SlideShare a Scribd company logo
COMPUTER FORENSICS AND
INVESTIGATION
Module:1 Understand the importance of
computer forensics
Topic: Introduction to computer forensics
BY,
Neha Raju K
Assistant Professor
BCA-CloudTechnology and Information Security Management
Contents
• Overview
• Introduction
• Definition of Computer Forensics
• Evolution of Digital forensics
• Assignment
• Why do we need computer forensics?
Overview
➢The main objective is to find the
criminal which is directly or indirectly
related to cyber world.
➢To find out the digital evidences.
➢Presenting evidences in a manner that
leads to legal action of the criminal.
Introduction • Many people across the globe prefer using gadgets like
computers, laptops, smart phones, ipads, etc. for
communication and online transactions.
• Organizations use various security measures to protect
confidential data.
• In spite of the security measures taken, cyber-crime still
occurs and is growing day by day.
• Hence we use Computer Forensics to investigate digital
crimes such as hacking of information online via bank
accounts, credit cards, emails, social networking websites
etc.
What is computer
forensics?
➢Computer forensics is a technological practice to
identify, collect, analyse and report various forms
of digital evidences in such a manner that
evidences are legally acceptable.
Evolution of Digital
Forensics
➢The computer forensics domain began to evolve
more than 30 years ago when computers were
developed and were being used extensively for
data processing.
➢The US’s law enforcement and military
organizations were the first to use computer
forensics.
➢The development of computer forensics can be
divided into three phases.
1. Ad-hoc phase
2. Structured phase
3. Enterprise phase
1.AD-HOC PHASE
➢ In the beginning, there was a lack of structure, appropriate tools, written processes and
procedures.
➢ No clear goals were defined and there was a lack of legal framework.
TIMELINE
➢ 1970- First crime cases involving computers, mainly financial fraud.
➢ 1980’s-first financial investigators and courts to realize that evidence can be stored in various
digital media devices.
➢ Norton utilities developed an “un-erase” tool.
➢ ACFE was founded.
➢ HTCIA was formed in Southern California.
STRUCTURED PHASE
➢Various first generation tools and techniques were developed and employed. But
most of them were quite complex.
➢The most important thing in this phase was the development and enabling of
the criminal legislation.
Timeline
➢1984- FBI Magnetic media program was created and become the computer
analysis and response team(CART)
➢1987-Access Data- Cyber Forensics company was formed.
➢1988-Founding of the International Association of computer investigative
Specialists(IACIS).
➢The first seized Computer Evidence Recovery Specialists (SCERS) training classes
were conducted.
• 1993- First International Conference on Computer Evidence was held.
• 1995-International Organization of Computer Evidence (IOCE) was formed.
• 1997-The G8 countries, in Moscow, declared that “Law enforcement personnel
must be trained and equipped to address high-tech crimes.
• 1998-In march,G8 appointed IICE to create international principles, guidelines
and procedures relating to digital evidence.
• 1998-INTERPOL Forensic Science Symposium.
3. ENTERPRISE PHASE
➢1999-FBI CART case load exceeds 2000 cases,
examined 17Terabytes of data.
➢2000-First FBI Regional Computer Forensic
Laboratory established.
➢2003- FBI CART case load exceeds 6500 cases,
examining 782 terabytes of data.
Basic Terminology
• Cybercrime, or computer-oriented crime, is a crime that involves a computer and a
network.
• The computer may have been used in the commission of a crime, or it may be the target.
• Cybercrimes can be defined as: "Offences that are committed against individuals or
groups of individuals with a criminal motive to intentionally harm the reputation of the
victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using
modern telecommunication networks such as Internet (networks including chat rooms,
emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)".
Why do we
need
computer
forensics?
• To produce evidence in the court that can lead to
the punishment of the actual.
• To ensure the integrity of the computer system.
• Hence the use of computer forensics is growing
for the following reasons:
1. Criminal investigations
2.Security investigations
3.Domestic cases
4.Data/IPTheft cases
DAILY ASSIGNMENT NO 1:
TOPIC :Myths about computer forensics
ThankYou

More Related Content

What's hot

Anti forensic
Anti forensicAnti forensic
Anti forensic
Milap Oza
 
Incident response process
Incident response processIncident response process
Incident response process
Bhupeshkumar Nanhe
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
Santosh Khadsare
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software tools
N.Jagadish Kumar
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigation
edwardbel
 
computer forensics
computer forensicscomputer forensics
computer forensics
shivi123456
 
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniInvestigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Dr Raghu Khimani
 
Malware forensics
Malware forensicsMalware forensics
Malware forensics
Sameera Amjad
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Somya Johri
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating procedures
Soumen Debgupta
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hacking
Ambuj Kumar
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
Kranthi
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
Yansi Keim
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
primeteacher32
 
Browser forensics
Browser forensicsBrowser forensics
Browser forensics
Prince Boonlia
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
primeteacher32
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
newbie2019
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
Online
 
Challenges in Cloud Forensics
Challenges in Cloud ForensicsChallenges in Cloud Forensics
Challenges in Cloud Forensics
Gayan Weerarathna
 
Email investigation
Email investigationEmail investigation
Email investigation
Animesh Shaw
 

What's hot (20)

Anti forensic
Anti forensicAnti forensic
Anti forensic
 
Incident response process
Incident response processIncident response process
Incident response process
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software tools
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigation
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniInvestigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
 
Malware forensics
Malware forensicsMalware forensics
Malware forensics
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating procedures
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hacking
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
Browser forensics
Browser forensicsBrowser forensics
Browser forensics
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Challenges in Cloud Forensics
Challenges in Cloud ForensicsChallenges in Cloud Forensics
Challenges in Cloud Forensics
 
