SlideShare ist ein Scribd-Unternehmen logo
1 von 22
COMPUTER
FORENSICS
Varun Sehgal
1208213037
Index
 Computer Forensics & it’s objective.
 Why Computer Forensics?
 History of Computer Forensics.
 Who uses computer forensics?
 Digital Evidences & it’s types.
 Computer Forensics Algorithm.
 What shouldn’t be done during Investigation?
 Computer Forensics Tools.
Computer Forensics Applications.
 Advantages of Computer Forensics.
 Disadvantages of Computer Forensics.
 Conclusions.
What is Computer Forensics?
“Computer Forensics is the process of identifying,
preserving, analyzing and presenting the digital
evidence in such a manner that the evidences are
legally acceptable”.
Objective of Computer Forensics
The main objective is to find the criminal which is
directly or indirectly related to cyber world.
 To find out the digital evidences.
 Presenting evidences in a manner that leads to
legal action of the criminal.
Why Computer Forensics?
 Employee internet abuse.
 Unauthorized disclosure of corporate information.
 Industrial espionage.
 Damage assessment.
 Criminal fraud and deception cases.
 Countless others!
History of Computer Forensics
 Bankruptcy in Enron in December 2001.
 Hundreds of employees were left jobless while some
executives seemed to benefit from the company's
collapse.
 The United States Congress decided to investigate and
a specialized detective force began to search through
hundreds of Enron employee computers using computer
forensics.
WHO USES COMPUTER FORENSICS?
 Criminal Prosecutors - Rely on evidence obtained
from a computer to prosecute suspects and use as
evidence.
 Civil Litigations - Personal and business data
discovered on a computer can be used in fraud,
harassment, or discrimination cases.
DIGITAL EVIDENCES
“Any data that is recorded or preserved on any
medium in or by a computer system or other similar
device, that can be read or understand by a person or
a computer system or other similar device”.
TYPE OF DIGITAL EVIDENCES
 PERSISTANT DATA- Data that remains unaffected
when the computer is turned off.
Example- Hard Drives & storage media.
 VOLATILE DATA- Data that would be lost if the
computer is turned off.
Example-Deleted files, computer history, the computer's
registry, temporary files and web browsing history.
RULES FOR DIGITAL EVIDENCES
Admissible-Must be able to be used in court or
elsewhere.
Authentic-Evidence must be relevant to the case.
Complete-Must not lack any information.
Reliable-No question about authenticity.
Believable-Clear, easy to understand, and
believable by a jury.
Steps of Collection of Evidence
 Find the evidence; where is it stored.
 Find relevant data – recovery.
 Create order of volatility.
 Collect evidence – use tools.
 Good documentation of all the actions.
Algorithm
Cross-Drive Analysis Algorithm
-> Correlates information found on multiple hard drives.
-> Identify social networks & perform anomaly detection.
-> Still being researched.
 Live Analysis Algorithm
-> Examine computers from within the operating system.
-> Use custom forensics tools to extract various evidence.
-> Useful when dealing with Encrypting File Systems.
Steps of Investigation in Live Analysis
 Acquisition: Physically or remotely obtaining
possession of the computer and external physical
storage devices.
 Identification: This step involves identifying
what data could be recovered and electronically
retrieving it by running various Computer Forensic
tools and software suites.
Contd.
 Evaluation: Evaluating the data recovered to
determine if and how it could be used again the suspect
for prosecution in court.
 Presentation: Presentation of evidence discovered
in a manner which is understood by lawyers, non-
technically staff/management, and suitable as evidence
as determined by laws.
What not to be done during
investigation?
Avoid changing date/time stamps (of files for
example)or changing data itself.
Overwriting of unallocated space (which can
happen on re-boot for example).
Computer Forensics Tools
Disk imaging software.
Hashing tools.
File recovery programs.
Encryption decoding software.
Password cracking software.
COMPUTER FORENSICS APPLICATION
 Financial fraud detection.
 Corporate security policy.
Criminal prosecution.
SKILLLS REQUIRED FOR COMPUTER
FORENSICS
Proper knowledge of computer.
Strong computer science fundamentals.
Strong system administrative skills.
Knowledge of the latest forensic tools.
Advantages
Digital Forensics help to protect from and solve cases
involving:
Theft of intellectual property- This is related to any act
that allows access to customer data and any confidential
information.
Financial Fraud- This is related to anything that uses
fraudulent purchase of victims information to conduct
fraudulent transactions.
Disadvantages
Digital evidence accepted into court must
prove that there is no tampering.
Costs- producing electronic records &
preserving them is extremely costly.
Legal practitioners must have extensive
computer knowledge.
Conclusion
This field will enable crucial electronic evidence to
be found, whether it was lost, deleted, damaged, or
hidden, and used to prosecute individuals that
believe they have successfully beaten the system.
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxBhupeshkumar Nanhe
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptSurajgroupsvideo
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
Operating System Forensics
Operating System ForensicsOperating System Forensics
Operating System ForensicsArunJS5
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital ForensicsManik Bhola
 
