SlideShare una empresa de Scribd logo
1 de 2
CMYK

 Crime




   Computer
   Forensics Vital
   for Combating
   Cyber Crimes
                             By Vicky Shah



                                Cyber crimes are            which consists of,
                                committed through the
                                                            • Arriving at the scene: Initial
                                use of computers or
                                                            response/ prioritization of efforts
                                computer network
                                                            • Preliminary Documentation and
                                systems. In these crimes,
                                                            Evaluation of the scene
                                computers are used as
                                                            • Processing the scene
                                tools to commit crime
                                                            • Completing and recording the crime scene
                               and/or as a target where
                                                            investigation of crime scene equipment
 an attack or compromise has to be performed and/or
 as an incidental to a crime in which a computer is used    Computer forensics is commonly defined as the
 to generate fake, forged or authentic looking literature   collection, prevention, analysis and court presentation
 for either committing a physical or virtual crime.         of computer-related evidence. Courts mandate the
                                                            proper seizure and analysis of computer evidence in
 A thorough crime scene analysis is vitally important to
                                                            any investigation with respect to the law of the land.
 effective law enforcement. In particular, rapid logical
 advances have greatly expanded the amount of               The most important tool for a computer forensic
 information that can be obtained from the analysis of      investigator is the software used to perform the
 physical evidence from a crime scene. In order to take     investigation. Without specially designed computer
 advantage of these new opportunities, the investigator     forensic software, there cannot be a true forensic
 should use sound scene processing practices to             analysis.
 recover useful evidence. Forensics is all about the
                                                            In general, there are three primary reasons why
 criticalness to the administration of a crime and the
                                                            specialized computer forensic software must be
 objective is all about recognition, documentation,
                                                            employed in order to conduct a proper computer
 collection, preservation and transmittal of physical
                                                            investigation:
 evidence for analysis.
                                                            1. Proper Acquisition and Preservation of
 Digital Forensic deals with the recognition,
                                                            Computer Evidence
 documentation, collection, preservation and
 transmittal, identification and interpretation of          Electronic evidence is fragile by nature and easily can
 electronic media for evidentiary and/or root cause         be altered or erased without proper handling. Merely
 analysis; especially of secondary memory of computer       booting a subject computer into windows environment
 which is capable of storing data in bits i.e. Hard Disk    will alter critical date stamps, erase temporary data,
 Drive (HDD).                                               and cause hundreds of writes to the drive.
 Digital Forensic deals with conducting a proper and        Specialized computer forensic software, such as FTK,
 documented investigation of the alleged misuse of a        EnCase which are recognized by NIST ensures the
 system, its users, its facts and services.                 subject computer's data is not altered in any way during
                                                            the acquisition process. A file date stamp is critical
 Prior to the forensic a chain of custody is followed

The Mumbai PROTECTOR                                                                          Jan - Feb 2010     49




                                                                                                        CMYK
CMYK

 Crime

 piece of evidence in litigation matters.
 2. Authentication of collected Data for
 Court Presentation
 Computer forensics is based largely on the
 premise that the data recovered from
 computer systems will ultimately be
 presented in court of law. As such, another
 important feature of computer forensic
 software is a verification process that
 establishes that the investigator did not
 corrupt or tamper with the subject evidence
 at any time in the course of the
 investigation.
 Computer forensic software employs a
 standard algorithm to generate an image
 hash value. The algorithm calculates a
 unique numerical value based upon the
 exact contents contained in the evidentiary
 image copy. If one bit of data on the
 acquired evidentiary bit-stream image
 changes, even by adding a single space of       • Identifying
 text or changing the case of a single           • Recovering
 character, this value changes.                  • Reconstructing
                                                 • Analyzing
 3. Recovery of all Available Data.
 Including Deleted files                         Goal of Cyber Forensic: Investigate digital systems to:
 In addition to the active data normally seen    • determine if system has been compromised
 by the computer user, computer forensic         • determine extent of damage
 software allows the examiner to recover all     • determine how a system was compromised
 deleted files that have not been completely     • understand intrusion techniques
 overwritten, as well as other forms of          • understand intruder patterns and infer intent
 unallocated or temporary data.                  • discover evidence of intruder identity
                                                 • strengthen protection
 Forensic science is the application of          • strengthen our ability to protect
 science to law; it deals with applying of any   • make new friends and host really fun parties
 scientific principle or technique...
                                                 Cyber Forensic is useful for investigating agencies.
                                                 Conclusion:
                                                 With organizations incurring excessive losses of intellectual
                                                 property and other trade secrets, advancements in computer
                                                 forensics technology are meeting the compelling need to counter
                                                 this threat. Also, with the volumes of cases, it is important for
                                                 investigators to use forensic tools with improved technology.
                                                 Ongoing computer investigations are now the need of the hour for
                                                 keeping pace to counter crime.
                                                 Reference: Legal Investigation Manual - Encase
                                                 Disclaimer: This article is for non-profit/non-commercial purpose.
                                                 For further queries please contact the author on
                                                 vicky@cybercrimes.in 1+91-98201-05011. "Human Behaviour is
                                                 the Biggest Risk in Security - Vicky Shah”.                    +


