SlideShare a Scribd company logo
CMYK

 Crime




   Computer
   Forensics Vital
   for Combating
   Cyber Crimes
                             By Vicky Shah



                                Cyber crimes are            which consists of,
                                committed through the
                                                            • Arriving at the scene: Initial
                                use of computers or
                                                            response/ prioritization of efforts
                                computer network
                                                            • Preliminary Documentation and
                                systems. In these crimes,
                                                            Evaluation of the scene
                                computers are used as
                                                            • Processing the scene
                                tools to commit crime
                                                            • Completing and recording the crime scene
                               and/or as a target where
                                                            investigation of crime scene equipment
 an attack or compromise has to be performed and/or
 as an incidental to a crime in which a computer is used    Computer forensics is commonly defined as the
 to generate fake, forged or authentic looking literature   collection, prevention, analysis and court presentation
 for either committing a physical or virtual crime.         of computer-related evidence. Courts mandate the
                                                            proper seizure and analysis of computer evidence in
 A thorough crime scene analysis is vitally important to
                                                            any investigation with respect to the law of the land.
 effective law enforcement. In particular, rapid logical
 advances have greatly expanded the amount of               The most important tool for a computer forensic
 information that can be obtained from the analysis of      investigator is the software used to perform the
 physical evidence from a crime scene. In order to take     investigation. Without specially designed computer
 advantage of these new opportunities, the investigator     forensic software, there cannot be a true forensic
 should use sound scene processing practices to             analysis.
 recover useful evidence. Forensics is all about the
                                                            In general, there are three primary reasons why
 criticalness to the administration of a crime and the
                                                            specialized computer forensic software must be
 objective is all about recognition, documentation,
                                                            employed in order to conduct a proper computer
 collection, preservation and transmittal of physical
                                                            investigation:
 evidence for analysis.
                                                            1. Proper Acquisition and Preservation of
 Digital Forensic deals with the recognition,
                                                            Computer Evidence
 documentation, collection, preservation and
 transmittal, identification and interpretation of          Electronic evidence is fragile by nature and easily can
 electronic media for evidentiary and/or root cause         be altered or erased without proper handling. Merely
 analysis; especially of secondary memory of computer       booting a subject computer into windows environment
 which is capable of storing data in bits i.e. Hard Disk    will alter critical date stamps, erase temporary data,
 Drive (HDD).                                               and cause hundreds of writes to the drive.
 Digital Forensic deals with conducting a proper and        Specialized computer forensic software, such as FTK,
 documented investigation of the alleged misuse of a        EnCase which are recognized by NIST ensures the
 system, its users, its facts and services.                 subject computer's data is not altered in any way during
                                                            the acquisition process. A file date stamp is critical
 Prior to the forensic a chain of custody is followed

The Mumbai PROTECTOR                                                                          Jan - Feb 2010     49




                                                                                                        CMYK
CMYK

 Crime

 piece of evidence in litigation matters.
 2. Authentication of collected Data for
 Court Presentation
 Computer forensics is based largely on the
 premise that the data recovered from
 computer systems will ultimately be
 presented in court of law. As such, another
 important feature of computer forensic
 software is a verification process that
 establishes that the investigator did not
 corrupt or tamper with the subject evidence
 at any time in the course of the
 investigation.
 Computer forensic software employs a
 standard algorithm to generate an image
 hash value. The algorithm calculates a
 unique numerical value based upon the
 exact contents contained in the evidentiary
 image copy. If one bit of data on the
 acquired evidentiary bit-stream image
 changes, even by adding a single space of       • Identifying
 text or changing the case of a single           • Recovering
 character, this value changes.                  • Reconstructing
                                                 • Analyzing
 3. Recovery of all Available Data.
 Including Deleted files                         Goal of Cyber Forensic: Investigate digital systems to:
 In addition to the active data normally seen    • determine if system has been compromised
 by the computer user, computer forensic         • determine extent of damage
 software allows the examiner to recover all     • determine how a system was compromised
 deleted files that have not been completely     • understand intrusion techniques
 overwritten, as well as other forms of          • understand intruder patterns and infer intent
 unallocated or temporary data.                  • discover evidence of intruder identity
                                                 • strengthen protection
 Forensic science is the application of          • strengthen our ability to protect
 science to law; it deals with applying of any   • make new friends and host really fun parties
 scientific principle or technique...
                                                 Cyber Forensic is useful for investigating agencies.
                                                 Conclusion:
                                                 With organizations incurring excessive losses of intellectual
                                                 property and other trade secrets, advancements in computer
                                                 forensics technology are meeting the compelling need to counter
                                                 this threat. Also, with the volumes of cases, it is important for
                                                 investigators to use forensic tools with improved technology.
                                                 Ongoing computer investigations are now the need of the hour for
                                                 keeping pace to counter crime.
                                                 Reference: Legal Investigation Manual - Encase
                                                 Disclaimer: This article is for non-profit/non-commercial purpose.
                                                 For further queries please contact the author on
                                                 vicky@cybercrimes.in 1+91-98201-05011. "Human Behaviour is
                                                 the Biggest Risk in Security - Vicky Shah”.                    +


