What is meant by computer forensics? Principle, Function of computer forensics. History about computer forensics. Needs of computer forensics. Top 10 location for evidence. Types of computer forensics/forensic tools Methodology about computer forensics. Applications/skills required for forensics. Conclusion.
“Forensic computing is the process of - a)Identifying b)Preserving c)Analysing and d)Presenting digital evidence in a manner that is acceptable.”
Detect a computer incident, identify the intruders and prosecute the perpetrator in a court of law.
HISTORY Began to evolve more than 30 years ago in US when law enforcement and military investigators started seeing criminals get technical. Over the next decades, and up to today, the field has exploded. Law enforcement and the military continue to have a large presence in the information security and computer forensic field at the local, state and federal level.
To produce evidence in the court that can lead to the punishment of the actual. To ensure the integrity of computer system. To focus on response to hi-tech offenses, started to intertwine.
Types of cyber crime : Child prom Breech of computer security Fraud /Theft Copy right violations Identity theft Narcotics investigations Threats Burglary Suicide Obscenity Homicide Administrative investigation stalking
Internet history files Slack/unallocated space Temporary internet files Buddy lists, personal chat room News groups/club lists/posting Settings, folder structure, file names File storage dates Software/hardware added. File sharing ability s
Hard ware Write blockers USB blockers IDE blockers SATA blockers SD card blockers FRED work stations Evidence bags Painters bucket Black light-windows MAC and IOS forensic analysis software. Internet evidence finder SANS INVESTIGATIVE FORENSICS TOOL KIT (SIFT)- multi purpose operating system
Shut down the computer Transport the computer system to a secure location Make bit stream back ups of hard disks and floppy disks Mathematically verify data on all storage devices Document the system date and time Make a list of key search words Evaluate the windows swap file Evaluate file slack
Financial fraud detection Criminal prosecution Civil litigation Corporate security policy and acceptable violations Domestic Marketing
BENEFITS: Information and evidence to solve a problem Scientist does the job of solving a crime through analysing data Using forensic science, it is easier to track the history and trace the events related to the crime Using analysis tools and utilities
1 ) Sunny Vaghela 2 ) Ankit Fadia 3 ) Trishneet Arora 4 ) Vivek Ramchandran 5 ) Koushik Dutta 6 ) Aseem Jakhar 7 ) Sai Satish 8 ) Benild Joseph 9 ) Falgun Rathod 10 ) Rahul Tyagi
With computers becoming more and more involved in our everyday lives, both professionally and socially, there is a need for computer forensics. This field will enable crucial electronic evidence to be found, whether it was lost, deleted, damaged, or hidden, and used to prosecute individuals that believe they have successfully beaten the system.
queries