SlideShare a Scribd company logo
Acquisition
physically or remotely obtaining possession of the computer, all
network mappings from the system, and external physical
storage devices.
Identification
This step involves identifying what data could be recovered and
electronically retrieving it by running various Computer Forensic
tools and software suites.
Evaluation
Evaluating the information/data recovered to determine if and how it
could be used again the suspect for employment termination or
prosecution in court.
Presentation
This step involves the presentation of evidence discovered in a manner
which is understood by lawyers, non-technically staff/management,
and suitable as evidence as determined by United States
and internal laws
 To human eyes, data usually contains known forms, like images, e-mail,
sounds, and text. Most Internet data naturally includes gratuitous headers, too.
These are media exploited using new controversial logical encodings:
steganography and marking.
Steganography: The art of storing information in such a way that the
existence of the information is hidden.
 Watermarking: Hiding data within data Information can be hidden
in almost any file format.
File formats with more room for compression are best
• Image files (JPEG, GIF)
• Sound files (MP3, WAV)
• Video files (MPG, AVI)
The hidden information may be encrypted, but not necessarily.
 Hard Drive/File System manipulation
Slack Space is the space between the logical end and the physical
end of file and is called the file slack
• Steganalysis - the art of detecting and decoding hidden data.
•Hiding information within electronic media requires alterations
of the media properties that may introduce some form of
degradation or unusual characteristics.
• The pattern of degradation or the unusual characteristic
of a specific type of steganography method is called a signature.
• Steganalysis software can be trained to look for a signature.
•Human Observation
•Software analysis
•Disk analysis utilities
•Statistical Analysis
•Frequency scanning
Recovery of watermarked data is extremely hard.
Currently, there are very few methods to recover
hidden, encrypted data.
Data hidden on disk is much easier to find. Once found, if
unencrypted, it is already recovered
Deleted data can be reconstructed (even on hard drives
that have been magnetically wiped)
Check swap files for passwords and encryption keys which
are stored in the clear (unencrypted)
Software Tools
• Scan for and reconstruct deleted data
• Break encryption
The "network" in "network forensics" != "computer"
•Network here means "relating to packets" or "network traffic"
Definition of forensics (dictionary.com)
•Relating to, used in, or appropriate for courts of law
or for public discussion or argumentation.
•Of, relating to, or used in debate or argument; rhetorical.
•Relating to the use of science or technology in the
investigation and establishment of facts or evidence in
a court of law: a forensic laboratory.
Many claim to perform network forensics,but most of these
practitioners are probably just capturing packets
•These guidelines will elevate your game to forensic levels
Forensics helps with "patch and proceed" or "pursue
and prosecute"
It has an ability to search through a
massive amount of data
Quickly
Easily
Thoroughly
In any language
Digital evidence accepted into court
Must prove that there is no tampering.
All evidence must be fully accounted for.
Computer forensic specialists must have
complete knowledge of legal
requirements, evidence handling and
storage and documentation procedures
Costs.
Producing electronic records & preserving
them is extremely costly.
Presents the potential for exposing
privileged documents.
Legal practitioners must have extensive
computer knowledge.
 FINANCIAL FRAUD DETECTION
 CRIMINAL PROSECUTION
 CIVIL LITIGATION
With computers becoming more and more
involved in our everyday lives, both
professionally and socially, there is a need for
computer forensics. This field will enable
crucial electronic evidence to be
found, whether it was
lost, deleted, damaged, or hidden and used to
prosecute individuals that belive they have
succecessfully beaten the system.
Sujit

More Related Content

What's hot

Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
gamemaker762
 
Chapter 3 cmp forensic
Chapter 3 cmp forensicChapter 3 cmp forensic
Chapter 3 cmp forensicshahhardik27
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Oldsun
 
Forensic Lab Development
Forensic Lab DevelopmentForensic Lab Development
Forensic Lab Development
amiable_indian
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
Muzzammil Wani
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics
00heights
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
Filip Maertens
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
OWASP Khartoum
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Vikas Jain
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
Onkar1431
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its roleSudeshna Basak
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
Lalit Garg
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
Online
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
Zyxware Technologies
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
Agape Inc
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Sagar Rahurkar
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Vidoushi B-Somrah
 
Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science
Damir Delija
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
Shashi Mishra
 

What's hot (20)

Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Chapter 3 cmp forensic
Chapter 3 cmp forensicChapter 3 cmp forensic
Chapter 3 cmp forensic
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Forensic Lab Development
Forensic Lab DevelopmentForensic Lab Development
Forensic Lab Development
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its role
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 

Viewers also liked

Tum Karo Daya
Tum Karo DayaTum Karo Daya
Tum Karo Daya
Jaspal Virdee, C.Eng
 
Global Lingo
Global LingoGlobal Lingo
Global Lingo
Global Lingo
 
Ballon d'or résultat vote
Ballon d'or résultat voteBallon d'or résultat vote
Ballon d'or résultat voteAmara Soumah
 
Baruang ka nu ngarora
Baruang ka nu ngaroraBaruang ka nu ngarora
Baruang ka nu ngarora
Muhammad Rizky Muharam
 
Legal Translation Services
Legal Translation ServicesLegal Translation Services
Legal Translation Services
Global Lingo
 
Flusp'2016 cidades inteligentes
Flusp'2016 cidades inteligentesFlusp'2016 cidades inteligentes
Flusp'2016 cidades inteligentes
Eduardo Santana
 
Combining Paid Search And SEO In Your Agency Marketing Strategy
Combining Paid Search And SEO In Your Agency Marketing StrategyCombining Paid Search And SEO In Your Agency Marketing Strategy
Combining Paid Search And SEO In Your Agency Marketing Strategy
Dylan Brooks
 
A Bridge To Success: How To Craft Effective Content For Your Insurance Website
A Bridge To Success: How To Craft Effective Content For Your Insurance WebsiteA Bridge To Success: How To Craft Effective Content For Your Insurance Website
A Bridge To Success: How To Craft Effective Content For Your Insurance Website
Dylan Brooks
 
Jobs ppt
Jobs pptJobs ppt
Jobs ppt
Varthak India
 
Simulador de Cidades Inteligentes (SBRC)
Simulador de Cidades Inteligentes (SBRC)Simulador de Cidades Inteligentes (SBRC)
Simulador de Cidades Inteligentes (SBRC)
Eduardo Santana
 
Wedding ppt
Wedding pptWedding ppt
Wedding ppt
Varthak India
 

Viewers also liked (18)

Jobs ppt
Jobs pptJobs ppt
Jobs ppt
 
Tum Karo Daya
Tum Karo DayaTum Karo Daya
Tum Karo Daya
 
Global Lingo
Global LingoGlobal Lingo
Global Lingo
 
Ballon d'or résultat vote
Ballon d'or résultat voteBallon d'or résultat vote
Ballon d'or résultat vote
 
Alqa2d alnajih
Alqa2d alnajihAlqa2d alnajih
Alqa2d alnajih
 
Baruang ka nu ngarora
Baruang ka nu ngaroraBaruang ka nu ngarora
Baruang ka nu ngarora
 
Education
EducationEducation
Education
 
1348
13481348
1348
 
Legal Translation Services
Legal Translation ServicesLegal Translation Services
Legal Translation Services
 
Flusp'2016 cidades inteligentes
Flusp'2016 cidades inteligentesFlusp'2016 cidades inteligentes
Flusp'2016 cidades inteligentes
 
Apparel
ApparelApparel
Apparel
 
Combining Paid Search And SEO In Your Agency Marketing Strategy
Combining Paid Search And SEO In Your Agency Marketing StrategyCombining Paid Search And SEO In Your Agency Marketing Strategy
Combining Paid Search And SEO In Your Agency Marketing Strategy
 
A Bridge To Success: How To Craft Effective Content For Your Insurance Website
A Bridge To Success: How To Craft Effective Content For Your Insurance WebsiteA Bridge To Success: How To Craft Effective Content For Your Insurance Website
A Bridge To Success: How To Craft Effective Content For Your Insurance Website
 
Jobs ppt
Jobs pptJobs ppt
Jobs ppt
 
Simulador de Cidades Inteligentes (SBRC)
Simulador de Cidades Inteligentes (SBRC)Simulador de Cidades Inteligentes (SBRC)
Simulador de Cidades Inteligentes (SBRC)
 
Doctors ppt
Doctors pptDoctors ppt
Doctors ppt
 
Wedding ppt
Wedding pptWedding ppt
Wedding ppt
 
Travel ppt
Travel pptTravel ppt
Travel ppt
 

Similar to Sujit

Computer forensics
Computer forensicsComputer forensics
Computer forensics
deaneal
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
Gnanavi2
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hacking
Ambuj Kumar
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
Ambuj Kumar
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Daksh Verma
 
