Digital forensic is defined as the process of preserving, identifying, extracting, and documenting computer evidence for use in a court of law. It involves identifying evidence stored on devices, preserving the data without alteration, analyzing the evidence using forensic tools, and documenting the findings. The key steps of the digital forensic process are identification, preservation, analysis, documentation, and presentation. Common types of digital forensics include disk, network, wireless, database, malware, email, memory, and mobile device forensics. Forensic tools used in the process include those for forensic imaging to make bit-by-bit copies of storage devices and data recovery tools to extract data from damaged sources.
Digital Forensics is the use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation, and presentation of digital evidence derived from digital devices.
Cyber crime is an activity done using computers and internet.
Cyber forensics is the science of collecting, examining, analyzing and reporting electronic evidence.
Computer forensics is a very important branch of computer science in relation to computer and Internet related crimes. Earlier, computers were only used to produce data but now it has expanded to all devices related to digital data. The goal of Computer forensics is to perform crime investigations by using evidence from digital data to find who was the responsible for that particular crime.
For better research and investigation, developers have created many computer forensics tools. Police departments and investigation agencies select the tools based on various factors including budget and available experts on the team.
What is digital evidence? , sources of digital evidence, types of digital evidence, the procedure for collecting digital evidence, records, digital vs physical evidence, controlling contamination.
Digital Forensics is the use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation, and presentation of digital evidence derived from digital devices.
Cyber crime is an activity done using computers and internet.
Cyber forensics is the science of collecting, examining, analyzing and reporting electronic evidence.
Computer forensics is a very important branch of computer science in relation to computer and Internet related crimes. Earlier, computers were only used to produce data but now it has expanded to all devices related to digital data. The goal of Computer forensics is to perform crime investigations by using evidence from digital data to find who was the responsible for that particular crime.
For better research and investigation, developers have created many computer forensics tools. Police departments and investigation agencies select the tools based on various factors including budget and available experts on the team.
What is digital evidence? , sources of digital evidence, types of digital evidence, the procedure for collecting digital evidence, records, digital vs physical evidence, controlling contamination.
Forensic science is a scientific method of gathering and examining information about the past which is then used in the court of law. Digital Forensics is the use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation, and presentation of digital evidence derived from digital devices for the purpose of facilitation or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations.
Search & Seizure of Electronic Evidence by Pelorus Technologiesurjarathi
Pelorus shares a presentation on search & seizure of electronic evidence Digital evidence is any digital information which is received from computers, audio files, video recordings, digital images etc. The evidence obtained is essential in computer and cyber crimes. For more information on search & seizure of electronic evidence visit our website.
Mobile forensics is a branch of digital forensics. Simply, it is a science of recovering different kinds of evidence from mobile phones. It helps investigators significantly to reach to the criminal.
The development of intelligent network forensic tools to focus on specific type of network traffic analysis is a challenge in terms of future perspective.
This will reduce time delays, less computational resources requirement; minimize attacks, providing reliable and secured evidences, and efficient investigation with minimum efforts
Forensic science is a scientific method of gathering and examining information about the past which is then used in the court of law. Digital Forensics is the use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation, and presentation of digital evidence derived from digital devices for the purpose of facilitation or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations.
Search & Seizure of Electronic Evidence by Pelorus Technologiesurjarathi
Pelorus shares a presentation on search & seizure of electronic evidence Digital evidence is any digital information which is received from computers, audio files, video recordings, digital images etc. The evidence obtained is essential in computer and cyber crimes. For more information on search & seizure of electronic evidence visit our website.
Mobile forensics is a branch of digital forensics. Simply, it is a science of recovering different kinds of evidence from mobile phones. It helps investigators significantly to reach to the criminal.
The development of intelligent network forensic tools to focus on specific type of network traffic analysis is a challenge in terms of future perspective.
This will reduce time delays, less computational resources requirement; minimize attacks, providing reliable and secured evidences, and efficient investigation with minimum efforts
Systematic Digital Forensic Investigation ModelCSCJournals
Law practitioners are in a uninterrupted battle with criminals in the application of digital/computer technologies, and require the development of a proper methodology to systematically search digital devices for significant evidence. Computer fraud and digital crimes are growing day by day and unfortunately less than two percent of the reported cases result in confidence. This paper explores the development of the digital forensics process model, compares digital forensic methodologies, and finally proposes a systematic model of the digital forensic procedure. This model attempts to address some of the shortcomings of previous methodologies, and provides the following advantages: a consistent, standardized and systematic framework for digital forensic investigation process; a framework which work systematically in team according the captured evidence; a mechanism for applying the framework to according the country digital forensic investigation technologies; a generalized methodology that judicial members can use to relate technology to non-technical observers. This paper present a brief overview of previous forensic models and propose a new model inspired from the DRFWS Digital Investigation Model, and finally compares it with other previous model to show relevant of this model. The proposed model in this paper explores the different processes involved in the investigation of cyber crime and cyber fraud in the form of an eleven-stage model. The Systematic digital forensic investigation model (SDFIM) has been developed with the aim of helping forensic practitioners and organizations for setting up appropriate policies and procedures in a systematic manner.
