Digital Forensics is the use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation, and presentation of digital evidence derived from digital devices.
Forensic science is a scientific method of gathering and examining information about the past which is then used in the court of law. Digital Forensics is the use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation, and presentation of digital evidence derived from digital devices for the purpose of facilitation or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations.
What is digital evidence? , sources of digital evidence, types of digital evidence, the procedure for collecting digital evidence, records, digital vs physical evidence, controlling contamination.
Forensic science is a scientific method of gathering and examining information about the past which is then used in the court of law. Digital Forensics is the use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation, and presentation of digital evidence derived from digital devices for the purpose of facilitation or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations.
What is digital evidence? , sources of digital evidence, types of digital evidence, the procedure for collecting digital evidence, records, digital vs physical evidence, controlling contamination.
Computer forensics is a very important branch of computer science in relation to computer and Internet related crimes. Earlier, computers were only used to produce data but now it has expanded to all devices related to digital data. The goal of Computer forensics is to perform crime investigations by using evidence from digital data to find who was the responsible for that particular crime.
For better research and investigation, developers have created many computer forensics tools. Police departments and investigation agencies select the tools based on various factors including budget and available experts on the team.
Introduction to Cyber forensics: Information Security Investigations, Corporate Cyber Forensics, Scientific method in forensic analysis, investigating large scale Data breach cases.
Analyzing Malicious software.
A Pilot study on issues and complexity of digital forensics and how digital forensics can be applied in a live environment without the loss or spoilage of valuable data and evidence
Download DOC word file from below Links:
Link 1 :http://gestyy.com/eiT4WO
Link 2: http://fumacrom.com/RQUm
Disclaimer: Above doc file is only for education purpose only
Process of Digital forensics
Identification
Preservation
Analysis
4. Presentation and Reporting:
5. Disseminating the case:
What is acquisition in digital forensics?
How to handle data acquisition in digital forensics
Types of Digital Forensics
Disk Forensics
Network Forensics
Wireless Forensics
Database Forensics
Computer forensics is a very important branch of computer science in relation to computer and Internet related crimes. Earlier, computers were only used to produce data but now it has expanded to all devices related to digital data. The goal of Computer forensics is to perform crime investigations by using evidence from digital data to find who was the responsible for that particular crime.
For better research and investigation, developers have created many computer forensics tools. Police departments and investigation agencies select the tools based on various factors including budget and available experts on the team.
Introduction to Cyber forensics: Information Security Investigations, Corporate Cyber Forensics, Scientific method in forensic analysis, investigating large scale Data breach cases.
Analyzing Malicious software.
A Pilot study on issues and complexity of digital forensics and how digital forensics can be applied in a live environment without the loss or spoilage of valuable data and evidence
Download DOC word file from below Links:
Link 1 :http://gestyy.com/eiT4WO
Link 2: http://fumacrom.com/RQUm
Disclaimer: Above doc file is only for education purpose only
Process of Digital forensics
Identification
Preservation
Analysis
4. Presentation and Reporting:
5. Disseminating the case:
What is acquisition in digital forensics?
How to handle data acquisition in digital forensics
Types of Digital Forensics
Disk Forensics
Network Forensics
Wireless Forensics
Database Forensics
Crime and violence are inherent in our political and social system. With the moving pace of technology, the
popularity of internet grows continuously, with not only changing our views of life, but also changing the
way crime takes place all over the world. We need a technology that can be used to bring justice to those
who are responsible for conducting attacks on computer systems across the globe. In this paper, we present
various measures being taken in order to control and deal with the crime related to digital devices. This
paper gives an insight of Digital Forensics and current situation of India in handling such type of crimes.
CYBER FORENSICS AND AUDITING
Topics Covered: Introduction to Cyber Forensics, Computer Equipment and associated storage, media Role of forensics Investigator, Forensics Investigation Process, Collecting Network based Evidence Writing, Computer Forensics Reports, Auditing, Plan an audit against a set of audit criteria, Information Security Management, System Management. Introduction to ISO 27001:2013
Cyber security course near me | Cyber security institute near me.pdfshyamv3005
Join the leading cyber security institute near you with Blitz Academy's specialized cyber security courses. Learn from expert instructors and gain practical skills for a successful career. Enroll now!
Cyber security course in Kerala, Kochi.pdfamallblitz0
Secure your future with the best cyber security course in Kerala and Kochi. Enroll now for comprehensive training and practical experience.
https://blitzacademy.org/maincourse.php?course_cat=9&cyber-security-course-in-kerala
Explore the best cyber forensic courses in Kerala, including hands-on training and expert guidance. Master digital investigation techniques in Kochi.
https://blitzacademy.org/coursedetail.php?course_cat=9&course_id=6&cyber-forensic-courses-in-kerala
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Digital forensics
1. DIGITAL FORENSICS WITH TOOLS
PRESENTED BY :- VISHNU.V
MASTER OF COMPUTER APPLICATION
DEPARTMENT OF COMPUTER APPLICATION
1
2. TYPES OF CRIMES
TRADITIONAL CRIMES
Traditional crimes are crimes which are done in earlier days without the help of
electronics or digital components.
