Download presentation
Presentation is loading. Please wait.
Published byRaymond Russell Modified over 9 years ago
2
It is a branch of FORENSIC SCIENCE for legal evidence found in computer It refers to detail investigation of the computers to carry out required tasks. This investigation process starts from ground situation to computer’s O.S. It is a broader concept related to crime happening in computer against law.
3
Computer forensic is also known as DIGITAL FORENSIC. The word ‘ forensic ’ is derived from the latin ‘forensis’, meaning-of the forum. This field has sub branches,such as- 1.Firewall forensic 2.Database forensic 3.Mobile device forensic
4
It is concerned with the application of scientific principal for investigation of crime. Forensic scientist convert the clues collected from a crime scene into evidence for the court of law. These evidence might include : 1.Traces of blood 2.Other body fluid 3.Hair 4.Fingerprint etc. It is broadly grouped into medical, laboratory, field science.
5
In the year 700s Chinese used fingerprints to establish the identity of document. In year 1248,a book named ‘ HSI DUANYU ’ (The Washing Away of Wrongs) –as a solution of crime. In 1609,the first treatise on systematic document examination was published in France. In 1784,an Englishman was convicted for a murder based on one of the first document.
6
An international reputation for forensic archaeology,anthropology and genocide investigation Excellent laboratory and computer facilities with high spec analytical equipment and state of the art field equipment Britain most iconic prehistoric and later sites are within easy travelling distance Extensive and behind the scenes access to museum collections
7
In legal cases,computer forensic techniques are are frequently used to analyze computer systems. To recover data in the event of a hardware or software failure. To analyze a computer system after a break in To gather evidence against an employee that an organization wishes to terminate.
8
Unauthorized use of computer mainly stealing a username and password. Accessing the victims computer via internet. Releasing a malicious computer program that is virus. E-mail fraud. Theft of company.
9
Rise in crime by use of computer –Hacking takes place on gvt. agencies & corporate offices. Criminals can install viruses or anything else to modify or change evidence. They can also attack on our e-mail account & check out for evidence. They can also debit money from our bank account when using credit card online.
10
Computer forensic analyst can retrieve data from a hard drive whose contents have been completely erased. It can be used to track e-mails & evaluate their contents. They can also help in different types of disputes other than criminal matters such as divorces, wills, civil disputes.
11
I. Preparation II. Collection III. Examination IV. Analysis V. Reporting
12
Physical forensic focus on identification individualization There processes compare an item from a crime scene with other substances to identify a clan of the item source of item Computer forensic focuses an finding the evidence &analyzing.
13
With the background of science subject do B.Sc forensic science after 10+2. After graduation they take up diploma in forensic science & criminology which is 1 year duration. They can also get master degree in these subjects.
14
Very good jobs of law enforcement agencies, police, legal system of &also private agencies. Can also work as teaches in institutes that conduct courses in that subject. As a forensic scientist in gvt. Organization. They can also work as private detective agencies.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.