Email investigation
Email investigationEmail investigation
Email investigation
 

Similar to Computer forensics and Investigation

Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
Jinalkakadiya
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
Dr. Prashant Vats
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
ijfcstjournal
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
ijfcstjournal
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
Malobe Lottin Cyrille Marcel
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
Teja Bheemanapally
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 
Computer Forensics.pptx
Computer Forensics.pptxComputer Forensics.pptx
Computer Forensics.pptx
Happyness Mkumbo
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
YashPatel132112
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
BhagyasriPatel2
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Shreya Singireddy
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Cybercrime_PPT.ppt
Cybercrime_PPT.pptCybercrime_PPT.ppt
Cybercrime_PPT.ppt
JiaJunWang17
 
An insight view of digital forensics
An insight view of digital forensicsAn insight view of digital forensics
An insight view of digital forensics
ijcsa
 
Week1_2.ppt
Week1_2.pptWeek1_2.ppt
Week1_2.ppt
AliAshraf68199
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
talhajann43
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
Surajgroupsvideo
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
AliAshraf68199
 
Presentation wk6
Presentation wk6Presentation wk6
Presentation wk6
Douglas Pippen
 
File000114
File000114File000114
File000114
Desmond Devendran
 

Similar to Computer forensics and Investigation (20)

Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Computer Forensics.pptx
Computer Forensics.pptxComputer Forensics.pptx
Computer Forensics.pptx
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
Cybercrime_PPT.ppt
Cybercrime_PPT.pptCybercrime_PPT.ppt
Cybercrime_PPT.ppt
 
An insight view of digital forensics
An insight view of digital forensicsAn insight view of digital forensics
An insight view of digital forensics
 
Week1_2.ppt
Week1_2.pptWeek1_2.ppt
Week1_2.ppt
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Presentation wk6
Presentation wk6Presentation wk6
Presentation wk6
 
File000114
File000114File000114
File000114
 

Recently uploaded

BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 

Recently uploaded (20)

BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 

Computer forensics and Investigation

  • 1. COMPUTER FORENSICS AND INVESTIGATION Module:1 Understand the importance of computer forensics Topic: Introduction to computer forensics BY, Neha Raju K Assistant Professor BCA-CloudTechnology and Information Security Management
  • 2. Contents • Overview • Introduction • Definition of Computer Forensics • Evolution of Digital forensics • Assignment • Why do we need computer forensics?
  • 3. Overview ➢The main objective is to find the criminal which is directly or indirectly related to cyber world. ➢To find out the digital evidences. ➢Presenting evidences in a manner that leads to legal action of the criminal.
  • 4. Introduction • Many people across the globe prefer using gadgets like computers, laptops, smart phones, ipads, etc. for communication and online transactions. • Organizations use various security measures to protect confidential data. • In spite of the security measures taken, cyber-crime still occurs and is growing day by day. • Hence we use Computer Forensics to investigate digital crimes such as hacking of information online via bank accounts, credit cards, emails, social networking websites etc.
  • 5. What is computer forensics? ➢Computer forensics is a technological practice to identify, collect, analyse and report various forms of digital evidences in such a manner that evidences are legally acceptable.
  • 6. Evolution of Digital Forensics ➢The computer forensics domain began to evolve more than 30 years ago when computers were developed and were being used extensively for data processing. ➢The US’s law enforcement and military organizations were the first to use computer forensics. ➢The development of computer forensics can be divided into three phases. 1. Ad-hoc phase 2. Structured phase 3. Enterprise phase
  • 8. ➢ In the beginning, there was a lack of structure, appropriate tools, written processes and procedures. ➢ No clear goals were defined and there was a lack of legal framework. TIMELINE ➢ 1970- First crime cases involving computers, mainly financial fraud. ➢ 1980’s-first financial investigators and courts to realize that evidence can be stored in various digital media devices. ➢ Norton utilities developed an “un-erase” tool. ➢ ACFE was founded. ➢ HTCIA was formed in Southern California.
  • 10. ➢Various first generation tools and techniques were developed and employed. But most of them were quite complex. ➢The most important thing in this phase was the development and enabling of the criminal legislation. Timeline ➢1984- FBI Magnetic media program was created and become the computer analysis and response team(CART) ➢1987-Access Data- Cyber Forensics company was formed. ➢1988-Founding of the International Association of computer investigative Specialists(IACIS). ➢The first seized Computer Evidence Recovery Specialists (SCERS) training classes were conducted.
  • 11. • 1993- First International Conference on Computer Evidence was held. • 1995-International Organization of Computer Evidence (IOCE) was formed. • 1997-The G8 countries, in Moscow, declared that “Law enforcement personnel must be trained and equipped to address high-tech crimes. • 1998-In march,G8 appointed IICE to create international principles, guidelines and procedures relating to digital evidence. • 1998-INTERPOL Forensic Science Symposium.
  • 12. 3. ENTERPRISE PHASE ➢1999-FBI CART case load exceeds 2000 cases, examined 17Terabytes of data. ➢2000-First FBI Regional Computer Forensic Laboratory established. ➢2003- FBI CART case load exceeds 6500 cases, examining 782 terabytes of data.
  • 13. Basic Terminology • Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network. • The computer may have been used in the commission of a crime, or it may be the target. • Cybercrimes can be defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)".
  • 14. Why do we need computer forensics? • To produce evidence in the court that can lead to the punishment of the actual. • To ensure the integrity of the computer system. • Hence the use of computer forensics is growing for the following reasons: 1. Criminal investigations 2.Security investigations 3.Domestic cases 4.Data/IPTheft cases
  • 15. DAILY ASSIGNMENT NO 1: TOPIC :Myths about computer forensics