SlideShare a Scribd company logo
How Technology Used
in Computer Forensics
Investigation
Technology and the internet have provided a wide
platform for cyber as well as white collar crimes. Crime
involving the use of computers and technology is rising
in unprecedented proportions. In light of this, the field
of forensic investigation has introduced cutting edge
tools and equipments in order to remain at par with the
criminals. From retinal scanning to tracing evidence on
internet servers, computer forensics has improvised
technology to solve sophisticated crimes involving the
use of modern day resources like computers, laptops,
cell phones and tablets.
While the acquisition of digital
evidence and the process of presenting
it at courts is a complex task carried
out by expert Computer Forensic
Investigators, there are countless
tools available to aid the procedure.
However, among the wide range of
cool technologies available, forensic
experts rely on software and
equipments that are court –incited
platforms and helps them investigate
efficiently and effectively.
Forensic Toolkit (FTK)
FTK or Forensic toolkit is a digital
forensic tool approved by court and
designed for analyzing vast repository of
data with uncontested speed. It is
characterized by stability, ease of use
and speed which makes it reliable as a
source of digital evidence. It efficiently
searches, filters, analyzes, indexes and
points out relevant facts and evidence
pertaining to the case. Owing to the
comprehensive architecture, FTK can be
used for collaborative analysis and web
based case management.
Mobile Phone Examiner
Mobile Phone Examiner Plus is a stand-
alone investigative solution for digital cell
phone forensic analysis. It presents a
unique approach to cell phone data
extraction thus easily zeroing on the key
facts and evidence. Plus, it supports the
analysis of more than 7000 mobile phone
models, including GSM/CDMA devices and
using versatile technologies like
Blackberry, Android, iOS and Windows.
MPE+ has robust tools built into its
architecture thus providing a single
solution for multiple platforms and thus
making the investigation a cost effective
process.
Institute of Computer Forensics and Criminal Investigations
Phone No : 214-384-3246
Email Us : daniel_james@att.net
icfeci2013@gmail.com
Website : www.icfeci.com
Contact Us

More Related Content

What's hot

Digital forensics
Digital forensicsDigital forensics
Digital forensics
dentpress
 
Computer forensic
Computer forensicComputer forensic
Computer forensicbhavithd
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
abdullah roomi
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Roberto Ellis
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
DINESH KAMBLE
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
Anyck Turgeon, CFE/GRCP/CEFI/CCIP/C|CISO/CBA
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
Muzzammil Wani
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Daksh Verma
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1zamayla143
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1ricky098
 
Lect 6 computer forensics
Lect 6 computer forensicsLect 6 computer forensics
Lect 6 computer forensics
Kabul Education University
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
Dr. Prashant Vats
 
Cybercrime
CybercrimeCybercrime
Cybercrime
JazAphrodite
 
Chap 1 general introduction to computer forensics
Chap 1  general introduction to computer forensicsChap 1  general introduction to computer forensics
Chap 1 general introduction to computer forensics
Malobe Lottin Cyrille Marcel
 
computer forensics
computer forensicscomputer forensics
computer forensics
Vaibhav Tapse
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
Malobe Lottin Cyrille Marcel
 
digital forensic examination of mobile phone data
digital forensic examination of mobile phone datadigital forensic examination of mobile phone data
digital forensic examination of mobile phone data
INFOGAIN PUBLICATION
 
Lect 3 Computer Forensics
Lect 3 Computer ForensicsLect 3 Computer Forensics
Lect 3 Computer Forensics
Kabul Education University
 

What's hot (20)

Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1
 
Lect 6 computer forensics
Lect 6 computer forensicsLect 6 computer forensics
Lect 6 computer forensics
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
AA Examples of Case CLE PDU
AA Examples of Case CLE PDUAA Examples of Case CLE PDU
AA Examples of Case CLE PDU
 
Chap 1 general introduction to computer forensics
Chap 1  general introduction to computer forensicsChap 1  general introduction to computer forensics
Chap 1 general introduction to computer forensics
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
 
digital forensic examination of mobile phone data
digital forensic examination of mobile phone datadigital forensic examination of mobile phone data
digital forensic examination of mobile phone data
 
Lect 3 Computer Forensics
Lect 3 Computer ForensicsLect 3 Computer Forensics
Lect 3 Computer Forensics
 

Similar to How technology used in computer forensics investigation

Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
CA.Kolluru Narayanarao
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
Kolluru N Rao
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensics
ijtsrd
 
New research directions in the area of
New research directions in the area ofNew research directions in the area of
New research directions in the area of
IJCNCJournal
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
gamemaker762
 
Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th July
Firoze Hussain
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Sagar Rahurkar
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
Zyxware Technologies
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
AliAshraf68199
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET Journal
 
Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014
Dr. Idris Ahmed
 
Cyber Security 1215
Cyber Security 1215Cyber Security 1215
Cyber Security 1215
Firoze Hussain
 
Cybersecurity Presentation by Tecomex Forensics Ltd
Cybersecurity Presentation by Tecomex Forensics LtdCybersecurity Presentation by Tecomex Forensics Ltd
Cybersecurity Presentation by Tecomex Forensics Ltd
Dr. Idris Ahmed
 
