Computer forensics

Preview:

DESCRIPTION

Computer forensics is the “who, what, when, and how” of electronic evidence. Typically narrow in scope, it attempts to reconstruct events, focusing on the computer-based conduct of an individual or group of individuals. The types of cases involving computer forensics are numerous and varied – from the personal (i.e. locating hidden assets in a messy divorce case), to the political (i.e. investigating alleged misuse of government computers for political gain), to the dramatic (i.e. “What was your client’s former employee downloading from the Internet before he was fired and brought suit for wrongful termination?”).

Citation preview

Computer Forensics By

Sarwar Hossain

Introduction

Computer forensics is a field of expertise in the use of analytical techniques to examine digital evidence.

Computer forensics performs a structured investigation while maintaining a documented chain of evidence.

Types of Cyber CrimesForgeryBreech of Computer SecurityFraud/TheftCopyright ViolationsIdentity TheftThreats

BurglaryHomicideAdministrative InvestigationsCyber TerrorismSales and Investment FraudElectronic Fund Transfer Fraud

Forensic Process Acquire data to be examined

Photographs

Make an image

Review of logical file structure

Review of unallocated space and file

slack

Recover deleted data (If any)

Report

Expert testimony

GOAL OF COMPUTER FORENSICSThe main goal of computer forensic experts is not only to find the criminal but also to find out the evidence and the presentation of the evidence in a manner that leads to legal action of the criminal.

Methodology1) Shut Down the Computer.2) Document the Hardware

Configuration of the System3) Transport the Computer System to

A Secure Location4) Make Bit Stream Backups of Hard

Disks and Floppy Disks5) Mathematically Verify Data on All

Storage Devices6) Document the System Date and

Time7) Make a List of Key Search Words

Cyber Crime : Top 20 countries

Applications# FINANCIAL FRAUD DETECTION

# CRIMINAL PROSECUTION

# CIVIL LITIGATION

# “CORPORATE SECURITY POLICY AND VIOLATIONS”

Forensic Tools1.Disk Imaging Software.

2.Software Write Tools.

3.Hashing Tools.

4.File recovery programs.

5.Analysis Software.

6.Password cracking software.

The End

Recommended