SlideShare une entreprise Scribd logo
1  sur  28
Digital & Computer
Forensic
1
By :Rahul Badekar (2)
ME(IT)
CONTENTS:-
Defining Digital & Computer Forensics
Characteristics
Needs
History
Goal
Cyber Crime & Evidence
Rules Of Handling Evidence
Top 10 Location For Evidence
Computer Forensics Methodology
Applications of Computer Forensics
Who Uses Computer Forensics
Skills Requirements for Computer Forensics 2
What is Digital Forensics?
• “Digital forensics (sometimes known as digital forensic
science) is a branch of forensic science encompassing the
recovery and investigation of material found in digital
devices, often in relation to computer crime.
• Digital forensics was originally used as a synonym
for computer forensics but has expanded to cover
investigation of all devices capable of storing digital data.
• The technical aspect of an investigation is divided into
several sub-branches, relating to the type of digital
devices involved computer forensics, network
forensics, forensic data analysis and mobile device
forensics.
3
What is Digital Forensics?
4
5
Community objective
6
The Process
• The primary activities of DFS are investigative in nature.
• The investigative process encompasses
• Identification
• Preservation
• Collection
• Examination
• Analysis
• Presentation
• Decision
7
Investigative Process
8
Subcategories of DFS
• There is a consensus that there are at least 3 distinct
types of DFS analysis
• Media Analysis
• Examining physical media for evidence
• Code Analysis
• Review of software for malicious signatures
• Network Analysis
• Scrutinize network traffic and logs to identify and locate
What is Computer Forensics?
• “Forensic computing is the process of identifying,
preserving, analyzing and presenting digital evidence in a
manner that is legally acceptable.”(Rodney Mckemmish
1999).
• Evidence might be required for a wide range of computer
crimes and misuses.
• Information collected assists in arrests, prosecution,
termination of employment, and preventing future illegal
activity
9
What is Computer Forensics?
10
Fundamentals
Military
Acquisition
Analysis
Examination
Report
Investigation
Criminal
FRYE
FRE 702
Daubert/Kumho
Civil
Federal Rules of Civil Procedure
Sedona
Rowe
Rules of Evidence
Expert Witness
Friend of the Court
Technical Expert
Presentation
Standards & Guidelines
Law Enforcement Private Sector
Computer Forensics
Characteristics of Computer
Forensic
• IDENTIFYING
• PRESERVING
• ANALYZING
• PRESENTING
11
Needs of Computer Forensic
• To produce evidence in the court that can
lead to the punishment of the actual.
• To ensure the integrity of the computer
system.
• To focus on the response to hi-tech
offenses, started to intertwine.
12
History of Computer Forensic
• Began to evolve more than 30 years ago in
US when law enforcement and military
investigators started seeing criminals get
technical.
• Over the next decades, and up to today,
the field has exploded. Law enforcement
and the military continue to have a large
presence in the information security and
computer forensic field at the local, state
and federal level.
13
Goal of Computer Forensic
• The main goal of computer forensic
experts is not only to find the criminal but
also to find out the evidence and the
presentation of the evidence in a manner
that leads to legal action of the criminal.
14
Cyber Crime & Evidence
• CYBER CRIME
• Cyber crime occurs when information
technology is used to commit or conceal
an offence.
15
Types of Cyber Crime
• Forgery
• Breech of Computer Security
• Fraud/Theft
• Copyright Violations
• Identity Theft
• Threats
• Burglary
• Homicide
• Administrative Investigations
• Cyber Terrorism
• Sales and Investment Fraud
• Electronic Fund Transfer Fraud 16
17
Cybercrime: Top 20 Countries
18
Evidence
• An item does not become officially a piece of evidence
until a court admits it.
• Much of forensics practice concerns how to collect,
preserve and analyze these items without compromising
their potential to be admitted as evidence in a court of
law.
19
Digital Evidence
• “Any data that is recorded or preserved on any medium
in or by a computer system or other similar device, that
can be read or understand by a person or a computer
system or other similar device. It includes a display, print
out or other output of that data.”
20
Types of Digital Evidence
1) PERSISTANT DATA
Meaning data that remains intact when the
computer is turned off. E.g. hard drives, disk drives and
removable storage devices (such as USB drives or flash
drives).
2) VOLATILE DATA,
Meaning data that would be lost if the computer is
turned off. E.g. deleted files, computer history, the
computer's registry, temporary files and web browsing
history. 21
5 Rules of Evidences
1) Admissible
• Must be able to be used in court or elsewhere.
2) Authentic
• Evidence relates to incident in relevant way.
3) Complete (no tunnel vision)
• Exculpatory evidence for alternative suspects.
4) Reliable
• No question about authenticity & veracity.
5) Believable
• Clear, easy to understand, and believable by a jury.
22
TOP 10 Location For Evidence
1) Internet History Files
2) Temporary Internet Files
3) Slack/Unallocated Space
4) Buddy lists, personal chat room records, others saved
areas
5) News groups/club lists/posting
6) Settings, folder structure, file names
7) File Storage Dates
8) Software/Hardware added
9) File Sharing ability
10) E-mails
23
Applications :-
• FINANCIAL FRAUD DETECTION
• CRIMINAL PROSECUTION
• CIVIL LITIGATION
• “CORPORATE SECURITY POLICY AND VIOLATIONS”
24
Who Uses Computer Forensics?
• Criminal Prosecutors
• Rely on evidence obtained from a computer to
prosecute suspects and use as evidence.
• Civil Litigations
• Personal and business data discovered on a computer
can be used in fraud, harassment, or discrimination
cases.
• Private Corporations
• Obtained evidence from employee computers can be
used as evidence in harassment, fraud, and
embezzlement cases. 25
Who Uses Computer Forensics?
(cont..)
• Law Enforcement Officials
• Rely on computer forensics to backup search warrants
and post-seizure handling.
• Individual/Private Citizens
• Obtain the services of professional computer forensic
specialists to support claims of harassment, abuse, or
wrongful termination from employment.
26
Skills Required For
Computer Forensics Application
• Programming or computer-related experience
• Broad understanding of operating systems and
applications
• Strong analytical skills
• Strong computer science fundamentals
• Strong system administrative skills
• Knowledge of the latest intruder tools
• Knowledge of cryptography and steganography
• Strong understanding of the rules of evidence and
evidence handling
• Ability to be an expert witness in a court of law
27
`
28

