SlideShare a Scribd company logo
DIGITAL FORENSICS WITH TOOLS
PRESENTED BY :- VISHNU.V
MASTER OF COMPUTER APPLICATION
DEPARTMENT OF COMPUTER APPLICATION
1
TYPES OF CRIMES
TRADITIONAL CRIMES
Traditional crimes are crimes which are done in earlier days without the help of
electronics or digital components.
Example : robbery , pick pocket ,kidnapping, Blackmail, theft etc….
DIGITAL CRIMES
Digital crimes are crimes which are done through digital world with the help of
Digital gadgets or devices.
Example : Hacking , dos attack ,malware, online financial theft etc…..
** NOW A DAYS MOST OF OUR DATA ARE IN THE FORM OF DIGITAL EVIDENCE **
2
INTRODUCTION
FORENSICS
Forensic science is the application of science to criminal and civil laws, mainly on
the criminal side during criminal investigation, as governed by the legal
standards of admissible evidence and criminal procedure .
DIGITAL FORENSICS
Digital Forensics is the use of scientifically derived and proven methods toward
the preservation, collection, validation, identification, analysis, interpretation,
documentation, and presentation of digital evidence derived from digital devices.
3
GRAPHICAL REPRESENTION OF CYBER CRIMES
4
MOST COMMON TYPES OF CYBER ATTACKS
5
HISTORY OF COMPUTER FORENSICS
• Michael Anderson
• “Father of computer forensics”
• special agent with IRS ( law enforcement agency)
• Meeting in 1988 (Portland, Oregon) • creation of IACIS, the International Association of
Computer Investigative Specialists •
• The first Seized Computer Evidence Recovery Specialists (SCERS) classes held.
6
WORKING PROCESS : METHOD OF HIDING DATA
Hard Drive/File System manipulation :
• Slack Space
• Partition waste space
• Hidden drive Space
• Bad sectors
• Extra Tracks
• Change file names and extensions
7
BRANCHES OF DIGITAL FORENSICS
The technical aspect of an investigation is divided into several sub-branches, relating to
the type of digital devices involved:
• Computer forensics
• Firewall Forensics
• Database Forensics
• Network forensics
• Forensic data analysis
• Mobile device forensics.
The typical forensic process encompasses the seizure, forensic imaging and
analysis of digital media and the production of a report into collected evidence.
8
TYPES OF DIGITAL FORENSICS
Digital forensics are classified into two :
LIVE DATA FORENSICS
Live data forensics is only focused on computer systems that are powered on. The main
purpose is to acquire volatile data that would otherwise get lost if the computer system is
turned off or would be overwritten if the computer system will stay turned on for a longer
period. Then go for the traditional forensics.
TRADITIONAL DATA FORENSICS
Live data forensics is only focused on computer systems that are powered off. But in case
of mobile phone if it is on keep it on, if it is off keep it off. If mobile phone is on change to
flight mode because of hash value will change continuously. Then crimes cant be proved.
9
STEPS IN DIGITAL FORENSICS
10
IDENTIFICATION
Identification is the most difficult step in digital forensics.
11
CENTRAL FORENSIC SCIENCE LABORATORY IN INDIA
The Central Forensic Science Laboratory (CFSL) is a wing of the Indian Ministry of
Home Affairs, which fulfills the forensic requirements in the country. It houses the only
DNA repository in South and Southeast Asia.
CFSL Hyderabad is a center of excellence in chemical sciences
CFSL Kolkata (the oldest laboratory in India) in biological sciences
CFSL Chandigarh in physical sciences.
CFSL New Delhi comes under the Central Bureau of Investigation, Delhi
12
KERALA POLICE CYBERDOME
13
KERALA CYBER FORENSICS LABS
The Kerala State Forensic Science laboratory was established in 1961 at the
Medical College Building, Thiruvananthapuram Dr. Thangavelu, the then Principal of
Medical College, Thiruvananthapuram was the first Honorary Director of the
laboratory.
At present, the laboratory consists of Headquarters lab situated in Police Head Quarters,
Thiruvananthapuram and two fully functional Regional Forensic Science Labs at Thrissur
and Kannur.
There are Nineteen District Mobile Forensic Labs(DMFL) in all Police Districts.
One new Regional FSL at Kochi has been sanctioned and is about to start its functioning.
The Headquarters lab at Thiruvananthapuram consists of eleven divisions such as
Physics, Ballistics, Biology, Serology, DNA, Documents, Documents- Civil, Cyber,
Chemistry, Explosives and Polygraph divisions. RFSLs have four major divisions such as
Physics, Chemistry, Biology and Documents.
14
EXAMPLES OF DIGITAL EVIDENCE
• e-mails
• digital photographs,
• ATM transaction logs
• Finger prints
• word processing documents
• Instant message histories
• files saved from accounting program
• spreadsheets
• internet browser histories
• Databases
• The contents of computer memory
• computer backups
• computer printouts
• Global Positioning System tracks,
• logs from a hotel’s electronic door locks
• digital video or audio files Types of Digital Evidence
15
STEPS FOR EVIDENCE PRESENTATION
• Format &Authenticity
• Hard Copy / Soft Copy
• Software used versions
• CV of the expert qualifications
• Hash results
• All storage media details
• Report should be in simple terms
• Supported by photographs
16
RULES OF EVIDENCE
