SlideShare a Scribd company logo
7
Most read
8
Most read
10
Most read
CYBER CRIMES &
CYBER FORENSICS
-AVINASH
OUTLINE
• What is computer crimes?
• What is computer forensics?
• Types of crimes
• Evidences taken for forensics
• Forensic tools
• Applications of cyber forensics
• Cyber crimes analysis
• Conclusion
Computer crimes
• Any crime where computer is a tool, target or both.
• Unauthorized access, modification or impairment of a computer or digital system
• Annual damage of social economy.
• Altering in an unauthorized way.
• criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim
directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and
groups) and mobile phones (SMS/MMS)".
Types of crimes
 Child pornography
 fraud
 espionage
 cyber stalking
Cont..
 Copyright Violations
 Identity Theft
 Sales and Investment Fraud
 Forgeries
 Admistrative investigation
Computer forensics
• Computer forensics is a field of expertise in the use of analytical techniques to examine digital evidence.
• Computer forensics is the practice of collecting, analyzing and reporting on digital data in a way that is legally admissible.
• Computer forensics performs a structured investigation while maintaining a documented chain of evidence.
• It can be used in the detection and prevention of crime and in any dispute .
• The preservation, identification, extraction, documentation and interpretation of computer data.
Process followed
Evidences for cyber crimes
• Cross-drive analysis
A forensic technique that correlates information found on multiple hard drives.
• Live analysis
The examination of computers from within the operating system using custom forensics or existing sysadmin tools to extract
evidence
• Deleted files
A common technique used in computer forensics is the recovery of deleted files. Modern forensic software have their own
tools for recovering or carving out deleted data.
• Steganography
the practice of concealing messages or information within other non-secret text or data.
Cont..
• Stochastic forensics
Investigating insider data theft. It is the modern forensic technic came existence.
• PERSISTANT DATA
Meaning data that remains intact when the computer is turned off. E.g. hard drives, disk drives and removable
storage devices (such as USB drives or flash drives).
• VOLATILE DATA
Which is data that would be lost if the computer is turned off. E.g. (deleted files, computer history, the computer's
registry, temporary files and web browsing history).
Forensic tools
• Typical forensic analysis includes a manual review of material on the media, reviewing the Windows registry for suspect
information, discovering and cracking passwords, keyword searches for topics related to the crime, and extracting e-mail and
pictures for review.
• Disk Imaging Software.
• Software Write Tools.
• Hashing Tools.
• File recovery programs.
• Analysis Software.
• Password cracking software.
Applications of cyber forensics
• FINANCIAL FRAUD DETECTION
• CRIMINAL PROSECUTION
• CIVIL LITIGATION
• “CORPORATE SECURITY POLICY AND ACCEPTABLS USE VIOLATIONS”
Crimes analysis
In India
Computer crimes and forensics
Conclusion
• Use of computer in daily life has increased mostly as we humans doesn’t satisfy with limited addition we require more than
our hungry so the man was moving towards crime to fulfills his stomach to stop the man to feed the other man these
forensics are required….,
• -- Thank you

More Related Content

PPT
Digital Forensic
PDF
A brief Intro to Digital Forensics
PPTX
Mobile Forensics
PPTX
Digital forensics
PPTX
Digital Forensics
PPTX
Computer forensic ppt
PPTX
Mobile Forensics
PPTX
Computer forensics
Digital Forensic
A brief Intro to Digital Forensics
Mobile Forensics
Digital forensics
Digital Forensics
Computer forensic ppt
Mobile Forensics
Computer forensics

What's hot (20)

