SlideShare a Scribd company logo
1 of 12
Introduction to Computer
Forensics
Computer Crime
 Computer crime is any criminal offense, activity or
issue that involves computers
(http://www.forensics.nl).
 Computer misuse tends to fall into two categories [1]:
 Computer is used to commit a crime
 Computer itself is a target of a crime. Computer is
the victim. Computer Security Incident.
 Computer Incident Response.
Computer is Used to
Commit a Crime
 Computer is used in illegal activities: property,
embezzlement – all these crimes leave digital
tracks [1, 2].
 Investigation into these types of crimes include
searching computers that are suspected of being
involved in illegal activities
 Analysis of gigabytes of data looking for specific
keywords, examining log files to see what
happened at certain times
Computer Security Incident [2]
 Unauthorized or unlawful intrusions into
computing systems
 Scanning a system - the systematic probing of
ports to see which ones are open [3]
 Denial–of–Service (DoS) attack - any attack
designed to disrupt the ability of authorized users to
access data [2, 3].
 Malicious Code – any program or procedure that
makes unauthorized modifications or triggers
unauthorized actions (virus, worm, Trojan horse)
[3]
Computer Forensics
 Computer Forensic Analysis
 Electronic Discovery
 Electronic Evidence Discovery
 Digital Discovery
 Data Recovery
 Data Discovery
 Computer Analysis
 Computer Examination
Definitions
 Computer Forensics involves the preservation,
identification, extraction, documentation and
interpretation of computer data [1]
 Computer Forensics is the application of science and
engineering to the legal problem of digital evidence. It is a
synthesis of science and law. [Mark Pollitt, 5, 6]
 Computer forensics, still a rather new discipline in
computer security, focuses on finding digital evidence
after a computer security incident has occurred
(http://www.forensics.nl)
Definitions
 Computer Forensics is the process of methodologically
examining computer media (hard discs, diskettes, tapes,
etc.) for evidence. [4]
 Computer Evidence is often transparently created by the
operating system (OS) without the knowledge of the
computer user. The information may be hidden from
view. To find it, special forensic software tools and
techniques are required. [4]
 Computer forensics is about evidence from computers
that is sufficiently reliable to stand up in court and be
convincing [4]
Methodology
 Treat every case as if it will end up in the court [1]
 Forensics Methodology [1]:
 Acquire the evidence without altering or damaging
the origin
 Authenticate that your recovered evidence is the
same as the originally seized data
 Analyze the data without modifying it
 There are essentially three phases for recovering evidence
from a computer system or storage medium. Those phases
are: (1) acquire, (2) analyze, and (3) report
(http://www.forensics.nl).
The Goal
The goal of computer forensics
is to do a structured
investigation and find out
exactly what happened on a
digital system, and who was
responsible for it.
(http://www.forensics.nl)
The Goals of Incident Response [2]
 Accumulation of accurate information
 Establishment of control for proper retrieval and handling of
evidence
 Protection of privacy rights established by law and policy
 Minimization of disruption to business and network operations
 Preparation of accurate reports and useful recommendations
 Minimization of exposure and compromise of proprietary data
 Protection of organization reputation and assets
 Education of senior management
 Promotion of rapid detection/or prevention of such incidents in
the future (via lessons learned, policy changes, etc)
Course Curriculum
 Introduction to Criminal Justice
 Computer Ethics
 Computer Organization
 Binary System
 Encryption and Computer Forensics
 Steganography: Data Hiding
 Introduction to Computer Security: Handling Security
Incidents, Malicious Code
 Computer Forensics Evidence and Analysis
 More….
References
[1] Computer Forensics, Incident Response Essentials, Warren
G. Kruse II, Jay G. Heiser, Addison-Wesley
[2] Incident Responce and Computer Forensics, Kevin Mandia,
Chris Prosise, Matt Pepe, McGraw-Hill
[3] Information Security Illuminated, Michael G. Solomon, Mike
Chapple, Jones and Bartlett Publishers, Inc
[4] Computer Forensics, Computer Crime Scene Investigation,
John R. Vacca, Charles River Media Inc
[5] Forensic Computing, A Practitioner's Guide, Tony Sammes
and Brian Jenkinson, Springer.
[6] Mark Pollitt, Computer Forensics: An Approach to Evidence
in Cyberspace,
http://www.digitalevidencepro.com/Resources/Approach.pdf

More Related Content

Similar to Introduction to Computer Forensics for all streams.