• Admissible - Conform to legal rules in court.
• Authentic - Possible to prove the evidence genuine.
• Complete - Should reflect all aspects of the incident or crime.
• Reliable - Clarity about how the evidence was collected and handled.
• Believable - Must be readily believable and understandable by the court
17
HASHING
• Hashing is a mathematical model for authenticating any digital data.
• It uses a set of computations to generate a unique code for the input data.
• Any minute change in the input data will change the resultant hash value .
• .There are standard algorithms like MD5, SHA1 and SHA2 used for this.
• Hashing can be done using hardware solutions or software solutions.
** software hashes are not valuable at the court **
18
DEVICES USED IN DIGITAL FORENSICS
WRITE BLOCKER
Write blockers are devices that allow acquisition of information on a drive
without creating the possibility of accidentally damaging the drive contents.
They do this by allowing read commands to pass but by blocking write commands.
RAID - RAPID ACTION IMAGING DEVICE
RAID or Master Device is a complete set
Of tools within a box which can carry out
by investigation officers in scene of crime.
Write Blocker
19
DIGITAL FORENSICS SOFTWARE TOOLS
Some of the most common digital forensics software tools ;
• Disk Forensics tool :- Cyber Check 6.0 - Forensic Data Recovery & Analysis tool
• Live Forensics Tool :- Win-LiFT 3.0 – Windows Live Forensics Tool
• Network Forensics Tools:- Net Force Suite 3.0 - A comprehensive collection of Network Forensics tools
• Device Forensics Tools :- Mobile Check 3.1 - Cell phone Forensics tool
Third party Foreign Tools :
• FTK
• EnCase
• Magnet Axiom
• Autopsy – Open Source
• Cellebrite
• Oxygen
• XRY
20
ADVANTAGES OF DIGITAL FORENSICS
• The most important advantage, however, is that it is able to search through a
large and massive amount of data.
• it has the ability to do this very quickly.
• Digital forensics can be used in corporate fraud, breach of contract and asset
recovery, theft, and intellectual property disputes.
• IT can search in the hard drives in different languages, and this is beneficial
since cyber crimes have the ability to cross borders on the internet.
• The many valuable data that has been lost and deleted can be achieved
sufficiently .
• It can then become substantial evidence in court.
21
CHALLENGES FACED BY DIGITAL FORENSICS
• The increase of PC’s and internet access has made the exchange of
information quick and inexpensive.
• Easy availability of Hacking Tools.
• Lack of physical evidence makes crimes harder to prosecute.
• The large amount of storage space available to suspects .
• The rapid technological changes requires constant upgrade or changes to
solutions .
22
IT ACT IN INDIA
Section65-Tampering with computer source document
section 66-Hacking with computer system
section 66-Receiving stolen computer or communication device
section 66C-Using password of another person
section 66D-Cheating using computer resource
section 66E-Publishing private images of others
section 66F-Acts of cyber terrorism
section 67-Publishing information which is obscene in electronic form.
section 67A-Publishing images containing sexual acts
section 67B-Publishing child porn or predating children online
section 67C-Failure to maintain records
section 68-Failure/refusal to comply with orders
section 70-Securing access or attempting to secure access to a protected system
section 71-Misrepresentation
23
FEATURE SCOPE
• There is an increasing wide array of tools used to preserve and analyze digital evidence.
• The single approach to utilize single evidence such as hard drives will change as there
is increasing size of hundreds of Gigabytes and Terabytes to be used.
• Huge targets will require more sophisticated analysis techniques and equipment.
• There will also be better collaborative functions to allow forensics investigators to
perform investigations a lot more efficiently that they do presently.
24
SUGGESTIONS TO KEEP YOU SAFE
 Update your system software's on continues intervals
 Update all your applications
 Don’t try to install unknown applications
 Don’t even open your unknown links which received by means of social
media or by mail or sms .
 Don’t share your OTP or any keys with any one.
25
TOOLS DEMONSTRATION WITH WINDOWS 10.
• HASHING
• BROWSE ANALYSIS
26
KERALA POLICE CYBERDOME
Headed with :- MANOJ ABRAHAM IPS
Address :- Cyber dome, Thejaswini Annexe Building,
Techno park Campus, Thiruvananthapuram,
Kerala -695581.
Website :- www.cyberdome.kerala.gov.in
E-mail :- cyberdome.pol@kerala.gov.in
Facebook page :- https://www.facebook.com/KeralaPoliceCyberdome
27
CONCLUSION
• Digital forensics is important for solving crimes
 with digital devices
 against digital devices
 against people where evidence may reside in a device
• Several sound tools and techniques exist to search and analyze
digital data.
• Regardless of existing tools, evolving digital age and development of
technology requires heavier research in digital forensics.
28
REFERENCE
www.slideshare.net/cleverence1/digital-forensic-73189319
https://en.wikipedia.org/wiki/Digital_forensics
www.techopedia.com/definition/27805/digital-forensics
29
END OF THE PRESENTATION
THANK YOU
ITS YOUR TIME
30

