SlideShare una empresa de Scribd logo
1 de 9
COMPUTER FORENSICS
Abstract:
The topic “Computer Forensics” deals with performing a structured investigation
while maintaining a documented chain of evidence to find out exactly what
happened on a computer and who was responsible for it. With the increase in the
use of computer and internet, there evolved an increasing cybercrime such as
stalking, hacking, blackmailing etc. In such a situation computers, mail services,
social networking sites can be major evidences to prove the crime and find out the
persons involved in it. The tools used by the forensic experts are also a part of the
discussion.
I Introduction:
Computer Forensics is a branch of
forensic science that uses
investigation and analysis techniques
to find and determine legal evidences
found in computer and digital storage
mediums. It is the practice of lawfully
establishing evidence and facts. The
core goals of it are fairly straight
forward: preservation, identification,
extraction, documented and
interpretation of computer data. Data
should be retrieved and analyzed
without it is damaged. The
authenticity of the data is also
ensured.
There is a plethora
hardware and software tools available
to assist with the interpretation of
forensic data.
II Definition:
Computer Forensics is referred to as
computer forensics analysis,
electronic discovery and data
discovery. Computer analysis and
computer examination is the process
of methodically examining computer
media (Hard diskettes, disk tapes etc.)
for evidence.
III History:
The field of computer forensics began
in 1980s, after personal computers
became a viable option for
consumers. In 1984, an FBI program
was created known for a time as
magnet media program, it is now
known as the computer analysis and
response team (CART). Shortly
thereafter, the man who is credited
with being “the father of computer
forensics” began work in this field.
His name was Michael Anderson.
1995: International Organization on
Computer Evidence (IOCE) was
formed.
1997: The G8 countries declared that
“Law enforcement personnel must be
trained and equipped to address high-
tech crimes” in the Moscow.
1998: INTERPOL Forensic Science
Symposium.
1999: FBI CART case load exceeds
2000 cases examining, 17 terabytes of
data.
2000: First FBI Regional Computer
Forensic Laboratory established.
2003: FBI CART case load exceeds
6500 cases, examining 782 terabytes
of data.
IV Need for Computer
Forensics:
The purpose of it is mainly due to the
wide variety of computer crimes that
take place in recent times. The loss
caused depends upon the sensitivity of
the computer data or the information
for which the crime has been
committed. It is also efficient where
in the data is stored in a single system
for the backup.
The main objective of
computer forensics is to produce
evidence in the court that lead to the
punishment of the actual. The word
forensic itself means bringing to
court.
V Types of crimes:
A) Breech of computer security.
B) Fraud/theft.
C) Copyright violation.
D) Identity theft.
E) Narcotics Investigation.
F) Burglary.
G) Suicide.
H) Obscenity.
VI How forensic experts
work?
A) Make an initial assessment about
the type of case that is going to be
investigated.
B) Determine a preliminary design or
approach to the case.
C) Determine the reasons needed.
D) Obtain a copy of the disk drive.
E) Identify and minimize or avoid the
risks.
F) Investigate the data that is
recovered.
G) Complete the case report.
VII Forensic tools:
The forensic tools are software’s or
hardware’s used for gathering the
required data from the media storage
devices of the computer that is
believed to be used to commit any
illegal activity or crime.
Basic tools:
Some of the basic and commonly
used computer forensic tools are:
A) Registry Recon: It extracts registry
information from a piece of evidence
(disk image etc.) whether that
information was active, backed up or
deleted and rebuilds all the registries
represented by the extracted
information.
B) SANS Investigative Toolkit:
It is pre-configured with all the
necessary tools to perform a detailed
forensic examination. The new
version is rebuilt on an Ubuntu base
with additional tools like replaying of
entire computer activity in detail etc.
Memory forensic tools:
Memory tools are used to acquire and
analyze a computers volatile memory.
Some of them are
A) CMAT:
Compile Memory Analysis Tool is a
self-contained memory analysis tool
that analyzes windows OS memory
and extracts information about
running processes.
B) Memoryze:
This tool can acquire live memory
images and analyze memory dumps.
It is inclusive to Microsoft Windows.
Mobile device forensics tools:
Mobile forensic tool tend to have
hardware and software components.
A) Cellebrite Mobile Forensics:
It is a Universal Forensic extraction
device which is both hardware and
software. It is used to gather evidence
from mobile devices, mobile media
cards, Sims and GPS devices.
B) MicroSystemation XRY:
XRY is digital forensic product by
MicroSystemation used to recover
information from mobile phones,
smartphones, GPS, navigation tools
and Tablets computers.
Network Forensics tools:
Network forensic tools are designed
to capture and analyze network
packets either from LAN or Internet.
A) Wire Shark:
It captures and analyzes packets. In
short it is a protocol analyzer.
B) TCP flow:
It is a TCP/IP session reassembles. It
records the TCP flow and stores the
data such that it is convenient for
protocol analysis.
Database forensic tools:
Database forensic is related to the
investigations applied on database and
metadata.
A) Hash keeper:
It uses an algorithm to establish
unique numeric identifiers (hash
values) for files known to be good or
bad. It was developed to reduce the
amount of time required to examine
files on digital media.
B) Arbutus:
Arbutus data tool is a window based
analysis and conversion tool that
fraud investigators use to analyze
server or mainframe data.
VIII Applications:
A) Uncover evidences of illegal
activities such as credit card fraud,
intellectual property theft etc.
B) Investigate and find evidence for
crimes that were not directly
committed via computer but for which
the accused might have stored
evidence on computer data storage
devices.
C) Detect and close computer system
security holes through ‘legal hacking’.
D) Tracking the activities of the
Terrorists by using Internet.
IX Conclusion:
Cybercrimes are increasing in number
day to day. The Forensic Department
has been efficiently delivering its
duties by controlling the crime rate on
the Internet. The techniques
developed by the forensic science are
also used by army in detecting the
presence of chemical weapons and
high explosives. Almost in all the
cases the persons involved in crime
are found out. On the other hand it is
the duty of judiciary to resolve any
disputes and punish the accused.
X References:
A) Computer Forensics, Computer
Crime Investigation by John R.
Vacca.
B) Computer Forensics and
Investigation by Nelson, Phillips
C) List of Computer Forensic Tools,
Computer Forensics, Wikipedia
Computer Forensics
Computer Forensics
Computer Forensics
Computer Forensics

