SlideShare a Scribd company logo
COMPUTER
FORENSICS
Varun Sehgal
1208213037
Index
 Computer Forensics & it’s objective.
 Why Computer Forensics?
 History of Computer Forensics.
 Who uses computer forensics?
 Digital Evidences & it’s types.
 Computer Forensics Algorithm.
 What shouldn’t be done during Investigation?
 Computer Forensics Tools.
Computer Forensics Applications.
 Advantages of Computer Forensics.
 Disadvantages of Computer Forensics.
 Conclusions.
What is Computer Forensics?
“Computer Forensics is the process of identifying,
preserving, analyzing and presenting the digital
evidence in such a manner that the evidences are
legally acceptable”.
Objective of Computer Forensics
The main objective is to find the criminal which is
directly or indirectly related to cyber world.
 To find out the digital evidences.
 Presenting evidences in a manner that leads to
legal action of the criminal.
Why Computer Forensics?
 Employee internet abuse.
 Unauthorized disclosure of corporate information.
 Industrial espionage.
 Damage assessment.
 Criminal fraud and deception cases.
 Countless others!
History of Computer Forensics
 Bankruptcy in Enron in December 2001.
 Hundreds of employees were left jobless while some
executives seemed to benefit from the company's
collapse.
 The United States Congress decided to investigate and
a specialized detective force began to search through
hundreds of Enron employee computers using computer
forensics.
WHO USES COMPUTER FORENSICS?
 Criminal Prosecutors - Rely on evidence obtained
from a computer to prosecute suspects and use as
evidence.
 Civil Litigations - Personal and business data
discovered on a computer can be used in fraud,
harassment, or discrimination cases.
DIGITAL EVIDENCES
“Any data that is recorded or preserved on any
medium in or by a computer system or other similar
device, that can be read or understand by a person or
a computer system or other similar device”.
TYPE OF DIGITAL EVIDENCES
 PERSISTANT DATA- Data that remains unaffected
when the computer is turned off.
Example- Hard Drives & storage media.
 VOLATILE DATA- Data that would be lost if the
computer is turned off.
Example-Deleted files, computer history, the computer's
registry, temporary files and web browsing history.
RULES FOR DIGITAL EVIDENCES
Admissible-Must be able to be used in court or
elsewhere.
Authentic-Evidence must be relevant to the case.
Complete-Must not lack any information.
Reliable-No question about authenticity.
Believable-Clear, easy to understand, and
believable by a jury.
Steps of Collection of Evidence
 Find the evidence; where is it stored.
 Find relevant data – recovery.
 Create order of volatility.
 Collect evidence – use tools.
 Good documentation of all the actions.
Algorithm
Cross-Drive Analysis Algorithm
-> Correlates information found on multiple hard drives.
-> Identify social networks & perform anomaly detection.
-> Still being researched.
 Live Analysis Algorithm
-> Examine computers from within the operating system.
-> Use custom forensics tools to extract various evidence.
-> Useful when dealing with Encrypting File Systems.
Steps of Investigation in Live Analysis
 Acquisition: Physically or remotely obtaining
possession of the computer and external physical
storage devices.
 Identification: This step involves identifying
what data could be recovered and electronically
retrieving it by running various Computer Forensic
tools and software suites.
Contd.
 Evaluation: Evaluating the data recovered to
determine if and how it could be used again the suspect
for prosecution in court.
 Presentation: Presentation of evidence discovered
in a manner which is understood by lawyers, non-
technically staff/management, and suitable as evidence
as determined by laws.
What not to be done during
investigation?
Avoid changing date/time stamps (of files for
example)or changing data itself.
Overwriting of unallocated space (which can
happen on re-boot for example).
Computer Forensics Tools
Disk imaging software.
Hashing tools.
File recovery programs.
Encryption decoding software.
Password cracking software.
COMPUTER FORENSICS APPLICATION
 Financial fraud detection.
 Corporate security policy.
Criminal prosecution.
SKILLLS REQUIRED FOR COMPUTER
FORENSICS
Proper knowledge of computer.
Strong computer science fundamentals.
Strong system administrative skills.
Knowledge of the latest forensic tools.
Advantages
Digital Forensics help to protect from and solve cases
involving:
Theft of intellectual property- This is related to any act
that allows access to customer data and any confidential
information.
Financial Fraud- This is related to anything that uses
fraudulent purchase of victims information to conduct
fraudulent transactions.
Disadvantages
Digital evidence accepted into court must
prove that there is no tampering.
Costs- producing electronic records &
preserving them is extremely costly.
Legal practitioners must have extensive
computer knowledge.
Conclusion
This field will enable crucial electronic evidence to
be found, whether it was lost, deleted, damaged, or
hidden, and used to prosecute individuals that
believe they have successfully beaten the system.
Thank You

