SlideShare a Scribd company logo
1 of 32
Digital Forensic
By-
FORnSEC Solutions
Digital Forensic
• Digital forensics (sometimes known as digital forensic
science) is a branch of forensic science that includes the
recovery and investigation of the information found in
digital devices often in relation to computer crime.
Digital forensics includes several sub-branches :
• Computer Forensics
• Mobile Forensics
• Network Forensic
Computer forensic:- Computer forensics (also known
as computer forensic science) is a branch of digital forensic
science pertaining to evidence found in computers and
digital storage media.
Mobile Forensic:- Mobile device forensics is a branch of digital
forensics relating to recovery of digital forensics and cyber
investigation or data from a mobile device under forensically
sound conditions.
Network Forensic:- Network forensics is a sub-branch of digital
forensics relating to the monitoring and analysis of computer
network traffic for the purposes of information gathering, legal
evidence, or intrusion detection.
Digital evidence
• Digital evidence is information stored or transmitted in binary form that may
be relied on in court. It can be found on a computer hard drive, a mobile phone,
a personal digital assistant (PDA), a CD, and a flash card in a digital camera,
among other place s.
A device which holds the data as long as it
has power supply connected to it and cannot
hold the memory when there is no power
supply connected to it is called Volatile
memory
A device which can hold data in it even if
it is not connected to any power source is
called Non Volatile Memory
Examples of digital Evidence
Searching and Seizing of Digital Evidence
Searching :- The first step is to identify the valuable evidence
present at the crime scene.
Seizure:- After searching of evidence , we need to physical
seize the evidence for further investigation
Collection of Evidence from Crime Scene
There are a number of evidences that can be obtained from
the crime scene such as
• Physical Evidence
• Digital Evidence
Physical Evidences
Digital Evidence
Collection of Physical Evidence
Dried Material Collection Technique
• With gloved hands, slightly moisten the swab with distilled water. (The swab should be
damp but not overly wet.)
• Thoroughly rub the stained area using a single moistened swab for a small stain and
multiple swabs for a large stain. When only a small amount of the stain is available,
• concentrate as much of the stain as possible on the tip of the swab.
• Air-dry the swabs.
• Place each swab into separate package.
• This package may be placed inside a paper envelope
• Collect a substrate/control sample from an unstained area using the same techniques
Continued..
Procedure for Computer Evidence Seizure
The activities/procedures for securing a suspected computer incident
scene include
• Securing the scene
 Shutting down the computer
 Labeling the evidence
 Documenting the evidence
 Transporting the evidence
 Providing chain-of-custody
 Documentation
• Photograph the Scene
• If the computer is ON then photograph the screen
and note down the names of programs being run.
• Do not switch off the computer. Simply pull the
power cord from behind the back of the computer.
• Open the computer and inspect the inside for
unusual connections or configuration.
• Disconnect the Power cables to all the storage hard
drives
Documentation
• Detailed notes should be maintained during all aspects of the
scene processing.
• This not only includes the usual who, what, where, when but
overall observations of the scene.
• A evidence/property document should contain entries with a
description of the items (model and serial number), any visible
markings present on the item, the condition of the item, the
manner it was marked for evidence and the location from within
the scene it was seized.
• Every item of evidence has its own characteristics, but should be
identified in a manner it can be easily identified at a later date.
Items should be collected as found and documented.
What are the Steps in the Mobile Forensics Process?
Mobile Phone Seizure Box
Airplane Mode
Cyber Crime
• Cyber crime are the crimes that involve digital evidences
such as computer, mobile and internet.
Classification of Cyber Crime:
 Cyber crimes against individual
 Cyber crimes against property
 Cyber crimes against government and society
Cyber crimes against individual
Cyber crimes against property
Cyber crimes against government and society
Cyber Forensic Investigation Steps:
1. Identify the computer crime
2. Collect preliminary evidence
3. Obtain court/higher authority permission for seizure (if necessary).
4. Perform first responder tool.
5. Seize evidence at the crime.
6. Create two-bit stream copies of the evidence
7. Generate SHA1 checksum on the image.
8.Maintain chain of custody.
9. Transport evidence to the forensic laboratory
10. Store the original evidence in a secure location
11. Analyze the image copy for evidence.
12. Prepare a forensic report.
13 Submit Report to Client.
14 If required, attend the court and testify as an expert.
Cyber Forensic Tools
EnCase
• Originally developed for law enforcement
• Built around case management
• Integrated Windows-based graphical user
interface (GUI)
• Multiple Features
Forensic Toolkit (FTK)
• Another Tool Suite
• Acquires & Examines Electronic Data
• Imaging Tool
• File Viewer
Cellebrite
• Tool for mobile phone, smartphone, and
PDA forensics.
• Compatible with over 2,500 mobile phones
(including GSM, TDMA, CDMA, iDEN).
TYPES OF FORENSIC SOFTWARE
 Cloning And Imaging Tool
 WriteProtection Tool
 Data Recovery/Analysis Tools
 Mobile Data Analysis Tool
 Audio/Video Forensic Tool
 Incidence Response Tool
 CDR Analysis Tool
 Password Recovery Tools
 Mac Forensic Tool
Ransomware
• Ransomware is a type of malware that attempt to extort money from a
computer user by infecting and taking control of the victim’s machine or
files or documents stored on it.
• Typically, the ransomware will either lock the computer to prevent
normal usage, or encrypt the documents and files on it to prevent access
to the saved data.
Bitcoin
• Bitcoin is a cryptocurrency and worldwide payment
system.
• A Peer-to-Peer Electronic Cash System.
• A distributed, decentralized digital currency system
Who created Bitcoin?
• October 31, 2008,
• Satoshi Nakamoto published white paper titled Bitcoin.
• A peer to peer Electronic cash system via “The Cryptography Mailing
List”
• January 3, 2009,
• Satoshi release Bitcoin source code and software client to the world.
Demo
Most promising cyber forensic solution providers  from india   forn sec solutions

