Upload
sarwar-hossain-rafsan
View
467
Download
1
Tags:
Embed Size (px)
DESCRIPTION
Computer forensics is the “who, what, when, and how” of electronic evidence. Typically narrow in scope, it attempts to reconstruct events, focusing on the computer-based conduct of an individual or group of individuals. The types of cases involving computer forensics are numerous and varied – from the personal (i.e. locating hidden assets in a messy divorce case), to the political (i.e. investigating alleged misuse of government computers for political gain), to the dramatic (i.e. “What was your client’s former employee downloading from the Internet before he was fired and brought suit for wrongful termination?”).
Citation preview
Computer Forensics By
Sarwar Hossain
Introduction
Computer forensics is a field of expertise in the use of analytical techniques to examine digital evidence.
Computer forensics performs a structured investigation while maintaining a documented chain of evidence.
Types of Cyber CrimesForgeryBreech of Computer SecurityFraud/TheftCopyright ViolationsIdentity TheftThreats
BurglaryHomicideAdministrative InvestigationsCyber TerrorismSales and Investment FraudElectronic Fund Transfer Fraud
Forensic Process Acquire data to be examined
Photographs
Make an image
Review of logical file structure
Review of unallocated space and file
slack
Recover deleted data (If any)
Report
Expert testimony
GOAL OF COMPUTER FORENSICSThe main goal of computer forensic experts is not only to find the criminal but also to find out the evidence and the presentation of the evidence in a manner that leads to legal action of the criminal.
Methodology1) Shut Down the Computer.2) Document the Hardware
Configuration of the System3) Transport the Computer System to
A Secure Location4) Make Bit Stream Backups of Hard
Disks and Floppy Disks5) Mathematically Verify Data on All
Storage Devices6) Document the System Date and
Time7) Make a List of Key Search Words
Cyber Crime : Top 20 countries
Applications# FINANCIAL FRAUD DETECTION
# CRIMINAL PROSECUTION
# CIVIL LITIGATION
# “CORPORATE SECURITY POLICY AND VIOLATIONS”
Forensic Tools1.Disk Imaging Software.
2.Software Write Tools.
3.Hashing Tools.
4.File recovery programs.
5.Analysis Software.
6.Password cracking software.
The End