SlideShare a Scribd company logo
COMPUTER FORENSICS
BY – SARFRAJ ANSARI
1.INTRODUCTION
1.1 DEFINITION
“Forensic computing is the process of identifying,
preserving, analyzing and presenting digital evidence in a
manner that is legally acceptable.”(Rodney Mckemmish
1999).
1.2 CHARECTERISTICS OF COMPUTER
FORENSICS
• IDENTIFYING
• PRESERVING
• ANALYZING
• PRESENTING
1.3 NEEDS OF COMPUTER FORENSICS
oTo produce evidence in the court that can lead to the
punishment of the actual.
oTo ensure the integrity of the computer system.
oTo focus on the response to hi-tech offenses, started to
intertwine.
1.4 HISTORY OF COMPUTER FORENSICS
o Began to evolve more than 30 years ago in US when law
enforcement and military investigators started seeing
criminals get technical.
o Over the next decades, and up to today, the field has
exploded. Law enforcement and the military continue to
have a large presence in the information security and
computer forensic field at the local, state and federal level.
o Now a days, Software companies continue to produce
newer and more robust forensic software programs. And
law enforcement and the military continue to identify and
train more and more of their personnel in the response to
crimes involving technology.
1.5 GOAL OF COMPUTER FORENSICS
o The main goal of computer forensic experts is not
only to find the criminal but also to find out the
evidence and the presentation of the evidence in a
manner that leads to legal action of the criminal.
2. CYBER CRIME & EVIDENCE
2.1 CYBER CRIME
Cyber crime occurs when information technology is
used to commit or conceal an offence.
• TYPES OF CYBER CRIME
o Breech of Computer Security
o Fraud/Theft
o Copyright Violations
o Identity Theft
o Narcotics Investigations
o Threats
o Burglary
o Suicide
o Obscenity
o Homicide
o Administrative Investigations
o Sexual Assault
o Stalking
2.2 DIGITAL EVIDENCE
“Any data that is recorded or preserved on any medium in or by a
computer system or other similar device, that can be read or
understand by a person or a computer system or other similar device.
It includes a display, print out or other output of that data.”
o Latent as fingerprint or DNA
o Fragile and can be easily altered, damaged, or destroyed.
o Can be Time sensitive
2.2.1 TYPES OF DIGITAL EVIDENCE
1) PERSISTANT DATA,
Meaning data that remains intact when the computer is turned off.
E.g. hard drives, disk drives and removable storage devices (such as
USB drives or flash drives).
2) VOLATILE DATA,
Which is data that would be lost if the computer is turned off. E.g.
deleted files, computer history, the computer's registry, temporary files
and web browsing history.
2.2.2. 5 RULES OF EVIDENCES
1) Admissible,
• Must be able to be used in court or elsewhere.
2) Authentic,
• Evidence relates to incident in relevant way.
3) Complete (no tunnel vision),
• Exculpatory evidence for alternative suspects.
4) Reliable,
• No question about authenticity & veracity.
5) Believable,
• Clear, easy to understand, and believable by a jury.
2.3 TOP 10 LOCATION FOR EVIDENCE
1) Internet History Files
2) Temporary Internet Files
3) Slack/Unallocated Space
4) Buddy lists, personal chat room records, P2P, others saved areas
5) News groups/club lists/posting
6) Settings, folder structure, file names
7) File Storage Dates
8) Software/Hardware added
9) File Sharing ability
10)E-mails
3.COMPUTER FORENSICS METHODOLOGY
1) Shut Down the Computer
2) Document the Hardware Configuration of The System
3) Transport the Computer System to A Secure Location
4) Make Bit Stream Backups of Hard Disks and Floppy Disks
5) Mathematically Verify Data on All Storage Devices
6) Document the System Date and Time
7) Make a List of Key Search Words
CONT…
8) Evaluate the Windows Swap File
9) Evaluate File Slack
10) Evaluate Unallocated Space (Erased Files)
11) Search Files, File Slack and Unallocated Space for Key Words
12) Document File Names, Dates and Times
13) Identify File, Program and Storage Anomalies
14) Evaluate Program Functionality
15) Document Your Findings
4. APPLICATIONS OF COMPUTER FORENSICS
4.1 APPLICATIONS
• FINANCIAL FRAUD DETECTION
• CRIMINAL PROSECUTION
• CIVIL LITIGATION
• “CORPORATE SECURITY POLICY AND ACCEPTABLS USE VIOLATIONS”
4.2 Skills Required For Computer Forensics
Application
o Programming or computer-related experience
o Broad understanding of operating systems and applications
o Strong analytical skills
o Strong computer science fundamentals
o Strong system administrative skills
o Knowledge of the latest intruder tools
o Knowledge of cryptography and steganography
o Strong understanding of the rules of evidence and evidence handling
o Ability to be an expert witness in a court of law
CONCLUSION
This field will enable crucial electronic evidence to
be found, whether it was lost, deleted, damaged, or
hidden, and used to prosecute individuals that
believe they have successfully beaten the system.
THANK YOU