The Mumbai PROTECTOR                                                                          Jan - Feb 2010    50




                                                                                                       CMYK

More Related Content

What's hot

Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickJacqueline Fick
 
Anton Chuvakin FTP Server Intrusion Investigation
Anton Chuvakin FTP Server Intrusion InvestigationAnton Chuvakin FTP Server Intrusion Investigation
Anton Chuvakin FTP Server Intrusion InvestigationAnton Chuvakin
 
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEWFORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEWcscpconf
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsdeaneal
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its toolsKathirvel Ayyaswamy
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics OverviewYansi Keim
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsSagar Rahurkar
 
Comparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic SystemsComparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic Systemsijsrd.com
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic InvestigatorAgape Inc
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDr Raghu Khimani
 
Chapter 3 cmp forensic
Chapter 3 cmp forensicChapter 3 cmp forensic
Chapter 3 cmp forensicshahhardik27
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigationOnline
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidenceOnline
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)AltheimPrivacy
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
CS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IVCS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IVArthyR3
 
76 s201924
76 s20192476 s201924
76 s201924IJRAT
 

What's hot (20)

Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
Anton Chuvakin FTP Server Intrusion Investigation
Anton Chuvakin FTP Server Intrusion InvestigationAnton Chuvakin FTP Server Intrusion Investigation
Anton Chuvakin FTP Server Intrusion Investigation
 
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEWFORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
Comparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic SystemsComparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic Systems
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Chapter 3 cmp forensic
Chapter 3 cmp forensicChapter 3 cmp forensic
Chapter 3 cmp forensic
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigation
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
CS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IVCS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IV
 
76 s201924
76 s20192476 s201924
76 s201924
 
Lecture5
Lecture5Lecture5
Lecture5
 

Viewers also liked

Viewers also liked (11)

General Tips
General TipsGeneral Tips
General Tips
 
Csit3916
Csit3916Csit3916
Csit3916
 
Nvm
NvmNvm
Nvm
 
2004 fron office biblioteca consiglio regionale_
2004 fron office biblioteca consiglio regionale_2004 fron office biblioteca consiglio regionale_
2004 fron office biblioteca consiglio regionale_
 
2004 21 maggio master comunicazione_valletta
2004 21 maggio master comunicazione_valletta2004 21 maggio master comunicazione_valletta
2004 21 maggio master comunicazione_valletta
 
Blessed are the Persecuted
Blessed are the Persecuted Blessed are the Persecuted
Blessed are the Persecuted
 
Бесхвостая лиса
Бесхвостая лисаБесхвостая лиса
Бесхвостая лиса
 
Todd Boedeker Thesis
Todd Boedeker ThesisTodd Boedeker Thesis
Todd Boedeker Thesis
 
the church
the churchthe church
the church
 
the lord's prayer
 the lord's prayer the lord's prayer
the lord's prayer
 
Apresentação ruido
Apresentação ruidoApresentação ruido
Apresentação ruido
 

Similar to Computer forensics vital_for_combating_cyber_crimes

A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsSamantha Vargas
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxVaishnaviBorse8
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1ricky098
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1zamayla143
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1}{it -Boy
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesBRNSSPublicationHubI
 
E discovery2
E discovery2E discovery2
E discovery2elijaht
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesIsaiah Edem
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
Cyber Forensics|Digital Forensics|Cyber Crime-2023
Cyber Forensics|Digital Forensics|Cyber Crime-2023Cyber Forensics|Digital Forensics|Cyber Crime-2023
Cyber Forensics|Digital Forensics|Cyber Crime-2023Cyber Security Experts
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh tManesh T
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesICFECI
 

Similar to Computer forensics vital_for_combating_cyber_crimes (20)

A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptx
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
E discovery2
E discovery2E discovery2
E discovery2
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting Crimes
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Cyber Forensics|Digital Forensics|Cyber Crime-2023
Cyber Forensics|Digital Forensics|Cyber Crime-2023Cyber Forensics|Digital Forensics|Cyber Crime-2023
Cyber Forensics|Digital Forensics|Cyber Crime-2023
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh t
 
Mjtanasas2
Mjtanasas2Mjtanasas2
Mjtanasas2
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics services
 
Cyber evidence at crime scene
Cyber evidence at crime sceneCyber evidence at crime scene
Cyber evidence at crime scene
 

