 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.

Slides:



Advertisements
Similar presentations
Computer Crime and Identity Theft Abe Orabi Tom Ballaro Tim Williams.
Advertisements

PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
Crime Laboratories Forensic Science Mr. Glatt
Computer Forensics and Digital Investigation – a brief introduction Ulf Larson/Erland Jonsson.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved Chapter 2 PHYSICAL EVIDENCE Development, Interpretation, Investigative Value Criminal.
BTEC Level 3 Certificate in Applied Science BTEC Level 3 Subsidiary Diploma in Applied Science (Forensic Science) All units are taught in an applied science.
Computer Forensics Mr.PRAWEE PROMPONMUANG M.Sc(Forensic Science) NO
By: Logan Wilson.  Forensics is a science dedicated to the methodical gathering and analysis of evidence to establish facts that can be presented in.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Private Detective & Investigator Quristain Hand. What Do They Do? (Duties)  Interview people to gather information  Do various types of searches, using.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Private Detective BY: Jocelyn Vazquez
COEN 152 Computer Forensics Introduction to Computer Forensics.
An Introduction to Forensic Science. Forensic science is the study and application of science to matters of law. You can use the terms forensic science.
Forensic Science. FORENSIC SCIENCE: The study and application of science to legal matters. Forensics derives from Latin forensis meaning “a public forum”
Guide to Computer Forensics and Investigations, Second Edition
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
THE CASE: An individual works with the police to identify criminals. Her/his help is invaluable even when she/he hasn’t witnessed a crime. Many of the.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Introduction to ForensicsSection 1 Section 1: Introduction to Forensic Science Preview Bellringer Key Ideas What Is Forensic Science? Tools of Forensic.
DNA Analyst Mystery Incorporated Kaleigh Rubino, Stephanie Penhale, and Brooke Dooley.
Unethical use of Computers and Networks
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
A BRIEF History of Forensic Science
Fraud Examination Evidence III: Forensic Science and Computer Forensics McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
I’ll get a good education along the way. I’ll get to help people. I’ll make $30-60,000 a year And mainly because I like mysteries!!
Intro to Forensic Science
CAREER PROJECT ON BALLISTIC EXPERTS By: Jameson Hale and Garrett Liming.
Crime Scene Investigator Occupation PowerPoint Created by The University of North Texas in partnership with the Texas Education Agency.
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University September 28, 2007.
Computer Forensics Dilian Kovatchev & Daniel Leitch.
Criminal Investigation: An Overview
Fraud Examination Evidence III: Forensic Science and Computer Forensics McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
CONTROLLING INFORMATION SYSTEMS
Security and Ethics Safeguards and Codes of Conduct.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Intro to Forensic Science and Crime Laboratories
* Fingerprint technicians typically work in a crime laboratory or within law enforcement agencies. * A fingerprint technician works to recreate the circumstances.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Do now: Why do you think pictures are so important for a crime scene investigation?
Who Dunnit? A Park High School Murder Mystery A Park High School Murder Mystery.
 Evidence : Something that tends to establish or disprove a fact.  Examples of evidence: › Documents › Testimony › Other objects.
History of Forensic Science Research based on Miami-Dade County Website.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Business Computer Applications I Business Computer Applications II Accounting Principles I Accounting Principles II Business Law (offered 2017) Intro to.
Digital Forensics Market Analysis: By Forensic Tools; By Application (Network Forensics, Mobile Forensics, Database Forensics, Computer Forensics) - Forecast.
Forensics. What is Forensic Science? Forensic comes from the Latin word forensis. It means: for public discussion or debate. Forensic science is science.
* Fingerprint Development* OUR ORGANIZATION PROVIDES THE SERVICES OF FINGERPRINT (INVISIBLE OR PARTIAL) DEVELOPMENT THROUGH VARIOUS TECHNIQUES I.E. POWDER.
Cell Phone Forensics Investigator - ICFECI
Managing False Information NiiBen C. A. Ayivorh AML/CFT Consultant Nii-Int’l L.L.C.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Forensic Science Education Dr. Jason Linville University of Alabama at Birmingham Forensic Science Education Finding a Forensic Job or.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
By: Casey Crawford.  - Foundation in chemistry, biology, physics, and math  - General chemistry I and II and lab for science majors (8 credit hours)
Investigations 2016 First semester [ 12 week ]-Forensic Analysis of the Windows 7 Registry.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Forensic Specialist.
Latent Print Examiner.
Criminal Justice Careers
Introduction to Computer Forensics
An Introduction to Forensic Science and Professions
(Introduction to Forensic Science)
Protecting Yourself from Fraud including Identity Theft
INTRODUCTION TO FORENSIC SCIENCE
WHAT IS FORENSIC & INVESTIGATIVE SCIENCES?
A BRIEF History of Forensic Science
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.  This investigation process starts from ground situation to computer’s O.S.  It is a broader concept related to crime happening in computer against law.

 Computer forensic is also known as DIGITAL FORENSIC.  The word ‘ forensic ’ is derived from the latin ‘forensis’, meaning-of the forum.  This field has sub branches,such as- 1.Firewall forensic 2.Database forensic 3.Mobile device forensic

 It is concerned with the application of scientific principal for investigation of crime.  Forensic scientist convert the clues collected from a crime scene into evidence for the court of law.  These evidence might include : 1.Traces of blood 2.Other body fluid 3.Hair 4.Fingerprint etc.  It is broadly grouped into medical, laboratory, field science.

 In the year 700s Chinese used fingerprints to establish the identity of document.  In year 1248,a book named ‘ HSI DUANYU ’ (The Washing Away of Wrongs) –as a solution of crime.  In 1609,the first treatise on systematic document examination was published in France.  In 1784,an Englishman was convicted for a murder based on one of the first document.

 An international reputation for forensic archaeology,anthropology and genocide investigation  Excellent laboratory and computer facilities with high spec analytical equipment and state of the art field equipment  Britain most iconic prehistoric and later sites are within easy travelling distance  Extensive and behind the scenes access to museum collections

 In legal cases,computer forensic techniques are are frequently used to analyze computer systems.  To recover data in the event of a hardware or software failure.  To analyze a computer system after a break in  To gather evidence against an employee that an organization wishes to terminate.

 Unauthorized use of computer mainly stealing a username and password.  Accessing the victims computer via internet.  Releasing a malicious computer program that is virus.  fraud.  Theft of company.

 Rise in crime by use of computer –Hacking takes place on gvt. agencies & corporate offices.  Criminals can install viruses or anything else to modify or change evidence.  They can also attack on our account & check out for evidence.  They can also debit money from our bank account when using credit card online.

 Computer forensic analyst can retrieve data from a hard drive whose contents have been completely erased.  It can be used to track s & evaluate their contents.  They can also help in different types of disputes other than criminal matters such as divorces, wills, civil disputes.

I. Preparation II. Collection III. Examination IV. Analysis V. Reporting

 Physical forensic focus on identification individualization  There processes compare an item from a crime scene with other substances to identify a clan of the item source of item  Computer forensic focuses an finding the evidence &analyzing.

 With the background of science subject do B.Sc forensic science after  After graduation they take up diploma in forensic science & criminology which is 1 year duration.  They can also get master degree in these subjects.

 Very good jobs of law enforcement agencies, police, legal system of &also private agencies.  Can also work as teaches in institutes that conduct courses in that subject.  As a forensic scientist in gvt. Organization.  They can also work as private detective agencies.