BY:- 
Anil Kumar 
CSE ퟑ풓풅 Year 
0903CS121017 
1
CONTENTS:- 
Defining Computer Forensics 
Characteristics 
Needs 
History 
Goal 
Cyber Crime & Evidence 
Rules Of Handling Evidence 
Top 10 Location For Evidence 
Computer Forensics Methodology 
Applications of Computer Forensics 
Who Uses Computer Forensics 
Skills Requirements for Computer Forensics 2
What is Computer Forensics? 
• “Forensic computing is the process of identifying, 
preserving, analyzing and presenting digital evidence in a 
manner that is legally acceptable.”(Rodney Mckemmish 
1999). 
• Evidence might be required for a wide range of computer 
crimes and misuses. 
• Information collected assists in arrests, prosecution, 
termination of employment, and preventing future illegal 
activity 
3
CHARECTERISTICS OF 
COMPUTER FORENSICS 
• IDENTIFYING 
• PRESERVING 
• ANALYZING 
• PRESENTING 
4
NEEDS OF COMPUTER FORENSICS 
oTo produce evidence in the court that can 
lead to the punishment of the actual. 
oTo ensure the integrity of the computer 
system. 
oTo focus on the response to hi-tech 
offenses, started to intertwine. 
5
HISTORY OF COMPUTER FORENSICS 
o Began to evolve more than 30 years ago in US when law 
enforcement and military investigators started seeing 
criminals get technical. 
o Over the next decades, and up to today, the field has 
exploded. Law enforcement and the military continue to 
have a large presence in the information security and 
computer forensic field at the local, state and federal 
level. 
o Now a days, Software companies continue to produce 
newer and more robust forensic software programs. And 
law enforcement and the military continue to identify 
and train more and more of their personnel in the 
response to crimes involving technology. 6
GOAL OF COMPUTER FORENSICS 
• The main goal of computer forensic 
experts is not only to find the criminal but 
also to find out the evidence and the 
presentation of the evidence in a manner 
that leads to legal action of the criminal. 
7
CYBER CRIME & EVIDENCE 
• CYBER CRIME 
• Cyber crime occurs when information 
technology is used to commit or conceal an 
offence. 
8
TYPES OF CYBER CRIME 
o Forgery 
o Breech of Computer Security 
o Fraud/Theft 
o Copyright Violations 
o Identity Theft 
o Threats 
o Burglary 
o Homicide 
o Administrative Investigations 
o Cyber Terrorism 
o Sales and Investment Fraud 
o Electronic Fund Transfer Fraud 9
10
Cybercrime: Top 20 Countries 
11
Evidence 
 An item does not become officially a piece of evidence 
until a court admits it. 
 Much of forensics practice concerns how to collect, 
preserve and analyze these items without compromising 
their potential to be admitted as evidence in a court of 
law. 
12
DIGITAL EVIDENCE 
• “Any data that is recorded or preserved on any medium 
in or by a computer system or other similar device, that 
can be read or understand by a person or a computer 
system or other similar device. It includes a display, print 
out or other output of that data.” 
13
TYPES OF DIGITAL EVIDENCE 
1) PERSISTANT DATA 
Meaning data that remains intact when the 
computer is turned off. E.g. hard drives, disk drives and 
removable storage devices (such as USB drives or flash 
drives). 
2) VOLATILE DATA, 
Meaning data that would be lost if the computer is 
turned off. E.g. deleted files, computer history, the 
computer's registry, temporary files and web browsing 
history. 14
5 RULES OF EVIDENCES 
1) Admissible 
• Must be able to be used in court or elsewhere. 
2) Authentic 
• Evidence relates to incident in relevant way. 
3) Complete (no tunnel vision) 
• Exculpatory evidence for alternative suspects. 
4) Reliable 
• No question about authenticity & veracity. 
5) Believable 
• Clear, easy to understand, and believable by a jury. 
15
TOP 10 LOCATION FOR EVIDENCE 
1) Internet History Files 
2) Temporary Internet Files 
3) Slack/Unallocated Space 
4) Buddy lists, personal chat room records, others saved 
areas 
5) News groups/club lists/posting 
6) Settings, folder structure, file names 
7) File Storage Dates 
8) Software/Hardware added 
9) File Sharing ability 
10) E-mails 
16
COMPUTER FORENSICS METHODOLOGY 
1) Shut Down the Computer 
2) Document the Hardware Configuration of 
The System 
3) Transport the Computer System to A Secure 
Location 
4) Make Bit Stream Backups of Hard Disks and 
Floppy Disks 
5) Mathematically Verify Data on All Storage 
Devices 
6) Document the System Date and Time 
7) Make a List of Key Search Words 17
CONT… 
8) Evaluate the Windows Swap File 
9) Evaluate File Slack 
10) Evaluate Unallocated Space (Erased Files) 
11) Search Files, File Slack and Unallocated 
Space for Key Words 
12) Document File Names, Dates and Times 
13) Identify File, Program and Storage 
Anomalies 
14) Evaluate Program Functionality 
15) Document Your Findings 
18
APPLICATIONS :- 
• FINANCIAL FRAUD DETECTION 
• CRIMINAL PROSECUTION 
• CIVIL LITIGATION 
• “CORPORATE SECURITY POLICY AND VIOLATIONS” 
19
Who Uses Computer Forensics? 
Criminal Prosecutors 
Rely on evidence obtained from a computer to 
prosecute suspects and use as evidence. 
Civil Litigations 
Personal and business data discovered on a computer 
can be used in fraud, harassment, or discrimination 
cases. 
Private Corporations 
Obtained evidence from employee computers can be 
used as evidence in harassment, fraud, and 
embezzlement cases. 20
Who Uses Computer Forensics? (cont..) 
Law Enforcement Officials 
Rely on computer forensics to backup search warrants 
and post-seizure handling. 
Individual/Private Citizens 
Obtain the services of professional computer forensic 
specialists to support claims of harassment, abuse, or 
wrongful termination from employment. 
21
Skills Required For 
Computer Forensics Application 
o Programming or computer-related experience 
o Broad understanding of operating systems and 
applications 
o Strong analytical skills 
o Strong computer science fundamentals 
o Strong system administrative skills 
o Knowledge of the latest intruder tools 
o Knowledge of cryptography and steganography 
o Strong understanding of the rules of evidence and 
evidence handling 
o Ability to be an expert witness in a court of law 
22
` 
23

