SlideShare a Scribd company logo
1 of 12
COMPUTER FORENSICS
Prepared by Aslıhan Nur Erol
A company collapses but
executives benefit from
it. How can this be?
Law Computer science
a computer a network
COMPUTER CRIMES
Cyber terrorism Child pornography
Internet banking fraud
JONATHAN JAMES
• First teenager who was sent to prison for hacking
• He accessed the computer system of US
Department of Defense and viewed sensitive e-
mails and captured employee usernames and
passwords.
• He also broke into NASA computers and stole
software worth approximately $1.7 million.
• NASA was forced to shut down its computer
systems, which caused the organization a loss of
$41.000.
MOD ( MASTERS OF DECEPTION )
• They stole the passwords and technical data from Pacific Bell,
Nynex and other telephone companies as well as several big
credit agencies and two major universities.
• One company, Southwestern Bell, suffered losses of $370.000.
• At the end of a major investigation by the FBI, five of MOD’s
members were sentenced to prison.
MAFIABOY
• In February 2000, he began a series of attacks
that paralyzed many of Internet’s major sites,
including Yahoo!, Amazon.com, E*TRADE,
eBay and CNN.
• Distributed denial-of-service (DDoS) attacks
• DDoS attack is an attempt to make a computer
resource unavailable to its users.
• It can destroy memory and network devices and
damage or shut down the operations of a
computer.
TWO BASIC TYPES OF DATA COLLECTED IN
COMPUTER FORENSICS
• Persistent data: the data
that is stored on a local
hard drive and is
preserved when the
computer is turned off
• Volatile data: the data that is
stored in memory and is lost
when the computer loses power
or is turned off
SPECIFIC GUIDELINES INDICATE
• When investigators are allowed to include
computers in a search,
• What kind of information is admissible in court,
• What steps to follow in searching for information
in a computer.
• If an investigator doesn’t
follow these guidelines, the
evidence will not be
accepted in court.
ANTI-FORENSICS
The most common technique is
hiding the data.
• Changing the information in files’
headers.
• Dividing files up into small sections
and hiding each section at the end
of other files.
• Hiding one file inside another.
• Encryption.
METADATA:
• Anti-forensic tools can also change the metadata attached to files.
• This is a widespread way of causing difficulty for investigators.
information such as the date when a file was created or last altered.

More Related Content

What's hot

Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information SystemSatya P. Joshi
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacyJoy Chakraborty
 
COMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITYCOMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITYzenbrowski
 
Presentation 1 security
Presentation 1 securityPresentation 1 security
Presentation 1 securityOkonkwo uzonna
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesIsaiah Edem
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Legal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud ComputingLegal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud ComputingNeal Axton
 

What's hot (15)

Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Desktop Security
Desktop SecurityDesktop Security
Desktop Security
 
COMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITYCOMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITY
 
PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Presentation 1 security
Presentation 1 securityPresentation 1 security
Presentation 1 security
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting Crimes
 
Lec1 ict
Lec1 ictLec1 ict
Lec1 ict
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Legal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud ComputingLegal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud Computing
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Similar to Computer Forensics Guide on Crimes, Techniques & Evidence

DIGITAL FORENSICS_PRESENTATION
DIGITAL FORENSICS_PRESENTATIONDIGITAL FORENSICS_PRESENTATION
DIGITAL FORENSICS_PRESENTATIONAmina Baha
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Anpumathews
 
CNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring RationaleCNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring RationaleSam Bowne
 
Network security
Network securityNetwork security
Network securitymena kaheel
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day ConferenceBrian Pichman
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challengesCRM
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowWinston & Strawn LLP
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...Cengage Learning
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
L007 Managing System Security (2016)
L007 Managing System Security (2016)L007 Managing System Security (2016)
L007 Managing System Security (2016)Jan Wong
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptxAmbuj Kumar
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.pptEndAlk15
 
Chapter1_2018.pptxddfsdfffffffffffffffffffffffffff
Chapter1_2018.pptxddfsdfffffffffffffffffffffffffffChapter1_2018.pptxddfsdfffffffffffffffffffffffffff
Chapter1_2018.pptxddfsdfffffffffffffffffffffffffffIbrahimYasser16
 
Sensitive Data Exposure
Sensitive Data ExposureSensitive Data Exposure
Sensitive Data Exposureabodiford
 

Similar to Computer Forensics Guide on Crimes, Techniques & Evidence (20)

Quality of information
Quality of informationQuality of information
Quality of information
 
DIGITAL FORENSICS_PRESENTATION
DIGITAL FORENSICS_PRESENTATIONDIGITAL FORENSICS_PRESENTATION
DIGITAL FORENSICS_PRESENTATION
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
CNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring RationaleCNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring Rationale
 