Review on effectiveness of deep learning approach in digital forensics
Review on effectiveness of deep learning approach in digital  forensicsReview on effectiveness of deep learning approach in digital  forensics
Review on effectiveness of deep learning approach in digital forensics
IJECEIAES
 
J017555559
J017555559J017555559
J017555559
IOSR Journals
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensics
i4box Anon
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
vishnuv43
 
Uncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsUncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic tools
Paraben Corporation
 
The Cyber Forensic Specialist's Toolkit: Strategies for Solving Digital Crime...
The Cyber Forensic Specialist's Toolkit: Strategies for Solving Digital Crime...The Cyber Forensic Specialist's Toolkit: Strategies for Solving Digital Crime...
The Cyber Forensic Specialist's Toolkit: Strategies for Solving Digital Crime...
Milind Agarwal
 

Similar to How technology used in computer forensics investigation (20)

Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensics
 
New research directions in the area of
New research directions in the area ofNew research directions in the area of
New research directions in the area of
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th July
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various Tools
 
Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014
 
AD-MPEX-BRO-09Dec2014
AD-MPEX-BRO-09Dec2014AD-MPEX-BRO-09Dec2014
AD-MPEX-BRO-09Dec2014
 
Cyber Security 1215
Cyber Security 1215Cyber Security 1215
Cyber Security 1215
 
Cybersecurity Presentation by Tecomex Forensics Ltd
Cybersecurity Presentation by Tecomex Forensics LtdCybersecurity Presentation by Tecomex Forensics Ltd
Cybersecurity Presentation by Tecomex Forensics Ltd
 
Review on effectiveness of deep learning approach in digital forensics
Review on effectiveness of deep learning approach in digital  forensicsReview on effectiveness of deep learning approach in digital  forensics
Review on effectiveness of deep learning approach in digital forensics
 
J017555559
J017555559J017555559
J017555559
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensics
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Uncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsUncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic tools
 
The Cyber Forensic Specialist's Toolkit: Strategies for Solving Digital Crime...
The Cyber Forensic Specialist's Toolkit: Strategies for Solving Digital Crime...The Cyber Forensic Specialist's Toolkit: Strategies for Solving Digital Crime...
The Cyber Forensic Specialist's Toolkit: Strategies for Solving Digital Crime...
 

More from ICFECI

5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic Science5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic Science
ICFECI
 
Get an Advance Cell Phone Forensic Services
Get an Advance Cell Phone Forensic ServicesGet an Advance Cell Phone Forensic Services
Get an Advance Cell Phone Forensic Services
ICFECI
 
Know The Modern Technique Used In Criminal Investigations
Know The Modern Technique Used In Criminal InvestigationsKnow The Modern Technique Used In Criminal Investigations
Know The Modern Technique Used In Criminal Investigations
ICFECI
 
KNOW WHY DO PEOPLE COMMIT CRIMES?
KNOW WHY DO PEOPLE COMMIT CRIMES?KNOW WHY DO PEOPLE COMMIT CRIMES?
KNOW WHY DO PEOPLE COMMIT CRIMES?
ICFECI
 
Cyber Forensic Services at Western Center Blvd
Cyber Forensic Services at Western Center BlvdCyber Forensic Services at Western Center Blvd
Cyber Forensic Services at Western Center Blvd
ICFECI
 
The digital forensic examinations and criminal investigations
The digital forensic examinations and criminal investigationsThe digital forensic examinations and criminal investigations
The digital forensic examinations and criminal investigations
ICFECI
 
Your mobile phone can save you from a conviction know everything from a cell...
Your mobile phone can save you from a conviction know everything from a  cell...Your mobile phone can save you from a conviction know everything from a  cell...
Your mobile phone can save you from a conviction know everything from a cell...
ICFECI
 
Your mobile phone can save you from a conviction know everything from a cell...
Your mobile phone can save you from a conviction know everything from a  cell...Your mobile phone can save you from a conviction know everything from a  cell...
Your mobile phone can save you from a conviction know everything from a cell...
ICFECI
 
Stay away from health care fraud investigation
Stay away from health care fraud investigationStay away from health care fraud investigation
Stay away from health care fraud investigation
ICFECI
 
PRIVATE INVESTIGATOR - THEN THEY CAME FOR ME
PRIVATE INVESTIGATOR - THEN THEY CAME FOR MEPRIVATE INVESTIGATOR - THEN THEY CAME FOR ME
PRIVATE INVESTIGATOR - THEN THEY CAME FOR ME
ICFECI
 
Dallas private investigator
Dallas private investigatorDallas private investigator
Dallas private investigator
ICFECI
 
Certified digital forensic services dallas icfeci
Certified digital forensic services dallas   icfeciCertified digital forensic services dallas   icfeci
Certified digital forensic services dallas icfeci
ICFECI
 
Icfeci infographic
Icfeci infographicIcfeci infographic
Icfeci infographic
ICFECI
 
