computer forensics presented by: anam sattar anum ijaz tayyaba shaffqat daniyal qadeer butt ...

33

Upload: alberta-price

Post on 18-Jan-2016

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid
Page 2: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Computer Forensics

Page 3: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Presented By:

Anam Sattar Anum Ijaz Tayyaba Shaffqat Daniyal Qadeer Butt Usman Rashid

Page 4: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

The Field of Computer Forensics

What is Computer Forensics?

Scientific process of preserving, identifying, extracting, documenting and interpreting data on computers.

  used to obtain potential legal evidence.  computer forensic is the application of computer

investigation and analysis techniques in the interests  of determining potential legal evidence.

  computer forensic is also called digital forensic, network

forensic, or cyber forensic.

Page 5: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

History of Computer Forensics 1.father of computer Forensic "Michael Enderson"

2.meeting in 1988 (Portland ,Oregon)      Creation of IACIS.

Page 6: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Advantages of Computer Forensics

Ability to search through a massive amount of data

Quickly Thoroughly In any language

Page 7: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Disadvantages of Computer Forensics

1.privacy concern

2.data corruption

Page 8: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Importance of computer forensic. Computer evidence are popular in cases such

as fraud, harassment, theft of trade secrets.

Computer forensic experts are often the only ones that can crack technology-based cases. Anyone can turn on a computer and do a basic search for a missing file but not everyone can find a missing file that someone else doesn’t want found. So if you want a wining case, hiring highly qualified experts makes all the difference.

Page 9: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Computer Forensics process

Page 10: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Computer Forensics process

Can be simple or complex depending upon circumstances.

Specialist looks for the information related to the incident.

It may be limited by a search warrant or time.

Page 11: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Gathering of Information

Page 12: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

First Step: Gathering of Information

Investigator is guided by search warrant to seize all the material.

Corporate forensics specialist is guided by the availability of equipment.

Despite of provided guidelines, many items are considered for collection & examination.

Page 13: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Items needed to be considered for collection

Computer Media:

1.Hard Disk2.Removable Hard Disk3.USB flash drives4.Flash memory card5.Optical disc

Page 14: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Computers and Peripherals

Page 15: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Computers and Peripherals

Every part of the computer needs to be considered for examination.

& all the equipment must be taken under possession.

Page 16: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Other computer and network hardware

Page 17: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Other computer and network hardware

The computers forensics should also include digital devices like routers, digital cameras, smart phones and other personal mobile devices.

Should also look for computers connected with wireless connection.

Page 18: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Computer software

Page 19: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Computer software

Its is impossible to examine files without the proper application software.

The user of the suspect computer might have installed specialized, custom or a very old software.

So the specialist should also look out for the proper software.

Page 20: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Step 2: In the computer Forensics Lab

Page 21: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

In the computer Forensics Lab

When the gathered material are in the forensics lab, the investigation can begin.

It compromises of following steps1.Preserve the media2.Extract evidence3.Analyze computer media4.Document results

Page 22: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

During this process We should make sure that

1. No information is modified.

2. The original hard disk should never be used to boot a computer.

3. Specialized tools must be used to maintain the integrity of the data and make sure that it stays in its original form.

Page 23: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Computer Forensics Tools

Page 24: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Computer Forensics Tools

A computer forensic tool refers to software used in the investigations of computer-related crimes, include software for:-

Disk imaging Forensic media preparation Mobile devices String search

Page 25: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

The Forensic Recovery Of Digital Evidence:

Workstation

Imaging application

Analysis tools

Page 26: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Fire chief hardware:

Working

How it can use?

Connected with computer via fire wire connection

Page 27: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Fire fly hardware:

It can plug directly into an Eide ,IDE ,SAS or SATA hard disk.

It is more preferable than the road master easier way of transferring data than

road master

Page 28: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Working of computer forenics The purpose of computer forensics

techniques is to search, preserve and analyze information on computer systems to find potential evidence for a trial.

Many of the techniques detectives use in crime scene investigations have digital counterparts but there are also some unique aspects to computer investigations.

Page 29: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Working

Analyzing deleted files

Traking packet routes

Analyzing network traffic

Page 30: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Working

Analyzing internet provider logs

Analyzing chat logs

Analyzing packet trace

Page 31: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

working

Analyzing personal mobile devices

Analyzing browser history logs

Page 32: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Conclusion Computer forensics is

very important. The procedures are

important to follow, because doing so ensures evidence will be admitted and suspects will be more likely to face the consequences if found guilty.

Page 33: Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid

Questions??The End.