More Related Content

What's hot

Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
primeteacher32
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Vidoushi B-Somrah
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
Aung Thu Rha Hein
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
Parsons Corporation
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
unnilala11
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
rakesh mishra
 
First Responder Officer in Cyber Crime
First Responder Officer in Cyber CrimeFirst Responder Officer in Cyber Crime
First Responder Officer in Cyber Crime
Applied Forensic Research Sciences
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
Online
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating proceduresSoumen Debgupta
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
DINESH KAMBLE
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
Manu Mathew Cherian
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
Manik Bhola
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
Suchita Rawat
 
Difference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptxDifference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptx
Applied Forensic Research Sciences
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
Online
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
abdullah roomi
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Oldsun
 

What's hot (20)

Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
First Responder Officer in Cyber Crime
First Responder Officer in Cyber CrimeFirst Responder Officer in Cyber Crime
First Responder Officer in Cyber Crime
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating procedures
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
Difference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptxDifference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptx
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 

Similar to Digital forensics

Digital forensic
Digital forensicDigital forensic
Digital forensic
Chandan Sah
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
gamemaker762
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
Dr. Prashant Vats
 
The Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptxThe Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptx
Applied Forensic Research Sciences
 
Scope of Cyber forensics
Scope of Cyber forensicsScope of Cyber forensics
Scope of Cyber forensics
Applied Forensic Research Sciences
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
ssuser2bf502
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
DaniyaHuzaifa
 
An insight view of digital forensics
An insight view of digital forensicsAn insight view of digital forensics
An insight view of digital forensics
ijcsa
 
UNIT 1Computer forensics science. .pptx
UNIT 1Computer forensics science.  .pptxUNIT 1Computer forensics science.  .pptx
UNIT 1Computer forensics science. .pptx
ramkumarttf69
 
Digital&computforensic
Digital&computforensicDigital&computforensic
Digital&computforensic
Rahul Badekar
 
