SlideShare a Scribd company logo
Intro to Computer Forensics
Mr. Islahuddin Jalal
MS (Cyber Security) – UKM Malaysia
Research Title – 3C-CSIRT Model for Afghanistan
BAKHTAR UNIVERSITY ‫باخترپوهنتون‬ ‫د‬
Outline
• Computer forensics
• Evolution, objective, advantages and disadvantages of CF
• Forensics Readiness Planning
• Cybercrime and its types
• Cybercrime investigation
Forensics Science
• Forensics Science is a science which proves to a court that the suspected
was involved or not, in the criminal activities, in order to find out the truth
that injustice shall not be occurred.
• Application of physical sciences to law
• in the search for truth in
• civil,
• criminal,
• and social behavioral matters
• In order to end that injustice shall not be done to any member of society. [CHFI]
• To prove that a person was present or not at the place of crime
Computer Forensics
• It is the combination of law and computer science
• Computer forensics is a process of gathering related data or
information from the digital appliances involved in the crime and
preserved those data or information in a way that is acceptable to
court of law.
• A methodical series of techniques and procedures for gathering
evidence, from computing equipment and various storage devices
and digital media that can be presented in a court of law in a
coherent and meaningful format. [Dr. H.B. Wolfe]
Computer Forensics
• Forensics computing is thee science of capturing, processing, and
investigating data from computers using a methodology whereby any
evidence discovered is acceptable in a court of law. [CHFI]
• The preservation, identification, extraction, interpretation, and
documentation of computer evidence, to include the rules of
evidence, legal processes, integrity of evidence, factual reporting of
the information found, and providing of expert opinion in a court of
law or other legal and/or administrative proceeding as to what was
found [CSI]
Aspects of Organizational Security [CHFI]
Evolution of Computer Forensics
• Francis Galton (1982 – 1911): Made the first recorded study of fingerprints
• Leone Lattes (1887 – 1954): Discovered Blood groupings
• Calvin Goddard (1891 – 1955): allowed firearms and bullet comparison for
solving many pending court cases
• Albert Osborn (1858 – 1946): Developed essential feature of document
examination
• Hans Gross (1847 – 1915): Made use of scientific study to head criminal
investigations
• FBI (1932): A lab was set up to provide forensics services to all field agents
and other law authorities across the country.
Evolution of Computer Forensics [CHFI]
Objective of Computer Forensics
• To find out the criminal which is directly or indirectly related to cyber
region.
• To recover, analyze and preserve computer and related materials in
such a way that they can be presented as evidence in a court of law.
• To identify the evidence quickly, estimate the potential impact of the
malicious activity on the victim, and assess the intent and identity of
the perpetrator.
Advantages of Computer Forensics
• Help to protect from and solve cases involving
• Theft of intellectual property
• This is related to any act that allows access to customer data and any confidential
information
• Financial Fraud
• This is related to anything that uses fraudulent purchase of victims information to
conduct fraudulent transactions.
Disadvantages of Computer Forensics
• Digital evidence accepted into court must prove that there is no
tampering
• Costs
• Producing electronic records and preserving them is extremely costly
• Legal practitioners must have extensive computer knowledge
Need for Computer Forensics [CHFI]
Forensics Readiness?
• It is defined as the ability of an organization to maximize its potential
to use digital evidence whilst minimizing the costs of an investigation.
Benefits of Forensics Readiness [CHFI]
• Evidence can be gathered to act in the company’s defense if subject to a
law suit
• In the event of a major incident, a fast and efficient investigation can be
conducted and corresponding actions can be followed with minimal
disruption to the business.
• Forensics readiness can extend the target of information security to the
wider threat from cybercrime such as intellectual property protection,
fraud, or extortion.
• Fixed and structured approach for storage of evidence can considerably
reduce the expense and time of an internal investigation
• It can improve and simplify law enforcement interface
• In case of a major incident, proper and in-depth investigation can be
conducted
Goals of Forensics Readiness [CHFI]
Forensics Readiness Planning
1) Define the business states that need digital evidence
2) Identify the potential evidence available
3) Determine the evidence collection requirement
4) Decide the procedure for securely collecting the evidence that meets the
requirement in a forensically sound manner
5) Establish a policy for securely handling and storing the collected evidence
6) Ensure that the observation process is aimed to detect and prevent the
important incidents
7) Ensure investigative staff are capable to complete any task related to handling
and preserving the evidence
8) Document all the activities performed and their impact
9) Ensure authorized review to facilitate action in response to the incident
Cyber Crime
• Cyber crime is an illegal action against any entity using computer, its
systems and its applications.
• Crime directed against a computer
• Crime where the computer contains evidence
• Crime where the computer is used as a tool to commit the crime
• A cyber crime is intentional and not accidental
Cyber crime
• Computer and networks make a healthy environment for the cyber
criminal to perform their illegal actions due to the following factors
• Speed
• Anonymity
• Different cyber laws
• It is also a great challenges for the investigators as well.
Modes of Attacks
• There are generally two main types of attacks
• Internal Attacks
• Breach of trust from employees within the organization
• External Attacks
• Attackers either hired by an insider or by an external entity to destroy the competitor’s
reputation
Examples of Cyber crime
1) Fraud achieved by the manipulation of the computer network
2) Deliberate circumvention of the computer systems
3) Unauthorized access to or modification of programs and data
4) Intellectual property theft, including software piracy
5) Industrial espionage by means of access to or theft of computer materials
6) Identity theft, which is accomplished by the use of fraudulent computer
7) Writing or spreading computer viruses or worms
8) Salami slicing is the practice of stealing money repeatedly in small quantities
9) Denial of service attack, where the company’s websites are flooded with
service requests and their website is overloaded and either slowed or is
crashed completely
10) Making and digitally distributing child pornography
CHFI
Cyber Crime Investigation [CHFI]
Key Steps in Forensics Investigation [CHFI]
Key Steps in Forensics Investigation [CHFI]
Thank You
For Your Patience