Recently uploaded

Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPragya - UEM Kolkata Quiz Club
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTechSoup
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff17thcssbs2
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxShibin Azad
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptxmansk2
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya - UEM Kolkata Quiz Club
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxheathfieldcps1
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxjmorse8
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaasiemaillard
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17Celine George
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportAvinash Rai
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...Sayali Powar
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeSaadHumayun7
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryEugene Lysak
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/siemaillard
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resourcesdimpy50
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Mohamed Rizk Khodair
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxakshayaramakrishnan21
 

Recently uploaded (20)

Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tube
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. Henry
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 

Computer forensics vital_for_combating_cyber_crimes

  • 1. CMYK Crime Computer Forensics Vital for Combating Cyber Crimes By Vicky Shah Cyber crimes are which consists of, committed through the • Arriving at the scene: Initial use of computers or response/ prioritization of efforts computer network • Preliminary Documentation and systems. In these crimes, Evaluation of the scene computers are used as • Processing the scene tools to commit crime • Completing and recording the crime scene and/or as a target where investigation of crime scene equipment an attack or compromise has to be performed and/or as an incidental to a crime in which a computer is used Computer forensics is commonly defined as the to generate fake, forged or authentic looking literature collection, prevention, analysis and court presentation for either committing a physical or virtual crime. of computer-related evidence. Courts mandate the proper seizure and analysis of computer evidence in A thorough crime scene analysis is vitally important to any investigation with respect to the law of the land. effective law enforcement. In particular, rapid logical advances have greatly expanded the amount of The most important tool for a computer forensic information that can be obtained from the analysis of investigator is the software used to perform the physical evidence from a crime scene. In order to take investigation. Without specially designed computer advantage of these new opportunities, the investigator forensic software, there cannot be a true forensic should use sound scene processing practices to analysis. recover useful evidence. Forensics is all about the In general, there are three primary reasons why criticalness to the administration of a crime and the specialized computer forensic software must be objective is all about recognition, documentation, employed in order to conduct a proper computer collection, preservation and transmittal of physical investigation: evidence for analysis. 1. Proper Acquisition and Preservation of Digital Forensic deals with the recognition, Computer Evidence documentation, collection, preservation and transmittal, identification and interpretation of Electronic evidence is fragile by nature and easily can electronic media for evidentiary and/or root cause be altered or erased without proper handling. Merely analysis; especially of secondary memory of computer booting a subject computer into windows environment which is capable of storing data in bits i.e. Hard Disk will alter critical date stamps, erase temporary data, Drive (HDD). and cause hundreds of writes to the drive. Digital Forensic deals with conducting a proper and Specialized computer forensic software, such as FTK, documented investigation of the alleged misuse of a EnCase which are recognized by NIST ensures the system, its users, its facts and services. subject computer's data is not altered in any way during the acquisition process. A file date stamp is critical Prior to the forensic a chain of custody is followed The Mumbai PROTECTOR Jan - Feb 2010 49 CMYK
  • 2. CMYK Crime piece of evidence in litigation matters. 2. Authentication of collected Data for Court Presentation Computer forensics is based largely on the premise that the data recovered from computer systems will ultimately be presented in court of law. As such, another important feature of computer forensic software is a verification process that establishes that the investigator did not corrupt or tamper with the subject evidence at any time in the course of the investigation. Computer forensic software employs a standard algorithm to generate an image hash value. The algorithm calculates a unique numerical value based upon the exact contents contained in the evidentiary image copy. If one bit of data on the acquired evidentiary bit-stream image changes, even by adding a single space of • Identifying text or changing the case of a single • Recovering character, this value changes. • Reconstructing • Analyzing 3. Recovery of all Available Data. Including Deleted files Goal of Cyber Forensic: Investigate digital systems to: In addition to the active data normally seen • determine if system has been compromised by the computer user, computer forensic • determine extent of damage software allows the examiner to recover all • determine how a system was compromised deleted files that have not been completely • understand intrusion techniques overwritten, as well as other forms of • understand intruder patterns and infer intent unallocated or temporary data. • discover evidence of intruder identity • strengthen protection Forensic science is the application of • strengthen our ability to protect science to law; it deals with applying of any • make new friends and host really fun parties scientific principle or technique... Cyber Forensic is useful for investigating agencies. Conclusion: With organizations incurring excessive losses of intellectual property and other trade secrets, advancements in computer forensics technology are meeting the compelling need to counter this threat. Also, with the volumes of cases, it is important for investigators to use forensic tools with improved technology. Ongoing computer investigations are now the need of the hour for keeping pace to counter crime. Reference: Legal Investigation Manual - Encase Disclaimer: This article is for non-profit/non-commercial purpose. For further queries please contact the author on vicky@cybercrimes.in 1+91-98201-05011. "Human Behaviour is the Biggest Risk in Security - Vicky Shah”. + The Mumbai PROTECTOR Jan - Feb 2010 50 CMYK