The Mumbai PROTECTOR                                                                          Jan - Feb 2010    50




                                                                                                       CMYK

Más contenido relacionado

La actualidad más candente

Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickJacqueline Fick
 
Anton Chuvakin FTP Server Intrusion Investigation
Anton Chuvakin FTP Server Intrusion InvestigationAnton Chuvakin FTP Server Intrusion Investigation
Anton Chuvakin FTP Server Intrusion InvestigationAnton Chuvakin
 
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEWFORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEWcscpconf
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsdeaneal
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its toolsKathirvel Ayyaswamy
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics OverviewYansi Keim
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsSagar Rahurkar
 
Comparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic SystemsComparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic Systemsijsrd.com
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic InvestigatorAgape Inc
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDr Raghu Khimani
 
Chapter 3 cmp forensic
Chapter 3 cmp forensicChapter 3 cmp forensic
Chapter 3 cmp forensicshahhardik27
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigationOnline
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidenceOnline
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)AltheimPrivacy
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
CS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IVCS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IVArthyR3
 
76 s201924
76 s20192476 s201924
76 s201924IJRAT
 

La actualidad más candente (20)

Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
Anton Chuvakin FTP Server Intrusion Investigation
Anton Chuvakin FTP Server Intrusion InvestigationAnton Chuvakin FTP Server Intrusion Investigation
Anton Chuvakin FTP Server Intrusion Investigation
 
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEWFORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
Comparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic SystemsComparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic Systems
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Chapter 3 cmp forensic
Chapter 3 cmp forensicChapter 3 cmp forensic
Chapter 3 cmp forensic
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigation
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
CS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IVCS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IV
 
76 s201924
76 s20192476 s201924
76 s201924
 
Lecture5
Lecture5Lecture5
Lecture5
 

Destacado (11)

General Tips
General TipsGeneral Tips
General Tips
 
Csit3916
Csit3916Csit3916
Csit3916
 
Nvm
NvmNvm
Nvm
 
2004 fron office biblioteca consiglio regionale_
2004 fron office biblioteca consiglio regionale_2004 fron office biblioteca consiglio regionale_
2004 fron office biblioteca consiglio regionale_
 
2004 21 maggio master comunicazione_valletta
2004 21 maggio master comunicazione_valletta2004 21 maggio master comunicazione_valletta
2004 21 maggio master comunicazione_valletta
 
Blessed are the Persecuted
Blessed are the Persecuted Blessed are the Persecuted
Blessed are the Persecuted
 
Бесхвостая лиса
Бесхвостая лисаБесхвостая лиса
Бесхвостая лиса
 
Todd Boedeker Thesis
Todd Boedeker ThesisTodd Boedeker Thesis
Todd Boedeker Thesis
 
the church
the churchthe church
the church
 
the lord's prayer
 the lord's prayer the lord's prayer
the lord's prayer
 
Apresentação ruido
Apresentação ruidoApresentação ruido
Apresentação ruido
 

Similar a Computer forensics vital_for_combating_cyber_crimes

A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsSamantha Vargas
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxVaishnaviBorse8
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1ricky098
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1zamayla143
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1}{it -Boy
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesBRNSSPublicationHubI
 
E discovery2
E discovery2E discovery2
E discovery2elijaht
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesIsaiah Edem
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
Cyber Forensics|Digital Forensics|Cyber Crime-2023
Cyber Forensics|Digital Forensics|Cyber Crime-2023Cyber Forensics|Digital Forensics|Cyber Crime-2023
Cyber Forensics|Digital Forensics|Cyber Crime-2023Cyber Security Experts
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh tManesh T
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesICFECI
 

Similar a Computer forensics vital_for_combating_cyber_crimes (20)

A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptx
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
E discovery2
E discovery2E discovery2
E discovery2
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting Crimes
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Cyber Forensics|Digital Forensics|Cyber Crime-2023
Cyber Forensics|Digital Forensics|Cyber Crime-2023Cyber Forensics|Digital Forensics|Cyber Crime-2023
Cyber Forensics|Digital Forensics|Cyber Crime-2023
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh t
 