Network security
Network securityNetwork security
Network security
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to Know
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
L007 Managing System Security (2016)
L007 Managing System Security (2016)L007 Managing System Security (2016)
L007 Managing System Security (2016)
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
sc.pptx
sc.pptxsc.pptx
sc.pptx
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Chapter #1.pptx
Chapter #1.pptxChapter #1.pptx
Chapter #1.pptx
 
Chapter1_2018.pptxddfsdfffffffffffffffffffffffffff
Chapter1_2018.pptxddfsdfffffffffffffffffffffffffffChapter1_2018.pptxddfsdfffffffffffffffffffffffffff
Chapter1_2018.pptxddfsdfffffffffffffffffffffffffff
 
Sensitive Data Exposure
Sensitive Data ExposureSensitive Data Exposure
Sensitive Data Exposure
 

More from Boun Yadyok

Alcohol Addiction
Alcohol AddictionAlcohol Addiction
Alcohol AddictionBoun Yadyok
 
Chukotka slides (p2 text1)
Chukotka slides (p2 text1)Chukotka slides (p2 text1)
Chukotka slides (p2 text1)Boun Yadyok
 
The procrastination doom loop
The procrastination doom loopThe procrastination doom loop
The procrastination doom loopBoun Yadyok
 
Sports, academic performanceand identity
Sports, academic performanceand identitySports, academic performanceand identity
Sports, academic performanceand identityBoun Yadyok
 
Offshore oil rigs
Offshore oil rigsOffshore oil rigs
Offshore oil rigsBoun Yadyok
 

More from Boun Yadyok (10)

Sleepy teens
Sleepy teens Sleepy teens
Sleepy teens
 
Sleepy teens
Sleepy teensSleepy teens
Sleepy teens
 
Alcohol Addiction
Alcohol AddictionAlcohol Addiction
Alcohol Addiction
 
Pandas
PandasPandas
Pandas
 
Media literacy
Media literacyMedia literacy
Media literacy
 
Chukotka slides (p2 text1)
Chukotka slides (p2 text1)Chukotka slides (p2 text1)
Chukotka slides (p2 text1)
 
What is anime?
What is anime?What is anime?
What is anime?
 
The procrastination doom loop
The procrastination doom loopThe procrastination doom loop
The procrastination doom loop
 
Sports, academic performanceand identity
Sports, academic performanceand identitySports, academic performanceand identity
Sports, academic performanceand identity
 
Offshore oil rigs
Offshore oil rigsOffshore oil rigs
Offshore oil rigs
 

Recently uploaded

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Computer Forensics Guide on Crimes, Techniques & Evidence

  • 1. COMPUTER FORENSICS Prepared by Aslıhan Nur Erol
  • 2. A company collapses but executives benefit from it. How can this be?
  • 4. a computer a network
  • 5. COMPUTER CRIMES Cyber terrorism Child pornography Internet banking fraud
  • 6. JONATHAN JAMES • First teenager who was sent to prison for hacking • He accessed the computer system of US Department of Defense and viewed sensitive e- mails and captured employee usernames and passwords. • He also broke into NASA computers and stole software worth approximately $1.7 million. • NASA was forced to shut down its computer systems, which caused the organization a loss of $41.000.
  • 7. MOD ( MASTERS OF DECEPTION ) • They stole the passwords and technical data from Pacific Bell, Nynex and other telephone companies as well as several big credit agencies and two major universities. • One company, Southwestern Bell, suffered losses of $370.000. • At the end of a major investigation by the FBI, five of MOD’s members were sentenced to prison.
  • 8. MAFIABOY • In February 2000, he began a series of attacks that paralyzed many of Internet’s major sites, including Yahoo!, Amazon.com, E*TRADE, eBay and CNN. • Distributed denial-of-service (DDoS) attacks • DDoS attack is an attempt to make a computer resource unavailable to its users. • It can destroy memory and network devices and damage or shut down the operations of a computer.
  • 9. TWO BASIC TYPES OF DATA COLLECTED IN COMPUTER FORENSICS • Persistent data: the data that is stored on a local hard drive and is preserved when the computer is turned off • Volatile data: the data that is stored in memory and is lost when the computer loses power or is turned off
  • 10. SPECIFIC GUIDELINES INDICATE • When investigators are allowed to include computers in a search, • What kind of information is admissible in court, • What steps to follow in searching for information in a computer. • If an investigator doesn’t follow these guidelines, the evidence will not be accepted in court.
  • 11. ANTI-FORENSICS The most common technique is hiding the data. • Changing the information in files’ headers. • Dividing files up into small sections and hiding each section at the end of other files. • Hiding one file inside another. • Encryption.
  • 12. METADATA: • Anti-forensic tools can also change the metadata attached to files. • This is a widespread way of causing difficulty for investigators. information such as the date when a file was created or last altered.