Computer Forensics
Computer Forensics
Unauthorized Access
Denial of Service
Extortion
Theft
Spoofing or Imposter
Sites
Sabotage
Espionage
Computer Fraud
Copyright Violation
Cyber terrorism
Forgery and
Counterfeiting
Internet Fraud
SEC Fraud and Stock
Manipulation
Child Pornography
Stalking & Harassment
Credit Card Fraud &
Skimming
Identity theft
Tsunami fraud
Disk Forensics
Disk forensics is the process of
acquiring and analyzing the data stored
on some form of physical storage
media.
Includes the recovery of hidden and
deleted data.
Network Forensics
Network forensics is the process of
examining network traffic.
After-the-fact analysis of transaction
logs
Real-time analysis via network
monitoring
1.Sniffers
2.Real-time tracing
Email Forensics
Email forensics is the study of source and
content of electronic mail as evidence.
identifying the actual sender and
recipient of a message, date/time it was
sent.
Often email is very incriminating.
Internet Forensics
Internet or Web forensics is the process
of piecing together where and when a
user has been on the Internet.
E.g., Scott Peterson,
Michael Jackson
Civil Litigations
Personal and business data discovered on a
computer can be used in fraud, divorce, harassment,
or discrimination cases
Insurance Companies
Evidence discovered on computer can be
used to mollify costs (fraud, workers
compensation, arson, etc)
Private Corporations
Obtained evidence from employee computers can
be used as evidence in harassment, fraud, and
embezzlement cases
Individual/Private Citizens
Obtain the services of professional computer
forensic specialists to support claims of
harassment, abuse, or wrongful termination from
employment
BIOS
Understanding how the BIOS works
Familiarity with the various settings and limitations of
the BIOS
Operation Systems
Windows 3.1/95/98/ME/NT/2000/2003/XP
DOS
UNIX
LINUX
VAX/VMS
Software
Familiarity with most popular software packages
such as Office
Forensic Tools
Familiarity with computer forensic techniques and the
software packages that could be used