Most promising cyber forensic solution providers from india forn sec solut...
Most promising cyber forensic solution providers  from india   forn sec solut...Most promising cyber forensic solution providers  from india   forn sec solut...
Most promising cyber forensic solution providers from india forn sec solut...
FORnSECSolutions
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
Mayank Diwakar
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
Muzzammil Wani
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Sagar Rahurkar
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
Sweta Kumari Barnwal
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
FORnSECSolutions
 
Cyber security course near me | Cyber security institute near me.pdf
Cyber security course near me | Cyber security institute near me.pdfCyber security course near me | Cyber security institute near me.pdf
Cyber security course near me | Cyber security institute near me.pdf
shyamv3005
 
Cyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdfCyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdf
amallblitz0
 
cyber forensic courses in kerala,kochi..
cyber forensic courses in kerala,kochi..cyber forensic courses in kerala,kochi..
cyber forensic courses in kerala,kochi..
mohammadbinshad332
 

Similar to Digital forensics (20)

Digital forensic
Digital forensicDigital forensic
Digital forensic
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
The Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptxThe Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptx
 
Scope of Cyber forensics
Scope of Cyber forensicsScope of Cyber forensics
Scope of Cyber forensics
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
An insight view of digital forensics
An insight view of digital forensicsAn insight view of digital forensics
An insight view of digital forensics
 
180 184
180 184180 184
180 184
 
UNIT 1Computer forensics science. .pptx
UNIT 1Computer forensics science.  .pptxUNIT 1Computer forensics science.  .pptx
UNIT 1Computer forensics science. .pptx
 
Digital&computforensic
Digital&computforensicDigital&computforensic
Digital&computforensic
 
Most promising cyber forensic solution providers from india forn sec solut...
Most promising cyber forensic solution providers  from india   forn sec solut...Most promising cyber forensic solution providers  from india   forn sec solut...
Most promising cyber forensic solution providers from india forn sec solut...
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
 
Cyber security course near me | Cyber security institute near me.pdf
Cyber security course near me | Cyber security institute near me.pdfCyber security course near me | Cyber security institute near me.pdf
Cyber security course near me | Cyber security institute near me.pdf
 
Cyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdfCyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdf
 
cyber forensic courses in kerala,kochi..
cyber forensic courses in kerala,kochi..cyber forensic courses in kerala,kochi..
cyber forensic courses in kerala,kochi..
 

