10
Computer Forensics By Sarwar Hossain

Computer forensics

Embed Size (px)

DESCRIPTION

Computer forensics is the “who, what, when, and how” of electronic evidence. Typically narrow in scope, it attempts to reconstruct events, focusing on the computer-based conduct of an individual or group of individuals. The types of cases involving computer forensics are numerous and varied – from the personal (i.e. locating hidden assets in a messy divorce case), to the political (i.e. investigating alleged misuse of government computers for political gain), to the dramatic (i.e. “What was your client’s former employee downloading from the Internet before he was fired and brought suit for wrongful termination?”).

Citation preview

Page 1: Computer forensics

Computer Forensics By

Sarwar Hossain

Page 2: Computer forensics

Introduction

Computer forensics is a field of expertise in the use of analytical techniques to examine digital evidence.

Computer forensics performs a structured investigation while maintaining a documented chain of evidence.

Page 3: Computer forensics

Types of Cyber CrimesForgeryBreech of Computer SecurityFraud/TheftCopyright ViolationsIdentity TheftThreats

BurglaryHomicideAdministrative InvestigationsCyber TerrorismSales and Investment FraudElectronic Fund Transfer Fraud

Page 4: Computer forensics

Forensic Process Acquire data to be examined

Photographs

Make an image

Review of logical file structure

Review of unallocated space and file

slack

Recover deleted data (If any)

Report

Expert testimony

Page 5: Computer forensics

GOAL OF COMPUTER FORENSICSThe main goal of computer forensic experts is not only to find the criminal but also to find out the evidence and the presentation of the evidence in a manner that leads to legal action of the criminal.

Page 6: Computer forensics

Methodology1) Shut Down the Computer.2) Document the Hardware

Configuration of the System3) Transport the Computer System to

A Secure Location4) Make Bit Stream Backups of Hard

Disks and Floppy Disks5) Mathematically Verify Data on All

Storage Devices6) Document the System Date and

Time7) Make a List of Key Search Words

Page 7: Computer forensics

Cyber Crime : Top 20 countries

Page 8: Computer forensics

Applications# FINANCIAL FRAUD DETECTION

# CRIMINAL PROSECUTION

# CIVIL LITIGATION

# “CORPORATE SECURITY POLICY AND VIOLATIONS”

Page 9: Computer forensics

Forensic Tools1.Disk Imaging Software.

2.Software Write Tools.

3.Hashing Tools.

4.File recovery programs.

5.Analysis Software.

6.Password cracking software.

Page 10: Computer forensics

The End