SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
Computer Forensics
What is Computer Forensics?

It is the act to determine legal evidence
found in computers and digital storage
mediums through the use of specialized
computer investigation and analysis
techniques.
How is it useful?

Collect evidence against suspects
of crime.
   find terrorists
Analyze after intrusions
   learn to defend against them
   next time
 Recover data
 Understand how some computer
systems works
Example of CF?

Dennis Lynn Rader, an American
serial killer who murdered 10
people between 1974 and 1991.
Convicted through evidence
found in a floppy disk.
Types of CF?

Static                   Live
   Permanent data           Volatile data
   e.g.                     e.g.
       Hard drive                RAM
       Flash memory              Live network
       CD
How CF works?

 
CF Methodologies?
No standard methodology for
conducting CF.

Mark Reith, Clint Carr & Gregg
Gunsch 2002 model:
 
"Never touch, change, or alter anything
until it has been documented, identified,
measured, and photographed . . . when a
body or article has been moved, it can
never be restored to its original
position."
CF Tools?

Software                  Hardware
   Utilities, editors,       Forensic Workstations,
   password recovery,       Devices readers, cables,
   imagery, etc.            etc.
   Alphabetical List of     High Tech Crime
   Computer Forensics       Institute, Inc
   Products                 Alphabetical list of links
                            to manufacturers,
                            suppliers, and products
What is Ubiquitous Computing?

 Ubiquitous
   being present everywhere at once; omnipresent; 
   universal
 Computing
   use of computers
Problems of CF with UC?

Increased variety of platforms (dimensions)
   File systems, physical connections, encryption, time,
   place, etc
Increased quantity of data (depth of dimensions)
   More tedious to find the specific data
Increased number of data dimensions and the depth of
the dimension itself led to more ways to hide data and
more difficult to detect the data.
(++|dn|)++|D| = n Exp(++|universe|) 
The curse of dimensionality?
How will CF evolve?

"As the ways to store and transit data increases, the ways
of CF also increases."

  Technological                Social
     More variety and              Awareness towards
     sophistication of tools      computer security
     More methodologies            Confidentiality of
     More laws observed           information
     Faster computer               Laws for CF to obtain
     devices                      information
Concerns for future of CF?
More negative publicity
   Attracting other cyber-attackers
   Inviting the ridicule of enemies of CF
   Undermining the confidence of their customers, suppliers, and
   investors
Growing sophistication and stealth of cyber criminal activities
   Much harder to detect than crimes in the physical world
   Often insiders and international involvement
   Indirectly through various hiding techniques
       Botnets
       Information hiding: steganography, covert channel, etc
       Anonymity proxies
Current open problems in CF?

Unavailability of Legal Framework
   Lack of unified guidelines for the evidence collection
  and presentation
       Evidence acceptable in one country may not be in
      another
         Gives way to international crimes
   Lack of technical knowledge
       Judge may not have relevant computer knowledge
      hence may not understand the evidences
Possible solutions?

Seek help from international organisations with high
authorit, to establish unified legal framework
   E.g. ISO, UN
Increase public awareness of computer security
   Find ways to get those information to the masses
References

      Mark Reith, C. C., Gregg Gunsch (2002). "An Examination
      of Digital Forensic Models." International Journal of
      Digital Evidence 1(3).
      Dennis Rader. (2009, December 9). In Wikipedia, The
      Free Encyclopedia. Retrieved 03:28, December 11, 2009,
      from http://en.wikipedia.org/w/index.php?
      title=Dennis_Rader&oldid=330665164
      Vacca, John R. Computer Forensics : Computer Crime
      Scene Investigation (2nd Edition).Boston, MA, USA:
      Course Technolgy, 2005. p xxv.
   
Questions or suggestions?

             

Más contenido relacionado

La actualidad más candente

Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic pptPriya Manik
 
Anti forensic
Anti forensicAnti forensic
Anti forensicMilap Oza
 
Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.guestcf6f5b
 
Digital forensic
Digital forensicDigital forensic
Digital forensicChandan Sah
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communicationUc Man
 

La actualidad más candente (6)

Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Anti forensic
Anti forensicAnti forensic
Anti forensic
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.
 