Más contenido relacionado

La actualidad más candente

Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics IntroJake K.
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Sagar Rahurkar
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxBhupeshkumar Nanhe
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics OverviewYansi Keim
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsdeaneal
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic pptPriya Manik
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 
computer forensics
computer forensicscomputer forensics
computer forensicsAkhil Kumar
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer ForensicsBense Tony
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationSam Bowne
 
SEPARATION OF OVERLAPPED FINGERPRINTS
SEPARATION OF OVERLAPPED FINGERPRINTSSEPARATION OF OVERLAPPED FINGERPRINTS
SEPARATION OF OVERLAPPED FINGERPRINTSpadma gade
 
Brain fingerprinting
Brain fingerprintingBrain fingerprinting
Brain fingerprintingVivek Jha
 

La actualidad más candente (20)

Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Windows forensic artifacts
Windows forensic artifactsWindows forensic artifacts
Windows forensic artifacts
 
Incident response process
Incident response processIncident response process
Incident response process
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
 
SEPARATION OF OVERLAPPED FINGERPRINTS
SEPARATION OF OVERLAPPED FINGERPRINTSSEPARATION OF OVERLAPPED FINGERPRINTS
SEPARATION OF OVERLAPPED FINGERPRINTS
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Brain fingerprinting
Brain fingerprintingBrain fingerprinting
Brain fingerprinting
 

Similar a Computer Forensics

A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsSamantha Vargas
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1Jinalkakadiya
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxVaishnaviBorse8
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
computer forensics
computer forensicscomputer forensics
computer forensicsshivi123456
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20worldAqib Memon
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricsMayank Diwakar
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)JIEMS Akkalkuwa
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)CA.Kolluru Narayanarao
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemsMayank Diwakar
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesBRNSSPublicationHubI
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesIsaiah Edem
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its toolsKathirvel Ayyaswamy
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxDaniyaHuzaifa
 

Similar a Computer Forensics (20)

A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptx
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting Crimes
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 

Más de Shreya Singireddy

Más de Shreya Singireddy (10)

Simplify Your Analytics Strategy
Simplify Your Analytics StrategySimplify Your Analytics Strategy
Simplify Your Analytics Strategy
 
Making Advanced Analytics Work for You
Making Advanced Analytics Work for YouMaking Advanced Analytics Work for You
Making Advanced Analytics Work for You
 
What People Analytics Can’t Capture
What People Analytics Can’t CaptureWhat People Analytics Can’t Capture
What People Analytics Can’t Capture
 
The New Patterns of Innovation
The New Patterns of InnovationThe New Patterns of Innovation
The New Patterns of Innovation
 
Marketers flunk the Big Data test
Marketers flunk the Big Data testMarketers flunk the Big Data test
Marketers flunk the Big Data test
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Firewalls
FirewallsFirewalls
Firewalls
 
Clouds
CloudsClouds
Clouds
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Firewalls
FirewallsFirewalls
Firewalls
 

Último

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Último (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Computer Forensics