More Related Content

PPTX
PPTX
Computer Forensics
PPTX
computer forensics by amritanshu kaushik
PPTX
Digital&computforensic
PPTX
Computer forensic
PPTX
Computer Forensics
PPT
Cyber Crime Evidence Collection Ifsa 2009
PPTX
Computer forensics
Computer Forensics
computer forensics by amritanshu kaushik
Digital&computforensic
Computer forensic
Computer Forensics
Cyber Crime Evidence Collection Ifsa 2009
Computer forensics

What's hot (20)

PPTX
Cyber forensics 02 mit-2014
PDF
Computer Forensics: You can run but you can't hide
PPS
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
PPTX
Computer forensics ppt
PPTX
Lect 5 computer forensics
PPTX
Computer forensic ppt
DOCX
Computer Forensics
PPTX
cyber Forensics
PPTX
Lect 3 Computer Forensics
PDF
Computer Forensic
PPT
Computer Forensics
PPTX
Computer forensics powerpoint presentation
PDF
Cyber Forensics Module 2
PPTX
Digital investigation
PDF
Sued or Suing: Introduction to Digital Forensics
PPTX
Digital Forensics Workshop
PPTX
computer forensics
PPTX
Computer forensics
PPT
Codebits 2010
PPTX
Cyber forensic 1
Cyber forensics 02 mit-2014
Computer Forensics: You can run but you can't hide
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
Computer forensics ppt
Lect 5 computer forensics
Computer forensic ppt
Computer Forensics
cyber Forensics
Lect 3 Computer Forensics
Computer Forensic
Computer Forensics
Computer forensics powerpoint presentation
Cyber Forensics Module 2
Digital investigation
Sued or Suing: Introduction to Digital Forensics
Digital Forensics Workshop
computer forensics
Computer forensics
Codebits 2010
Cyber forensic 1
Ad

Viewers also liked (20)