A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
BRNSSPublicationHubI
 

Similar to Introduction to Computer Forensics for all streams. (20)

A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Forensics
ForensicsForensics
Forensics
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer Forensic
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
 
I0516064
I0516064I0516064
I0516064
 
180 184
180 184180 184
180 184
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
 
Computer Forensics.pptx
Computer Forensics.pptxComputer Forensics.pptx
Computer Forensics.pptx
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptx
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Post-Genesis Digital Forensics Investigation
Post-Genesis Digital Forensics InvestigationPost-Genesis Digital Forensics Investigation
Post-Genesis Digital Forensics Investigation
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
Cyber Forensics|Digital Forensics|Cyber Crime-2023
Cyber Forensics|Digital Forensics|Cyber Crime-2023Cyber Forensics|Digital Forensics|Cyber Crime-2023
Cyber Forensics|Digital Forensics|Cyber Crime-2023
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 

More from MayuraD1

SDP_May2023:student developement program
SDP_May2023:student developement programSDP_May2023:student developement program
SDP_May2023:student developement program
MayuraD1
 
cyber_security_brochure details of workshop
cyber_security_brochure details of workshopcyber_security_brochure details of workshop
cyber_security_brochure details of workshop
MayuraD1
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Machine learning Module-2, 6th Semester Elective
Machine learning Module-2, 6th Semester ElectiveMachine learning Module-2, 6th Semester Elective
Machine learning Module-2, 6th Semester Elective
MayuraD1
 
Introduction to Machine Learning Elective Course
Introduction to Machine Learning Elective CourseIntroduction to Machine Learning Elective Course
Introduction to Machine Learning Elective Course
MayuraD1
 
Cloud computing_Applications and paradigams.pptx
Cloud computing_Applications and paradigams.pptxCloud computing_Applications and paradigams.pptx
Cloud computing_Applications and paradigams.pptx
MayuraD1
 
Introduction about research methodology explained in simple language.
Introduction about research methodology explained in simple language.Introduction about research methodology explained in simple language.
Introduction about research methodology explained in simple language.
MayuraD1
 

More from MayuraD1 (13)

SDP_May2023:student developement program
SDP_May2023:student developement programSDP_May2023:student developement program
SDP_May2023:student developement program
 
cyber_security_brochure details of workshop
cyber_security_brochure details of workshopcyber_security_brochure details of workshop
cyber_security_brochure details of workshop
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Machine learning Module-2, 6th Semester Elective
Machine learning Module-2, 6th Semester ElectiveMachine learning Module-2, 6th Semester Elective
Machine learning Module-2, 6th Semester Elective
 
Introduction to Machine Learning Elective Course
Introduction to Machine Learning Elective CourseIntroduction to Machine Learning Elective Course
Introduction to Machine Learning Elective Course
 
Module1 of Introduction to Machine Learning
Module1 of Introduction to Machine LearningModule1 of Introduction to Machine Learning
Module1 of Introduction to Machine Learning
 
Research Methodology Module 1 useful for any course work
Research Methodology Module 1 useful for any course workResearch Methodology Module 1 useful for any course work
Research Methodology Module 1 useful for any course work
 
Cloud computing_Applications and paradigams.pptx
Cloud computing_Applications and paradigams.pptxCloud computing_Applications and paradigams.pptx
Cloud computing_Applications and paradigams.pptx
 
Cloud computing_Applications and paradigams.pptx
Cloud computing_Applications and paradigams.pptxCloud computing_Applications and paradigams.pptx
Cloud computing_Applications and paradigams.pptx
 
Introduction about research methodology explained in simple language.
Introduction about research methodology explained in simple language.Introduction about research methodology explained in simple language.
Introduction about research methodology explained in simple language.
 
Cloud Computing Introduction. Engineering seventh Semester
Cloud Computing Introduction. Engineering seventh SemesterCloud Computing Introduction. Engineering seventh Semester
Cloud Computing Introduction. Engineering seventh Semester
 
M2.pptx
M2.pptxM2.pptx
M2.pptx
 
M5.pptx
M5.pptxM5.pptx
M5.pptx
 

Recently uploaded

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 

Introduction to Computer Forensics for all streams.

