0% found this document useful (0 votes)
51 views22 pages

CFPPT

This document provides an overview of computer forensics. It discusses the architecture, process, advantages, and applications of computer forensics. The computer forensics process involves preparing a case, conducting an investigation through techniques like cross-drive analysis and recovery of deleted files, protecting evidence, and completing the case with a final report. Computer forensics can be used for criminal and civil cases and has the advantage of being able to search and analyze large amounts of digital data quickly to uncover evidence.

Uploaded by

Manju Allagi
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views22 pages

CFPPT

This document provides an overview of computer forensics. It discusses the architecture, process, advantages, and applications of computer forensics. The computer forensics process involves preparing a case, conducting an investigation through techniques like cross-drive analysis and recovery of deleted files, protecting evidence, and completing the case with a final report. Computer forensics can be used for criminal and civil cases and has the advantage of being able to search and analyze large amounts of digital data quickly to uncover evidence.

Uploaded by

Manju Allagi
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 22

COMPUTER FORENSICS

By
DIVYA.M.K.
1SG07CS021
Computer Science and Engineering
UNDER THE GUIDANCE OF: Prof. Mallikarjuna shastry
Contents
Introduction
Abstract
Architecture of computer forensics
Computer forensics process
Advantages
Disadvantages
Applications
Conclusion
Future enhancement
References
2
Introduction
Computer forensics(CF) is a branch of digital
forensic science.
It is most often associated with computer crime , but
it may also be used in civil proceedings.
Evidence from computer forensic investigations is
usually subjected to the same guidelines and practices
of other digital evidence.
The scope of forensic analysis can vary from simple
information retrieval to reconstructing a series of
events.
3
Abstract
As in any investigation, establishing that an incident
has occurred is the first key step.
Secondly, the incident needs to be evaluated to
determine if computer forensics may be required.
Preservation of evidence is the first rule in the
process.
The level of training and expertise required to execute
a forensics task will largely depend on the level of
evidence required in the case.
4
Computer Forensic Architecture
The Open Computer Forensics Architecture (OCFA)
is a modular computer forensics framework built by
the Dutch National Police Agency.
The architecture forms an environment for recursive
extraction of data and metadata from digital evidence.
The Open Computer Forensics Architecture aims to
be highly modular, robust, fault tolerant, recursive and
scalable.

5
6
Computer Forensic process
Steps to be followed[2]
Prepare a case
Conducting
investigation
Protecting evidence
Completing case

7
Preparing a case
Examining a company policy violation[3]
• Companies often establish policies for computer use by
employees.
• Employees misusing resources can cost companies millions
of dollars
• Misuse includes:
 Surfing the Internet
 Sending personal e-mails
 Using company computers for personal tasks

8
Conducting Investigation
A number of techniques are used during computer
forensics investigation[1].
 Cross-drive analysis
 Live analysis
 Recovery of deleted files

9
Cross-drive analysis(CDA)
 CDA is a forensic technique that
correlates information found on
multiple hard drives.
 It uses another technique called
Forensic Feature Extraction(FFE).
 The process , which is still being
researched , can be used for anomaly
detection.

10
Live Analysis(LA)
LA is the process of examining
the computers from within the
OS using existing sysadmin
tools to extract evidence.
This technique is useful when
dealing with Encrypting File
Systems(EFS).
One application of LA is to
recover RAM data.

11
Recovery of Deleted Files
Recovering the deleted
files is the common
technique used in CF
process.
Most OS and FS allow
physical file data to be
reconstructed from the
physical disk sectors.
This technique involves a
Process called File carving.

12
Protecting Evidence
Take all necessary
measures to avoid
damaging the evidence.
Place the evidence in a
secure container.
Transport the evidence to
computer forensics lab.
Secure evidence by
locking the container.

13
Completing the Case
You need to produce a final report
State what you did and what you found
You can even include logs from the forensic tools you
used
If required, use a report template
The report should show conclusive evidence that the
suspect did or did not commit a crime or violate a
company policy

14
Advantages
Computer forensics’ main advantage is its ability to
search and analyze a mountain of data quickly,
thoroughly and efficiently.
Investigate and uncover evidence of illegal activities
conducted via computer.
Investigate and uncover evidence of crimes that
weren't directly committed via computer.
Valuable data that has been lost and deleted by
offenders can be retrieved.
15
Disadvantages
The main disadvantage is the cost when retrieving
data.
Computer forensic specialists must have complete
knowledge of legal requirements, evidence handling
and storage and documentation procedures.
Legal practitioners involved in the case must also
have knowledge of computer forensics.
CF analyst should prove in court of law that data is
tampered.

16
Applications
Criminal Prosecutors Civil Litigations
 Child Pornography cases  Fraud
 Homicides  Divorce
 Embezzlement  Breach of Contract
 Financial Fraud  Copy right
Insurance Companies
 False Accident Reports
 Workman’s
Compensation Cases
Applications(continued)
Large Corporations
 Embezzlement
 Insider Trading
Law Enforcement
Any Individual
 Claims
• Sexual harassment
• Age discrimination
• Wrongful termination from job
• Background checks

18
Conclusion
With computers becoming more and more involved in
our everyday lives, both professionally and socially,
there is a need for computer forensics.
This field will enable crucial electronic evidence to
be found, whether it was lost, deleted, damaged, or
hidden, and used to prosecute individuals who believe
they have successfully beaten the system.
Future enhancement
Computer forensic tools will be about 5 times as fast,
and twice as sophisticated.
A lot of automated tools for collection and initial
processing of evidence are starting to be released.
These tools can be used by less-trained people, so it
may be that data collection and preliminary
processing will be faster.
More Open Source forensic tools will be available for
free for those willing to learn to use them.
20
References
1. Michael G. Noblett; Mark M. Pollitt, Lawrence A.
Presley (October 2000). "Recovering and examining
computer forensic evidence". Retrieved 26 July 2010.
2. A Yasinsac; RF Erbacher, DG Marks, MM Pollitt
(2003). "Computer forensics education". IEEE Security
& Privacy. Retrieved 26 July 2010.
3. Warren G. Kruse; Jay G. Heiser (2002). Computer
forensics: incident response essentials. Addison-Wesley.
pp. 392. ISBN 0201707195. Retrieved 6 December
2010.
21
THANK YOU

22

You might also like