PPT
Cyber Crime
PPTX
McAfee Threats Report, Cyber Crime, Hacktivism, Anonymous
PPTX
Identity Theft Presentation
PPT
Identity Theft Presentation
PPT
Indentify Theft Slide Show
PPTX
Cyber crime
PPT
CYBER CRIME AND SECURITY
PPT
Biodiversity conservation
PPTX
Cyber-crime PPT
PPTX
Biodiversity and its Conservation
PPT
Seminar on Cyber Crime
PPT
Cybercrime presentation
PPT
Cyber Crime and Security
PPTX
Cyber crime
PDF
Cyber crime
PPT
presentation on cyber crime and security
PPTX
Cyber security
PPTX
Cyber crime ppt
PPTX
Cybercrime.ppt
PPT
PPT OF BIODIVERSITY
Cyber Crime
McAfee Threats Report, Cyber Crime, Hacktivism, Anonymous
Identity Theft Presentation
Identity Theft Presentation
Indentify Theft Slide Show
Cyber crime
CYBER CRIME AND SECURITY
Biodiversity conservation
Cyber-crime PPT
Biodiversity and its Conservation
Seminar on Cyber Crime
Cybercrime presentation
Cyber Crime and Security
Cyber crime
Cyber crime
presentation on cyber crime and security
Cyber security
Cyber crime ppt
Cybercrime.ppt
PPT OF BIODIVERSITY
Ad

Similar to Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02 (20)

PDF
computerforensicsppt-111006063922-phpapp01.pdf
PPTX
computer-forensics-8727-OHvDvOm.pptx
PPTX
computer-forensics-8727-OHvDvOm.pptx
PPTX
computer forensics
PPTX
Forensic investigation
PPT
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
PPTX
Computer forensics Slides
PPTX
Computer forensic
PPT
Chap 1 general introduction to computer forensics
PPTX
COMPUTER FORENSICS.pptx
PPT
Secure Computer Forensics and its tools
PPTX
Examining computer and evidence collection
PPTX
Computer forensics and its role
PPTX
Computer Forensics in Fighting Crimes
PDF
FINAL_MSCIT_CYBER_FORENSICS_NOTES_SEM_IV_PROFAJAYPASHANKAR.pdf
PPTX
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
PPT
Computer forensics
PPTX
Cyber forensics ppt
PPTX
Computer Forensics (1).pptx
PDF
CS6004 Cyber Forensics
computerforensicsppt-111006063922-phpapp01.pdf
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
computer forensics
Forensic investigation
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
Computer forensics Slides
Computer forensic
Chap 1 general introduction to computer forensics
COMPUTER FORENSICS.pptx
Secure Computer Forensics and its tools
Examining computer and evidence collection
Computer forensics and its role
Computer Forensics in Fighting Crimes
FINAL_MSCIT_CYBER_FORENSICS_NOTES_SEM_IV_PROFAJAYPASHANKAR.pdf
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
Computer forensics
Cyber forensics ppt
Computer Forensics (1).pptx
CS6004 Cyber Forensics

Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02

  • 1. BY:- Anil Kumar CSE ퟑ풓풅 Year 0903CS121017 1
  • 2. CONTENTS:- Defining Computer Forensics Characteristics Needs History Goal Cyber Crime & Evidence Rules Of Handling Evidence Top 10 Location For Evidence Computer Forensics Methodology Applications of Computer Forensics Who Uses Computer Forensics Skills Requirements for Computer Forensics 2
  • 3. What is Computer Forensics? • “Forensic computing is the process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally acceptable.”(Rodney Mckemmish 1999). • Evidence might be required for a wide range of computer crimes and misuses. • Information collected assists in arrests, prosecution, termination of employment, and preventing future illegal activity 3
  • 4. CHARECTERISTICS OF COMPUTER FORENSICS • IDENTIFYING • PRESERVING • ANALYZING • PRESENTING 4
  • 5. NEEDS OF COMPUTER FORENSICS oTo produce evidence in the court that can lead to the punishment of the actual. oTo ensure the integrity of the computer system. oTo focus on the response to hi-tech offenses, started to intertwine. 5
  • 6. HISTORY OF COMPUTER FORENSICS o Began to evolve more than 30 years ago in US when law enforcement and military investigators started seeing criminals get technical. o Over the next decades, and up to today, the field has exploded. Law enforcement and the military continue to have a large presence in the information security and computer forensic field at the local, state and federal level. o Now a days, Software companies continue to produce newer and more robust forensic software programs. And law enforcement and the military continue to identify and train more and more of their personnel in the response to crimes involving technology. 6
  • 7. GOAL OF COMPUTER FORENSICS • The main goal of computer forensic experts is not only to find the criminal but also to find out the evidence and the presentation of the evidence in a manner that leads to legal action of the criminal. 7
  • 8. CYBER CRIME & EVIDENCE • CYBER CRIME • Cyber crime occurs when information technology is used to commit or conceal an offence. 8
  • 9. TYPES OF CYBER CRIME o Forgery o Breech of Computer Security o Fraud/Theft o Copyright Violations o Identity Theft o Threats o Burglary o Homicide o Administrative Investigations o Cyber Terrorism o Sales and Investment Fraud o Electronic Fund Transfer Fraud 9
  • 10. 10
  • 11. Cybercrime: Top 20 Countries 11
  • 12. Evidence  An item does not become officially a piece of evidence until a court admits it.  Much of forensics practice concerns how to collect, preserve and analyze these items without compromising their potential to be admitted as evidence in a court of law. 12
  • 13. DIGITAL EVIDENCE • “Any data that is recorded or preserved on any medium in or by a computer system or other similar device, that can be read or understand by a person or a computer system or other similar device. It includes a display, print out or other output of that data.” 13
  • 14. TYPES OF DIGITAL EVIDENCE 1) PERSISTANT DATA Meaning data that remains intact when the computer is turned off. E.g. hard drives, disk drives and removable storage devices (such as USB drives or flash drives). 2) VOLATILE DATA, Meaning data that would be lost if the computer is turned off. E.g. deleted files, computer history, the computer's registry, temporary files and web browsing history. 14
  • 15. 5 RULES OF EVIDENCES 1) Admissible • Must be able to be used in court or elsewhere. 2) Authentic • Evidence relates to incident in relevant way. 3) Complete (no tunnel vision) • Exculpatory evidence for alternative suspects. 4) Reliable • No question about authenticity & veracity. 5) Believable • Clear, easy to understand, and believable by a jury. 15
  • 16. TOP 10 LOCATION FOR EVIDENCE 1) Internet History Files 2) Temporary Internet Files 3) Slack/Unallocated Space 4) Buddy lists, personal chat room records, others saved areas 5) News groups/club lists/posting 6) Settings, folder structure, file names 7) File Storage Dates 8) Software/Hardware added 9) File Sharing ability 10) E-mails 16
  • 17. COMPUTER FORENSICS METHODOLOGY 1) Shut Down the Computer 2) Document the Hardware Configuration of The System 3) Transport the Computer System to A Secure Location 4) Make Bit Stream Backups of Hard Disks and Floppy Disks 5) Mathematically Verify Data on All Storage Devices 6) Document the System Date and Time 7) Make a List of Key Search Words 17
  • 18. CONT… 8) Evaluate the Windows Swap File 9) Evaluate File Slack 10) Evaluate Unallocated Space (Erased Files) 11) Search Files, File Slack and Unallocated Space for Key Words 12) Document File Names, Dates and Times 13) Identify File, Program and Storage Anomalies 14) Evaluate Program Functionality 15) Document Your Findings 18
  • 19. APPLICATIONS :- • FINANCIAL FRAUD DETECTION • CRIMINAL PROSECUTION • CIVIL LITIGATION • “CORPORATE SECURITY POLICY AND VIOLATIONS” 19
  • 20. Who Uses Computer Forensics? Criminal Prosecutors Rely on evidence obtained from a computer to prosecute suspects and use as evidence. Civil Litigations Personal and business data discovered on a computer can be used in fraud, harassment, or discrimination cases. Private Corporations Obtained evidence from employee computers can be used as evidence in harassment, fraud, and embezzlement cases. 20
  • 21. Who Uses Computer Forensics? (cont..) Law Enforcement Officials Rely on computer forensics to backup search warrants and post-seizure handling. Individual/Private Citizens Obtain the services of professional computer forensic specialists to support claims of harassment, abuse, or wrongful termination from employment. 21
  • 22. Skills Required For Computer Forensics Application o Programming or computer-related experience o Broad understanding of operating systems and applications o Strong analytical skills o Strong computer science fundamentals o Strong system administrative skills o Knowledge of the latest intruder tools o Knowledge of cryptography and steganography o Strong understanding of the rules of evidence and evidence handling o Ability to be an expert witness in a court of law 22
  • 23. ` 23