Download
computer forensics n.
Skip this Video
Loading SlideShow in 5 Seconds..
COMPUTER FORENSICS PowerPoint Presentation
Download Presentation
COMPUTER FORENSICS

COMPUTER FORENSICS

520 Views Download Presentation
Download Presentation

COMPUTER FORENSICS

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. COMPUTER FORENSICS

  2. COMPUTER FORENSICSSYNOPSIS: What is meant by computer forensics? • Principle, Function of computer forensics. • History about computer forensics. • Needs of computer forensics. • Top 10 location for evidence. • Types of computer forensics/forensic tools • Methodology about computer forensics. • Applications/skills required for forensics. • Conclusion.

  3. Computer forensicsPRINCIPLE “Forensic computing is the process of - a)Identifying b)Preserving c)Analysing and d)Presenting digital evidence in a manner that is acceptable.”

  4. FUNCTION: • Detect a computer incident, identify the intruders and prosecute the perpetrator in a court of law.

  5. HISTORY • Began to evolve more than 30 years ago in US when law enforcement and military investigators started seeing criminals get technical. • Over the next decades, and up to today, the field has exploded. Law enforcement and the military continue to have a large presence in the information security and computer forensic field at the local, state and federal level.

  6. NEEDS OF COMPUTER FORENSICS • To produce evidence in the court that can lead to the punishment of the actual. • To ensure the integrity of computer system. • To focus on response to hi-tech offenses, started to intertwine.

  7. CYBER CRIME: “any illegal act that involves a computer it’s system or it’s applications”. • Burglary • Suicide • Obscenity • Homicide • Administrative investigation • stalking • Types of cyber crime : • Child prom • Breech of computer security • Fraud /Theft • Copy right violations • Identity theft • Narcotics investigations • Threats

  8. Top 10 Location for evidence • Software/hardware added. • File sharing ability • E-mails • Internet history files • Slack/unallocated space • Temporary internet files • Buddy lists, personal chat room • News groups/club lists/posting • Settings, folder structure, file names • File storage dates

  9. ForensicTools • Black light-windows MAC and IOS forensic analysis software. • Internet evidence finder • SANS INVESTIGATIVE FORENSICS TOOL KIT (SIFT)- multi purpose operating system • Hard ware • Write blockers • USB blockers • IDE blockers • SATA blockers • SD card blockers • FRED work stations • Evidence bags • Painters bucket

  10. METHODOLOGY • Shut down the computer • Transport the computer system to a secure location • Make bit stream back ups of hard disks and floppy disks • Mathematically verify data on all storage devices • Document the system date and time • Make a list of key search words • Evaluate the windows swap file • Evaluate file slack

  11. APPLICATIONS • Financial fraud detection • Criminal prosecution • Civil litigation • Corporate security policy and acceptable violations • Domestic • Marketing

  12. Skills required: a)strong analytical skills b)strong computer science fundamentals c)strong system administrative skills

  13. BENEFITS: • Information and evidence to solve a problem • Scientist does the job of solving a crime through analysing data • Using forensic science, it is easier to track the history and trace the events related to the crime • Using analysis tools and utilities

  14. Top 10 Ethical Hackers in India | Best Indian Hackers | Indian Ethical Hackers 1 ) Sunny Vaghela 2 ) Ankit Fadia 3 ) Trishneet Arora 4 ) Vivek Ramchandran 5 ) Koushik Dutta 6 ) Aseem Jakhar 7 ) Sai Satish 8 ) Benild Joseph 9 ) Falgun Rathod 10) Rahul  Tyagi

  15. Conclusion • With computers becoming more and more involved in our everyday lives, both professionally and socially, there is a need for computer forensics. This field will enable crucial electronic evidence to be found, whether it was lost, deleted, damaged, or hidden, and used to prosecute individuals that believe they have successfully beaten the system.

  16. queries