Example : robbery , pick pocket ,kidnapping, Blackmail, theft etc….
DIGITAL CRIMES
Digital crimes are crimes which are done through digital world with the help of
Digital gadgets or devices.
Example : Hacking , dos attack ,malware, online financial theft etc…..
** NOW A DAYS MOST OF OUR DATA ARE IN THE FORM OF DIGITAL EVIDENCE **
2
3. INTRODUCTION
FORENSICS
Forensic science is the application of science to criminal and civil laws, mainly on
the criminal side during criminal investigation, as governed by the legal
standards of admissible evidence and criminal procedure .
DIGITAL FORENSICS
Digital Forensics is the use of scientifically derived and proven methods toward
the preservation, collection, validation, identification, analysis, interpretation,
documentation, and presentation of digital evidence derived from digital devices.
3
6. HISTORY OF COMPUTER FORENSICS
• Michael Anderson
• “Father of computer forensics”
• special agent with IRS ( law enforcement agency)
• Meeting in 1988 (Portland, Oregon) • creation of IACIS, the International Association of
Computer Investigative Specialists •
• The first Seized Computer Evidence Recovery Specialists (SCERS) classes held.
6
7. WORKING PROCESS : METHOD OF HIDING DATA
Hard Drive/File System manipulation :
• Slack Space
• Partition waste space
• Hidden drive Space
• Bad sectors
• Extra Tracks
• Change file names and extensions
7
8. BRANCHES OF DIGITAL FORENSICS
The technical aspect of an investigation is divided into several sub-branches, relating to
the type of digital devices involved:
• Computer forensics
• Firewall Forensics
• Database Forensics
• Network forensics
• Forensic data analysis
• Mobile device forensics.
The typical forensic process encompasses the seizure, forensic imaging and
analysis of digital media and the production of a report into collected evidence.
8
9. TYPES OF DIGITAL FORENSICS
Digital forensics are classified into two :
LIVE DATA FORENSICS
Live data forensics is only focused on computer systems that are powered on. The main
purpose is to acquire volatile data that would otherwise get lost if the computer system is
turned off or would be overwritten if the computer system will stay turned on for a longer
period. Then go for the traditional forensics.
TRADITIONAL DATA FORENSICS
Live data forensics is only focused on computer systems that are powered off. But in case
of mobile phone if it is on keep it on, if it is off keep it off. If mobile phone is on change to
flight mode because of hash value will change continuously. Then crimes cant be proved.
9
12. CENTRAL FORENSIC SCIENCE LABORATORY IN INDIA
The Central Forensic Science Laboratory (CFSL) is a wing of the Indian Ministry of
Home Affairs, which fulfills the forensic requirements in the country. It houses the only
DNA repository in South and Southeast Asia.
CFSL Hyderabad is a center of excellence in chemical sciences
CFSL Kolkata (the oldest laboratory in India) in biological sciences
CFSL Chandigarh in physical sciences.
CFSL New Delhi comes under the Central Bureau of Investigation, Delhi
12
14. KERALA CYBER FORENSICS LABS
The Kerala State Forensic Science laboratory was established in 1961 at the
Medical College Building, Thiruvananthapuram Dr. Thangavelu, the then Principal of
Medical College, Thiruvananthapuram was the first Honorary Director of the
laboratory.
At present, the laboratory consists of Headquarters lab situated in Police Head Quarters,
Thiruvananthapuram and two fully functional Regional Forensic Science Labs at Thrissur
and Kannur.
There are Nineteen District Mobile Forensic Labs(DMFL) in all Police Districts.
One new Regional FSL at Kochi has been sanctioned and is about to start its functioning.
The Headquarters lab at Thiruvananthapuram consists of eleven divisions such as
Physics, Ballistics, Biology, Serology, DNA, Documents, Documents- Civil, Cyber,
Chemistry, Explosives and Polygraph divisions. RFSLs have four major divisions such as
Physics, Chemistry, Biology and Documents.
14
15. EXAMPLES OF DIGITAL EVIDENCE
• e-mails
• digital photographs,
• ATM transaction logs
• Finger prints
• word processing documents
• Instant message histories
• files saved from accounting program
• spreadsheets
• internet browser histories
• Databases
• The contents of computer memory
• computer backups
• computer printouts
• Global Positioning System tracks,
• logs from a hotel’s electronic door locks
• digital video or audio files Types of Digital Evidence
15
16. STEPS FOR EVIDENCE PRESENTATION
• Format &Authenticity
• Hard Copy / Soft Copy
• Software used versions
• CV of the expert qualifications
• Hash results
• All storage media details
• Report should be in simple terms
• Supported by photographs
16
17. RULES OF EVIDENCE
• Admissible - Conform to legal rules in court.