More Related Content

PDF
Computer Forensic
PPTX
Digital Forensics
PDF
Cyber Forensics Module 1
PPT
Digital Forensics
PDF
Computer forensics and Investigation
PPTX
E mail forensics
PDF
Anti forensics-techniques-for-browsing-artifacts
PPTX
Computer forensic ppt
Computer Forensic
Digital Forensics
Cyber Forensics Module 1
Digital Forensics
Computer forensics and Investigation
E mail forensics
Anti forensics-techniques-for-browsing-artifacts
Computer forensic ppt

What's hot (20)

PPTX
Digital forensics
PPT
Computer forensics
PDF
A brief Intro to Digital Forensics
PDF
04 Evidence Collection and Data Seizure - Notes
PDF
01 Computer Forensics Fundamentals - Notes
PPTX
Computer forensics and its role
PDF
Incident response methodology
PPTX
Digital Forensic ppt
PPTX
cyber security and forensic tools
PPTX
Cyber Threat Intelligence.pptx
PPTX
Digital forensics
PPTX
Digital Evidence by Raghu Khimani
PPT
Cybersecurity: Public Sector Threats and Responses
PPT
Digital Forensic
PPTX
Hardware Authentication
PPTX
Anti forensic
PPTX
Security Policies and Standards
PPTX
Threat hunting foundations: People, process and technology.pptx
PPTX
Digital Forensics best practices with the use of open source tools and admiss...
PPT
information security management
Digital forensics
Computer forensics
A brief Intro to Digital Forensics
04 Evidence Collection and Data Seizure - Notes
01 Computer Forensics Fundamentals - Notes
Computer forensics and its role
Incident response methodology
Digital Forensic ppt
cyber security and forensic tools
Cyber Threat Intelligence.pptx
Digital forensics
Digital Evidence by Raghu Khimani
Cybersecurity: Public Sector Threats and Responses
Digital Forensic
Hardware Authentication
Anti forensic
Security Policies and Standards
Threat hunting foundations: People, process and technology.pptx
Digital Forensics best practices with the use of open source tools and admiss...
information security management
Ad

Viewers also liked (20)