Automated Live Forensics Analysis for Volatile Data AcquisitionIJERA Editor
The increase in sophisticated attack on computers needs the assistance of Live forensics to uncover the evidence
since traditional forensics methods doesn’t collect volatile data. The volatile data can ease the difficulty towards
investigation in fact it can provide investigator with rich information towards solving a case. Here we are trying
to eliminate the complexity involved in normal process by automating the process of acquisition and analyzing
at the same time providing integrity towards evidence data through python scripting.
Digital Forensics is a technique used to search for evidence of events that have occurred. This quest aims to reveal the hidden truth. The existence of digital forensic activities due to the occurrence of crimes both in the field of computers or other. Legal treatment in digital forensic field makes this area of science a compulsory device to dismantle crimes involving the computer world. In general, the cyber crime leaves a digital footprint, so it is necessary for a computer forensics expert to secure digital evidence. Computer forensics necessarily requires a standard operational procedure in taking digital evidence so as not to be contaminated or modified when the data is analyzed. The application of digital forensic is beneficial to the legal process going well and correctly.
Incident Response Methodology is one of the popular process to investigate the incident which is unlawful, unauthorized or unacceptable action on computer system or computer network.
Slide 1: Title Slide
Extrachromosomal Inheritance
Slide 2: Introduction to Extrachromosomal Inheritance
Definition: Extrachromosomal inheritance refers to the transmission of genetic material that is not found within the nucleus.
Key Components: Involves genes located in mitochondria, chloroplasts, and plasmids.
Slide 3: Mitochondrial Inheritance
Mitochondria: Organelles responsible for energy production.
Mitochondrial DNA (mtDNA): Circular DNA molecule found in mitochondria.
Inheritance Pattern: Maternally inherited, meaning it is passed from mothers to all their offspring.
Diseases: Examples include Leber’s hereditary optic neuropathy (LHON) and mitochondrial myopathy.
Slide 4: Chloroplast Inheritance
Chloroplasts: Organelles responsible for photosynthesis in plants.
Chloroplast DNA (cpDNA): Circular DNA molecule found in chloroplasts.
Inheritance Pattern: Often maternally inherited in most plants, but can vary in some species.
Examples: Variegation in plants, where leaf color patterns are determined by chloroplast DNA.
Slide 5: Plasmid Inheritance
Plasmids: Small, circular DNA molecules found in bacteria and some eukaryotes.
Features: Can carry antibiotic resistance genes and can be transferred between cells through processes like conjugation.
Significance: Important in biotechnology for gene cloning and genetic engineering.
Slide 6: Mechanisms of Extrachromosomal Inheritance
Non-Mendelian Patterns: Do not follow Mendel’s laws of inheritance.
Cytoplasmic Segregation: During cell division, organelles like mitochondria and chloroplasts are randomly distributed to daughter cells.
Heteroplasmy: Presence of more than one type of organellar genome within a cell, leading to variation in expression.
Slide 7: Examples of Extrachromosomal Inheritance
Four O’clock Plant (Mirabilis jalapa): Shows variegated leaves due to different cpDNA in leaf cells.
Petite Mutants in Yeast: Result from mutations in mitochondrial DNA affecting respiration.
Slide 8: Importance of Extrachromosomal Inheritance
Evolution: Provides insight into the evolution of eukaryotic cells.
Medicine: Understanding mitochondrial inheritance helps in diagnosing and treating mitochondrial diseases.
Agriculture: Chloroplast inheritance can be used in plant breeding and genetic modification.
Slide 9: Recent Research and Advances
Gene Editing: Techniques like CRISPR-Cas9 are being used to edit mitochondrial and chloroplast DNA.
Therapies: Development of mitochondrial replacement therapy (MRT) for preventing mitochondrial diseases.
Slide 10: Conclusion
Summary: Extrachromosomal inheritance involves the transmission of genetic material outside the nucleus and plays a crucial role in genetics, medicine, and biotechnology.
Future Directions: Continued research and technological advancements hold promise for new treatments and applications.
Slide 11: Questions and Discussion
Invite Audience: Open the floor for any questions or further discussion on the topic.
Seminar of U.V. Spectroscopy by SAMIR PANDASAMIR PANDA
Spectroscopy is a branch of science dealing the study of interaction of electromagnetic radiation with matter.
Ultraviolet-visible spectroscopy refers to absorption spectroscopy or reflect spectroscopy in the UV-VIS spectral region.
Ultraviolet-visible spectroscopy is an analytical method that can measure the amount of light received by the analyte.
Richard's entangled aventures in wonderlandRichard Gill
Since the loophole-free Bell experiments of 2020 and the Nobel prizes in physics of 2022, critics of Bell's work have retreated to the fortress of super-determinism. Now, super-determinism is a derogatory word - it just means "determinism". Palmer, Hance and Hossenfelder argue that quantum mechanics and determinism are not incompatible, using a sophisticated mathematical construction based on a subtle thinning of allowed states and measurements in quantum mechanics, such that what is left appears to make Bell's argument fail, without altering the empirical predictions of quantum mechanics. I think however that it is a smoke screen, and the slogan "lost in math" comes to my mind. I will discuss some other recent disproofs of Bell's theorem using the language of causality based on causal graphs. Causal thinking is also central to law and justice. I will mention surprising connections to my work on serial killer nurse cases, in particular the Dutch case of Lucia de Berk and the current UK case of Lucy Letby.