Digital forensic
Digital forensicDigital forensic
Digital forensic
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 

Similar a Computer forensics and ubiquitous computing

Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemsMayank Diwakar
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1Jinalkakadiya
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emamahmad abdelhafeez
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital ForensicsDonald Tabone
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20worldAqib Memon
 
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxCYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxOlusegun Mosugu
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh tManesh T
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeCSCJournals
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshopforensicsnation
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop newforensicsnation
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Muzzammil Wani
 

Similar a Computer forensics and ubiquitous computing (20)

Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
 
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxCYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh t
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
 

Computer forensics and ubiquitous computing

  • 2. What is Computer Forensics? It is the act to determine legal evidence found in computers and digital storage mediums through the use of specialized computer investigation and analysis techniques.
  • 3. How is it useful? Collect evidence against suspects of crime. find terrorists Analyze after intrusions learn to defend against them next time  Recover data  Understand how some computer systems works
  • 4. Example of CF? Dennis Lynn Rader, an American serial killer who murdered 10 people between 1974 and 1991. Convicted through evidence found in a floppy disk.
  • 5. Types of CF? Static Live Permanent data Volatile data e.g.  e.g. Hard drive  RAM Flash memory  Live network CD
  • 7. CF Methodologies? No standard methodology for conducting CF. Mark Reith, Clint Carr & Gregg Gunsch 2002 model:   "Never touch, change, or alter anything until it has been documented, identified, measured, and photographed . . . when a body or article has been moved, it can never be restored to its original position."
  • 8. CF Tools? Software Hardware Utilities, editors,  Forensic Workstations, password recovery, Devices readers, cables, imagery, etc. etc. Alphabetical List of High Tech Crime Computer Forensics Institute, Inc Products Alphabetical list of links to manufacturers, suppliers, and products
  • 9. What is Ubiquitous Computing?  Ubiquitous being present everywhere at once; omnipresent;  universal  Computing use of computers
  • 10. Problems of CF with UC? Increased variety of platforms (dimensions) File systems, physical connections, encryption, time, place, etc Increased quantity of data (depth of dimensions) More tedious to find the specific data Increased number of data dimensions and the depth of the dimension itself led to more ways to hide data and more difficult to detect the data. (++|dn|)++|D| = n Exp(++|universe|)  The curse of dimensionality?
  • 11. How will CF evolve? "As the ways to store and transit data increases, the ways of CF also increases." Technological Social More variety and  Awareness towards sophistication of tools computer security More methodologies  Confidentiality of More laws observed information Faster computer  Laws for CF to obtain devices information
  • 12. Concerns for future of CF? More negative publicity Attracting other cyber-attackers Inviting the ridicule of enemies of CF Undermining the confidence of their customers, suppliers, and investors Growing sophistication and stealth of cyber criminal activities Much harder to detect than crimes in the physical world Often insiders and international involvement Indirectly through various hiding techniques Botnets Information hiding: steganography, covert channel, etc Anonymity proxies
  • 13. Current open problems in CF? Unavailability of Legal Framework  Lack of unified guidelines for the evidence collection and presentation  Evidence acceptable in one country may not be in another Gives way to international crimes  Lack of technical knowledge  Judge may not have relevant computer knowledge hence may not understand the evidences
  • 14. Possible solutions? Seek help from international organisations with high authorit, to establish unified legal framework E.g. ISO, UN Increase public awareness of computer security Find ways to get those information to the masses
  • 15. References Mark Reith, C. C., Gregg Gunsch (2002). "An Examination of Digital Forensic Models." International Journal of Digital Evidence 1(3). Dennis Rader. (2009, December 9). In Wikipedia, The Free Encyclopedia. Retrieved 03:28, December 11, 2009, from http://en.wikipedia.org/w/index.php? title=Dennis_Rader&oldid=330665164 Vacca, John R. Computer Forensics : Computer Crime Scene Investigation (2nd Edition).Boston, MA, USA: Course Technolgy, 2005. p xxv.