• Authentic - Possible to prove the evidence genuine.
• Complete - Should reflect all aspects of the incident or crime.
• Reliable - Clarity about how the evidence was collected and handled.
• Believable - Must be readily believable and understandable by the court
17
18. HASHING
• Hashing is a mathematical model for authenticating any digital data.
• It uses a set of computations to generate a unique code for the input data.
• Any minute change in the input data will change the resultant hash value .
• .There are standard algorithms like MD5, SHA1 and SHA2 used for this.
• Hashing can be done using hardware solutions or software solutions.
** software hashes are not valuable at the court **
18
19. DEVICES USED IN DIGITAL FORENSICS
WRITE BLOCKER
Write blockers are devices that allow acquisition of information on a drive
without creating the possibility of accidentally damaging the drive contents.
They do this by allowing read commands to pass but by blocking write commands.
RAID - RAPID ACTION IMAGING DEVICE
RAID or Master Device is a complete set
Of tools within a box which can carry out
by investigation officers in scene of crime.
Write Blocker
19
20. DIGITAL FORENSICS SOFTWARE TOOLS
Some of the most common digital forensics software tools ;
• Disk Forensics tool :- Cyber Check 6.0 - Forensic Data Recovery & Analysis tool
• Live Forensics Tool :- Win-LiFT 3.0 – Windows Live Forensics Tool
• Network Forensics Tools:- Net Force Suite 3.0 - A comprehensive collection of Network Forensics tools
• Device Forensics Tools :- Mobile Check 3.1 - Cell phone Forensics tool
Third party Foreign Tools :
• FTK
• EnCase
• Magnet Axiom
• Autopsy – Open Source
• Cellebrite
• Oxygen
• XRY
20
21. ADVANTAGES OF DIGITAL FORENSICS
• The most important advantage, however, is that it is able to search through a
large and massive amount of data.
• it has the ability to do this very quickly.
• Digital forensics can be used in corporate fraud, breach of contract and asset
recovery, theft, and intellectual property disputes.
• IT can search in the hard drives in different languages, and this is beneficial
since cyber crimes have the ability to cross borders on the internet.
• The many valuable data that has been lost and deleted can be achieved
sufficiently .
• It can then become substantial evidence in court.
21
22. CHALLENGES FACED BY DIGITAL FORENSICS
• The increase of PC’s and internet access has made the exchange of
information quick and inexpensive.
• Easy availability of Hacking Tools.
• Lack of physical evidence makes crimes harder to prosecute.
• The large amount of storage space available to suspects .
• The rapid technological changes requires constant upgrade or changes to
solutions .
22
23. IT ACT IN INDIA
Section65-Tampering with computer source document
section 66-Hacking with computer system
section 66-Receiving stolen computer or communication device
section 66C-Using password of another person
section 66D-Cheating using computer resource
section 66E-Publishing private images of others
section 66F-Acts of cyber terrorism
section 67-Publishing information which is obscene in electronic form.
section 67A-Publishing images containing sexual acts
section 67B-Publishing child porn or predating children online
section 67C-Failure to maintain records
section 68-Failure/refusal to comply with orders
section 70-Securing access or attempting to secure access to a protected system
section 71-Misrepresentation
23
24. FEATURE SCOPE
• There is an increasing wide array of tools used to preserve and analyze digital evidence.
• The single approach to utilize single evidence such as hard drives will change as there
is increasing size of hundreds of Gigabytes and Terabytes to be used.
• Huge targets will require more sophisticated analysis techniques and equipment.
• There will also be better collaborative functions to allow forensics investigators to
perform investigations a lot more efficiently that they do presently.
24
25. SUGGESTIONS TO KEEP YOU SAFE
Update your system software's on continues intervals
Update all your applications
Don’t try to install unknown applications
Don’t even open your unknown links which received by means of social
media or by mail or sms .
Don’t share your OTP or any keys with any one.
25
27. KERALA POLICE CYBERDOME
Headed with :- MANOJ ABRAHAM IPS
Address :- Cyber dome, Thejaswini Annexe Building,
Techno park Campus, Thiruvananthapuram,
Kerala -695581.
Website :- www.cyberdome.kerala.gov.in
E-mail :- cyberdome.pol@kerala.gov.in
Facebook page :- https://www.facebook.com/KeralaPoliceCyberdome
27
28. CONCLUSION
• Digital forensics is important for solving crimes
with digital devices
against digital devices
against people where evidence may reside in a device
• Several sound tools and techniques exist to search and analyze
digital data.
• Regardless of existing tools, evolving digital age and development of
technology requires heavier research in digital forensics.
28