100% found this document useful (1 vote)
887 views

Cse Computer Forensics

Uploaded by

Divya Bj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
887 views

Cse Computer Forensics

Uploaded by

Divya Bj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Technical Seminar

On
Cyber Forensic in
Diversified Manner By,
Padmashree C
M.Tech 1st year
Under the guidance of,
Prof. Shashikala S V.
HOD, Dept of CS&E.
CONTENTS
2

 Introduction
 Cyber Crime
 Cyber Forensics
 Literature Survey
 Requirements and Analysis
 Future Enhancement
 Conclusion
INTRODUCTION
3

The primary purpose of digital forensics is to retrieve and


analyze files with digital forensics hardware and software,
utilizing a scientific methodology that is acceptable in a court
of law. Digital forensics goes well beyond the ability to
resurrect deleted files; numerous other files that are not easily
accessible can be retrieved using digital forensics tools.
Additionally, digital forensic analysis tools have highly
effective search and filtering capabilities. Moreover, many
professional tools provide recovery, searching, password-
cracking and decryption tools.
CYBER CRIME
4

CYBER CRIME INVESTIGATION

 The investigation of any crime involves the


painstaking collection of clues and forensic evidence.
 It is inevitable that there will be at least one
electronic device found during the course of an
investigation.
 The information held on the computer may be crucial
and must be investigated in the proper manner.
KEY STEPS IN FORENSIC
INVESTIGATION
5

 Identify the computer crime


 Seize evidence at the crime scene
 Create two-bit stream copies of the evidence
 Store the original evidence in a secure location
 Analyze the image copy for evidence
 Prepare a forensic report
 If required, attend the court and testify as an expert
witness
DIGITAL EVIDENCE
6

 Graphics files
 Audio and video recording files
 Internet browser histories
 Server logs
 Word processing and spreadsheet
 Emails
 Log files
CYBER FORENSICS
7

CYBER FORENSIC STEPS


 Acquisition:

 Identification:

 Evaluation:

 Presentation:
NEEDS OF COMPUTER FORENSICS
8

 To produce evidence in the court that can lead to the


punishment of the actual.
 To ensure the integrity of the computer system.
 To focus on the response to hi-tech offenses, started
to intertwine.
GOAL OF COMPUTER FORENSICS
9

 The main goal of computer forensic experts is not only to find


the criminal but also to find out the evidence and the
presentation of the evidence in a manner that leads to legal
action of the criminal.
CYBER CRIME
10

 CYBER CRIME
 Cyber crime occurs when information technology is used to
commit or conceal an offence.
TYPES OF CYBER CRIME
11

o Forgery
o Breech of Computer Security
o Fraud/Theft
o Copyright Violations
o Identity Theft
o Threats
o Burglary
o Homicide
o Administrative Investigations
o Cyber Terrorism
o Sales and Investment Fraud
o Electronic Fund Transfer Fraud
12
EVIDENCE
13

 An item does not become officially a piece of evidence until a


court admits it.
 Much of forensics practice concerns how to collect, preserve
and analyze these items without compromising their potential
to be admitted as evidence in a court of law.
DIGITAL EVIDENCE
14

 “Any data that is recorded or preserved on any medium in or


by a computer system or other similar device, that can be read
or understand by a person or a computer system or other
similar device. It includes a display, print out or other output of
that data.”
TOP 10 LOCATION FOR EVIDENCE
15

 Internet History Files


 Temporary Internet Files
 Slack/Unallocated Space
 Buddy lists, personal chat room records, others saved
areas
 News groups/club lists/posting
 Settings, folder structure, file names
 File Storage Dates
 Software/Hardware added
 File Sharing ability
 E-mails
METHODOLOGY
16

 Shut Down the Computer


 Document the Hardware Configuration of The System
 Transport the Computer System to A Secure Location
 Make Bit Stream Backups of Hard Disks and Floppy
Disks
 Mathematically Verify Data on All Storage Devices
 Document the System Date and Time
 Make a List of Key Search Words
CONT…

 Evaluate the Windows Swap File


 Evaluate File Slack
 Evaluate Unallocated Space (Erased Files)
 Search Files, File Slack and Unallocated Space for Key
Words
 Document File Names, Dates and Times
 Identify File, Program and Storage Anomalies
 Evaluate Program Functionality
 Document Your Findings
APPLICATIONS
18

 FINANCIAL FRAUD DETECTION


 CRIMINAL PROSECUTION
 CIVIL LITIGATION
 “CORPORATE SECURITY POLICY AND VIOLATIONS”
CONCLUSION

 With computers becoming more and more involved in our


everyday lives, both professionally and socially, there is a
need for computer forensics.
 This field will enable crucial electronic evidence to be found,
whether it was lost, deleted, damaged, or hidden, and used to
prosecute individuals that believe they have successfully
beaten the system.
REFERENCES

 www.google.com
 www.wikipedia.com
 www.studymafia.org
21

Thanks

You might also like