Recently uploaded

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

Digital forensics

  • 1. DIGITAL FORENSICS WITH TOOLS PRESENTED BY :- VISHNU.V MASTER OF COMPUTER APPLICATION DEPARTMENT OF COMPUTER APPLICATION 1
  • 2. TYPES OF CRIMES TRADITIONAL CRIMES Traditional crimes are crimes which are done in earlier days without the help of electronics or digital components. Example : robbery , pick pocket ,kidnapping, Blackmail, theft etc…. DIGITAL CRIMES Digital crimes are crimes which are done through digital world with the help of Digital gadgets or devices. Example : Hacking , dos attack ,malware, online financial theft etc….. ** NOW A DAYS MOST OF OUR DATA ARE IN THE FORM OF DIGITAL EVIDENCE ** 2
  • 3. INTRODUCTION FORENSICS Forensic science is the application of science to criminal and civil laws, mainly on the criminal side during criminal investigation, as governed by the legal standards of admissible evidence and criminal procedure . DIGITAL FORENSICS Digital Forensics is the use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation, and presentation of digital evidence derived from digital devices. 3
  • 4. GRAPHICAL REPRESENTION OF CYBER CRIMES 4
  • 5. MOST COMMON TYPES OF CYBER ATTACKS 5
  • 6. HISTORY OF COMPUTER FORENSICS • Michael Anderson • “Father of computer forensics” • special agent with IRS ( law enforcement agency) • Meeting in 1988 (Portland, Oregon) • creation of IACIS, the International Association of Computer Investigative Specialists • • The first Seized Computer Evidence Recovery Specialists (SCERS) classes held. 6
  • 7. WORKING PROCESS : METHOD OF HIDING DATA Hard Drive/File System manipulation : • Slack Space • Partition waste space • Hidden drive Space • Bad sectors • Extra Tracks • Change file names and extensions 7
  • 8. BRANCHES OF DIGITAL FORENSICS The technical aspect of an investigation is divided into several sub-branches, relating to the type of digital devices involved: • Computer forensics • Firewall Forensics • Database Forensics • Network forensics • Forensic data analysis • Mobile device forensics. The typical forensic process encompasses the seizure, forensic imaging and analysis of digital media and the production of a report into collected evidence. 8
  • 9. TYPES OF DIGITAL FORENSICS Digital forensics are classified into two : LIVE DATA FORENSICS Live data forensics is only focused on computer systems that are powered on. The main purpose is to acquire volatile data that would otherwise get lost if the computer system is turned off or would be overwritten if the computer system will stay turned on for a longer period. Then go for the traditional forensics. TRADITIONAL DATA FORENSICS Live data forensics is only focused on computer systems that are powered off. But in case of mobile phone if it is on keep it on, if it is off keep it off. If mobile phone is on change to flight mode because of hash value will change continuously. Then crimes cant be proved. 9
  • 10. STEPS IN DIGITAL FORENSICS 10
  • 11. IDENTIFICATION Identification is the most difficult step in digital forensics. 11
  • 12. CENTRAL FORENSIC SCIENCE LABORATORY IN INDIA The Central Forensic Science Laboratory (CFSL) is a wing of the Indian Ministry of Home Affairs, which fulfills the forensic requirements in the country. It houses the only DNA repository in South and Southeast Asia. CFSL Hyderabad is a center of excellence in chemical sciences CFSL Kolkata (the oldest laboratory in India) in biological sciences CFSL Chandigarh in physical sciences. CFSL New Delhi comes under the Central Bureau of Investigation, Delhi 12
  • 14. KERALA CYBER FORENSICS LABS The Kerala State Forensic Science laboratory was established in 1961 at the Medical College Building, Thiruvananthapuram Dr. Thangavelu, the then Principal of Medical College, Thiruvananthapuram was the first Honorary Director of the laboratory. At present, the laboratory consists of Headquarters lab situated in Police Head Quarters, Thiruvananthapuram and two fully functional Regional Forensic Science Labs at Thrissur and Kannur. There are Nineteen District Mobile Forensic Labs(DMFL) in all Police Districts. One new Regional FSL at Kochi has been sanctioned and is about to start its functioning. The Headquarters lab at Thiruvananthapuram consists of eleven divisions such as Physics, Ballistics, Biology, Serology, DNA, Documents, Documents- Civil, Cyber, Chemistry, Explosives and Polygraph divisions. RFSLs have four major divisions such as Physics, Chemistry, Biology and Documents. 14
  • 15. EXAMPLES OF DIGITAL EVIDENCE • e-mails • digital photographs, • ATM transaction logs • Finger prints • word processing documents • Instant message histories • files saved from accounting program • spreadsheets • internet browser histories • Databases • The contents of computer memory • computer backups • computer printouts • Global Positioning System tracks, • logs from a hotel’s electronic door locks • digital video or audio files Types of Digital Evidence 15
  • 16. STEPS FOR EVIDENCE PRESENTATION • Format &Authenticity • Hard Copy / Soft Copy • Software used versions • CV of the expert qualifications • Hash results • All storage media details • Report should be in simple terms • Supported by photographs 16