PPTX
Computer forensics ppt
PDF
Chfi V3 Module 01 Computer Forensics In Todays World
PPTX
Computer Forensic Softwares
PPT
Computer forensics
PDF
Ce hv6 module 57 computer forensics and incident handling
PPTX
Computer forensics toolkit
PDF
Bridging the gap between mobile and computer forensics
PPT
Introduction to computer forensic
PPTX
Computer forensic 101 - OWASP Khartoum
PPTX
Computer forensics
PDF
Digital Evidence in Computer Forensic Investigations
PDF
Digital Crime & Forensics - Presentation
PPTX
Computer forensics powerpoint presentation
PPTX
Lect 2 computer forensics
PPTX
Csc339 – lecture 2 network fundamental
PPT
Fs Ch 18
PPT
Fs Ch 19
PDF
MobileForensicsbyFayMahdi
PPTX
Computer Forensics: First Responder Training - Eric Vanderburg - JurInnov
PPTX
Incident Response in the wake of Dear CEO
Computer forensics ppt
Chfi V3 Module 01 Computer Forensics In Todays World
Computer Forensic Softwares
Computer forensics
Ce hv6 module 57 computer forensics and incident handling
Computer forensics toolkit
Bridging the gap between mobile and computer forensics
Introduction to computer forensic
Computer forensic 101 - OWASP Khartoum
Computer forensics
Digital Evidence in Computer Forensic Investigations
Digital Crime & Forensics - Presentation
Computer forensics powerpoint presentation
Lect 2 computer forensics
Csc339 – lecture 2 network fundamental
Fs Ch 18
Fs Ch 19
MobileForensicsbyFayMahdi
Computer Forensics: First Responder Training - Eric Vanderburg - JurInnov
Incident Response in the wake of Dear CEO
Ad

Similar to Lect 1 computer forensics (20)

PPT
Latihan2 comp-forensic
PDF
FINAL_MSCIT_CYBER_FORENSICS_NOTES_SEM_IV_PROFAJAYPASHANKAR.pdf
PDF
File000114
PPTX
The Scope of Cyber Forensic.pptx
PPTX
Scope of Cyber forensics
PDF
PPTX
Computer Forensics.pptx
PPTX
DIGITAL FORENSICS, MULTIMEDIA AND INCIDENT RESPONSE.pptx
PDF
cyber forensics notes presentation chp1.pdf
PDF
Cyber forensics and auditing
PPTX
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
PPTX
Computer Forensics
PDF
Computer forensic
PPTX
computer forensics by amritanshu kaushik
PPT
Chap 1 general introduction to computer forensics
PPT
01 computer%20 forensics%20in%20todays%20world
PPTX
PPTX
Digital&computforensic
PPTX
computer forensics
PDF
Computer Forensics-An Introduction of New Face to the Digital World
Latihan2 comp-forensic
FINAL_MSCIT_CYBER_FORENSICS_NOTES_SEM_IV_PROFAJAYPASHANKAR.pdf
File000114
The Scope of Cyber Forensic.pptx
Scope of Cyber forensics
Computer Forensics.pptx
DIGITAL FORENSICS, MULTIMEDIA AND INCIDENT RESPONSE.pptx
cyber forensics notes presentation chp1.pdf
Cyber forensics and auditing
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
Computer Forensics
Computer forensic
computer forensics by amritanshu kaushik
Chap 1 general introduction to computer forensics
01 computer%20 forensics%20in%20todays%20world
Digital&computforensic
computer forensics
Computer Forensics-An Introduction of New Face to the Digital World

More from Kabul Education University (20)

