SlideShare a Scribd company logo
DIGITAL FORENSIC
&
IT'S PROCEDURE
Presented By;
Bhupeshkumar Nanhe
Assist. Professor,
Dept. of Forensic Science
SoS, JECRC University, Jaipur (RJ), India
INTRODUCTION TO COMPUTER FORENSIC
• Digital Forensics is defined as the process of
preservation, identification, extraction, and
documentation of computer evidence which can be
used by the court of law.
• It is a science of finding evidence from digital media
like a computer, mobile phone, server, or network.
• Digital Forensics helps the forensic team to analyzes,
inspect, identifies, and preserve the digital evidence
residing on various types of electronic devices.
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
PROCESS OF COMPUTER FORENSIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
• Identification
• It is the first step in the computer forensic process. The identification process
mainly includes things like what evidence is present, where it is stored, and
lastly, how it is stored (in which format).
• Electronic storage media can be personal computers, Mobile phones, PDAs,
etc.
PROCESS OF COMPUTER FORENSIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
• Preservation
• In this phase, data is isolated, secured, and preserved. It includes preventing
people from using the digital device so that digital evidence is not tampered
with.
PROCESS OF COMPUTER FORENSIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
• Analysis
• In this step, investigation agents reconstruct
fragments of data and draw conclusions based
on evidence found.
• Various tools and techniques used by digital
forensic investigator for the purpose of
extraction of truth.
PROCESS OF COMPUTER FORENSIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
ANALYSIS OF DIGITAL EVIDENCE
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
• Documentation
• In this process, a record of all the visible data must be created. It helps in
recreating the crime scene and reviewing it. It Involves proper documentation
of the crime scene along with photographing, sketching, and crime-scene
mapping.
PROCESS OF COMPUTER FORENSIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
• Presentation
• In this last step, the process of
summarization and explanation of
conclusions is done.
• Presentation should be in easy to
understand manner and with proper
reference.
PROCESS OF COMPUTER FORENSIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
• Disk Forensics:
• It deals with extracting data from storage media by searching active, modified,
or deleted files.
• Network Forensics:
• It is a sub-branch of digital forensics. It is related to monitoring and analysis of
computer network traffic to collect important information and legal evidence.
TYPES OF DIGITAL FORENSIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
• Wireless Forensics:
• It is a division of network forensics. The
main aim of wireless forensics is to
offers the tools need to collect and
analyze the data from wireless network
traffic.
• Database Forensics:
• It is a branch of digital forensics relating
to the study and examination of
databases and their related metadata.
TYPES OF DIGITAL FORENSIC (Conti..)
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
TYPES OF DIGITAL FORENSIC (Conti..)
• Malware Forensics:
• This branch deals with the identification
of malicious code, to study their payload,
viruses, worms, etc.
• Email Forensics
• Deals with recovery and analysis of
emails, including deleted emails,
calendars, and contacts.
TYPES OF DIGITAL FORENSIC (Conti..)
• Memory Forensics:
• It deals with collecting data from
system memory (system
registers, cache, RAM) in raw
form and then carving the data
from Raw dump.
• Mobile Phone Forensics:
• It mainly deals with the
examination and analysis of
mobile devices. It helps to
retrieve phone and SIM contacts,
call logs, incoming, and outgoing
SMS/MMS, Audio, videos, etc.
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
TOOLS USED IN COMPUTER FORENIC
• Forensic Imaging
A forensic image
(forensic copy) is a bit-by-bit,
sector-by-sector direct copy of a
physical storage device,
including all files, folders and
unallocated, free and slack
space.
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
• Forensic Imaging Tools
TOOLS USED IN COMPUTER FORENIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
• Recovery Forensics
Forensic data recovery is the
extraction of data from damaged
evidence sources in a forensically
sound manner.
It can be done with the help of tools
such as Recuva, Disk Drill, etc.
TOOLS USED IN COMPUTER FORENIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in
• Recovery Forensic Tools
TOOLS USED IN COMPUTER FORENIC
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
THANK YOU !!!
Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
bhupeshkumar.nanhe@jecrcu.edu.in