More Related Content

PPS
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
PPT
Cyber Crime Evidence Collection Ifsa 2009
PPTX
Computer forensics
PPTX
Anti forensic
PPTX
Intro to cyber forensics
PPT
Cyber Crimes & Cyber Forensics
PPT
Role of a Forensic Investigator
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
Cyber Crime Evidence Collection Ifsa 2009
Computer forensics
Anti forensic
Intro to cyber forensics
Cyber Crimes & Cyber Forensics
Role of a Forensic Investigator

What's hot (20)

PPTX
Digital forensics research: The next 10 years
PPTX
Computer Networks
PPT
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
PPTX
Deep web, the unIndexed web
DOCX
E discovery3
PPT
About Internet
PPTX
Quality of information
PPTX
Group pp
PPT
Electronic discovery
PDF
PPTX
Internet
PPT
Computer forensics 1
PPT
Communication 2
DOC
resume 2
PPT
E Mail Ppt 2
PPT
Com Slideshow 2
PDF
Digital Crime & Forensics - Report
PPTX
Internet
PPTX
Rescuing and preserving old software
PPTX
Downloading
Digital forensics research: The next 10 years
Computer Networks
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
Deep web, the unIndexed web
E discovery3
About Internet
Quality of information
Group pp
Electronic discovery
Internet
Computer forensics 1
Communication 2
resume 2
E Mail Ppt 2
Com Slideshow 2
Digital Crime & Forensics - Report
Internet
Rescuing and preserving old software
Downloading
Ad

Similar to computer forensics (20)

PDF
computerforensicsppt-111006063922-phpapp01.pdf
PPTX
Computer forensics ppt
PPTX
computer forensics by amritanshu kaushik
PPTX
Computer Forensics
PPTX
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
PPTX
PPTX
Digital&computforensic
PPTX
Forensic investigation
PPTX
computer-forensics-8727-OHvDvOm.pptx
PPTX
computer-forensics-8727-OHvDvOm.pptx
PPT
Chap 1 general introduction to computer forensics
PPT
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
PPTX
Computer forensics powerpoint presentation
PPTX
Computer forensics Slides
PPTX
Computer Forensics
PPTX
Computer forensic
PDF
FINAL_MSCIT_CYBER_FORENSICS_NOTES_SEM_IV_PROFAJAYPASHANKAR.pdf
PDF
Cyber Forensics Module 1
PPTX
Cyber forensics ppt
PPTX
Computer Forensics in Fighting Crimes
computerforensicsppt-111006063922-phpapp01.pdf
Computer forensics ppt
computer forensics by amritanshu kaushik
Computer Forensics
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Digital&computforensic
Forensic investigation
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
Chap 1 general introduction to computer forensics
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
Computer forensics powerpoint presentation
Computer forensics Slides
Computer Forensics
Computer forensic
FINAL_MSCIT_CYBER_FORENSICS_NOTES_SEM_IV_PROFAJAYPASHANKAR.pdf
Cyber Forensics Module 1
Cyber forensics ppt
Computer Forensics in Fighting Crimes
Ad

Recently uploaded (20)

PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPT
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
PPT on Performance Review to get promotions
PPTX
Nature of X-rays, X- Ray Equipment, Fluoroscopy
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PDF
737-MAX_SRG.pdf student reference guides
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Abrasive, erosive and cavitation wear.pdf
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Artificial Intelligence
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPT
Occupational Health and Safety Management System
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
Categorization of Factors Affecting Classification Algorithms Selection
PPT on Performance Review to get promotions
Nature of X-rays, X- Ray Equipment, Fluoroscopy
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
737-MAX_SRG.pdf student reference guides
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Abrasive, erosive and cavitation wear.pdf
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Artificial Intelligence
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Occupational Health and Safety Management System
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx

computer forensics

  • 1. COMPUTER FORENSICS BY – SARFRAJ ANSARI
  • 2. 1.INTRODUCTION 1.1 DEFINITION “Forensic computing is the process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally acceptable.”(Rodney Mckemmish 1999).
  • 3. 1.2 CHARECTERISTICS OF COMPUTER FORENSICS • IDENTIFYING • PRESERVING • ANALYZING • PRESENTING
  • 4. 1.3 NEEDS OF COMPUTER FORENSICS oTo produce evidence in the court that can lead to the punishment of the actual. oTo ensure the integrity of the computer system. oTo focus on the response to hi-tech offenses, started to intertwine.
  • 5. 1.4 HISTORY OF COMPUTER FORENSICS o Began to evolve more than 30 years ago in US when law enforcement and military investigators started seeing criminals get technical. o Over the next decades, and up to today, the field has exploded. Law enforcement and the military continue to have a large presence in the information security and computer forensic field at the local, state and federal level. o Now a days, Software companies continue to produce newer and more robust forensic software programs. And law enforcement and the military continue to identify and train more and more of their personnel in the response to crimes involving technology.
  • 6. 1.5 GOAL OF COMPUTER FORENSICS o The main goal of computer forensic experts is not only to find the criminal but also to find out the evidence and the presentation of the evidence in a manner that leads to legal action of the criminal.
  • 7. 2. CYBER CRIME & EVIDENCE 2.1 CYBER CRIME Cyber crime occurs when information technology is used to commit or conceal an offence.
  • 8. • TYPES OF CYBER CRIME o Breech of Computer Security o Fraud/Theft o Copyright Violations o Identity Theft o Narcotics Investigations o Threats o Burglary o Suicide o Obscenity o Homicide o Administrative Investigations o Sexual Assault o Stalking
  • 9. 2.2 DIGITAL EVIDENCE “Any data that is recorded or preserved on any medium in or by a computer system or other similar device, that can be read or understand by a person or a computer system or other similar device. It includes a display, print out or other output of that data.” o Latent as fingerprint or DNA o Fragile and can be easily altered, damaged, or destroyed. o Can be Time sensitive
  • 10. 2.2.1 TYPES OF DIGITAL EVIDENCE 1) PERSISTANT DATA, Meaning data that remains intact when the computer is turned off. E.g. hard drives, disk drives and removable storage devices (such as USB drives or flash drives). 2) VOLATILE DATA, Which is data that would be lost if the computer is turned off. E.g. deleted files, computer history, the computer's registry, temporary files and web browsing history.
  • 11. 2.2.2. 5 RULES OF EVIDENCES 1) Admissible, • Must be able to be used in court or elsewhere. 2) Authentic, • Evidence relates to incident in relevant way. 3) Complete (no tunnel vision), • Exculpatory evidence for alternative suspects. 4) Reliable, • No question about authenticity & veracity. 5) Believable, • Clear, easy to understand, and believable by a jury.
  • 12. 2.3 TOP 10 LOCATION FOR EVIDENCE 1) Internet History Files 2) Temporary Internet Files 3) Slack/Unallocated Space 4) Buddy lists, personal chat room records, P2P, others saved areas 5) News groups/club lists/posting 6) Settings, folder structure, file names 7) File Storage Dates 8) Software/Hardware added 9) File Sharing ability 10)E-mails
  • 13. 3.COMPUTER FORENSICS METHODOLOGY 1) Shut Down the Computer 2) Document the Hardware Configuration of The System 3) Transport the Computer System to A Secure Location 4) Make Bit Stream Backups of Hard Disks and Floppy Disks 5) Mathematically Verify Data on All Storage Devices 6) Document the System Date and Time 7) Make a List of Key Search Words
  • 14. CONT… 8) Evaluate the Windows Swap File 9) Evaluate File Slack 10) Evaluate Unallocated Space (Erased Files) 11) Search Files, File Slack and Unallocated Space for Key Words 12) Document File Names, Dates and Times 13) Identify File, Program and Storage Anomalies 14) Evaluate Program Functionality 15) Document Your Findings
  • 15. 4. APPLICATIONS OF COMPUTER FORENSICS 4.1 APPLICATIONS • FINANCIAL FRAUD DETECTION • CRIMINAL PROSECUTION • CIVIL LITIGATION • “CORPORATE SECURITY POLICY AND ACCEPTABLS USE VIOLATIONS”
  • 16. 4.2 Skills Required For Computer Forensics Application o Programming or computer-related experience o Broad understanding of operating systems and applications o Strong analytical skills o Strong computer science fundamentals o Strong system administrative skills o Knowledge of the latest intruder tools o Knowledge of cryptography and steganography o Strong understanding of the rules of evidence and evidence handling o Ability to be an expert witness in a court of law
  • 18. This field will enable crucial electronic evidence to be found, whether it was lost, deleted, damaged, or hidden, and used to prosecute individuals that believe they have successfully beaten the system.