Contenu connexe

Tendances

04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeAung Thu Rha Hein
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptSurajgroupsvideo
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsSCREAM138
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its roleSudeshna Basak
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Anpumathews
 
Email investigation
Email investigationEmail investigation
Email investigationAnimesh Shaw
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenesprimeteacher32
 
Computer forensic
Computer forensicComputer forensic
Computer forensicbhavithd
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidencerakesh mishra
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 

Tendances (20)

04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Database forensics
Database forensicsDatabase forensics
Database forensics
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its role
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Email investigation
Email investigationEmail investigation
Email investigation
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
Malware forensics
Malware forensicsMalware forensics
Malware forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Incident response process
Incident response processIncident response process
Incident response process
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 

Similaire à Digital&computforensic

Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02satyabwati
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxDaniyaHuzaifa
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxssuser2bf502
 
computer forensics by amritanshu kaushik
computer forensics by amritanshu kaushikcomputer forensics by amritanshu kaushik
computer forensics by amritanshu kaushikamritanshu4u
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Muzzammil Wani
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1Jinalkakadiya
 
Computer Forensics (1).pptx
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptxGautam708801
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsN.Jagadish Kumar
 
computer forensics
computer forensicscomputer forensics
computer forensicsAmit Singh
 
Digital forensic
Digital forensicDigital forensic
Digital forensicChandan Sah
 
UNIT 1Computer forensics science. .pptx
UNIT 1Computer forensics science.  .pptxUNIT 1Computer forensics science.  .pptx
UNIT 1Computer forensics science. .pptxramkumarttf69
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh tManesh T
 
Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowWinston & Strawn LLP
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emamahmad abdelhafeez
 

Similaire à Digital&computforensic (20)

Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer forensics by amritanshu kaushik
computer forensics by amritanshu kaushikcomputer forensics by amritanshu kaushik
computer forensics by amritanshu kaushik
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
 
Computer Forensics (1).pptx
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptx
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection tools
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Digital forensic
Digital forensicDigital forensic
Digital forensic
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
UNIT 1Computer forensics science. .pptx
UNIT 1Computer forensics science.  .pptxUNIT 1Computer forensics science.  .pptx
UNIT 1Computer forensics science. .pptx
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh t
 
Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to Know
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 

Dernier

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSrknatarajan
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 

Dernier (20)