  • 17. RULES OF EVIDENCE • Admissible - Conform to legal rules in court. • Authentic - Possible to prove the evidence genuine. • Complete - Should reflect all aspects of the incident or crime. • Reliable - Clarity about how the evidence was collected and handled. • Believable - Must be readily believable and understandable by the court 17
  • 18. HASHING • Hashing is a mathematical model for authenticating any digital data. • It uses a set of computations to generate a unique code for the input data. • Any minute change in the input data will change the resultant hash value . • .There are standard algorithms like MD5, SHA1 and SHA2 used for this. • Hashing can be done using hardware solutions or software solutions. ** software hashes are not valuable at the court ** 18
  • 19. DEVICES USED IN DIGITAL FORENSICS WRITE BLOCKER Write blockers are devices that allow acquisition of information on a drive without creating the possibility of accidentally damaging the drive contents. They do this by allowing read commands to pass but by blocking write commands. RAID - RAPID ACTION IMAGING DEVICE RAID or Master Device is a complete set Of tools within a box which can carry out by investigation officers in scene of crime. Write Blocker 19
  • 20. DIGITAL FORENSICS SOFTWARE TOOLS Some of the most common digital forensics software tools ; • Disk Forensics tool :- Cyber Check 6.0 - Forensic Data Recovery & Analysis tool • Live Forensics Tool :- Win-LiFT 3.0 – Windows Live Forensics Tool • Network Forensics Tools:- Net Force Suite 3.0 - A comprehensive collection of Network Forensics tools • Device Forensics Tools :- Mobile Check 3.1 - Cell phone Forensics tool Third party Foreign Tools : • FTK • EnCase • Magnet Axiom • Autopsy – Open Source • Cellebrite • Oxygen • XRY 20
  • 21. ADVANTAGES OF DIGITAL FORENSICS • The most important advantage, however, is that it is able to search through a large and massive amount of data. • it has the ability to do this very quickly. • Digital forensics can be used in corporate fraud, breach of contract and asset recovery, theft, and intellectual property disputes. • IT can search in the hard drives in different languages, and this is beneficial since cyber crimes have the ability to cross borders on the internet. • The many valuable data that has been lost and deleted can be achieved sufficiently . • It can then become substantial evidence in court. 21
  • 22. CHALLENGES FACED BY DIGITAL FORENSICS • The increase of PC’s and internet access has made the exchange of information quick and inexpensive. • Easy availability of Hacking Tools. • Lack of physical evidence makes crimes harder to prosecute. • The large amount of storage space available to suspects . • The rapid technological changes requires constant upgrade or changes to solutions . 22
  • 23. IT ACT IN INDIA Section65-Tampering with computer source document section 66-Hacking with computer system section 66-Receiving stolen computer or communication device section 66C-Using password of another person section 66D-Cheating using computer resource section 66E-Publishing private images of others section 66F-Acts of cyber terrorism section 67-Publishing information which is obscene in electronic form. section 67A-Publishing images containing sexual acts section 67B-Publishing child porn or predating children online section 67C-Failure to maintain records section 68-Failure/refusal to comply with orders section 70-Securing access or attempting to secure access to a protected system section 71-Misrepresentation 23
  • 24. FEATURE SCOPE • There is an increasing wide array of tools used to preserve and analyze digital evidence. • The single approach to utilize single evidence such as hard drives will change as there is increasing size of hundreds of Gigabytes and Terabytes to be used. • Huge targets will require more sophisticated analysis techniques and equipment. • There will also be better collaborative functions to allow forensics investigators to perform investigations a lot more efficiently that they do presently. 24
  • 25. SUGGESTIONS TO KEEP YOU SAFE  Update your system software's on continues intervals  Update all your applications  Don’t try to install unknown applications  Don’t even open your unknown links which received by means of social media or by mail or sms .  Don’t share your OTP or any keys with any one. 25
  • 26. TOOLS DEMONSTRATION WITH WINDOWS 10. • HASHING • BROWSE ANALYSIS 26
  • 27. KERALA POLICE CYBERDOME Headed with :- MANOJ ABRAHAM IPS Address :- Cyber dome, Thejaswini Annexe Building, Techno park Campus, Thiruvananthapuram, Kerala -695581. Website :- www.cyberdome.kerala.gov.in E-mail :- cyberdome.pol@kerala.gov.in Facebook page :- https://www.facebook.com/KeralaPoliceCyberdome 27
  • 28. CONCLUSION • Digital forensics is important for solving crimes  with digital devices  against digital devices  against people where evidence may reside in a device • Several sound tools and techniques exist to search and analyze digital data. • Regardless of existing tools, evolving digital age and development of technology requires heavier research in digital forensics. 28
  • 30. END OF THE PRESENTATION THANK YOU ITS YOUR TIME 30