By
Sarwar Hossain
Introduction
Computer forensics is a field of expertise in the use of analytical
techniques to examine digital evidence.
Computer forensics performs a structured investigation while
maintaining a documented chain of evidence.
Types of Cyber
Crimes
Forgery
Breech of Computer
Security
Fraud/Theft
Copyright Violations
Identity Theft
Threats
Burglary
Homicide
Administrative Investigations
Cyber Terrorism
Sales and Investment Fraud
Electronic Fund Transfer Fraud
Forensic Process
 Acquire data to be examined
 Photographs
 Make an image
 Review of logical file structure
 Review of unallocated space and file slack
 Recover deleted data (If any)
Report
 Expert testimony
GOAL OF COMPUTER
FORENSICS
The main goal of computer forensic experts
is not only to find the criminal but also to
find out the evidence and the presentation
of the evidence in a manner that leads to
legal action of the criminal.
Methodology
1) Shut Down the Computer.
2) Document the Hardware Configuration of
the System
3) Transport the Computer System to A
Secure Location
4) Make Bit Stream Backups of Hard Disks
and Floppy Disks
5) Mathematically Verify Data on All Storage
Devices
6) Document the System Date and Time
7) Make a List of Key Search Words
Cyber Crime : Top 20 countries
Applications
# FINANCIAL FRAUD DETECTION
# CRIMINAL PROSECUTION
# CIVIL LITIGATION
# “CORPORATE SECURITY POLICY
AND VIOLATIONS”
Forensic Tools
1.Disk Imaging Software.
2.Software Write Tools.
3.Hashing Tools.
4.File recovery programs.
5.Analysis Software.
6.Password cracking software.
Computer forensics

More Related Content

PPTX
computer forensics
PPT
Computer forensics
PDF
Computer Forensic
PPT
Computer forensics
PDF
Cyber Forensics Module 2
PPT
Computer forensics
PPT
Codebits 2010
computer forensics
Computer forensics
Computer Forensic
Computer forensics
Cyber Forensics Module 2
Computer forensics
Codebits 2010

What's hot (20)

PPTX
Computer forensics and its role
PPT
Computer Forensics
PPTX
cyber Forensics
PDF
01 Computer Forensics Fundamentals - Notes
PPTX
Cyber forensics 02 mit-2014
PDF
Computer forensic
DOCX
Computer Forensics
PDF
Cyber Forensics Module 1
PPTX
Computer Forensic Softwares
PPTX
Computer forensic ppt
PPTX
Computer forensics
PPTX
computer forensics
PPTX
Computer Forensics
PPT
Cyber forensics
PPT
computer forensics
PPT
Computer Forensics
PPTX
Computer forensics powerpoint presentation
PPTX
Lect 3 Computer Forensics
PPTX
Computer forensic ppt
PPTX
Computer forensic
Computer forensics and its role
Computer Forensics
cyber Forensics
01 Computer Forensics Fundamentals - Notes
Cyber forensics 02 mit-2014
Computer forensic
Computer Forensics
Cyber Forensics Module 1
Computer Forensic Softwares
Computer forensic ppt
Computer forensics
computer forensics
Computer Forensics
Cyber forensics
computer forensics
Computer Forensics
Computer forensics powerpoint presentation
Lect 3 Computer Forensics
Computer forensic ppt
Computer forensic
Ad

Viewers also liked (20)

PPTX
Computer forensics ppt
PPT
Computer +forensics
PPTX
Digital forensics
PPT
Computer forensics
PPTX
Computer forensics
PDF
Digital Crime & Forensics - Presentation
PPT
Digital Forensics
PPTX
Digital Forensics
PPT
Introduction to computer forensic
PPTX
Digital forensics
PPT
Computer Forensic
PPTX
Computer forensics and steganography
PDF
Chfi V3 Module 01 Computer Forensics In Todays World
PPTX
Computer forensic 101 - OWASP Khartoum
PPTX
SheSummits Insipration Deck
PPTX
encase enterprise
PPTX
Nuix Presentation
PPTX
2017 PowerPoints (Scroll Down to View)
PPT
E Discovery General E Discovery Presentation
PPTX
Computer forensics ppt
Computer +forensics
Digital forensics
Computer forensics
Computer forensics
Digital Crime & Forensics - Presentation
Digital Forensics
Digital Forensics
Introduction to computer forensic
Digital forensics
Computer Forensic
Computer forensics and steganography
Chfi V3 Module 01 Computer Forensics In Todays World
Computer forensic 101 - OWASP Khartoum
SheSummits Insipration Deck
encase enterprise
Nuix Presentation
2017 PowerPoints (Scroll Down to View)
E Discovery General E Discovery Presentation
Ad

