Cse Computer Forensics PPT 38
Cse Computer Forensics PPT 38
COMPUTER
FORENSICS
Presentation by
Dr.NC SACHITHANANTHAM
Assistant Professor
Department of Information Technology
[email protected]
Department of
IT
Information
Technology
CONTENTS
• Introduction
• What is Computer Forensics?
• Characteristics
• Needs
• History
• Goal
• Cyber Crime & Evidence
• Computer Forensics Methodology
• Applications of Computer Forensics
• Who Uses Computer Forensics
• Skills Requirements for Computer Forensics 2
• Conclusion
INTRODUCTION
“Forensic computing is the process of identifying,
preserving, analyzing and presenting digital evidence in
a manner that is legally acceptable.”(Rodney
Mckemmish 1999).
“Forensic computing is the process of identifying,
WHAT IS COMPUTER FORENSICS?
4
CHARACTERISTICS
IDENTIFYING
PRESERVING
ANALYZING
PRESENTING
5
NEEDS OF COMPUTER FORENSICS
o To produce evidence in the court that can lead to the
punishment of the actual.
o To ensure the integrity of the computer system.
o To focus on the response to hi-tech offenses, started to
intertwine.
6
HISTORY OF COMPUTER FORENSICS
o Began to evolve more than 30 years ago in US when law
8
CYBER CRIME & EVIDENCE
CYBER CRIME
Cyber crime occurs when information technology is
used to commit or conceal an offence.
9
TYPES OF CYBER CRIME
o Forgery
o Breech of Computer Security
o Fraud/Theft
o Copyright Violations
o Identity Theft
o Threats
o Burglary
o Homicide
o Administrative Investigations
o Cyber Terrorism
10
o Sales and Investment Fraud
o Electronic Fund Transfer Fraud
EVIDENCE
11
DIGITAL EVIDENCE
12
TYPES OF DIGITAL EVIDENCE
1) PERSISTANT DATA
Meaning data that remains intact when the
computer is turned off. E.g. hard drives, disk drives and
removable storage devices (such as USB drives or flash
drives).
2) VOLATILE DATA,
Meaning data that would be lost if the computer
is turned off. E.g. deleted files, computer history, the
computer's registry, temporary files and web browsing
history.
13
5 RULES OF EVIDENCES
1) Admissible
Must be able to be used in court or elsewhere.
2) Authentic
Evidence relates to incident in relevant way.
4) Reliable
No question about authenticity & veracity.
5) Believable
Clear, easy to understand, and believable by a jury.
14
TOP 10 LOCATION FOR EVIDENCE
1) Internet History Files
2) Temporary Internet Files
3) Slack/Unallocated Space
4) Buddy lists, personal chat room records, others saved
areas
5) News groups/club lists/posting
6) Settings, folder structure, file names
7) File Storage Dates
8) Software/Hardware added
9) File Sharing ability
15
10) E-mails
METHODOLOGY
1) Shut Down the Computer
2) Document the Hardware Configuration of The
System
3) Transport the Computer System to A Secure
Location
4) Make Bit Stream Backups of Hard Disks and
Floppy Disks
5) Mathematically Verify Data on All Storage
Devices
6) Document the System Date and Time
7) Make a List of Key Search Words
16
APPLICATIONS
FINANCIAL FRAUD DETECTION
CRIMINAL PROSECUTION
CIVIL LITIGATION
VIOLATIONS”
17
WHO USES COMPUTER FORENSICS?
Criminal Prosecutors
Rely on evidence obtained from a computer to
prosecute suspects and use as evidence.
Civil Litigations
Personal and business data discovered on a
computer can be used in fraud, harassment, or
discrimination cases.
Private Corporations
Obtained evidence from employee computers can
be used as evidence in harassment, fraud, and 18
embezzlement cases.
WHO USES COMPUTER FORENSICS?
(CONT..)
Law Enforcement Officials
Rely on computer forensics to backup search warrants
and post-seizure handling.
Individual/Private Citizens
Obtain the services of professional computer forensic
specialists to support claims of harassment, abuse, or
wrongful termination from employment.
19
CONCLUSION
With computers becoming more and more involved in
our everyday lives, both professionally and socially,
there is a need for computer forensics.
This field will enable crucial electronic evidence to be
21