  • 2. Computer Crime  Computer crime is any criminal offense, activity or issue that involves computers (http://www.forensics.nl).  Computer misuse tends to fall into two categories [1]:  Computer is used to commit a crime  Computer itself is a target of a crime. Computer is the victim. Computer Security Incident.  Computer Incident Response.
  • 3. Computer is Used to Commit a Crime  Computer is used in illegal activities: property, embezzlement – all these crimes leave digital tracks [1, 2].  Investigation into these types of crimes include searching computers that are suspected of being involved in illegal activities  Analysis of gigabytes of data looking for specific keywords, examining log files to see what happened at certain times
  • 4. Computer Security Incident [2]  Unauthorized or unlawful intrusions into computing systems  Scanning a system - the systematic probing of ports to see which ones are open [3]  Denial–of–Service (DoS) attack - any attack designed to disrupt the ability of authorized users to access data [2, 3].  Malicious Code – any program or procedure that makes unauthorized modifications or triggers unauthorized actions (virus, worm, Trojan horse) [3]
  • 5. Computer Forensics  Computer Forensic Analysis  Electronic Discovery  Electronic Evidence Discovery  Digital Discovery  Data Recovery  Data Discovery  Computer Analysis  Computer Examination
  • 6. Definitions  Computer Forensics involves the preservation, identification, extraction, documentation and interpretation of computer data [1]  Computer Forensics is the application of science and engineering to the legal problem of digital evidence. It is a synthesis of science and law. [Mark Pollitt, 5, 6]  Computer forensics, still a rather new discipline in computer security, focuses on finding digital evidence after a computer security incident has occurred (http://www.forensics.nl)
  • 7. Definitions  Computer Forensics is the process of methodologically examining computer media (hard discs, diskettes, tapes, etc.) for evidence. [4]  Computer Evidence is often transparently created by the operating system (OS) without the knowledge of the computer user. The information may be hidden from view. To find it, special forensic software tools and techniques are required. [4]  Computer forensics is about evidence from computers that is sufficiently reliable to stand up in court and be convincing [4]
  • 8. Methodology  Treat every case as if it will end up in the court [1]  Forensics Methodology [1]:  Acquire the evidence without altering or damaging the origin  Authenticate that your recovered evidence is the same as the originally seized data  Analyze the data without modifying it  There are essentially three phases for recovering evidence from a computer system or storage medium. Those phases are: (1) acquire, (2) analyze, and (3) report (http://www.forensics.nl).
  • 9. The Goal The goal of computer forensics is to do a structured investigation and find out exactly what happened on a digital system, and who was responsible for it. (http://www.forensics.nl)
  • 10. The Goals of Incident Response [2]  Accumulation of accurate information  Establishment of control for proper retrieval and handling of evidence  Protection of privacy rights established by law and policy  Minimization of disruption to business and network operations  Preparation of accurate reports and useful recommendations  Minimization of exposure and compromise of proprietary data  Protection of organization reputation and assets  Education of senior management  Promotion of rapid detection/or prevention of such incidents in the future (via lessons learned, policy changes, etc)
  • 11. Course Curriculum  Introduction to Criminal Justice  Computer Ethics  Computer Organization  Binary System  Encryption and Computer Forensics  Steganography: Data Hiding  Introduction to Computer Security: Handling Security Incidents, Malicious Code  Computer Forensics Evidence and Analysis  More….
  • 12. References [1] Computer Forensics, Incident Response Essentials, Warren G. Kruse II, Jay G. Heiser, Addison-Wesley [2] Incident Responce and Computer Forensics, Kevin Mandia, Chris Prosise, Matt Pepe, McGraw-Hill [3] Information Security Illuminated, Michael G. Solomon, Mike Chapple, Jones and Bartlett Publishers, Inc [4] Computer Forensics, Computer Crime Scene Investigation, John R. Vacca, Charles River Media Inc [5] Forensic Computing, A Practitioner's Guide, Tony Sammes and Brian Jenkinson, Springer. [6] Mark Pollitt, Computer Forensics: An Approach to Evidence in Cyberspace, http://www.digitalevidencepro.com/Resources/Approach.pdf