More Related Content

What's hot

Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
Priya Manik
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
Cleverence Kombe
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Roberto Ellis
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensicsRahul Baghla
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
Manik Bhola
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
SCREAM138
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
rakesh mishra
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
Yansi Keim
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologies
urjarathi
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Vidoushi B-Somrah
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
noorashams
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
unnilala11
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
Online
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
Suchita Rawat
 
Network forensic
Network forensicNetwork forensic
Network forensic
Manjushree Mashal
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
abdullah roomi
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
Aung Thu Rha Hein
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating proceduresSoumen Debgupta
 

What's hot (20)

Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologies
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating procedures
 

Similar to L6 Digital Forensic Investigation Tools.pptx

L5 Cyber Crime.pptx
L5 Cyber Crime.pptxL5 Cyber Crime.pptx
L5 Cyber Crime.pptx
Bhupeshkumar Nanhe
 
computerforensicppt-160201192341.pdf
computerforensicppt-160201192341.pdfcomputerforensicppt-160201192341.pdf
computerforensicppt-160201192341.pdf
Gnanavi2
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
Johnson Ubah
 
Systematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation ModelSystematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation Model
CSCJournals
 
Automated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data AcquisitionAutomated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data Acquisition
IJERA Editor
 
Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...Clinton DSouza
 
Zuo Wei 2016
Zuo Wei 2016Zuo Wei 2016
Zuo Wei 2016Wei Zuo
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
BRNSSPublicationHubI
 
Computer Forensics.pptx
Computer Forensics.pptxComputer Forensics.pptx
Computer Forensics.pptx
Happyness Mkumbo
 
The Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptxThe Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptx
Applied Forensic Research Sciences
 
Scope of Cyber forensics
Scope of Cyber forensicsScope of Cyber forensics
Scope of Cyber forensics
Applied Forensic Research Sciences
 
AUTOMATED PROCTORING SYSTEM
AUTOMATED PROCTORING SYSTEMAUTOMATED PROCTORING SYSTEM
AUTOMATED PROCTORING SYSTEM
IRJET Journal
 
Lie detector
Lie detectorLie detector
Lie detector
ankit jha
 
CRIME PREDICTION AND ANALYSIS USING MACHINE LEARNING
CRIME PREDICTION AND ANALYSIS USING MACHINE LEARNINGCRIME PREDICTION AND ANALYSIS USING MACHINE LEARNING
CRIME PREDICTION AND ANALYSIS USING MACHINE LEARNING
MLRITMCSD
 
Post-Genesis Digital Forensics Investigation
Post-Genesis Digital Forensics InvestigationPost-Genesis Digital Forensics Investigation
Post-Genesis Digital Forensics Investigation
Universitas Pembangunan Panca Budi
 
Presentation (1).pdf
Presentation (1).pdfPresentation (1).pdf
Presentation (1).pdf
SOUMYAR27
 
Anits dip
Anits dipAnits dip
10.computer technology in Research
10.computer technology in Research10.computer technology in Research
10.computer technology in Research
Asir John Samuel
 

Similar to L6 Digital Forensic Investigation Tools.pptx (20)

L5 Cyber Crime.pptx
L5 Cyber Crime.pptxL5 Cyber Crime.pptx
L5 Cyber Crime.pptx
 
computerforensicppt-160201192341.pdf
computerforensicppt-160201192341.pdfcomputerforensicppt-160201192341.pdf
computerforensicppt-160201192341.pdf
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
 
Systematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation ModelSystematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation Model
 
Automated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data AcquisitionAutomated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data Acquisition
 
Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...Detection and Prevention of security vulnerabilities associated with mobile b...
Detection and Prevention of security vulnerabilities associated with mobile b...
 