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 

Digital&computforensic

  • 1. Digital & Computer Forensic 1 By :Rahul Badekar (2) ME(IT)
  • 2. CONTENTS:- Defining Digital & Computer Forensics Characteristics Needs History Goal Cyber Crime & Evidence Rules Of Handling Evidence Top 10 Location For Evidence Computer Forensics Methodology Applications of Computer Forensics Who Uses Computer Forensics Skills Requirements for Computer Forensics 2
  • 3. What is Digital Forensics? • “Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. • Digital forensics was originally used as a synonym for computer forensics but has expanded to cover investigation of all devices capable of storing digital data. • The technical aspect of an investigation is divided into several sub-branches, relating to the type of digital devices involved computer forensics, network forensics, forensic data analysis and mobile device forensics. 3
  • 4. What is Digital Forensics? 4
  • 6. 6 The Process • The primary activities of DFS are investigative in nature. • The investigative process encompasses • Identification • Preservation • Collection • Examination • Analysis • Presentation • Decision
  • 8. 8 Subcategories of DFS • There is a consensus that there are at least 3 distinct types of DFS analysis • Media Analysis • Examining physical media for evidence • Code Analysis • Review of software for malicious signatures • Network Analysis • Scrutinize network traffic and logs to identify and locate
  • 9. What is Computer Forensics? • “Forensic computing is the process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally acceptable.”(Rodney Mckemmish 1999). • Evidence might be required for a wide range of computer crimes and misuses. • Information collected assists in arrests, prosecution, termination of employment, and preventing future illegal activity 9
  • 10. What is Computer Forensics? 10 Fundamentals Military Acquisition Analysis Examination Report Investigation Criminal FRYE FRE 702 Daubert/Kumho Civil Federal Rules of Civil Procedure Sedona Rowe Rules of Evidence Expert Witness Friend of the Court Technical Expert Presentation Standards & Guidelines Law Enforcement Private Sector Computer Forensics
  • 11. Characteristics of Computer Forensic • IDENTIFYING • PRESERVING • ANALYZING • PRESENTING 11
  • 12. Needs of Computer Forensic • To produce evidence in the court that can lead to the punishment of the actual. • To ensure the integrity of the computer system. • To focus on the response to hi-tech offenses, started to intertwine. 12
  • 13. History of Computer Forensic • Began to evolve more than 30 years ago in US when law enforcement and military investigators started seeing criminals get technical. • Over the next decades, and up to today, the field has exploded. Law enforcement and the military continue to have a large presence in the information security and computer forensic field at the local, state and federal level. 13
  • 14. Goal of Computer Forensic • The main goal of computer forensic experts is not only to find the criminal but also to find out the evidence and the presentation of the evidence in a manner that leads to legal action of the criminal. 14
  • 15. Cyber Crime & Evidence • CYBER CRIME • Cyber crime occurs when information technology is used to commit or conceal an offence. 15
  • 16. Types of Cyber Crime • Forgery • Breech of Computer Security • Fraud/Theft • Copyright Violations • Identity Theft • Threats • Burglary • Homicide • Administrative Investigations • Cyber Terrorism • Sales and Investment Fraud • Electronic Fund Transfer Fraud 16
  • 17. 17
  • 18. Cybercrime: Top 20 Countries 18
  • 19. Evidence • An item does not become officially a piece of evidence until a court admits it. • Much of forensics practice concerns how to collect, preserve and analyze these items without compromising their potential to be admitted as evidence in a court of law. 19
  • 20. Digital Evidence • “Any data that is recorded or preserved on any medium in or by a computer system or other similar device, that can be read or understand by a person or a computer system or other similar device. It includes a display, print out or other output of that data.” 20
  • 21. Types of Digital Evidence 1) PERSISTANT DATA Meaning data that remains intact when the computer is turned off. E.g. hard drives, disk drives and removable storage devices (such as USB drives or flash drives). 2) VOLATILE DATA, Meaning data that would be lost if the computer is turned off. E.g. deleted files, computer history, the computer's registry, temporary files and web browsing history. 21
  • 22. 5 Rules of Evidences 1) Admissible • Must be able to be used in court or elsewhere. 2) Authentic • Evidence relates to incident in relevant way. 3) Complete (no tunnel vision) • Exculpatory evidence for alternative suspects. 4) Reliable • No question about authenticity & veracity. 5) Believable • Clear, easy to understand, and believable by a jury. 22
  • 23. TOP 10 Location For Evidence 1) Internet History Files 2) Temporary Internet Files 3) Slack/Unallocated Space 4) Buddy lists, personal chat room records, others saved areas 5) News groups/club lists/posting 6) Settings, folder structure, file names 7) File Storage Dates 8) Software/Hardware added 9) File Sharing ability 10) E-mails 23
  • 24. Applications :- • FINANCIAL FRAUD DETECTION • CRIMINAL PROSECUTION • CIVIL LITIGATION • “CORPORATE SECURITY POLICY AND VIOLATIONS” 24
  • 25. Who Uses Computer Forensics? • Criminal Prosecutors • Rely on evidence obtained from a computer to prosecute suspects and use as evidence. • Civil Litigations • Personal and business data discovered on a computer can be used in fraud, harassment, or discrimination cases. • Private Corporations • Obtained evidence from employee computers can be used as evidence in harassment, fraud, and embezzlement cases. 25
  • 26. Who Uses Computer Forensics? (cont..) • Law Enforcement Officials • Rely on computer forensics to backup search warrants and post-seizure handling. • Individual/Private Citizens • Obtain the services of professional computer forensic specialists to support claims of harassment, abuse, or wrongful termination from employment. 26
  • 27. Skills Required For Computer Forensics Application • Programming or computer-related experience • Broad understanding of operating systems and applications • Strong analytical skills • Strong computer science fundamentals • Strong system administrative skills • Knowledge of the latest intruder tools • Knowledge of cryptography and steganography • Strong understanding of the rules of evidence and evidence handling • Ability to be an expert witness in a court of law 27
  • 28. ` 28