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...Sérgio Sacani
Since volcanic activity was first discovered on Io from Voyager images in 1979, changes
on Io’s surface have been monitored from both spacecraft and ground-based telescopes.
Here, we present the highest spatial resolution images of Io ever obtained from a groundbased telescope. These images, acquired by the SHARK-VIS instrument on the Large
Binocular Telescope, show evidence of a major resurfacing event on Io’s trailing hemisphere. When compared to the most recent spacecraft images, the SHARK-VIS images
show that a plume deposit from a powerful eruption at Pillan Patera has covered part
of the long-lived Pele plume deposit. Although this type of resurfacing event may be common on Io, few have been detected due to the rarity of spacecraft visits and the previously low spatial resolution available from Earth-based telescopes. The SHARK-VIS instrument ushers in a new era of high resolution imaging of Io’s surface using adaptive
optics at visible wavelengths.
2. INTRODUCTION TO COMPUTER FORENSIC
• Digital Forensics is defined as the process of
preservation, identification, extraction, and
documentation of computer evidence which can be
used by the court of law.
• It is a science of finding evidence from digital media
like a computer, mobile phone, server, or network.
• Digital Forensics helps the forensic team to analyzes,
inspect, identifies, and preserve the digital evidence
residing on various types of electronic devices.
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
3. PROCESS OF COMPUTER FORENSIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
4. • Identification
• It is the first step in the computer forensic process. The identification process
mainly includes things like what evidence is present, where it is stored, and
lastly, how it is stored (in which format).
• Electronic storage media can be personal computers, Mobile phones, PDAs,
etc.
PROCESS OF COMPUTER FORENSIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
5. • Preservation
• In this phase, data is isolated, secured, and preserved. It includes preventing
people from using the digital device so that digital evidence is not tampered
with.
PROCESS OF COMPUTER FORENSIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
6. • Analysis
• In this step, investigation agents reconstruct
fragments of data and draw conclusions based
on evidence found.
• Various tools and techniques used by digital
forensic investigator for the purpose of
extraction of truth.
PROCESS OF COMPUTER FORENSIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
7. ANALYSIS OF DIGITAL EVIDENCE
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
8. • Documentation
• In this process, a record of all the visible data must be created. It helps in
recreating the crime scene and reviewing it. It Involves proper documentation
of the crime scene along with photographing, sketching, and crime-scene
mapping.
PROCESS OF COMPUTER FORENSIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
9. • Presentation
• In this last step, the process of
summarization and explanation of
conclusions is done.
• Presentation should be in easy to
understand manner and with proper
reference.
PROCESS OF COMPUTER FORENSIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
10. • Disk Forensics:
• It deals with extracting data from storage media by searching active, modified,
or deleted files.
• Network Forensics:
• It is a sub-branch of digital forensics. It is related to monitoring and analysis of
computer network traffic to collect important information and legal evidence.
TYPES OF DIGITAL FORENSIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
11. • Wireless Forensics:
• It is a division of network forensics. The
main aim of wireless forensics is to
offers the tools need to collect and
analyze the data from wireless network
traffic.
• Database Forensics:
• It is a branch of digital forensics relating
to the study and examination of
databases and their related metadata.
TYPES OF DIGITAL FORENSIC (Conti..)
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
12. TYPES OF DIGITAL FORENSIC (Conti..)
• Malware Forensics:
• This branch deals with the identification
of malicious code, to study their payload,
viruses, worms, etc.
• Email Forensics
• Deals with recovery and analysis of
emails, including deleted emails,
calendars, and contacts.
13. TYPES OF DIGITAL FORENSIC (Conti..)
• Memory Forensics:
• It deals with collecting data from
system memory (system
registers, cache, RAM) in raw
form and then carving the data
from Raw dump.
• Mobile Phone Forensics:
• It mainly deals with the
examination and analysis of
mobile devices. It helps to
retrieve phone and SIM contacts,
call logs, incoming, and outgoing
SMS/MMS, Audio, videos, etc.
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
14. TOOLS USED IN COMPUTER FORENIC
• Forensic Imaging
A forensic image
(forensic copy) is a bit-by-bit,
sector-by-sector direct copy of a
physical storage device,
including all files, folders and
unallocated, free and slack
space.
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
15. • Forensic Imaging Tools
TOOLS USED IN COMPUTER FORENIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
16. • Recovery Forensics
Forensic data recovery is the
extraction of data from damaged
evidence sources in a forensically
sound manner.
It can be done with the help of tools
such as Recuva, Disk Drill, etc.
TOOLS USED IN COMPUTER FORENIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
17. • Recovery Forensic Tools
TOOLS USED IN COMPUTER FORENIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
18. THANK YOU !!!
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in