PDF
Digital Evidence in Computer Forensic Investigations
PPTX
Computer forensic
PPTX
Computer forensics powerpoint presentation
PPTX
Difference between Cyber and digital Forensic.pptx
PPTX
Digital Evidence by Raghu Khimani
PPT
Introduction to computer forensic
PPTX
Digital forensics
PPTX
PDF
CS6004 Cyber Forensics
PDF
Digital forensic principles and procedure
PPTX
Cyber Forensics Overview
PDF
04 Evidence Collection and Data Seizure - Notes
PPTX
Digital Forensic ppt
PPT
Computer +forensics
PPT
Cyber crime and forensic
PPTX
L6 Digital Forensic Investigation Tools.pptx
PPTX
Analysis of digital evidence
PDF
Social Media Forensics
PPT
Windows forensic artifacts
PPT
Mobile forensics
Digital Evidence in Computer Forensic Investigations
Computer forensic
Computer forensics powerpoint presentation
Difference between Cyber and digital Forensic.pptx
Digital Evidence by Raghu Khimani
Introduction to computer forensic
Digital forensics
CS6004 Cyber Forensics
Digital forensic principles and procedure
Cyber Forensics Overview
04 Evidence Collection and Data Seizure - Notes
Digital Forensic ppt
Computer +forensics
Cyber crime and forensic
L6 Digital Forensic Investigation Tools.pptx
Analysis of digital evidence
Social Media Forensics
Windows forensic artifacts
Mobile forensics
Ad

Viewers also liked (20)

PDF
Agata overview
PPTX
Emirates Forensic Presentation
PDF
Digital Forensic
PPTX
Dracos forensic flavor
PDF
Cyber forensic readiness cybercon2012 adv j fick
PDF
BDO Forensic Services
PDF
MobilePolicing –Investing in Mobile Technology to Produce an Efficient and Ag...
PDF
Raising performance in composites bonding - Highlight
PPTX
M.Tech. Cyber Security & Incident Response
PDF
EC-Council Computer Hacking Forensic Investigator v9
PDF
Cyber fraud in banks
PPTX
Workshop Digital Forensic - Cyber Security Community
PDF
Real time trade surveillance in financial markets
PDF
Utilizing Internet for Fraud Examination and Investigation
PDF
Securing the Internet from Cyber Criminals
PPTX
Lect 1 computer forensics
PDF
Cybersecurity Risk Management for Financial Institutions
PDF
China kmr bearing manufacturer
PPTX
Redaccion de textos
PPTX
Perdida en los libros 7uu7
Agata overview
Emirates Forensic Presentation
Digital Forensic
Dracos forensic flavor
Cyber forensic readiness cybercon2012 adv j fick
BDO Forensic Services
MobilePolicing –Investing in Mobile Technology to Produce an Efficient and Ag...
Raising performance in composites bonding - Highlight
M.Tech. Cyber Security & Incident Response
EC-Council Computer Hacking Forensic Investigator v9
Cyber fraud in banks
Workshop Digital Forensic - Cyber Security Community
Real time trade surveillance in financial markets
Utilizing Internet for Fraud Examination and Investigation
Securing the Internet from Cyber Criminals
Lect 1 computer forensics
Cybersecurity Risk Management for Financial Institutions
China kmr bearing manufacturer
Redaccion de textos
Perdida en los libros 7uu7
Ad

Similar to Computer crimes and forensics (20)

PDF
computerforensicppt-160201192341.pdf
PPT
Computer forensics 1
PPT
Computer forensics
DOCX
Computer Forensics
PDF
A Review on Recovering and Examining Computer Forensic Evidences
PDF
computerforensicsppt-111006063922-phpapp01.pdf
PPTX
computer forensics by amritanshu kaushik
PDF
Computer Forensics-An Introduction of New Face to the Digital World
PPT
Secure Computer Forensics and its tools
PPTX
Computer Forensics
PPTX
Computer forensics ppt
PPTX
Digital&computforensic
PPTX
Forensic investigation
PPTX
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
PDF
Computer forencis
PDF
Computer forensic
PPTX
computer-forensics-8727-OHvDvOm.pptx
PPTX
computer-forensics-8727-OHvDvOm.pptx
PDF
Cyber Forensics Module 1
PPTX
computer forensics
computerforensicppt-160201192341.pdf
Computer forensics 1
Computer forensics
Computer Forensics
A Review on Recovering and Examining Computer Forensic Evidences
computerforensicsppt-111006063922-phpapp01.pdf
computer forensics by amritanshu kaushik
Computer Forensics-An Introduction of New Face to the Digital World
Secure Computer Forensics and its tools
Computer Forensics
Computer forensics ppt
Digital&computforensic
Forensic investigation
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Computer forencis
Computer forensic
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
Cyber Forensics Module 1
computer forensics

