computer forensics

17
COMPUTER FORENSICS

Upload: hedva

Post on 23-Feb-2016

132 views

Category:

Documents


0 download

DESCRIPTION

COMPUTER FORENSICS. COMPUTER FORENSICS SYNOPSIS:. What is meant by computer forensics? Principle , Function of computer forensics. History about computer forensics. Needs of computer forensics. Top 10 location for evidence. Types of computer forensics/forensic tools - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: COMPUTER FORENSICS

COMPUTER

FORENSICS

Page 2: COMPUTER FORENSICS

What is meant by computer forensics? Principle , Function of computer forensics. History about computer forensics. Needs of computer forensics. Top 10 location for evidence. Types of computer forensics/forensic tools Methodology about computer forensics. Applications/skills required for forensics. Conclusion.

COMPUTER FORENSICS SYNOPSIS:

Page 3: COMPUTER FORENSICS

“Forensic computing is the process of -

a)Identifying b)Preserving c)Analysing and d)Presenting digital evidence in a manner that is acceptable.”

Computer forensicsPRINCIPLE

Page 4: COMPUTER FORENSICS

Detect a computer incident, identify the intruders and prosecute the perpetrator in a court of law.

FUNCTION:

Page 5: COMPUTER FORENSICS

HISTORY

• Began to evolve more than 30 years ago in US when law enforcement and military investigators started seeing criminals get technical.

• Over the next decades, and up to today, the field has exploded. Law enforcement and the military continue to have a large presence in the information security and computer forensic field at the local, state and federal level.

Page 6: COMPUTER FORENSICS

To produce evidence in the court that can lead to the punishment of the actual.

To ensure the integrity of computer system. To focus on response to hi-tech offenses, started to

intertwine.

NEEDS OF COMPUTER FORENSICS

Page 7: COMPUTER FORENSICS

Types of cyber crime : Child prom Breech of computer

security Fraud /Theft Copy right violations Identity theft Narcotics investigations Threats

Burglary Suicide Obscenity Homicide Administrative

investigation stalking

CYBER CRIME: “any illegal act that involves a computer it’s system or it’s applications”.

Page 8: COMPUTER FORENSICS

Internet history files Slack/unallocated space Temporary internet files Buddy lists, personal

chat room News groups/club

lists/posting Settings, folder

structure, file names File storage dates

Software/hardware added.

File sharing ability E-mails

Top 10 Location for evidence

Page 9: COMPUTER FORENSICS

Hard ware Write blockers USB blockers IDE blockers SATA blockers SD card blockers FRED work stations Evidence bags Painters bucket

Black light-windows MAC and IOS forensic analysis software.

Internet evidence finder SANS INVESTIGATIVE

FORENSICS TOOL KIT (SIFT)- multi

purpose operating system

Forensic Tools

Page 10: COMPUTER FORENSICS

Shut down the computer Transport the computer

system to a secure location Make bit stream back ups of

hard disks and floppy disks Mathematically verify data

on all storage devices Document the system date

and time Make a list of key search

words Evaluate the windows swap

file Evaluate file slack

METHODOLOGY

Page 11: COMPUTER FORENSICS

Financial fraud detection Criminal prosecution Civil litigation Corporate security policy and acceptable violations Domestic Marketing

APPLICATIONS

Page 12: COMPUTER FORENSICS

Skills required: a)strong analytical skills b)strong computer science fundamentals c)strong system administrative skills

Page 13: COMPUTER FORENSICS

BENEFITS: Information and evidence to solve a problem Scientist does the job of solving a crime through

analysing data Using forensic science, it is easier to track the history

and trace the events related to the crime Using analysis tools and utilities

Page 14: COMPUTER FORENSICS

1 ) Sunny Vaghela2 ) Ankit Fadia3 ) Trishneet Arora4 ) Vivek Ramchandran5 ) Koushik Dutta6 ) Aseem Jakhar7 ) Sai Satish8 ) Benild Joseph9 ) Falgun Rathod10 ) Rahul  Tyagi 

Top 10 Ethical Hackers in India | Best Indian Hackers | Indian Ethical Hackers

Page 15: COMPUTER FORENSICS

With computers becoming more and more involved in our everyday lives, both professionally and socially, there is a need for computer forensics. This field will enable crucial electronic evidence to be found, whether it was lost, deleted, damaged, or hidden, and used to prosecute individuals that believe they have successfully beaten the system.

Conclusion

Page 16: COMPUTER FORENSICS

queries

Page 17: COMPUTER FORENSICS