Zuo Wei 2016
Zuo Wei 2016Zuo Wei 2016
Zuo Wei 2016
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Computer Forensics.pptx
Computer Forensics.pptxComputer Forensics.pptx
Computer Forensics.pptx
 
The Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptxThe Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptx
 
Scope of Cyber forensics
Scope of Cyber forensicsScope of Cyber forensics
Scope of Cyber forensics
 
AUTOMATED PROCTORING SYSTEM
AUTOMATED PROCTORING SYSTEMAUTOMATED PROCTORING SYSTEM
AUTOMATED PROCTORING SYSTEM
 
Lie detector
Lie detectorLie detector
Lie detector
 
Word
WordWord
Word
 
CRIME PREDICTION AND ANALYSIS USING MACHINE LEARNING
CRIME PREDICTION AND ANALYSIS USING MACHINE LEARNINGCRIME PREDICTION AND ANALYSIS USING MACHINE LEARNING
CRIME PREDICTION AND ANALYSIS USING MACHINE LEARNING
 
Post-Genesis Digital Forensics Investigation
Post-Genesis Digital Forensics InvestigationPost-Genesis Digital Forensics Investigation
Post-Genesis Digital Forensics Investigation
 
Presentation (1).pdf
Presentation (1).pdfPresentation (1).pdf
Presentation (1).pdf
 
Anits dip
Anits dipAnits dip
Anits dip
 
10.computer technology in Research
10.computer technology in Research10.computer technology in Research
10.computer technology in Research
 

More from Bhupeshkumar Nanhe

Questioned Document.pptx
Questioned Document.pptxQuestioned Document.pptx
Questioned Document.pptx
Bhupeshkumar Nanhe
 
L1 Basics of Forensic Science & FSL.pptx
L1 Basics of Forensic Science & FSL.pptxL1 Basics of Forensic Science & FSL.pptx
L1 Basics of Forensic Science & FSL.pptx
Bhupeshkumar Nanhe
 
Incident response process
Incident response processIncident response process
Incident response process
Bhupeshkumar Nanhe
 
Biometrics
BiometricsBiometrics
Biometrics
Bhupeshkumar Nanhe
 
Geoforensic
Geoforensic Geoforensic
Geoforensic
Bhupeshkumar Nanhe
 
Fingerprint Classification
Fingerprint ClassificationFingerprint Classification
Fingerprint Classification
Bhupeshkumar Nanhe
 
Bhavana Shivankar
Bhavana ShivankarBhavana Shivankar
Bhavana Shivankar
Bhupeshkumar Nanhe
 

More from Bhupeshkumar Nanhe (7)

Questioned Document.pptx
Questioned Document.pptxQuestioned Document.pptx
Questioned Document.pptx
 
L1 Basics of Forensic Science & FSL.pptx
L1 Basics of Forensic Science & FSL.pptxL1 Basics of Forensic Science & FSL.pptx
L1 Basics of Forensic Science & FSL.pptx
 
Incident response process
Incident response processIncident response process
Incident response process
 
Biometrics
BiometricsBiometrics
Biometrics
 
Geoforensic
Geoforensic Geoforensic
Geoforensic
 
Fingerprint Classification
Fingerprint ClassificationFingerprint Classification
Fingerprint Classification
 
Bhavana Shivankar
Bhavana ShivankarBhavana Shivankar
Bhavana Shivankar
 

Recently uploaded

plant biotechnology Lecture note ppt.pptx
plant biotechnology Lecture note ppt.pptxplant biotechnology Lecture note ppt.pptx
plant biotechnology Lecture note ppt.pptx
yusufzako14
 
Lab report on liquid viscosity of glycerin
Lab report on liquid viscosity of glycerinLab report on liquid viscosity of glycerin
Lab report on liquid viscosity of glycerin
ossaicprecious19
 
In silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptxIn silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptx
AlaminAfendy1
 
Hemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptxHemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptx
muralinath2
 