Recently uploaded (20)

PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Computing-Curriculum for Schools in Ghana
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Cell Types and Its function , kingdom of life
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Cell Structure & Organelles in detailed.
PPTX
Lesson notes of climatology university.
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Institutional Correction lecture only . . .
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Sports Quiz easy sports quiz sports quiz
Computing-Curriculum for Schools in Ghana
PPH.pptx obstetrics and gynecology in nursing
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
102 student loan defaulters named and shamed – Is someone you know on the list?
O7-L3 Supply Chain Operations - ICLT Program
Final Presentation General Medicine 03-08-2024.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
O5-L3 Freight Transport Ops (International) V1.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Cell Types and Its function , kingdom of life
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Cell Structure & Organelles in detailed.
Lesson notes of climatology university.
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Institutional Correction lecture only . . .

Computer crimes and forensics

  • 1. CYBER CRIMES & CYBER FORENSICS -AVINASH
  • 2. OUTLINE • What is computer crimes? • What is computer forensics? • Types of crimes • Evidences taken for forensics • Forensic tools • Applications of cyber forensics • Cyber crimes analysis • Conclusion
  • 3. Computer crimes • Any crime where computer is a tool, target or both. • Unauthorized access, modification or impairment of a computer or digital system • Annual damage of social economy. • Altering in an unauthorized way. • criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)".
  • 4. Types of crimes  Child pornography  fraud  espionage  cyber stalking
  • 5. Cont..  Copyright Violations  Identity Theft  Sales and Investment Fraud  Forgeries  Admistrative investigation
  • 6. Computer forensics • Computer forensics is a field of expertise in the use of analytical techniques to examine digital evidence. • Computer forensics is the practice of collecting, analyzing and reporting on digital data in a way that is legally admissible. • Computer forensics performs a structured investigation while maintaining a documented chain of evidence. • It can be used in the detection and prevention of crime and in any dispute . • The preservation, identification, extraction, documentation and interpretation of computer data.
  • 8. Evidences for cyber crimes • Cross-drive analysis A forensic technique that correlates information found on multiple hard drives. • Live analysis The examination of computers from within the operating system using custom forensics or existing sysadmin tools to extract evidence • Deleted files A common technique used in computer forensics is the recovery of deleted files. Modern forensic software have their own tools for recovering or carving out deleted data. • Steganography the practice of concealing messages or information within other non-secret text or data.
  • 9. Cont.. • Stochastic forensics Investigating insider data theft. It is the modern forensic technic came existence. • PERSISTANT DATA Meaning data that remains intact when the computer is turned off. E.g. hard drives, disk drives and removable storage devices (such as USB drives or flash drives). • VOLATILE DATA Which is data that would be lost if the computer is turned off. E.g. (deleted files, computer history, the computer's registry, temporary files and web browsing history).
  • 10. Forensic tools • Typical forensic analysis includes a manual review of material on the media, reviewing the Windows registry for suspect information, discovering and cracking passwords, keyword searches for topics related to the crime, and extracting e-mail and pictures for review. • Disk Imaging Software. • Software Write Tools. • Hashing Tools. • File recovery programs. • Analysis Software. • Password cracking software.
  • 11. Applications of cyber forensics • FINANCIAL FRAUD DETECTION • CRIMINAL PROSECUTION • CIVIL LITIGATION • “CORPORATE SECURITY POLICY AND ACCEPTABLS USE VIOLATIONS”
  • 15. Conclusion • Use of computer in daily life has increased mostly as we humans doesn’t satisfy with limited addition we require more than our hungry so the man was moving towards crime to fulfills his stomach to stop the man to feed the other man these forensics are required….,