SlideShare a Scribd company logo
Computer Forensics And
Investigation
Module 1:Understand the importance of computer
forensics
Topic2:Rules of Computer Forensics, Computer
Forensic Evidence
By,
Neha Raju K
Assistant Professor
BCA-Cloud Technology and Information Security
Management
Contents
Rules of Computer Forensics
Computer Forensics Evidence
Rules of Computer Forensics
• There are various rules employed during
and after the forensic examination
Process.
Some of the most common rules are
categorised as follows:
• Rules for admissibility of evidences
• Rules for Chain of custody
• Rules for Evidence Integrity
1.Rules for Admissibility of
Evidences
• Rule 1: To be admissible in the court
of law, all evidences must be relevant
to the case in question.
• Rule 2: To be identifiable and
authentic, all evidences must be
sufficient to support a claim,
illustrative, self-authentication
(without extrinsic evidences) such as
public records, govt.official docs and
govt.certified records with seal.
2.Rules for Chain of Custody
• The chain of custody is important to the investigation process
because it is the first step when authenticating digital audio and
video evidence.
• Identifying this chain of custody provides information about whether
or not this evidence has been copied or cloned.
• The chain of custody document contain the following information.
1.Who seized the evidence : Name, designation, e-mail,phone
number,etc.
2.When the evidence was seized: Actual time and date, the system
CMOS date and time .
3.Physical description of the evidence item: serial no,tag,make and
model, etc.
3.Rules for Evidence Integrity
• To ensure that the evidence is not altered, various methods
are employed. Some of these are:
1)Bit by bit copy
2)Evidence is locked in safe and limited access cabinets called
safes,or vaults.
3)The use of crypto graphic hashes like MD5,SHA1,SHA2,etc.
to ensure the integrity of the original evidence media.
4)The use of write blocker to protect the evidence from
modification.
5)To create and maintain chain of custody documents.
Computer Forensics Evidence
• Computer forensics investigation is an
organised process just like any other
traditional law enforcement investigation.
• Specially trained forensics investigators
follow specific computer forensics
methodology.
• Evidence must be relevant to a case in
question and sufficient enough to prove a
point.
Where can we find evidence?
• During investigations, we need to collect ,preserve
and analyse computer hard drives and media such as
USB drives,floppy disks,zip drives and optical media
like CDs and DVDs.
• Data that is not found on the disk can be found in the
RAM.
• The information that is found in memory includes the
user ids and passwords,encryption keys,chat
sessions,unencrpted data,emails,unsaved
documents,hidden code such as rootkits,registry
information and other critical evidence.
• This data can provide related information about the
target’s activity on the computer.
• Evidence may be stored in
1)CDs/DVDs
2)Hard Disk Media
3)USB drives
4)Memory Cards
5)Text messages
6)Phone Records
7)E-mails
8)Digital images
9)Various application records
10)web-sites
11)Browser history
Conclusion
• There are various rules employed
during and after the forensic
examination Process.
• Evidences are not only related to
eyewitness,Blood DNA etc. Digital
evidences also make a big impact
on the case.
THANK YOU

More Related Content

PDF
Computer forensics and Investigation
PDF
Information security fundamentals topic 2: Evolution of Information security
PPTX
Digital forensics
PPTX
CYBERFORENSICS
PPTX
Computer crimes and forensics
PPTX
Digital&computforensic
PPT
Chap 1 general introduction to computer forensics
PPTX
Chap 2 computer forensics investigation
Computer forensics and Investigation
Information security fundamentals topic 2: Evolution of Information security
Digital forensics
CYBERFORENSICS
Computer crimes and forensics
Digital&computforensic
Chap 1 general introduction to computer forensics
Chap 2 computer forensics investigation

What's hot (20)

PPTX
Digital forensics
PPTX
Digital investigation
PPTX
Module 8 security and ethical challenges
 
PPTX
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
PPTX
Computer forensic
PPTX
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
PPTX
Digital forensics by vimal priya.s
PPTX
Cyber evidence at crime scene
KEY
Computer crime hacking
PPTX
Cyber Security
PDF
Digital Crime & Forensics - Report
PPTX
Computer forensics
PPTX
Lect 5 computer forensics
PPT
Hacking
PPTX
computer forensics
PPTX
PPIT Lecture 1
PDF
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
PPTX
what is cyber crime and how it started
PPTX
Lect 6 computer forensics
PPTX
IT Ethics
Digital forensics
Digital investigation
Module 8 security and ethical challenges
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Computer forensic
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
Digital forensics by vimal priya.s
Cyber evidence at crime scene
Computer crime hacking
Cyber Security
Digital Crime & Forensics - Report
Computer forensics
Lect 5 computer forensics
Hacking
computer forensics
PPIT Lecture 1
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
what is cyber crime and how it started
Lect 6 computer forensics
IT Ethics
Ad

Similar to Computer forensics and investigation module 1 topic 2 (20)