Digital Forensics Overview
Digital Forensics OverviewDigital Forensics Overview
Digital Forensics OverviewMathew Shelby
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
Suchita Rawat
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
Varun Sehgal
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Somya Johri
 
Computer Forensics Bootcamp
Computer Forensics BootcampComputer Forensics Bootcamp
Computer Forensics Bootcamp
nCircle - a Tripwire Company
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortressSTO STRATEGY
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
Sweta Kumari Barnwal
 
Evidence and data
Evidence and dataEvidence and data
Evidence and data
Atul Rai
 
computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...
pable2
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
pranjal dutta
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Abdallah Hodieb
 

Similar to Sujit (20)

Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hacking
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Digital Forensics Overview
Digital Forensics OverviewDigital Forensics Overview
Digital Forensics Overview
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Computer Forensics Bootcamp
Computer Forensics BootcampComputer Forensics Bootcamp
Computer Forensics Bootcamp
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortress
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Evidence and data
Evidence and dataEvidence and data
Evidence and data
 
computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

Sujit

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Acquisition physically or remotely obtaining possession of the computer, all network mappings from the system, and external physical storage devices. Identification This step involves identifying what data could be recovered and electronically retrieving it by running various Computer Forensic tools and software suites. Evaluation Evaluating the information/data recovered to determine if and how it could be used again the suspect for employment termination or prosecution in court. Presentation This step involves the presentation of evidence discovered in a manner which is understood by lawyers, non-technically staff/management, and suitable as evidence as determined by United States and internal laws
  • 7.  To human eyes, data usually contains known forms, like images, e-mail, sounds, and text. Most Internet data naturally includes gratuitous headers, too. These are media exploited using new controversial logical encodings: steganography and marking. Steganography: The art of storing information in such a way that the existence of the information is hidden.  Watermarking: Hiding data within data Information can be hidden in almost any file format. File formats with more room for compression are best • Image files (JPEG, GIF) • Sound files (MP3, WAV) • Video files (MPG, AVI) The hidden information may be encrypted, but not necessarily.  Hard Drive/File System manipulation Slack Space is the space between the logical end and the physical end of file and is called the file slack
  • 8. • Steganalysis - the art of detecting and decoding hidden data. •Hiding information within electronic media requires alterations of the media properties that may introduce some form of degradation or unusual characteristics. • The pattern of degradation or the unusual characteristic of a specific type of steganography method is called a signature. • Steganalysis software can be trained to look for a signature.
  • 9. •Human Observation •Software analysis •Disk analysis utilities •Statistical Analysis •Frequency scanning
  • 10. Recovery of watermarked data is extremely hard. Currently, there are very few methods to recover hidden, encrypted data. Data hidden on disk is much easier to find. Once found, if unencrypted, it is already recovered Deleted data can be reconstructed (even on hard drives that have been magnetically wiped) Check swap files for passwords and encryption keys which are stored in the clear (unencrypted) Software Tools • Scan for and reconstruct deleted data • Break encryption
  • 11. The "network" in "network forensics" != "computer" •Network here means "relating to packets" or "network traffic" Definition of forensics (dictionary.com) •Relating to, used in, or appropriate for courts of law or for public discussion or argumentation. •Of, relating to, or used in debate or argument; rhetorical. •Relating to the use of science or technology in the investigation and establishment of facts or evidence in a court of law: a forensic laboratory. Many claim to perform network forensics,but most of these practitioners are probably just capturing packets •These guidelines will elevate your game to forensic levels Forensics helps with "patch and proceed" or "pursue and prosecute"
  • 12. It has an ability to search through a massive amount of data Quickly Easily Thoroughly In any language
  • 13. Digital evidence accepted into court Must prove that there is no tampering. All evidence must be fully accounted for. Computer forensic specialists must have complete knowledge of legal requirements, evidence handling and storage and documentation procedures Costs. Producing electronic records & preserving them is extremely costly. Presents the potential for exposing privileged documents. Legal practitioners must have extensive computer knowledge.
  • 14.  FINANCIAL FRAUD DETECTION  CRIMINAL PROSECUTION  CIVIL LITIGATION
  • 15. With computers becoming more and more involved in our everyday lives, both professionally and socially, there is a need for computer forensics. This field will enable crucial electronic evidence to be found, whether it was lost, deleted, damaged, or hidden and used to prosecute individuals that belive they have succecessfully beaten the system.