Mjtanasas2
Mjtanasas2Mjtanasas2
Mjtanasas2
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics services
 
Cyber evidence at crime scene
Cyber evidence at crime sceneCyber evidence at crime scene
Cyber evidence at crime scene
 

Último

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 

Último (20)

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 

Computer forensics vital_for_combating_cyber_crimes

  • 1. CMYK Crime Computer Forensics Vital for Combating Cyber Crimes By Vicky Shah Cyber crimes are which consists of, committed through the • Arriving at the scene: Initial use of computers or response/ prioritization of efforts computer network • Preliminary Documentation and systems. In these crimes, Evaluation of the scene computers are used as • Processing the scene tools to commit crime • Completing and recording the crime scene and/or as a target where investigation of crime scene equipment an attack or compromise has to be performed and/or as an incidental to a crime in which a computer is used Computer forensics is commonly defined as the to generate fake, forged or authentic looking literature collection, prevention, analysis and court presentation for either committing a physical or virtual crime. of computer-related evidence. Courts mandate the proper seizure and analysis of computer evidence in A thorough crime scene analysis is vitally important to any investigation with respect to the law of the land. effective law enforcement. In particular, rapid logical advances have greatly expanded the amount of The most important tool for a computer forensic information that can be obtained from the analysis of investigator is the software used to perform the physical evidence from a crime scene. In order to take investigation. Without specially designed computer advantage of these new opportunities, the investigator forensic software, there cannot be a true forensic should use sound scene processing practices to analysis. recover useful evidence. Forensics is all about the In general, there are three primary reasons why criticalness to the administration of a crime and the specialized computer forensic software must be objective is all about recognition, documentation, employed in order to conduct a proper computer collection, preservation and transmittal of physical investigation: evidence for analysis. 1. Proper Acquisition and Preservation of Digital Forensic deals with the recognition, Computer Evidence documentation, collection, preservation and transmittal, identification and interpretation of Electronic evidence is fragile by nature and easily can electronic media for evidentiary and/or root cause be altered or erased without proper handling. Merely analysis; especially of secondary memory of computer booting a subject computer into windows environment which is capable of storing data in bits i.e. Hard Disk will alter critical date stamps, erase temporary data, Drive (HDD). and cause hundreds of writes to the drive. Digital Forensic deals with conducting a proper and Specialized computer forensic software, such as FTK, documented investigation of the alleged misuse of a EnCase which are recognized by NIST ensures the system, its users, its facts and services. subject computer's data is not altered in any way during the acquisition process. A file date stamp is critical Prior to the forensic a chain of custody is followed The Mumbai PROTECTOR Jan - Feb 2010 49 CMYK
  • 2. CMYK Crime piece of evidence in litigation matters. 2. Authentication of collected Data for Court Presentation Computer forensics is based largely on the premise that the data recovered from computer systems will ultimately be presented in court of law. As such, another important feature of computer forensic software is a verification process that establishes that the investigator did not corrupt or tamper with the subject evidence at any time in the course of the investigation. Computer forensic software employs a standard algorithm to generate an image hash value. The algorithm calculates a unique numerical value based upon the exact contents contained in the evidentiary image copy. If one bit of data on the acquired evidentiary bit-stream image changes, even by adding a single space of • Identifying text or changing the case of a single • Recovering character, this value changes. • Reconstructing • Analyzing 3. Recovery of all Available Data. Including Deleted files Goal of Cyber Forensic: Investigate digital systems to: In addition to the active data normally seen • determine if system has been compromised by the computer user, computer forensic • determine extent of damage software allows the examiner to recover all • determine how a system was compromised deleted files that have not been completely • understand intrusion techniques overwritten, as well as other forms of • understand intruder patterns and infer intent unallocated or temporary data. • discover evidence of intruder identity • strengthen protection Forensic science is the application of • strengthen our ability to protect science to law; it deals with applying of any • make new friends and host really fun parties scientific principle or technique... Cyber Forensic is useful for investigating agencies. Conclusion: With organizations incurring excessive losses of intellectual property and other trade secrets, advancements in computer forensics technology are meeting the compelling need to counter this threat. Also, with the volumes of cases, it is important for investigators to use forensic tools with improved technology. Ongoing computer investigations are now the need of the hour for keeping pace to counter crime. Reference: Legal Investigation Manual - Encase Disclaimer: This article is for non-profit/non-commercial purpose. For further queries please contact the author on vicky@cybercrimes.in 1+91-98201-05011. "Human Behaviour is the Biggest Risk in Security - Vicky Shah”. + The Mumbai PROTECTOR Jan - Feb 2010 50 CMYK