PPTX
ppt for Module 5 cybersecuirty_023501.pptx
PPTX
unit 5 understanding computer forensics.pptx
PPTX
PPTX
Introduction to computer forensics in IT society
PPTX
Computer Forensics.pptx
PPTX
computer-forensics-8727-OHvDvOm.pptx
PPTX
computer-forensics-8727-OHvDvOm.pptx
PDF
A Review on Recovering and Examining Computer Forensic Evidences
PDF
Cyber Forensics training by Forensic Academy
PPTX
computer forensics
PPTX
Computer Forensics (1).pptx
PPTX
Computer Forensics
DOCX
Ethical Hacking And Computer Forensics
PPTX
computer forensics by amritanshu kaushik
PDF
computerforensicsppt-111006063922-phpapp01.pdf
PPTX
Computer forensics and its role
PPT
Computer Forensics
PDF
Cyber forensics and auditing
PPTX
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
PPTX
Computer forensic
ppt for Module 5 cybersecuirty_023501.pptx
unit 5 understanding computer forensics.pptx
Introduction to computer forensics in IT society
Computer Forensics.pptx
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
A Review on Recovering and Examining Computer Forensic Evidences
Cyber Forensics training by Forensic Academy
computer forensics
Computer Forensics (1).pptx
Computer Forensics
Ethical Hacking And Computer Forensics
computer forensics by amritanshu kaushik
computerforensicsppt-111006063922-phpapp01.pdf
Computer forensics and its role
Computer Forensics
Cyber forensics and auditing
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Computer forensic
Ad

Recently uploaded (20)

PDF
RMMM.pdf make it easy to upload and study
PDF
Pre independence Education in Inndia.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Insiders guide to clinical Medicine.pdf
PPTX
master seminar digital applications in india
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Cell Types and Its function , kingdom of life
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Cell Structure & Organelles in detailed.
PDF
01-Introduction-to-Information-Management.pdf
PDF
Classroom Observation Tools for Teachers
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
RMMM.pdf make it easy to upload and study
Pre independence Education in Inndia.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Insiders guide to clinical Medicine.pdf
master seminar digital applications in india
Microbial diseases, their pathogenesis and prophylaxis
2.FourierTransform-ShortQuestionswithAnswers.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Week 4 Term 3 Study Techniques revisited.pptx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Microbial disease of the cardiovascular and lymphatic systems
Cell Types and Its function , kingdom of life
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Renaissance Architecture: A Journey from Faith to Humanism
Cell Structure & Organelles in detailed.
01-Introduction-to-Information-Management.pdf
Classroom Observation Tools for Teachers
Anesthesia in Laparoscopic Surgery in India
Module 4: Burden of Disease Tutorial Slides S2 2025

Computer forensics and investigation module 1 topic 2

  • 1. Computer Forensics And Investigation Module 1:Understand the importance of computer forensics Topic2:Rules of Computer Forensics, Computer Forensic Evidence By, Neha Raju K Assistant Professor BCA-Cloud Technology and Information Security Management
  • 2. Contents Rules of Computer Forensics Computer Forensics Evidence
  • 3. Rules of Computer Forensics • There are various rules employed during and after the forensic examination Process. Some of the most common rules are categorised as follows: • Rules for admissibility of evidences • Rules for Chain of custody • Rules for Evidence Integrity
  • 4. 1.Rules for Admissibility of Evidences • Rule 1: To be admissible in the court of law, all evidences must be relevant to the case in question. • Rule 2: To be identifiable and authentic, all evidences must be sufficient to support a claim, illustrative, self-authentication (without extrinsic evidences) such as public records, govt.official docs and govt.certified records with seal.
  • 5. 2.Rules for Chain of Custody • The chain of custody is important to the investigation process because it is the first step when authenticating digital audio and video evidence. • Identifying this chain of custody provides information about whether or not this evidence has been copied or cloned. • The chain of custody document contain the following information. 1.Who seized the evidence : Name, designation, e-mail,phone number,etc. 2.When the evidence was seized: Actual time and date, the system CMOS date and time . 3.Physical description of the evidence item: serial no,tag,make and model, etc.
  • 6. 3.Rules for Evidence Integrity • To ensure that the evidence is not altered, various methods are employed. Some of these are: 1)Bit by bit copy 2)Evidence is locked in safe and limited access cabinets called safes,or vaults. 3)The use of crypto graphic hashes like MD5,SHA1,SHA2,etc. to ensure the integrity of the original evidence media. 4)The use of write blocker to protect the evidence from modification. 5)To create and maintain chain of custody documents.
  • 8. • Computer forensics investigation is an organised process just like any other traditional law enforcement investigation. • Specially trained forensics investigators follow specific computer forensics methodology. • Evidence must be relevant to a case in question and sufficient enough to prove a point.
  • 9. Where can we find evidence? • During investigations, we need to collect ,preserve and analyse computer hard drives and media such as USB drives,floppy disks,zip drives and optical media like CDs and DVDs. • Data that is not found on the disk can be found in the RAM. • The information that is found in memory includes the user ids and passwords,encryption keys,chat sessions,unencrpted data,emails,unsaved documents,hidden code such as rootkits,registry information and other critical evidence. • This data can provide related information about the target’s activity on the computer.
  • 10. • Evidence may be stored in 1)CDs/DVDs 2)Hard Disk Media 3)USB drives 4)Memory Cards 5)Text messages 6)Phone Records 7)E-mails 8)Digital images 9)Various application records 10)web-sites 11)Browser history
  • 11. Conclusion • There are various rules employed during and after the forensic examination Process. • Evidences are not only related to eyewitness,Blood DNA etc. Digital evidences also make a big impact on the case.