PPTX
Cryptography and Network security # Lecture 8
PPTX
ITIL # Lecture 9
PPTX
Cryptography and Network security # Lecture 7
PPTX
ITIL # Lecture 8
PPTX
Cryptography and Network security # Lecture 6
PPTX
ITIL # Lecture 7
PPTX
Cryptography and Network security # Lecture 5
PPTX
Cyber Security # Lec 5
PPTX
ITIL # Lecture 6
PPTX
Cyber Security # Lec 4
PPTX
ITIL # Lecture 5
PPTX
Cyber Security # Lec 3
PPTX
ITIL # Lecture 4
PPTX
Cryptography and Network security # Lecture 4
PPTX
Cyber Security # Lec 2
PPTX
ITIL # Lecture 3
PPTX
Cryptography and Network security # Lecture 3
PPTX
ITIL # Lecture 2
PPTX
Cryptography and Network Security # Lecture 2
PPTX
ITIL # Lecture 1
Cryptography and Network security # Lecture 8
ITIL # Lecture 9
Cryptography and Network security # Lecture 7
ITIL # Lecture 8
Cryptography and Network security # Lecture 6
ITIL # Lecture 7
Cryptography and Network security # Lecture 5
Cyber Security # Lec 5
ITIL # Lecture 6
Cyber Security # Lec 4
ITIL # Lecture 5
Cyber Security # Lec 3
ITIL # Lecture 4
Cryptography and Network security # Lecture 4
Cyber Security # Lec 2
ITIL # Lecture 3
Cryptography and Network security # Lecture 3
ITIL # Lecture 2
Cryptography and Network Security # Lecture 2
ITIL # Lecture 1

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Approach and Philosophy of On baking technology
PPT
Teaching material agriculture food technology
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
KodekX | Application Modernization Development
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Electronic commerce courselecture one. Pdf
PPTX
sap open course for s4hana steps from ECC to s4
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Understanding_Digital_Forensics_Presentation.pptx
Approach and Philosophy of On baking technology
Teaching material agriculture food technology
20250228 LYD VKU AI Blended-Learning.pptx
Spectral efficient network and resource selection model in 5G networks
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Programs and apps: productivity, graphics, security and other tools
Network Security Unit 5.pdf for BCA BBA.
Chapter 3 Spatial Domain Image Processing.pdf
Machine learning based COVID-19 study performance prediction
Building Integrated photovoltaic BIPV_UPV.pdf
Review of recent advances in non-invasive hemoglobin estimation
KodekX | Application Modernization Development
Digital-Transformation-Roadmap-for-Companies.pptx
Electronic commerce courselecture one. Pdf
sap open course for s4hana steps from ECC to s4

