What is meant by computer forensics?  Principle, Function of computer forensics.  History about computer forensics.  Needs of computer forensics.

Slides:



Advertisements
Similar presentations
OC RIMS Cyber Safety & Security Incident Response.
Advertisements

Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Data Collection, Analysis and Preservation Computer Forensics: Data Collection, Analysis and Preservation Kikunda Eric Kajangu, Cher Vue, and John Mottola.
The Fascinating World of Digital Evidence
MSc in Business Information Technology
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Guide to Computer Forensics and Investigations, Second Edition
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Computer Forensics BACS 371
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
Technology for Computer Forensics by Alicia Castro.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Computer Forensics Mr.PRAWEE PROMPONMUANG M.Sc(Forensic Science) NO
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J w/ T. Scocca.
Capturing Computer Evidence Extracting Information.
Chapter 5: System Software: Operating Systems and Utility Programs.
COEN 152 Computer Forensics Introduction to Computer Forensics.
Guide to Computer Forensics and Investigations, Second Edition
SUMMER BRIDGE PROGRAM DR. HWAJUNG LEE DR. ASHLEY PODHRADSKY Computer Forensics.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Computer Forensics Iram Qureshi, Prajakta Lokhande.
Dr Richard Overill Department of Informatics King’s College London Cyber Sleuthing or the Art of the Digital Detective.
Digital Crime Scene Investigative Process
Computer Forensics Principles and Practices
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
1 IT Investigative Tools Tools and Services for the Forensic Auditor.
© Sapphire 2006 Computer Misuse in the Workplace You only get one chance..... David Horn You only get one chance...
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University September 28, 2007.
Computer Forensics An introduction Jessie Dunbar, Jr. Lynn Johnston Andrew Preece Kathy Spaulding September 18, 2007.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
Computer security By Isabelle Cooper.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Cybercrime What is it, what does it cost, & how is it regulated?
CJ 317 – Computer Forensics
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter Extension 24 Computer Crime and Forensics.
Computer Forensics Kelsey Bretz. Overview Introduction What happens when a file is deleted Typical Computer Forensic Investigations Who uses Computer.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
CIT 180 Security Fundamentals Computer Forensics.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Cell Phone Forensics Investigator - ICFECI
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Electronic Crime: Incident Reporting and Forensics Between Law Enforcement and Private Industry D/Sgt. Michael Harrington CEECS, CFCE, EnCE Michigan State.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
CyberLaw. Assignment Review Cyber LawCyberLaw 6/23/2016 CyberLaw 3 Securing an Organization  This Chat: CyberLaw and Compliance –Forensics –Privacy.
Digital Forensics Ryan Lord. Road Map - What is Digital Forensics? - Types of computer crimes - Tools - Procedures - Cases - Problems.
Investigations 2016 First semester [ 12 week ]-Forensic Analysis of the Windows 7 Registry.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
Computer Forensics By: Chris Rozic.
Criminal Prosecutors with Computer Forensics
Computer Forensics 1 1.
Guide to Computer Forensics and Investigations Fifth Edition
The Need For Forensic Capabilities In The Commercial Sector
Digital Forensics Ryan Lord.
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Ad Hoc Phase Structured Phase Enterprise Phase
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Counter Forensic for Computer Forensic By: Lara Amanj Gulan Azad.
Forensic Recovery of Evidence Device (FRED)
Introduction to Digital Forensics
Presentation transcript:

What is meant by computer forensics?  Principle, Function of computer forensics.  History about computer forensics.  Needs of computer forensics.  Top 10 location for evidence.  Types of computer forensics/forensic tools  Methodology about computer forensics.  Applications/skills required for forensics.  Conclusion.

“Forensic computing is the process of - a)Identifying b)Preserving c)Analysing and d)Presenting digital evidence in a manner that is acceptable.”

 Detect a computer incident, identify the intruders and prosecute the perpetrator in a court of law.

HISTORY Began to evolve more than 30 years ago in US when law enforcement and military investigators started seeing criminals get technical. Over the next decades, and up to today, the field has exploded. Law enforcement and the military continue to have a large presence in the information security and computer forensic field at the local, state and federal level.

 To produce evidence in the court that can lead to the punishment of the actual.  To ensure the integrity of computer system.  To focus on response to hi-tech offenses, started to intertwine.

 Types of cyber crime :  Child prom  Breech of computer security  Fraud /Theft  Copy right violations  Identity theft  Narcotics investigations  Threats  Burglary  Suicide  Obscenity  Homicide  Administrative investigation  stalking

 Internet history files  Slack/unallocated space  Temporary internet files  Buddy lists, personal chat room  News groups/club lists/posting  Settings, folder structure, file names  File storage dates  Software/hardware added.  File sharing ability  s

 Hard ware  Write blockers  USB blockers  IDE blockers  SATA blockers  SD card blockers  FRED work stations  Evidence bags  Painters bucket  Black light-windows MAC and IOS forensic analysis software.  Internet evidence finder  SANS INVESTIGATIVE FORENSICS TOOL KIT (SIFT)- multi purpose operating system

 Shut down the computer  Transport the computer system to a secure location  Make bit stream back ups of hard disks and floppy disks  Mathematically verify data on all storage devices  Document the system date and time  Make a list of key search words  Evaluate the windows swap file  Evaluate file slack

 Financial fraud detection  Criminal prosecution  Civil litigation  Corporate security policy and acceptable violations  Domestic  Marketing

 BENEFITS:  Information and evidence to solve a problem  Scientist does the job of solving a crime through analysing data  Using forensic science, it is easier to track the history and trace the events related to the crime  Using analysis tools and utilities

1 ) Sunny Vaghela 2 ) Ankit Fadia 3 ) Trishneet Arora 4 ) Vivek Ramchandran 5 ) Koushik Dutta 6 ) Aseem Jakhar 7 ) Sai Satish 8 ) Benild Joseph 9 ) Falgun Rathod 10 ) Rahul Tyagi

 With computers becoming more and more involved in our everyday lives, both professionally and socially, there is a need for computer forensics. This field will enable crucial electronic evidence to be found, whether it was lost, deleted, damaged, or hidden, and used to prosecute individuals that believe they have successfully beaten the system.

queries