Computer forensic investigation
Computer forensic investigationComputer forensic investigation
Computer forensic investigation
ICFECI
 

More from ICFECI (14)

5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic Science5 Key Steps Involved In Digital Forensic Science
5 Key Steps Involved In Digital Forensic Science
 
Get an Advance Cell Phone Forensic Services
Get an Advance Cell Phone Forensic ServicesGet an Advance Cell Phone Forensic Services
Get an Advance Cell Phone Forensic Services
 
Know The Modern Technique Used In Criminal Investigations
Know The Modern Technique Used In Criminal InvestigationsKnow The Modern Technique Used In Criminal Investigations
Know The Modern Technique Used In Criminal Investigations
 
KNOW WHY DO PEOPLE COMMIT CRIMES?
KNOW WHY DO PEOPLE COMMIT CRIMES?KNOW WHY DO PEOPLE COMMIT CRIMES?
KNOW WHY DO PEOPLE COMMIT CRIMES?
 
Cyber Forensic Services at Western Center Blvd
Cyber Forensic Services at Western Center BlvdCyber Forensic Services at Western Center Blvd
Cyber Forensic Services at Western Center Blvd
 
The digital forensic examinations and criminal investigations
The digital forensic examinations and criminal investigationsThe digital forensic examinations and criminal investigations
The digital forensic examinations and criminal investigations
 
Your mobile phone can save you from a conviction know everything from a cell...
Your mobile phone can save you from a conviction know everything from a  cell...Your mobile phone can save you from a conviction know everything from a  cell...
Your mobile phone can save you from a conviction know everything from a cell...
 
Your mobile phone can save you from a conviction know everything from a cell...
Your mobile phone can save you from a conviction know everything from a  cell...Your mobile phone can save you from a conviction know everything from a  cell...
Your mobile phone can save you from a conviction know everything from a cell...
 
Stay away from health care fraud investigation
Stay away from health care fraud investigationStay away from health care fraud investigation
Stay away from health care fraud investigation
 
PRIVATE INVESTIGATOR - THEN THEY CAME FOR ME
PRIVATE INVESTIGATOR - THEN THEY CAME FOR MEPRIVATE INVESTIGATOR - THEN THEY CAME FOR ME
PRIVATE INVESTIGATOR - THEN THEY CAME FOR ME
 
Dallas private investigator
Dallas private investigatorDallas private investigator
Dallas private investigator
 
Certified digital forensic services dallas icfeci
Certified digital forensic services dallas   icfeciCertified digital forensic services dallas   icfeci
Certified digital forensic services dallas icfeci
 
Icfeci infographic
Icfeci infographicIcfeci infographic
Icfeci infographic
 
Computer forensic investigation
Computer forensic investigationComputer forensic investigation
Computer forensic investigation
 

Recently uploaded

Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Syed Muhammad Humza Hussain
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
BridgeWest.eu
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
azizurrahaman17
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
akbarrasyid3
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
PelayoGilbert
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
Finlaw Consultancy Pvt Ltd
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
9ib5wiwt
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 

Recently uploaded (20)

Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 

How technology used in computer forensics investigation

  • 1. How Technology Used in Computer Forensics Investigation
  • 2. Technology and the internet have provided a wide platform for cyber as well as white collar crimes. Crime involving the use of computers and technology is rising in unprecedented proportions. In light of this, the field of forensic investigation has introduced cutting edge tools and equipments in order to remain at par with the criminals. From retinal scanning to tracing evidence on internet servers, computer forensics has improvised technology to solve sophisticated crimes involving the use of modern day resources like computers, laptops, cell phones and tablets.
  • 3. While the acquisition of digital evidence and the process of presenting it at courts is a complex task carried out by expert Computer Forensic Investigators, there are countless tools available to aid the procedure. However, among the wide range of cool technologies available, forensic experts rely on software and equipments that are court –incited platforms and helps them investigate efficiently and effectively.
  • 4. Forensic Toolkit (FTK) FTK or Forensic toolkit is a digital forensic tool approved by court and designed for analyzing vast repository of data with uncontested speed. It is characterized by stability, ease of use and speed which makes it reliable as a source of digital evidence. It efficiently searches, filters, analyzes, indexes and points out relevant facts and evidence pertaining to the case. Owing to the comprehensive architecture, FTK can be used for collaborative analysis and web based case management.
  • 5. Mobile Phone Examiner Mobile Phone Examiner Plus is a stand- alone investigative solution for digital cell phone forensic analysis. It presents a unique approach to cell phone data extraction thus easily zeroing on the key facts and evidence. Plus, it supports the analysis of more than 7000 mobile phone models, including GSM/CDMA devices and using versatile technologies like Blackberry, Android, iOS and Windows. MPE+ has robust tools built into its architecture thus providing a single solution for multiple platforms and thus making the investigation a cost effective process.
  • 6. Institute of Computer Forensics and Criminal Investigations Phone No : 214-384-3246 Email Us : daniel_james@att.net icfeci2013@gmail.com Website : www.icfeci.com Contact Us