dutta
 
Evidence and data
Evidence and dataEvidence and data
Evidence and data
Atul Rai
 
computer forensics by amritanshu kaushik
computer forensics by amritanshu kaushikcomputer forensics by amritanshu kaushik
computer forensics by amritanshu kaushik
amritanshu4u
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
ssuser2bf502
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
DaniyaHuzaifa
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Bense Tony
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
Varun Sehgal
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
Dhiren Gala
 
computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...
pable2
 

Similar to Computer Forensics (20)

Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to Know
 
Sujit
SujitSujit
Sujit
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Latest presentation
Latest presentationLatest presentation
Latest presentation
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Evidence and data
Evidence and dataEvidence and data
Evidence and data
 
computer forensics by amritanshu kaushik
computer forensics by amritanshu kaushikcomputer forensics by amritanshu kaushik
computer forensics by amritanshu kaushik
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

Computer Forensics

  • 1. COMPUTER FORENSICS A Need of Modern Crimes -Daksh Verma
  • 3. O Computer Forensics is the process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally acceptable. O Method used to investigate and analyze data maintained on or retrieved from electronic data storage media for the purposes of presentation in a court of law, civil or administrative proceeding.
  • 4. Important Data Persistent Data Volatile Data O Data which is preserved when the computer is turned off. O Data stored on hard drives, external memory. O Data which is lost when the computer is turned off. O Data stored in registers, cache memory, RAM. Another categorization of data is Ambient Data and Active Data
  • 5. NEED O To produce evidence in the court that can lead to punishment of the actual. O To ensure the integrity of the computer system. O To focus on the response to the hi-tech offences, started to intertwine.
  • 6. ADVANTAGES O Catch the culprit or the criminal who is involved in the crime related to the computers. O To Organizations:  Recovering lost data  Advice on how to safeguard data from theft
  • 8. O Cyber crimes occur when information technology is used to commit or conceal an offence. O “Digital Evidence is any probative information stored or transmitted in digital form that a party to a court case may use at trial.” O 2 Types:  Persistent Data  Volatile Data
  • 9. Types of Cyber Crimes O Hacking O Theft O Cyber Stalking O Identity Theft O Malicious Software O Child soliciting and Abuse O Email-Spoofing O Copyright Violations
  • 10.
  • 11.
  • 12.
  • 13. Characteristics of Digital Evidence O Admissible Must be able to be used in court O Authenticate Evidence relates to incident in relevant way O Complete Exculpatory evidence for alternate suspects O Reliable No question about authenticity and veracity O Believable Clear, easy to understand & believable by jury
  • 14. Top Spots for Evidence O Temporary Files O File Slack O Unallocated Space O Internet History Files O E-mails O File Storage Dates O Settings, Folder Structures, File Names O Storage Devices
  • 15. Popular Cases O BTK Serial Killer Evidence: File’s metadata on floppy disk O U.S. Navy Football Star Rape Case Evidence: IM keywords and HTML coding O Industrial Espionage Case Evidence: Stolen engineering drawings
  • 17. ACQUISITION • Physically or remotely obtaining possession of computer, network mappings, external storage devices. IDENTIFICATION • Identifying what data could be recovered • Retrieving data using various tools EVALUATION • Evaluating how retrieved data can be used against the suspect. PRESENTATION • Presentation of evidence in a form understandable by non-technical persons.
  • 18. Steps to Retrieve Evidence 1. Shut down the computer 2. Document the hardware configuration of the system 3. Transport the computer system to a secure location 4. Make bit stream backups of hard disks and storage devices 5. Mathematically authenticated data on all storage devices 6. Document the system date and time 7. Make a list of key search words
  • 19. Steps to Retrieve Evidence 8. Evaluate the Windows swap file 9. Evaluate file slack 10. Evaluate unallocated space 11. Search files, file slack, unallocated space for key words 12. Document file names, date and time 13. Identify file, storage and program anomalies 14. Document your findings
  • 21. GETFREE O Used to analyze Unallocated Space O Unallocated space contains the deleted files and the associated file slack O Automatically calculates the size of and captures the Unallocated space O Captures the contents of Windows swap file for analysis with other tools O Dos-based for speed and ease-of-use
  • 22. GETSLACK O Used to analyze File Slack O Network logons and passwords or passwords used in file encryption can be found in file slack. O Calculates the size of and captures the File Slack O Dos-based for speed and ease-of-use
  • 23. Forensic Graphics File Extractor O Automatically extract exact copies of graphics file images O Searches Windows Swap File and Unallocated Space for patterns of BMP, GIF and JPG file images O Reconstructs partial or complete image files in one highly accurate operation. The accuracy of this process is dependent upon the degree of fragmentation involved
  • 24. APPLICATIONS O Financial Fraud Detection O Criminal Prosecution O Civil Litigation O Corporate Security Policy and Acceptable Use Violations
  • 25. CONCLUSION O With increase in technology, cyber crimes increasing. O Computer forensics is a vital part of the computer security process. O As more knowledge is obtained about how crimes are committed with the use of computers, more forensic tools can be fine tuned to gather evidence more efficiently and combat the crime wave on technology.