computer forensics
DESCRIPTION
COMPUTER FORENSICS. COMPUTER FORENSICS SYNOPSIS:. What is meant by computer forensics? Principle , Function of computer forensics. History about computer forensics. Needs of computer forensics. Top 10 location for evidence. Types of computer forensics/forensic tools - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: COMPUTER FORENSICS](https://reader036.vdocuments.mx/reader036/viewer/2022062501/56816380550346895dd4613c/html5/thumbnails/1.jpg)
COMPUTER
FORENSICS
![Page 2: COMPUTER FORENSICS](https://reader036.vdocuments.mx/reader036/viewer/2022062501/56816380550346895dd4613c/html5/thumbnails/2.jpg)
What is meant by computer forensics? Principle , Function of computer forensics. History about computer forensics. Needs of computer forensics. Top 10 location for evidence. Types of computer forensics/forensic tools Methodology about computer forensics. Applications/skills required for forensics. Conclusion.
COMPUTER FORENSICS SYNOPSIS:
![Page 3: COMPUTER FORENSICS](https://reader036.vdocuments.mx/reader036/viewer/2022062501/56816380550346895dd4613c/html5/thumbnails/3.jpg)
“Forensic computing is the process of -
a)Identifying b)Preserving c)Analysing and d)Presenting digital evidence in a manner that is acceptable.”
Computer forensicsPRINCIPLE
![Page 4: COMPUTER FORENSICS](https://reader036.vdocuments.mx/reader036/viewer/2022062501/56816380550346895dd4613c/html5/thumbnails/4.jpg)
Detect a computer incident, identify the intruders and prosecute the perpetrator in a court of law.
FUNCTION:
![Page 5: COMPUTER FORENSICS](https://reader036.vdocuments.mx/reader036/viewer/2022062501/56816380550346895dd4613c/html5/thumbnails/5.jpg)
HISTORY
• Began to evolve more than 30 years ago in US when law enforcement and military investigators started seeing criminals get technical.
• Over the next decades, and up to today, the field has exploded. Law enforcement and the military continue to have a large presence in the information security and computer forensic field at the local, state and federal level.
![Page 6: COMPUTER FORENSICS](https://reader036.vdocuments.mx/reader036/viewer/2022062501/56816380550346895dd4613c/html5/thumbnails/6.jpg)
To produce evidence in the court that can lead to the punishment of the actual.
To ensure the integrity of computer system. To focus on response to hi-tech offenses, started to
intertwine.
NEEDS OF COMPUTER FORENSICS
![Page 7: COMPUTER FORENSICS](https://reader036.vdocuments.mx/reader036/viewer/2022062501/56816380550346895dd4613c/html5/thumbnails/7.jpg)
Types of cyber crime : Child prom Breech of computer
security Fraud /Theft Copy right violations Identity theft Narcotics investigations Threats
Burglary Suicide Obscenity Homicide Administrative
investigation stalking
CYBER CRIME: “any illegal act that involves a computer it’s system or it’s applications”.
![Page 8: COMPUTER FORENSICS](https://reader036.vdocuments.mx/reader036/viewer/2022062501/56816380550346895dd4613c/html5/thumbnails/8.jpg)
Internet history files Slack/unallocated space Temporary internet files Buddy lists, personal
chat room News groups/club
lists/posting Settings, folder
structure, file names File storage dates
Software/hardware added.
File sharing ability E-mails
Top 10 Location for evidence
![Page 9: COMPUTER FORENSICS](https://reader036.vdocuments.mx/reader036/viewer/2022062501/56816380550346895dd4613c/html5/thumbnails/9.jpg)
Hard ware Write blockers USB blockers IDE blockers SATA blockers SD card blockers FRED work stations Evidence bags Painters bucket
Black light-windows MAC and IOS forensic analysis software.
Internet evidence finder SANS INVESTIGATIVE
FORENSICS TOOL KIT (SIFT)- multi
purpose operating system
Forensic Tools
![Page 10: COMPUTER FORENSICS](https://reader036.vdocuments.mx/reader036/viewer/2022062501/56816380550346895dd4613c/html5/thumbnails/10.jpg)
Shut down the computer Transport the computer
system to a secure location Make bit stream back ups of
hard disks and floppy disks Mathematically verify data
on all storage devices Document the system date
and time Make a list of key search
words Evaluate the windows swap
file Evaluate file slack
METHODOLOGY
![Page 11: COMPUTER FORENSICS](https://reader036.vdocuments.mx/reader036/viewer/2022062501/56816380550346895dd4613c/html5/thumbnails/11.jpg)
Financial fraud detection Criminal prosecution Civil litigation Corporate security policy and acceptable violations Domestic Marketing
APPLICATIONS
![Page 12: COMPUTER FORENSICS](https://reader036.vdocuments.mx/reader036/viewer/2022062501/56816380550346895dd4613c/html5/thumbnails/12.jpg)
Skills required: a)strong analytical skills b)strong computer science fundamentals c)strong system administrative skills
![Page 13: COMPUTER FORENSICS](https://reader036.vdocuments.mx/reader036/viewer/2022062501/56816380550346895dd4613c/html5/thumbnails/13.jpg)
BENEFITS: Information and evidence to solve a problem Scientist does the job of solving a crime through
analysing data Using forensic science, it is easier to track the history
and trace the events related to the crime Using analysis tools and utilities
![Page 14: COMPUTER FORENSICS](https://reader036.vdocuments.mx/reader036/viewer/2022062501/56816380550346895dd4613c/html5/thumbnails/14.jpg)
1 ) Sunny Vaghela2 ) Ankit Fadia3 ) Trishneet Arora4 ) Vivek Ramchandran5 ) Koushik Dutta6 ) Aseem Jakhar7 ) Sai Satish8 ) Benild Joseph9 ) Falgun Rathod10 ) Rahul Tyagi
Top 10 Ethical Hackers in India | Best Indian Hackers | Indian Ethical Hackers
![Page 15: COMPUTER FORENSICS](https://reader036.vdocuments.mx/reader036/viewer/2022062501/56816380550346895dd4613c/html5/thumbnails/15.jpg)
With computers becoming more and more involved in our everyday lives, both professionally and socially, there is a need for computer forensics. This field will enable crucial electronic evidence to be found, whether it was lost, deleted, damaged, or hidden, and used to prosecute individuals that believe they have successfully beaten the system.
Conclusion
![Page 16: COMPUTER FORENSICS](https://reader036.vdocuments.mx/reader036/viewer/2022062501/56816380550346895dd4613c/html5/thumbnails/16.jpg)
queries
![Page 17: COMPUTER FORENSICS](https://reader036.vdocuments.mx/reader036/viewer/2022062501/56816380550346895dd4613c/html5/thumbnails/17.jpg)