2. Digital Forensic
• Digital forensics (sometimes known as digital forensic
science) is a branch of forensic science that includes the
recovery and investigation of the information found in
digital devices often in relation to computer crime.
3. Digital forensics includes several sub-branches :
• Computer Forensics
• Mobile Forensics
• Network Forensic
4. Computer forensic:- Computer forensics (also known
as computer forensic science) is a branch of digital forensic
science pertaining to evidence found in computers and
digital storage media.
Mobile Forensic:- Mobile device forensics is a branch of digital
forensics relating to recovery of digital forensics and cyber
investigation or data from a mobile device under forensically
sound conditions.
Network Forensic:- Network forensics is a sub-branch of digital
forensics relating to the monitoring and analysis of computer
network traffic for the purposes of information gathering, legal
evidence, or intrusion detection.
5. Digital evidence
• Digital evidence is information stored or transmitted in binary form that may
be relied on in court. It can be found on a computer hard drive, a mobile phone,
a personal digital assistant (PDA), a CD, and a flash card in a digital camera,
among other place s.
6. A device which holds the data as long as it
has power supply connected to it and cannot
hold the memory when there is no power
supply connected to it is called Volatile
memory
A device which can hold data in it even if
it is not connected to any power source is
called Non Volatile Memory
8. Searching and Seizing of Digital Evidence
Searching :- The first step is to identify the valuable evidence
present at the crime scene.
Seizure:- After searching of evidence , we need to physical
seize the evidence for further investigation
9. Collection of Evidence from Crime Scene
There are a number of evidences that can be obtained from
the crime scene such as
• Physical Evidence
• Digital Evidence
12. Collection of Physical Evidence
Dried Material Collection Technique
• With gloved hands, slightly moisten the swab with distilled water. (The swab should be
damp but not overly wet.)
• Thoroughly rub the stained area using a single moistened swab for a small stain and
multiple swabs for a large stain. When only a small amount of the stain is available,
• concentrate as much of the stain as possible on the tip of the swab.
• Air-dry the swabs.
• Place each swab into separate package.
• This package may be placed inside a paper envelope
• Collect a substrate/control sample from an unstained area using the same techniques
14. Procedure for Computer Evidence Seizure
The activities/procedures for securing a suspected computer incident
scene include
• Securing the scene
Shutting down the computer
Labeling the evidence
Documenting the evidence
Transporting the evidence
Providing chain-of-custody
Documentation
15. • Photograph the Scene
• If the computer is ON then photograph the screen
and note down the names of programs being run.
• Do not switch off the computer. Simply pull the
power cord from behind the back of the computer.
• Open the computer and inspect the inside for
unusual connections or configuration.
• Disconnect the Power cables to all the storage hard
drives
16. Documentation
• Detailed notes should be maintained during all aspects of the
scene processing.
• This not only includes the usual who, what, where, when but
overall observations of the scene.
• A evidence/property document should contain entries with a
description of the items (model and serial number), any visible
markings present on the item, the condition of the item, the
manner it was marked for evidence and the location from within
the scene it was seized.
• Every item of evidence has its own characteristics, but should be
identified in a manner it can be easily identified at a later date.
Items should be collected as found and documented.
17. What are the Steps in the Mobile Forensics Process?
Mobile Phone Seizure Box
Airplane Mode
18. Cyber Crime
• Cyber crime are the crimes that involve digital evidences
such as computer, mobile and internet.
Classification of Cyber Crime:
Cyber crimes against individual
Cyber crimes against property
Cyber crimes against government and society
22. Cyber Forensic Investigation Steps:
1. Identify the computer crime
2. Collect preliminary evidence
3. Obtain court/higher authority permission for seizure (if necessary).
4. Perform first responder tool.
5. Seize evidence at the crime.
6. Create two-bit stream copies of the evidence
7. Generate SHA1 checksum on the image.
8.Maintain chain of custody.
9. Transport evidence to the forensic laboratory
10. Store the original evidence in a secure location
11. Analyze the image copy for evidence.
12. Prepare a forensic report.
13 Submit Report to Client.
14 If required, attend the court and testify as an expert.
24. EnCase
• Originally developed for law enforcement
• Built around case management
• Integrated Windows-based graphical user
interface (GUI)
• Multiple Features
25. Forensic Toolkit (FTK)
• Another Tool Suite
• Acquires & Examines Electronic Data
• Imaging Tool
• File Viewer
26. Cellebrite
• Tool for mobile phone, smartphone, and
PDA forensics.
• Compatible with over 2,500 mobile phones
(including GSM, TDMA, CDMA, iDEN).
27. TYPES OF FORENSIC SOFTWARE
Cloning And Imaging Tool
WriteProtection Tool
Data Recovery/Analysis Tools
Mobile Data Analysis Tool
Audio/Video Forensic Tool
Incidence Response Tool
CDR Analysis Tool
Password Recovery Tools
Mac Forensic Tool
28. Ransomware
• Ransomware is a type of malware that attempt to extort money from a
computer user by infecting and taking control of the victim’s machine or
files or documents stored on it.
• Typically, the ransomware will either lock the computer to prevent
normal usage, or encrypt the documents and files on it to prevent access
to the saved data.
29. Bitcoin
• Bitcoin is a cryptocurrency and worldwide payment
system.
• A Peer-to-Peer Electronic Cash System.
• A distributed, decentralized digital currency system
30. Who created Bitcoin?
• October 31, 2008,
• Satoshi Nakamoto published white paper titled Bitcoin.
• A peer to peer Electronic cash system via “The Cryptography Mailing
List”
• January 3, 2009,
• Satoshi release Bitcoin source code and software client to the world.