More Related Content

What's hot

Digital forensics
Digital forensicsDigital forensics
Digital forensicsdentpress
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidencerakesh mishra
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensicsnoorashams
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic pptPriya Manik
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDr Raghu Khimani
 
Digital forensic
Digital forensicDigital forensic
Digital forensicChandan Sah
 
Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.guestcf6f5b
 
CS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IVCS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IVArthyR3
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its toolsKathirvel Ayyaswamy
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsHiren Selani
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsSCREAM138
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)AltheimPrivacy
 
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...Danny609Davidson
 

What's hot (20)

Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital forensic
Digital forensicDigital forensic
Digital forensic
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.
 
CS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IVCS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IV
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
 
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
 
computer forensics
computer forensics computer forensics
computer forensics
 

Similar to Most promising cyber forensic solution providers from india forn sec solutions

mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptxAmbuj Kumar
 
Computer Forensics (1).pptx
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptxGautam708801
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
Uncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsUncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsParaben Corporation
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsN.Jagadish Kumar
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxgouriuplenchwar63
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenesprimeteacher32
 
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...William782Delaney
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1Jinalkakadiya
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidenceOnline
 

Similar to Most promising cyber forensic solution providers from india forn sec solutions (20)

mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
Difference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptxDifference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptx
 
Computer Forensics (1).pptx
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptx
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
cyber forensics
cyber forensicscyber forensics
cyber forensics
 
Uncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsUncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic tools
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection tools
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
First Responder Officer in Cyber Crime
First Responder Officer in Cyber CrimeFirst Responder Officer in Cyber Crime
First Responder Officer in Cyber Crime
 
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...
Personal Computer 'Forensics' Occupation -- Simply What Does A Pc Forensic Ex...
 
The Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptxThe Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptx
 
Scope of Cyber forensics
Scope of Cyber forensicsScope of Cyber forensics
Scope of Cyber forensics
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 

Recently uploaded

Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 

Recently uploaded (20)

Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 

Most promising cyber forensic solution providers from india forn sec solutions

  • 2. Digital Forensic • Digital forensics (sometimes known as digital forensic science) is a branch of forensic science that includes the recovery and investigation of the information found in digital devices often in relation to computer crime.
  • 3. Digital forensics includes several sub-branches : • Computer Forensics • Mobile Forensics • Network Forensic
  • 4. Computer forensic:- Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. Mobile Forensic:- Mobile device forensics is a branch of digital forensics relating to recovery of digital forensics and cyber investigation or data from a mobile device under forensically sound conditions. Network Forensic:- Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection.
  • 5. Digital evidence • Digital evidence is information stored or transmitted in binary form that may be relied on in court. It can be found on a computer hard drive, a mobile phone, a personal digital assistant (PDA), a CD, and a flash card in a digital camera, among other place s.
  • 6. A device which holds the data as long as it has power supply connected to it and cannot hold the memory when there is no power supply connected to it is called Volatile memory A device which can hold data in it even if it is not connected to any power source is called Non Volatile Memory
  • 8. Searching and Seizing of Digital Evidence Searching :- The first step is to identify the valuable evidence present at the crime scene. Seizure:- After searching of evidence , we need to physical seize the evidence for further investigation
  • 9. Collection of Evidence from Crime Scene There are a number of evidences that can be obtained from the crime scene such as • Physical Evidence • Digital Evidence
  • 12. Collection of Physical Evidence Dried Material Collection Technique • With gloved hands, slightly moisten the swab with distilled water. (The swab should be damp but not overly wet.) • Thoroughly rub the stained area using a single moistened swab for a small stain and multiple swabs for a large stain. When only a small amount of the stain is available, • concentrate as much of the stain as possible on the tip of the swab. • Air-dry the swabs. • Place each swab into separate package. • This package may be placed inside a paper envelope • Collect a substrate/control sample from an unstained area using the same techniques
  • 14. Procedure for Computer Evidence Seizure The activities/procedures for securing a suspected computer incident scene include • Securing the scene  Shutting down the computer  Labeling the evidence  Documenting the evidence  Transporting the evidence  Providing chain-of-custody  Documentation
  • 15. • Photograph the Scene • If the computer is ON then photograph the screen and note down the names of programs being run. • Do not switch off the computer. Simply pull the power cord from behind the back of the computer. • Open the computer and inspect the inside for unusual connections or configuration. • Disconnect the Power cables to all the storage hard drives
  • 16. Documentation • Detailed notes should be maintained during all aspects of the scene processing. • This not only includes the usual who, what, where, when but overall observations of the scene. • A evidence/property document should contain entries with a description of the items (model and serial number), any visible markings present on the item, the condition of the item, the manner it was marked for evidence and the location from within the scene it was seized. • Every item of evidence has its own characteristics, but should be identified in a manner it can be easily identified at a later date. Items should be collected as found and documented.
  • 17. What are the Steps in the Mobile Forensics Process? Mobile Phone Seizure Box Airplane Mode
  • 18. Cyber Crime • Cyber crime are the crimes that involve digital evidences such as computer, mobile and internet. Classification of Cyber Crime:  Cyber crimes against individual  Cyber crimes against property  Cyber crimes against government and society
  • 19. Cyber crimes against individual
  • 21. Cyber crimes against government and society
  • 22. Cyber Forensic Investigation Steps: 1. Identify the computer crime 2. Collect preliminary evidence 3. Obtain court/higher authority permission for seizure (if necessary). 4. Perform first responder tool. 5. Seize evidence at the crime. 6. Create two-bit stream copies of the evidence 7. Generate SHA1 checksum on the image. 8.Maintain chain of custody. 9. Transport evidence to the forensic laboratory 10. Store the original evidence in a secure location 11. Analyze the image copy for evidence. 12. Prepare a forensic report. 13 Submit Report to Client. 14 If required, attend the court and testify as an expert.
  • 24. EnCase • Originally developed for law enforcement • Built around case management • Integrated Windows-based graphical user interface (GUI) • Multiple Features
  • 25. Forensic Toolkit (FTK) • Another Tool Suite • Acquires & Examines Electronic Data • Imaging Tool • File Viewer
  • 26. Cellebrite • Tool for mobile phone, smartphone, and PDA forensics. • Compatible with over 2,500 mobile phones (including GSM, TDMA, CDMA, iDEN).
  • 27. TYPES OF FORENSIC SOFTWARE  Cloning And Imaging Tool  WriteProtection Tool  Data Recovery/Analysis Tools  Mobile Data Analysis Tool  Audio/Video Forensic Tool  Incidence Response Tool  CDR Analysis Tool  Password Recovery Tools  Mac Forensic Tool
  • 28. Ransomware • Ransomware is a type of malware that attempt to extort money from a computer user by infecting and taking control of the victim’s machine or files or documents stored on it. • Typically, the ransomware will either lock the computer to prevent normal usage, or encrypt the documents and files on it to prevent access to the saved data.
  • 29. Bitcoin • Bitcoin is a cryptocurrency and worldwide payment system. • A Peer-to-Peer Electronic Cash System. • A distributed, decentralized digital currency system
  • 30. Who created Bitcoin? • October 31, 2008, • Satoshi Nakamoto published white paper titled Bitcoin. • A peer to peer Electronic cash system via “The Cryptography Mailing List” • January 3, 2009, • Satoshi release Bitcoin source code and software client to the world.
  • 31. Demo