0% found this document useful (0 votes)
3 views14 pages

Digital Forensics

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1/ 14

Introduction to

digital
forensics

Aashika N
Kristu Jayanti College
Introduction
Digital forensics, also known as computer or cyber
forensics, is a specialized branch of forensic
science that focuses on the recovery, analysis,
and preservation of electronic evidence in cases
involving digital devices and systems. It plays a
crucial role in investigating and solving
cybercrimes, as well as in legal proceedings where
digital evidence is central.
Computer forensics

Computer forensics is a part of digital forensics that


deals with crimes committed across computing
devices such as networks, computers, and digital
storage media. It refers to a set of methodological
procedures and techniques to identify, gather,
preserve, extract, interpret, document, and present
evidence from computing equipment such that the
discovered evidence is acceptable during a legal
and/or administrative proceeding in a court of law.
TYPES OF INVESTIGATION

Criminal Intelligence
forensics gathering

Electronic
Intrusion
discovery
investigatio
(eDiscovery
n
)
Scope and Purpose:
Digital forensics involves the collection,
analysis, and preservation of electronic
evidence to investigate cyber crimes,
unauthorized access, data breaches,
intellectual property theft, and other
cyber-related incidents. Its primary goal is
to uncover digital evidence that can be
used in legal proceedings.
Nature of Digital Evidence:
Digital evidence encompasses a wide
range of electronic data, including files,
emails, logs, metadata, and more. It can
be found on computers, servers, mobile
devices, storage media, and even in the
cloud. The volatile and dynamic nature of
digital evidence requires specialized
techniques to ensure its integrity and
admissibility in court.
History of computer forensics
1990s: Establishment of
1960s - 1970s: Emergence Computer Forensics as a
of Computers 1 4 Discipline

1995: Formation of High


1980s: Rise of Personal
Computers
2 5 Technology Crime Investigation
Association (HTCIA)

Late 1990s - Early 2000s: Legal


Late 1980s - Early 1990s: 3 6 Recognition and
Growing Need for Forensics Standardization
7
2000s: Evolution of Tools and
Techniques
Need for digital forensics

● Rise in Cybercrime:
● Digital Evidence in Legal
Proceedings
● Corporate Investigations
● Incident Response and Breach
Investigation
● Intellectual Property Protection
● Employee Misconduct Investigations
● Preventing Data Loss
● Counterterrorism and National
Security
Principles of computer
forensics
● Legal Admissibility
● Preservation of Evidence
● Documentation and
Recordkeeping
● Privacy and Data Protection
● Chain of Custody
● Transparency and Replicability
● Exhaustive Examination
● Technical Competence
Locard’s principle
Locard originally developed this principle in the context of physical forensic evidence, it
has been extended to digital forensics as well. In digital forensics, Locard's Principle of
Exchange is applied to the idea that interactions in the digital realm also leave traces
that can be analyzed for investigative purposes

Every Interaction Leaves a


Trace

Trace Analysis

Evidence Identification

Linking Individuals and


Devices
Prerequisites for Setting up Digital Forensic Lab

Hardware and
Software
Infrastructure

Secure
Facility Qualified
Personnel
Prerequisites for Setting up Digital Forensic Lab

Digital Forensic
Tools

Evidence Handling
Protocols Training
Programs
Global Standards in Digital Forensics
ISO/IEC 27037

ISO/IEC 17025

SWGDE (Scientific
Working Group on Digital
Evidence)
NIST (National Institute of
Standards and
Technology)

Global Digital Evidence


Association (GDEA)
Legal Process in Digital Forensics

Chain of Expert
Legal Custody Data Collection Analysis and Documentatio Witness
Authorization Examination n of Findings Testimony

You might also like