Jaipur Engineering College and Research Center
Jaipur Engineering College and Research Center
Research Center
Presented by:
VIKAS KHANDELWAL
3
What’s Digital Evidence
& why is it important?
4
1st Why is Evidence important?
In the legal world,
evidence is everything & the only thing
Evidence is used to establish facts
Evidence must be admissible in court or
legal action
To be admissible, the investigator must
follow proper procedure
5
Digital Evidence
Forensics Uncover
Criminals Hide Evidence
Evidence
Restore deleted files and
Delete their files and emails emails – they are still really
there!
6
What is CyberCrime?
A crime that involves computers, digital devices,
or the Internet.
A computer is:
7
Computer Crime
Easy to commit—too many
vulnerable systems & gullible people
Crime without punishment—too often
Lots of media sensationalism &
public apathy
8
Types of Cyber Crime
9
Issues to think about…
10
What is Computer Forensics?
A process of applying scientific
& analytical techniques to
computers, networks, digital
devices, & files to discover or
recover admissible evidence.
11
Definition
12
Who needs Computer Forensics?
The Victim!
Businesses and government
Financial sector
Law Enforcement
Anti-terrorist & National Security agencies
Those in need of Data & Disaster Recovery
13
Steps Of Computer Forensics
Presentation
• This step involves the presentation of evidence
discovered in a manner which is understood by lawyers,
non-technically staff/management, and suitable as
evidence as determined by internal laws
15
Types of Computer Forensics
16
Disk Forensics
Disk forensics is the process of acquiring and
analyzing the data stored on some form of
physical storage media.
Includes the recovery of hidden and
deleted data.
17
Network Forensics
Network forensics is the process of examining
network traffic.
After-the-fact analysis of transaction logs
• Sniffers(Packet Analyzer)
• Real-time tracing
18
Email Forensics
Email forensics is the study of source and content of
electronic mail as evidence.
identifying the actual sender and recipient of a
message, date/time it was sent.
Often email is very incriminating.
19
Internet Forensics
Internet or Web forensics is the process of
piecing together where and when a user has
been on the Internet.
E.g.Michael Jackson
20
Source Code Forensics
To determine software ownership or
software liability issues.
Review of actual source code.
Examination of the entire development
process, e.g., development procedures,
documentation review, and review of
source code revisions.
21
The Future of Computer Forensics
22
Protect our Computers!
23
Technological progress is
like an axe in the hands of
a pathological criminal.
24