Similar to Computer forensics (20)

PDF
computerforensicppt-160201192341.pdf
PPTX
computer forensics by amritanshu kaushik
PPTX
Computer Forensics
PPTX
computer forensics
PPTX
Computer crimes and forensics
PPTX
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
PPTX
ppt on computer forensic concept and types
PDF
computerforensicsppt-111006063922-phpapp01.pdf
PPTX
PPTX
Digital&computforensic
PDF
A Review on Recovering and Examining Computer Forensic Evidences
PPTX
computer-forensics-8727-OHvDvOm.pptx
PPTX
computer-forensics-8727-OHvDvOm.pptx
PPT
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
PDF
Computer forensic
PDF
FINAL_MSCIT_CYBER_FORENSICS_NOTES_SEM_IV_PROFAJAYPASHANKAR.pdf
PPTX
Computer forensic
PPTX
Forensic investigation
PPT
Computer forensics 1
PPTX
The Scope of Cyber Forensic.pptx
computerforensicppt-160201192341.pdf
computer forensics by amritanshu kaushik
Computer Forensics
computer forensics
Computer crimes and forensics
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
ppt on computer forensic concept and types
computerforensicsppt-111006063922-phpapp01.pdf
Digital&computforensic
A Review on Recovering and Examining Computer Forensic Evidences
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
Computer forensic
FINAL_MSCIT_CYBER_FORENSICS_NOTES_SEM_IV_PROFAJAYPASHANKAR.pdf
Computer forensic
Forensic investigation
Computer forensics 1
The Scope of Cyber Forensic.pptx

Recently uploaded (20)

PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PPT
Geologic Time for studying geology for geologist
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
STKI Israel Market Study 2025 version august
PPTX
Microsoft Excel 365/2024 Beginner's training
PPTX
The various Industrial Revolutions .pptx
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Five Habits of High-Impact Board Members
PPT
What is a Computer? Input Devices /output devices
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Chapter 5: Probability Theory and Statistics
Enhancing emotion recognition model for a student engagement use case through...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
A proposed approach for plagiarism detection in Myanmar Unicode text
Geologic Time for studying geology for geologist
sustainability-14-14877-v2.pddhzftheheeeee
sbt 2.0: go big (Scala Days 2025 edition)
STKI Israel Market Study 2025 version august
Microsoft Excel 365/2024 Beginner's training
The various Industrial Revolutions .pptx
CloudStack 4.21: First Look Webinar slides
Flame analysis and combustion estimation using large language and vision assi...
NewMind AI Weekly Chronicles – August ’25 Week III
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Consumable AI The What, Why & How for Small Teams.pdf
Five Habits of High-Impact Board Members
What is a Computer? Input Devices /output devices

Computer forensics

  • 2. Introduction Computer forensics is a field of expertise in the use of analytical techniques to examine digital evidence. Computer forensics performs a structured investigation while maintaining a documented chain of evidence.
  • 3. Types of Cyber Crimes Forgery Breech of Computer Security Fraud/Theft Copyright Violations Identity Theft Threats Burglary Homicide Administrative Investigations Cyber Terrorism Sales and Investment Fraud Electronic Fund Transfer Fraud
  • 4. Forensic Process  Acquire data to be examined  Photographs  Make an image  Review of logical file structure  Review of unallocated space and file slack  Recover deleted data (If any) Report  Expert testimony
  • 5. GOAL OF COMPUTER FORENSICS The main goal of computer forensic experts is not only to find the criminal but also to find out the evidence and the presentation of the evidence in a manner that leads to legal action of the criminal.
  • 6. Methodology 1) Shut Down the Computer. 2) Document the Hardware Configuration of the System 3) Transport the Computer System to A Secure Location 4) Make Bit Stream Backups of Hard Disks and Floppy Disks 5) Mathematically Verify Data on All Storage Devices 6) Document the System Date and Time 7) Make a List of Key Search Words
  • 7. Cyber Crime : Top 20 countries
  • 8. Applications # FINANCIAL FRAUD DETECTION # CRIMINAL PROSECUTION # CIVIL LITIGATION # “CORPORATE SECURITY POLICY AND VIOLATIONS”
  • 9. Forensic Tools 1.Disk Imaging Software. 2.Software Write Tools. 3.Hashing Tools. 4.File recovery programs. 5.Analysis Software. 6.Password cracking software.