computer forensics
DESCRIPTION
COMPUTER FORENSICS. COMPUTER FORENSICS SYNOPSIS:. What is meant by computer forensics? Principle , Function of computer forensics. History about computer forensics. Needs of computer forensics. Top 10 location for evidence. Types of computer forensics/forensic tools - PowerPoint PPT PresentationTRANSCRIPT
COMPUTER
FORENSICS
What is meant by computer forensics? Principle , Function of computer forensics. History about computer forensics. Needs of computer forensics. Top 10 location for evidence. Types of computer forensics/forensic tools Methodology about computer forensics. Applications/skills required for forensics. Conclusion.
COMPUTER FORENSICS SYNOPSIS:
“Forensic computing is the process of -
a)Identifying b)Preserving c)Analysing and d)Presenting digital evidence in a manner that is acceptable.”
Computer forensicsPRINCIPLE
Detect a computer incident, identify the intruders and prosecute the perpetrator in a court of law.
FUNCTION:
HISTORY
• Began to evolve more than 30 years ago in US when law enforcement and military investigators started seeing criminals get technical.
• Over the next decades, and up to today, the field has exploded. Law enforcement and the military continue to have a large presence in the information security and computer forensic field at the local, state and federal level.
To produce evidence in the court that can lead to the punishment of the actual.
To ensure the integrity of computer system. To focus on response to hi-tech offenses, started to
intertwine.
NEEDS OF COMPUTER FORENSICS
Types of cyber crime : Child prom Breech of computer
security Fraud /Theft Copy right violations Identity theft Narcotics investigations Threats
Burglary Suicide Obscenity Homicide Administrative
investigation stalking
CYBER CRIME: “any illegal act that involves a computer it’s system or it’s applications”.
Internet history files Slack/unallocated space Temporary internet files Buddy lists, personal
chat room News groups/club
lists/posting Settings, folder
structure, file names File storage dates
Software/hardware added.
File sharing ability E-mails
Top 10 Location for evidence
Hard ware Write blockers USB blockers IDE blockers SATA blockers SD card blockers FRED work stations Evidence bags Painters bucket
Black light-windows MAC and IOS forensic analysis software.
Internet evidence finder SANS INVESTIGATIVE
FORENSICS TOOL KIT (SIFT)- multi
purpose operating system
Forensic Tools
Shut down the computer Transport the computer
system to a secure location Make bit stream back ups of
hard disks and floppy disks Mathematically verify data
on all storage devices Document the system date
and time Make a list of key search
words Evaluate the windows swap
file Evaluate file slack
METHODOLOGY
Financial fraud detection Criminal prosecution Civil litigation Corporate security policy and acceptable violations Domestic Marketing
APPLICATIONS
Skills required: a)strong analytical skills b)strong computer science fundamentals c)strong system administrative skills
BENEFITS: Information and evidence to solve a problem Scientist does the job of solving a crime through
analysing data Using forensic science, it is easier to track the history
and trace the events related to the crime Using analysis tools and utilities
1 ) Sunny Vaghela2 ) Ankit Fadia3 ) Trishneet Arora4 ) Vivek Ramchandran5 ) Koushik Dutta6 ) Aseem Jakhar7 ) Sai Satish8 ) Benild Joseph9 ) Falgun Rathod10 ) Rahul Tyagi
Top 10 Ethical Hackers in India | Best Indian Hackers | Indian Ethical Hackers
With computers becoming more and more involved in our everyday lives, both professionally and socially, there is a need for computer forensics. This field will enable crucial electronic evidence to be found, whether it was lost, deleted, damaged, or hidden, and used to prosecute individuals that believe they have successfully beaten the system.
Conclusion
queries