Anti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifactsAnti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifactsgaurang17
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic pptSuchita Rawat
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics Avinash Mavuru
 
Forensic et réponse à incident - procédure (rattrapage module ESD)
Forensic et réponse à incident - procédure (rattrapage module ESD)Forensic et réponse à incident - procédure (rattrapage module ESD)
Forensic et réponse à incident - procédure (rattrapage module ESD)ESD Cybersecurity Academy
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital ForensicsOldsun
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 

Was ist angesagt? (20)

Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Présentation rattrapage module Forensic
Présentation rattrapage module ForensicPrésentation rattrapage module Forensic
Présentation rattrapage module Forensic
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Operating System Forensics
Operating System ForensicsOperating System Forensics
Operating System Forensics
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
 
Anti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifactsAnti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifacts
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 
Cyber Forensics & Challenges
Cyber Forensics & ChallengesCyber Forensics & Challenges
Cyber Forensics & Challenges
 
Forensic et réponse à incident - procédure (rattrapage module ESD)
Forensic et réponse à incident - procédure (rattrapage module ESD)Forensic et réponse à incident - procédure (rattrapage module ESD)
Forensic et réponse à incident - procédure (rattrapage module ESD)
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 

Ähnlich wie Computer forensics Slides

Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensicsLalit Garg
 
Evidence and data
Evidence and dataEvidence and data
Evidence and dataAtul Rai
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)JIEMS Akkalkuwa
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortressSTO STRATEGY
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensicsJohnson Ubah
 
Maintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docxMaintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docxsmile790243
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensicsRahul Baghla
 
computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfGnanavi2
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemsMayank Diwakar
 

Ähnlich wie Computer forensics Slides (20)

Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
Evidence and data
Evidence and dataEvidence and data
Evidence and data
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
Cyber
CyberCyber
Cyber
 
R15 a0533 cf converted
R15 a0533 cf convertedR15 a0533 cf converted
R15 a0533 cf converted
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortress
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
 
Maintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docxMaintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docx
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdf
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
 

Kürzlich hochgeladen

Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 

Kürzlich hochgeladen (20)

Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 

Computer forensics Slides

  • 2. Index  Computer Forensics & it’s objective.  Why Computer Forensics?  History of Computer Forensics.  Who uses computer forensics?  Digital Evidences & it’s types.  Computer Forensics Algorithm.  What shouldn’t be done during Investigation?  Computer Forensics Tools. Computer Forensics Applications.  Advantages of Computer Forensics.  Disadvantages of Computer Forensics.  Conclusions.
  • 3. What is Computer Forensics? “Computer Forensics is the process of identifying, preserving, analyzing and presenting the digital evidence in such a manner that the evidences are legally acceptable”.
  • 4. Objective of Computer Forensics The main objective is to find the criminal which is directly or indirectly related to cyber world.  To find out the digital evidences.  Presenting evidences in a manner that leads to legal action of the criminal.
  • 5. Why Computer Forensics?  Employee internet abuse.  Unauthorized disclosure of corporate information.  Industrial espionage.  Damage assessment.  Criminal fraud and deception cases.  Countless others!
  • 6. History of Computer Forensics  Bankruptcy in Enron in December 2001.  Hundreds of employees were left jobless while some executives seemed to benefit from the company's collapse.  The United States Congress decided to investigate and a specialized detective force began to search through hundreds of Enron employee computers using computer forensics.
  • 7. WHO USES COMPUTER FORENSICS?  Criminal Prosecutors - Rely on evidence obtained from a computer to prosecute suspects and use as evidence.  Civil Litigations - Personal and business data discovered on a computer can be used in fraud, harassment, or discrimination cases.
  • 8. DIGITAL EVIDENCES “Any data that is recorded or preserved on any medium in or by a computer system or other similar device, that can be read or understand by a person or a computer system or other similar device”.
  • 9. TYPE OF DIGITAL EVIDENCES  PERSISTANT DATA- Data that remains unaffected when the computer is turned off. Example- Hard Drives & storage media.  VOLATILE DATA- Data that would be lost if the computer is turned off. Example-Deleted files, computer history, the computer's registry, temporary files and web browsing history.
  • 10. RULES FOR DIGITAL EVIDENCES Admissible-Must be able to be used in court or elsewhere. Authentic-Evidence must be relevant to the case. Complete-Must not lack any information. Reliable-No question about authenticity. Believable-Clear, easy to understand, and believable by a jury.
  • 11. Steps of Collection of Evidence  Find the evidence; where is it stored.  Find relevant data – recovery.  Create order of volatility.  Collect evidence – use tools.  Good documentation of all the actions.
  • 12. Algorithm Cross-Drive Analysis Algorithm -> Correlates information found on multiple hard drives. -> Identify social networks & perform anomaly detection. -> Still being researched.  Live Analysis Algorithm -> Examine computers from within the operating system. -> Use custom forensics tools to extract various evidence. -> Useful when dealing with Encrypting File Systems.
  • 13. Steps of Investigation in Live Analysis  Acquisition: Physically or remotely obtaining possession of the computer and external physical storage devices.  Identification: This step involves identifying what data could be recovered and electronically retrieving it by running various Computer Forensic tools and software suites.
  • 14. Contd.  Evaluation: Evaluating the data recovered to determine if and how it could be used again the suspect for prosecution in court.  Presentation: Presentation of evidence discovered in a manner which is understood by lawyers, non- technically staff/management, and suitable as evidence as determined by laws.
  • 15. What not to be done during investigation? Avoid changing date/time stamps (of files for example)or changing data itself. Overwriting of unallocated space (which can happen on re-boot for example).
  • 16. Computer Forensics Tools Disk imaging software. Hashing tools. File recovery programs. Encryption decoding software. Password cracking software.
  • 17. COMPUTER FORENSICS APPLICATION  Financial fraud detection.  Corporate security policy. Criminal prosecution.
  • 18. SKILLLS REQUIRED FOR COMPUTER FORENSICS Proper knowledge of computer. Strong computer science fundamentals. Strong system administrative skills. Knowledge of the latest forensic tools.
  • 19. Advantages Digital Forensics help to protect from and solve cases involving: Theft of intellectual property- This is related to any act that allows access to customer data and any confidential information. Financial Fraud- This is related to anything that uses fraudulent purchase of victims information to conduct fraudulent transactions.
  • 20. Disadvantages Digital evidence accepted into court must prove that there is no tampering. Costs- producing electronic records & preserving them is extremely costly. Legal practitioners must have extensive computer knowledge.
  • 21. Conclusion This field will enable crucial electronic evidence to be found, whether it was lost, deleted, damaged, or hidden, and used to prosecute individuals that believe they have successfully beaten the system.