Lect 1 computer forensics

  • 1. Intro to Computer Forensics Mr. Islahuddin Jalal MS (Cyber Security) – UKM Malaysia Research Title – 3C-CSIRT Model for Afghanistan BAKHTAR UNIVERSITY ‫باخترپوهنتون‬ ‫د‬
  • 2. Outline • Computer forensics • Evolution, objective, advantages and disadvantages of CF • Forensics Readiness Planning • Cybercrime and its types • Cybercrime investigation
  • 3. Forensics Science • Forensics Science is a science which proves to a court that the suspected was involved or not, in the criminal activities, in order to find out the truth that injustice shall not be occurred. • Application of physical sciences to law • in the search for truth in • civil, • criminal, • and social behavioral matters • In order to end that injustice shall not be done to any member of society. [CHFI] • To prove that a person was present or not at the place of crime
  • 4. Computer Forensics • It is the combination of law and computer science • Computer forensics is a process of gathering related data or information from the digital appliances involved in the crime and preserved those data or information in a way that is acceptable to court of law. • A methodical series of techniques and procedures for gathering evidence, from computing equipment and various storage devices and digital media that can be presented in a court of law in a coherent and meaningful format. [Dr. H.B. Wolfe]
  • 5. Computer Forensics • Forensics computing is thee science of capturing, processing, and investigating data from computers using a methodology whereby any evidence discovered is acceptable in a court of law. [CHFI] • The preservation, identification, extraction, interpretation, and documentation of computer evidence, to include the rules of evidence, legal processes, integrity of evidence, factual reporting of the information found, and providing of expert opinion in a court of law or other legal and/or administrative proceeding as to what was found [CSI]
  • 6. Aspects of Organizational Security [CHFI]
  • 7. Evolution of Computer Forensics • Francis Galton (1982 – 1911): Made the first recorded study of fingerprints • Leone Lattes (1887 – 1954): Discovered Blood groupings • Calvin Goddard (1891 – 1955): allowed firearms and bullet comparison for solving many pending court cases • Albert Osborn (1858 – 1946): Developed essential feature of document examination • Hans Gross (1847 – 1915): Made use of scientific study to head criminal investigations • FBI (1932): A lab was set up to provide forensics services to all field agents and other law authorities across the country.
  • 8. Evolution of Computer Forensics [CHFI]
  • 9. Objective of Computer Forensics • To find out the criminal which is directly or indirectly related to cyber region. • To recover, analyze and preserve computer and related materials in such a way that they can be presented as evidence in a court of law. • To identify the evidence quickly, estimate the potential impact of the malicious activity on the victim, and assess the intent and identity of the perpetrator.
  • 10. Advantages of Computer Forensics • Help to protect from and solve cases involving • Theft of intellectual property • This is related to any act that allows access to customer data and any confidential information • Financial Fraud • This is related to anything that uses fraudulent purchase of victims information to conduct fraudulent transactions.
  • 11. Disadvantages of Computer Forensics • Digital evidence accepted into court must prove that there is no tampering • Costs • Producing electronic records and preserving them is extremely costly • Legal practitioners must have extensive computer knowledge
  • 12. Need for Computer Forensics [CHFI]
  • 13. Forensics Readiness? • It is defined as the ability of an organization to maximize its potential to use digital evidence whilst minimizing the costs of an investigation.
  • 14. Benefits of Forensics Readiness [CHFI] • Evidence can be gathered to act in the company’s defense if subject to a law suit • In the event of a major incident, a fast and efficient investigation can be conducted and corresponding actions can be followed with minimal disruption to the business. • Forensics readiness can extend the target of information security to the wider threat from cybercrime such as intellectual property protection, fraud, or extortion. • Fixed and structured approach for storage of evidence can considerably reduce the expense and time of an internal investigation • It can improve and simplify law enforcement interface • In case of a major incident, proper and in-depth investigation can be conducted
  • 15. Goals of Forensics Readiness [CHFI]
  • 16. Forensics Readiness Planning 1) Define the business states that need digital evidence 2) Identify the potential evidence available 3) Determine the evidence collection requirement 4) Decide the procedure for securely collecting the evidence that meets the requirement in a forensically sound manner 5) Establish a policy for securely handling and storing the collected evidence 6) Ensure that the observation process is aimed to detect and prevent the important incidents 7) Ensure investigative staff are capable to complete any task related to handling and preserving the evidence 8) Document all the activities performed and their impact 9) Ensure authorized review to facilitate action in response to the incident
  • 17. Cyber Crime • Cyber crime is an illegal action against any entity using computer, its systems and its applications. • Crime directed against a computer • Crime where the computer contains evidence • Crime where the computer is used as a tool to commit the crime • A cyber crime is intentional and not accidental
  • 18. Cyber crime • Computer and networks make a healthy environment for the cyber criminal to perform their illegal actions due to the following factors • Speed • Anonymity • Different cyber laws • It is also a great challenges for the investigators as well.
  • 19. Modes of Attacks • There are generally two main types of attacks • Internal Attacks • Breach of trust from employees within the organization • External Attacks • Attackers either hired by an insider or by an external entity to destroy the competitor’s reputation
  • 20. Examples of Cyber crime 1) Fraud achieved by the manipulation of the computer network 2) Deliberate circumvention of the computer systems 3) Unauthorized access to or modification of programs and data 4) Intellectual property theft, including software piracy 5) Industrial espionage by means of access to or theft of computer materials 6) Identity theft, which is accomplished by the use of fraudulent computer 7) Writing or spreading computer viruses or worms 8) Salami slicing is the practice of stealing money repeatedly in small quantities 9) Denial of service attack, where the company’s websites are flooded with service requests and their website is overloaded and either slowed or is crashed completely 10) Making and digitally distributing child pornography
  • 21. CHFI
  • 23. Key Steps in Forensics Investigation [CHFI]
  • 24. Key Steps in Forensics Investigation [CHFI]
  • 25. Thank You For Your Patience