Counter Forensic for Computer Forensic By: Lara Amanj Gulan Azad.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
14 September Digital Investigations With the proliferation of devices, do organisations really know where their most sensitive data is held? Companies.
CRIMINAL LAW CRIMINAL PROCEDURE OUR CRIMINAL LAWS CHAPTER 5.
The Information Technology Act, 2000 and The Information Technology (amendment) Act, 2008 A Comparative analysis By – Sagar Rahurkar.
Drug abuse violations are defined as State or local offenses relating to the unlawful possession, sale, use, growing, manufacturing, and making of narcotic.
Security on Web 2.0 Krasznay Csaba. Google Search Trends.
Contents What is Forensic Accounting Nature of work of Forensic Accountants Need of Forensic accounting Activities of Forensic accountants Forensic Accountant…An.
Legal & Political Issues in International Computer Crime Investigation & Prosecution Jennifer S. Granick m.
STATE OF CYBER SECURITY IN JAMAICA Hon. Julian Robinson Chairman Joint Select Committee on the Cybercrimes Act January 24, 2013.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FORENSIC ACCOUNTING - BA124 – Fall 2010Slide 3-1 Today’s Topics n Fighting Fraud n Fraud prevention n Early detection n Fraud investigations n Legal intervention.
Computer Forensics What is Computer Forensics? What is the importance of Computer Forensics? What do Computer Forensics specialists do? Applications of.
What is meant by computer forensics?  Principle, Function of computer forensics.  History about computer forensics.  Needs of computer forensics.
Forensic Accounting Presented by: Gary Pope. What Is Forensic Accounting? Forensic Accounting the practice of utilizing accounting, auditing, and investigative.
Introduction to Forensic Accounting and Fraud Examination McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights.
Private Detective & Investigator Quristain Hand. What Do They Do? (Duties)  Interview people to gather information  Do various types of searches, using.
Private Detective BY: Jocelyn Vazquez
General Awareness Training
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Chapter 9: Criminal Law and Cyber Crimes
CAMPUS SECURITY AUTHORITY THE PRESENTATION TODAY WILL INCLUDE: OVERVIEW; CLERY CENTER FOR SECURITY ON CAMPUS FILM, HANDOUTS, AND FORMS; AND, DISCUSSION.
The Clery Act. This material was produced under grant number SH F- 11 from the Occupational Safety and Health Administration, U.S. Department.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
 An orderly analysis, investigation, inquiry, test, inspection, or examination along a “paper trail” in the search for fraud, embezzlement, or hidden.
The Forensic Accounting Legal Environment McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 6 Criminal Law and Cyber Crimes. 2  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for.
FORENSICS How to become a crime scene investigator become-crime-scene-investigator.html.
H ISTORY OR F ORENSICS & L AW Determine differences between class and individual evidence Learn historical developments in forensics. Understand the steps.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau
Jhalen Ascue Mr. Sneed 9/28/12. Forensics are scientific tests or techniques used in the investigation of crimes. This also may be in relation to a crime.
7 th Grade Civics Miss Smith *pgs  Crime- any act that breaks the law and for which there is a punishment  Criminal- a person who commits.
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
Chapter 5 Criminal Law.  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for a crime?  What.
ON THE INTERNET, NOBODY KNOWS YOU ARE A DOG. FIRST PART THREE SUBPARTS (1) What is Cyber Laws (2) What are violations of Cyber Laws (3) What is Cyber.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
CYBER AND COMPUTER FORENSICS. 2016/06/082 Network of experienced stakeholders in the cybercrime environment Information gathering capability and analytical.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
* Fingerprint Development* OUR ORGANIZATION PROVIDES THE SERVICES OF FINGERPRINT (INVISIBLE OR PARTIAL) DEVELOPMENT THROUGH VARIOUS TECHNIQUES I.E. POWDER.
Cell Phone Forensics Investigator - ICFECI
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
RESOURCES Pacific Area Finance Training February 2008.
Digital Forensics Ryan Lord. Road Map - What is Digital Forensics? - Types of computer crimes - Tools - Procedures - Cases - Problems.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Crimes Against the Person  Crimes against the person include homicide, assault, battery, and rape. They are all serious offenses that can result in harsh.
Securing Information Systems
Fraud Examination, 3E Chapter 18: Legal Follow-Up
Computer Security Fundamentals
OFFICE OF THE STATE’S ATTORNEY
ACC 571 PAPERS Expert Level /acc571papers.com
Chapter 7 Criminal Law and Cyber Crimes
What is ‘Crime’?.
Criminal Prosecutors with Computer Forensics
Computer Crime CJ 520 / CJ October 27, 2010.
Computer Forensics 1 1.
The Crime Lab.
Crime in the United States
Mitigating Discovery within Government Investigations
digital forensics market analysis, digital forensics market size, global digital forensics market,
The Need For Forensic Capabilities In The Commercial Sector
Prepared By : Binay Tiwari
Digital Forensics Ryan Lord.
Topic: CATEGORIES OF CRIMES
Crime in the United States
Crime in the United States
COMPARING CIVIL AND CRIMINAL LAW
Role of US Security and Intelligence Agencies
Introduction to Digital Forensics
Presentation transcript:

Counter Forensic for Computer Forensic By: Lara Amanj Gulan Azad

What is Counter-Forensic : Forensic computing is the process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally acceptable. Counter Forensic

CHARECTERISTICS OF COMPUTER FORENSICS:. IDENTIFYING. PRESERVING. ANALYZING. PRESENTING

Counter Forensic NEEDS OF COMPUTER FORENSICS o To produce evidence in the court that can lead to the punishment of the actual. o To ensure the integrity of the computer system. o To focus on the response to hi-tech offenses, started to intertwine.

GOAL OF COMPUTER FORENSICS The main goal of computer forensic experts is not only to find the criminal but also to find out the evidence and the presentation of the evidence in a manner that leads to legal action of the criminal. Counter Forensic

TYPES OF CYBER CRIME o Child Porn o Breech of Computer Security o Fraud/Theft o Copyright Violations o Identity Theft o Narcotics Investigations o Threats o Burglary o Suicide o Obscenity o Homicide o Administrative Investigations o Sexual Assault o Stalking Counter Forensic

APPLICATIONS OF COMPUTER FORENSICS APPLICATIONS:. FINANCIAL FRAUD DETECTION. CRIMINAL PROSECUTION. CIVIL LITIGATION. CORPORATE SECURITY POLICY AND ACCEPTABLS USE VIOLATIONS Counter Forensic

Thank You Counter Forensic