  • 1. COMPUTER FORENSICS Abstract: The topic “Computer Forensics” deals with performing a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computer and who was responsible for it. With the increase in the use of computer and internet, there evolved an increasing cybercrime such as stalking, hacking, blackmailing etc. In such a situation computers, mail services, social networking sites can be major evidences to prove the crime and find out the persons involved in it. The tools used by the forensic experts are also a part of the discussion. I Introduction: Computer Forensics is a branch of forensic science that uses investigation and analysis techniques to find and determine legal evidences found in computer and digital storage mediums. It is the practice of lawfully establishing evidence and facts. The core goals of it are fairly straight forward: preservation, identification, extraction, documented and interpretation of computer data. Data should be retrieved and analyzed without it is damaged. The authenticity of the data is also ensured. There is a plethora hardware and software tools available to assist with the interpretation of forensic data.
  • 2. II Definition: Computer Forensics is referred to as computer forensics analysis, electronic discovery and data discovery. Computer analysis and computer examination is the process of methodically examining computer media (Hard diskettes, disk tapes etc.) for evidence. III History: The field of computer forensics began in 1980s, after personal computers became a viable option for consumers. In 1984, an FBI program was created known for a time as magnet media program, it is now known as the computer analysis and response team (CART). Shortly thereafter, the man who is credited with being “the father of computer forensics” began work in this field. His name was Michael Anderson. 1995: International Organization on Computer Evidence (IOCE) was formed. 1997: The G8 countries declared that “Law enforcement personnel must be trained and equipped to address high- tech crimes” in the Moscow. 1998: INTERPOL Forensic Science Symposium. 1999: FBI CART case load exceeds 2000 cases examining, 17 terabytes of data. 2000: First FBI Regional Computer Forensic Laboratory established. 2003: FBI CART case load exceeds 6500 cases, examining 782 terabytes of data. IV Need for Computer Forensics: The purpose of it is mainly due to the wide variety of computer crimes that take place in recent times. The loss caused depends upon the sensitivity of the computer data or the information for which the crime has been committed. It is also efficient where in the data is stored in a single system for the backup. The main objective of computer forensics is to produce evidence in the court that lead to the punishment of the actual. The word forensic itself means bringing to court. V Types of crimes: A) Breech of computer security.
  • 3. B) Fraud/theft. C) Copyright violation. D) Identity theft. E) Narcotics Investigation. F) Burglary. G) Suicide. H) Obscenity. VI How forensic experts work? A) Make an initial assessment about the type of case that is going to be investigated. B) Determine a preliminary design or approach to the case. C) Determine the reasons needed. D) Obtain a copy of the disk drive. E) Identify and minimize or avoid the risks. F) Investigate the data that is recovered. G) Complete the case report. VII Forensic tools: The forensic tools are software’s or hardware’s used for gathering the required data from the media storage devices of the computer that is believed to be used to commit any illegal activity or crime. Basic tools: Some of the basic and commonly used computer forensic tools are: A) Registry Recon: It extracts registry information from a piece of evidence (disk image etc.) whether that information was active, backed up or deleted and rebuilds all the registries represented by the extracted information. B) SANS Investigative Toolkit: It is pre-configured with all the necessary tools to perform a detailed forensic examination. The new version is rebuilt on an Ubuntu base with additional tools like replaying of entire computer activity in detail etc. Memory forensic tools: Memory tools are used to acquire and analyze a computers volatile memory. Some of them are A) CMAT: Compile Memory Analysis Tool is a self-contained memory analysis tool that analyzes windows OS memory
  • 4. and extracts information about running processes. B) Memoryze: This tool can acquire live memory images and analyze memory dumps. It is inclusive to Microsoft Windows. Mobile device forensics tools: Mobile forensic tool tend to have hardware and software components. A) Cellebrite Mobile Forensics: It is a Universal Forensic extraction device which is both hardware and software. It is used to gather evidence from mobile devices, mobile media cards, Sims and GPS devices. B) MicroSystemation XRY: XRY is digital forensic product by MicroSystemation used to recover information from mobile phones, smartphones, GPS, navigation tools and Tablets computers. Network Forensics tools: Network forensic tools are designed to capture and analyze network packets either from LAN or Internet. A) Wire Shark: It captures and analyzes packets. In short it is a protocol analyzer. B) TCP flow: It is a TCP/IP session reassembles. It records the TCP flow and stores the data such that it is convenient for protocol analysis. Database forensic tools: Database forensic is related to the investigations applied on database and metadata. A) Hash keeper: It uses an algorithm to establish unique numeric identifiers (hash values) for files known to be good or bad. It was developed to reduce the amount of time required to examine files on digital media. B) Arbutus: Arbutus data tool is a window based analysis and conversion tool that fraud investigators use to analyze server or mainframe data. VIII Applications: A) Uncover evidences of illegal activities such as credit card fraud, intellectual property theft etc.
  • 5. B) Investigate and find evidence for crimes that were not directly committed via computer but for which the accused might have stored evidence on computer data storage devices. C) Detect and close computer system security holes through ‘legal hacking’. D) Tracking the activities of the Terrorists by using Internet. IX Conclusion: Cybercrimes are increasing in number day to day. The Forensic Department has been efficiently delivering its duties by controlling the crime rate on the Internet. The techniques developed by the forensic science are also used by army in detecting the presence of chemical weapons and high explosives. Almost in all the cases the persons involved in crime are found out. On the other hand it is the duty of judiciary to resolve any disputes and punish the accused. X References: A) Computer Forensics, Computer Crime Investigation by John R. Vacca. B) Computer Forensics and Investigation by Nelson, Phillips C) List of Computer Forensic Tools, Computer Forensics, Wikipedia