Viksit bharat till 2047 India@2047.pptx
Viksit bharat till 2047  India@2047.pptxViksit bharat till 2047  India@2047.pptx
Viksit bharat till 2047 India@2047.pptx
rakeshsharma20142015
 
Penicillin...........................pptx
Penicillin...........................pptxPenicillin...........................pptx
Penicillin...........................pptx
Cherry
 
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
Health Advances
 
extra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdfextra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdf
DiyaBiswas10
 
Mammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also FunctionsMammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also Functions
YOGESH DOGRA
 
Structures and textures of metamorphic rocks
Structures and textures of metamorphic rocksStructures and textures of metamorphic rocks
Structures and textures of metamorphic rocks
kumarmathi863
 
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptxBody fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
muralinath2
 
Seminar of U.V. Spectroscopy by SAMIR PANDA
 Seminar of U.V. Spectroscopy by SAMIR PANDA Seminar of U.V. Spectroscopy by SAMIR PANDA
Seminar of U.V. Spectroscopy by SAMIR PANDA
SAMIR PANDA
 
Richard's entangled aventures in wonderland
Richard's entangled aventures in wonderlandRichard's entangled aventures in wonderland
Richard's entangled aventures in wonderland
Richard Gill
 
Citrus Greening Disease and its Management
Citrus Greening Disease and its ManagementCitrus Greening Disease and its Management
Citrus Greening Disease and its Management
subedisuryaofficial
 
EY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptxEY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptx
AlguinaldoKong
 
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Sérgio Sacani
 
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
NathanBaughman3
 
Comparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebratesComparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebrates
sachin783648
 
NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
pablovgd
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Erdal Coalmaker
 

Recently uploaded (20)

plant biotechnology Lecture note ppt.pptx
plant biotechnology Lecture note ppt.pptxplant biotechnology Lecture note ppt.pptx
plant biotechnology Lecture note ppt.pptx
 
Lab report on liquid viscosity of glycerin
Lab report on liquid viscosity of glycerinLab report on liquid viscosity of glycerin
Lab report on liquid viscosity of glycerin
 
In silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptxIn silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptx
 
Hemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptxHemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptx
 
Viksit bharat till 2047 India@2047.pptx
Viksit bharat till 2047  India@2047.pptxViksit bharat till 2047  India@2047.pptx
Viksit bharat till 2047 India@2047.pptx
 
Penicillin...........................pptx
Penicillin...........................pptxPenicillin...........................pptx
Penicillin...........................pptx
 
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
 
extra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdfextra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdf
 
Mammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also FunctionsMammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also Functions
 
Structures and textures of metamorphic rocks
Structures and textures of metamorphic rocksStructures and textures of metamorphic rocks
Structures and textures of metamorphic rocks
 
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptxBody fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
 
Seminar of U.V. Spectroscopy by SAMIR PANDA
 Seminar of U.V. Spectroscopy by SAMIR PANDA Seminar of U.V. Spectroscopy by SAMIR PANDA
Seminar of U.V. Spectroscopy by SAMIR PANDA
 
Richard's entangled aventures in wonderland
Richard's entangled aventures in wonderlandRichard's entangled aventures in wonderland
Richard's entangled aventures in wonderland
 
Citrus Greening Disease and its Management
Citrus Greening Disease and its ManagementCitrus Greening Disease and its Management
Citrus Greening Disease and its Management
 
EY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptxEY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptx
 
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
 
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
 
Comparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebratesComparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebrates
 
NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
 

L6 Digital Forensic Investigation Tools.pptx

  • 1. DIGITAL FORENSIC & IT'S PROCEDURE Presented By; Bhupeshkumar Nanhe Assist. Professor, Dept. of Forensic Science SoS, JECRC University, Jaipur (RJ), India
  • 2. INTRODUCTION TO COMPUTER FORENSIC • Digital Forensics is defined as the process of preservation, identification, extraction, and documentation of computer evidence which can be used by the court of law. • It is a science of finding evidence from digital media like a computer, mobile phone, server, or network. • Digital Forensics helps the forensic team to analyzes, inspect, identifies, and preserve the digital evidence residing on various types of electronic devices. Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in
  • 3. PROCESS OF COMPUTER FORENSIC Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
  • 4. • Identification • It is the first step in the computer forensic process. The identification process mainly includes things like what evidence is present, where it is stored, and lastly, how it is stored (in which format). • Electronic storage media can be personal computers, Mobile phones, PDAs, etc. PROCESS OF COMPUTER FORENSIC Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in
  • 5. • Preservation • In this phase, data is isolated, secured, and preserved. It includes preventing people from using the digital device so that digital evidence is not tampered with. PROCESS OF COMPUTER FORENSIC Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in
  • 6. • Analysis • In this step, investigation agents reconstruct fragments of data and draw conclusions based on evidence found. • Various tools and techniques used by digital forensic investigator for the purpose of extraction of truth. PROCESS OF COMPUTER FORENSIC Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in
  • 7. ANALYSIS OF DIGITAL EVIDENCE Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in
  • 8. • Documentation • In this process, a record of all the visible data must be created. It helps in recreating the crime scene and reviewing it. It Involves proper documentation of the crime scene along with photographing, sketching, and crime-scene mapping. PROCESS OF COMPUTER FORENSIC Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in
  • 9. • Presentation • In this last step, the process of summarization and explanation of conclusions is done. • Presentation should be in easy to understand manner and with proper reference. PROCESS OF COMPUTER FORENSIC Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in
  • 10. • Disk Forensics: • It deals with extracting data from storage media by searching active, modified, or deleted files. • Network Forensics: • It is a sub-branch of digital forensics. It is related to monitoring and analysis of computer network traffic to collect important information and legal evidence. TYPES OF DIGITAL FORENSIC Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in
  • 11. • Wireless Forensics: • It is a division of network forensics. The main aim of wireless forensics is to offers the tools need to collect and analyze the data from wireless network traffic. • Database Forensics: • It is a branch of digital forensics relating to the study and examination of databases and their related metadata. TYPES OF DIGITAL FORENSIC (Conti..) Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in
  • 12. TYPES OF DIGITAL FORENSIC (Conti..) • Malware Forensics: • This branch deals with the identification of malicious code, to study their payload, viruses, worms, etc. • Email Forensics • Deals with recovery and analysis of emails, including deleted emails, calendars, and contacts.
  • 13. TYPES OF DIGITAL FORENSIC (Conti..) • Memory Forensics: • It deals with collecting data from system memory (system registers, cache, RAM) in raw form and then carving the data from Raw dump. • Mobile Phone Forensics: • It mainly deals with the examination and analysis of mobile devices. It helps to retrieve phone and SIM contacts, call logs, incoming, and outgoing SMS/MMS, Audio, videos, etc. Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
  • 14. TOOLS USED IN COMPUTER FORENIC • Forensic Imaging A forensic image (forensic copy) is a bit-by-bit, sector-by-sector direct copy of a physical storage device, including all files, folders and unallocated, free and slack space. Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
  • 15. • Forensic Imaging Tools TOOLS USED IN COMPUTER FORENIC Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in
  • 16. • Recovery Forensics Forensic data recovery is the extraction of data from damaged evidence sources in a forensically sound manner. It can be done with the help of tools such as Recuva, Disk Drill, etc. TOOLS USED IN COMPUTER FORENIC Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in
  • 17. • Recovery Forensic Tools TOOLS USED IN COMPUTER FORENIC Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email:
  • 18. THANK YOU !!! Mr. Bhupeshkumar Nanhe, Assistant Professor, Dept. of Forensic Science, SoS, JECRC University, Jaipur (RJ), India. Email: bhupeshkumar.nanhe@jecrcu.edu.in