More Related Content

PPTX
Analysis of digital evidence
PPTX
computer forensics
PPT
Computer Forensics
PPT
Computer forensics
PPTX
Computer forensic ppt
PDF
Digital Forensic: Brief Intro & Research Challenge
PPTX
Digital forensic tools
PPTX
Types of Evidence
Analysis of digital evidence
computer forensics
Computer Forensics
Computer forensics
Computer forensic ppt
Digital Forensic: Brief Intro & Research Challenge
Digital forensic tools
Types of Evidence

What's hot (20)

PPTX
SCHS Topic 5: Privacy, Confidentiality and Medical Records
PPTX
Mellss yr 4 forensics criminal n civil negligence
PPT
Digital Forensic
PPTX
Memory forensics.pptx
PPTX
Digital forensics
PPTX
Privacy, Privilege And Confidentiality For Lawyers
PPTX
Cybercrime And Cyber forensics
PPTX
Computer forensics
PPTX
Cyber forensic 1
PPT
Forensic medicine- legal procedure
PPTX
Digital Forensics
PDF
Digital forensic principles and procedure
PPTX
What is Medical Negligence By Dr. Ghazala Shaikh
PPTX
Cyber Forensics Overview
PPSX
Doctors and their criminal liability
PPT
Computer +forensics
PPT
Forensic ppt
PDF
Cloud-forensics
PPT
Forensic dactyloscopy
PPTX
Violence against doctors: A viral epidemic ?
SCHS Topic 5: Privacy, Confidentiality and Medical Records
Mellss yr 4 forensics criminal n civil negligence
Digital Forensic
Memory forensics.pptx
Digital forensics
Privacy, Privilege And Confidentiality For Lawyers
Cybercrime And Cyber forensics
Computer forensics
Cyber forensic 1
Forensic medicine- legal procedure
Digital Forensics
Digital forensic principles and procedure
What is Medical Negligence By Dr. Ghazala Shaikh
Cyber Forensics Overview
Doctors and their criminal liability
Computer +forensics
Forensic ppt
Cloud-forensics
Forensic dactyloscopy
Violence against doctors: A viral epidemic ?
Ad

Similar to Computer forensics Slides (20)

PPTX
Computer forensic
PDF
Computer forensic
PPTX
Business Intelligence (BI) Tools For Computer Forensic
PPTX
Computer forensics toolkit
PPT
Computer forensics
PPTX
digitalforensicpptlatest28-230522192202-1d9b832e (1).pptx
PDF
Computer forencis
PPTX
Cyber forensics ppt
PPTX
Evidence and data
PDF
4.content (computer forensic)
PDF
III year VI sem CYber forensics material
PPTX
Digital Forensic ppt
PPTX
Cyber
DOCX
Digital forensics Steps
DOCX
R15 a0533 cf converted
PDF
To get round to the heart of fortress
DOCX
What is Digital Forensics.docx
PPTX
Network and computer forensics
DOCX
Maintaining The Digital Chain of Custody By John Patzakis .docx
PDF
Cyber forensics and auditing
Computer forensic
Computer forensic
Business Intelligence (BI) Tools For Computer Forensic
Computer forensics toolkit
Computer forensics
digitalforensicpptlatest28-230522192202-1d9b832e (1).pptx
Computer forencis
Cyber forensics ppt
Evidence and data
4.content (computer forensic)
III year VI sem CYber forensics material
Digital Forensic ppt
Cyber
Digital forensics Steps
R15 a0533 cf converted
To get round to the heart of fortress
What is Digital Forensics.docx
Network and computer forensics
Maintaining The Digital Chain of Custody By John Patzakis .docx
Cyber forensics and auditing
Ad

Recently uploaded (20)

PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
PPT on Performance Review to get promotions
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPT
Mechanical Engineering MATERIALS Selection
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Welding lecture in detail for understanding
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
Digital Logic Computer Design lecture notes
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPT on Performance Review to get promotions
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
additive manufacturing of ss316l using mig welding
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Internet of Things (IOT) - A guide to understanding
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Mechanical Engineering MATERIALS Selection
CYBER-CRIMES AND SECURITY A guide to understanding
Strings in CPP - Strings in C++ are sequences of characters used to store and...
UNIT 4 Total Quality Management .pptx
Welding lecture in detail for understanding
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Arduino robotics embedded978-1-4302-3184-4.pdf
Digital Logic Computer Design lecture notes
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx

Computer forensics Slides

  • 2. Index  Computer Forensics & it’s objective.  Why Computer Forensics?  History of Computer Forensics.  Who uses computer forensics?  Digital Evidences & it’s types.  Computer Forensics Algorithm.  What shouldn’t be done during Investigation?  Computer Forensics Tools. Computer Forensics Applications.  Advantages of Computer Forensics.  Disadvantages of Computer Forensics.  Conclusions.
  • 3. What is Computer Forensics? “Computer Forensics is the process of identifying, preserving, analyzing and presenting the digital evidence in such a manner that the evidences are legally acceptable”.
  • 4. Objective of Computer Forensics The main objective is to find the criminal which is directly or indirectly related to cyber world.  To find out the digital evidences.  Presenting evidences in a manner that leads to legal action of the criminal.
  • 5. Why Computer Forensics?  Employee internet abuse.  Unauthorized disclosure of corporate information.  Industrial espionage.  Damage assessment.  Criminal fraud and deception cases.  Countless others!
  • 6. History of Computer Forensics  Bankruptcy in Enron in December 2001.  Hundreds of employees were left jobless while some executives seemed to benefit from the company's collapse.  The United States Congress decided to investigate and a specialized detective force began to search through hundreds of Enron employee computers using computer forensics.
  • 7. WHO USES COMPUTER FORENSICS?  Criminal Prosecutors - Rely on evidence obtained from a computer to prosecute suspects and use as evidence.  Civil Litigations - Personal and business data discovered on a computer can be used in fraud, harassment, or discrimination cases.
  • 8. DIGITAL EVIDENCES “Any data that is recorded or preserved on any medium in or by a computer system or other similar device, that can be read or understand by a person or a computer system or other similar device”.
  • 9. TYPE OF DIGITAL EVIDENCES  PERSISTANT DATA- Data that remains unaffected when the computer is turned off. Example- Hard Drives & storage media.  VOLATILE DATA- Data that would be lost if the computer is turned off. Example-Deleted files, computer history, the computer's registry, temporary files and web browsing history.
  • 10. RULES FOR DIGITAL EVIDENCES Admissible-Must be able to be used in court or elsewhere. Authentic-Evidence must be relevant to the case. Complete-Must not lack any information. Reliable-No question about authenticity. Believable-Clear, easy to understand, and believable by a jury.
  • 11. Steps of Collection of Evidence  Find the evidence; where is it stored.  Find relevant data – recovery.  Create order of volatility.  Collect evidence – use tools.  Good documentation of all the actions.
  • 12. Algorithm Cross-Drive Analysis Algorithm -> Correlates information found on multiple hard drives. -> Identify social networks & perform anomaly detection. -> Still being researched.  Live Analysis Algorithm -> Examine computers from within the operating system. -> Use custom forensics tools to extract various evidence. -> Useful when dealing with Encrypting File Systems.
  • 13. Steps of Investigation in Live Analysis  Acquisition: Physically or remotely obtaining possession of the computer and external physical storage devices.  Identification: This step involves identifying what data could be recovered and electronically retrieving it by running various Computer Forensic tools and software suites.
  • 14. Contd.  Evaluation: Evaluating the data recovered to determine if and how it could be used again the suspect for prosecution in court.  Presentation: Presentation of evidence discovered in a manner which is understood by lawyers, non- technically staff/management, and suitable as evidence as determined by laws.
  • 15. What not to be done during investigation? Avoid changing date/time stamps (of files for example)or changing data itself. Overwriting of unallocated space (which can happen on re-boot for example).
  • 16. Computer Forensics Tools Disk imaging software. Hashing tools. File recovery programs. Encryption decoding software. Password cracking software.
  • 17. COMPUTER FORENSICS APPLICATION  Financial fraud detection.  Corporate security policy. Criminal prosecution.
  • 18. SKILLLS REQUIRED FOR COMPUTER FORENSICS Proper knowledge of computer. Strong computer science fundamentals. Strong system administrative skills. Knowledge of the latest forensic tools.
  • 19. Advantages Digital Forensics help to protect from and solve cases involving: Theft of intellectual property- This is related to any act that allows access to customer data and any confidential information. Financial Fraud- This is related to anything that uses fraudulent purchase of victims information to conduct fraudulent transactions.
  • 20. Disadvantages Digital evidence accepted into court must prove that there is no tampering. Costs- producing electronic records & preserving them is extremely costly. Legal practitioners must have extensive computer knowledge.
  • 21. Conclusion This field will enable crucial electronic evidence to be found, whether it was lost, deleted, damaged, or hidden, and used to prosecute individuals that believe they have successfully beaten the system.