SlideShare uma empresa Scribd logo
1 de 23
Computer Forensics In Fighting
Crimes
Paul Umoren
OUTLINES
DEFINITION OF COMPUTER
FORENSICS
COOMPUTER FORENSICS TECHNIGUES
SCOPE OF COMPUTER FORENSIC
COMPUTER FORENSICS PROCESS
IMPORTANCE OF COMPUTER
FORENSICS
ITEMS USE FOR EXAMINATION
COMPUTER FORENSICS CASES
COMMON MISTAKES MADE
DURING A COMPUTER FORENSIC
ANALYSIS
CONCLUSION
QUESTIONS
REFERENCES
DEFINITION:
This is the discovery, collection,
and analysis of evidence found
on computers and networks to
investigate and establish faces in
criminal or civil courts.
COMPUTER FORENSICS TECHNIQUES:
Cross-drive analysis: A forensic technique
that correlates information found on multiple
HDD
Live analysis: The practice is useful when
dealing with Encrypting File System and
recovery of RAM data when the system was
shutdown
Deleted files: This is a common technique
TECHNIQUES CONTNUE:
Analysis of chat logs: This involves the
Analysis of log files
Reviewing of trace nodes
SCOPE OF COMPUTER FORENSIC:
It focuses on computers and networks for
finding crimes evidence for government,
private business and other sectors of
organization.
Computers: (examination of computer
media, program, data & log files, Internet
messaging conversation, internet chat, e-
mail, etc)
SCOPE CONTINUES:
Networks: (analysis of server contents,
server and router log files, packet traffic
and information obtain from Internet
access providers.)
It is critical for Law enforcement as an
evidence gathering and criminal
investigation tool
COMPUTER FORENSICS PROCESS:
Acquisition/Preserve the media (The
original drives need be imaged, make
copies of original)
Extract evidence (this depends on the
type of investigation,the specialist needs
to determine what kind of information on
the computer is pertinent to the case)
PROCESS CONTUNUES:
Analysis: (The most tasking part, the
information retrieve can be incriminating
or exculpatory.)
Reporting/Documentation: (Configuration
of the computer and BIOS settings to
every step taken and pertinent evidence
that is found should be reported and
WHY COMPUTER FORENSICS?
Computer forensics allows for the general
integrity of your network infrastructure and
ensures that your organization’s private
information remains private.
Protection From employee abuse, as well as
protects your company from violating
government regulations such as those rules
regarding customer data privacy.
WHY COMPUTER FORENSICS? CONTS.
CUT DOWN COST: (Working with
professionals who have both technological and
practical understandings of computer forensics
and electronic discovery can also cut costs for
your company)
ANTITERRORISM :It is important as an
antiterrorism tool for both criminal persecution
and intelligent gathering.
COMPUTER FORENSICS TOOLS:
The Forensics Recovery of Digital
Evidence
Guidance Software’s EnCase
Ultimate Toolkit
The FireChief hardware A portable Tableau write blocker attached to a
Hard Drive
SOME ITEMS USE FOR EXAMINATION:
COMPUTER FORENSICS CASES :
Soham murders
The alibi of the killer was disproved when
mobile phone records of the person he claimed
to be with showed she was out of town at the
time.
BTK Killer(Dennis Rader was convicted of a
string of serial killings that occurred over a
period of sixteen years)
COMPUTER FORENSICS CASES CONTS. :
Joseph E. Duncan III (Forensic investigators
found a spreadsheet in which Duncan was
planning his murders; this helped prove he was
planning the crimes.)
Sharon Lopatka (After going through
hundreds of emails, investigators were able to
find her killer, Robert Glass.)
COMPUTER FORENSICS CASES CONTS. :
Dr. Conrad Murray (Michael
Jackson’s doctor was convicted
partially by digital evidence on his
computer. This evidence included
medical documentation showing
lethal amounts of propofol.)
COMMON MISTAKES MADE DURING A
COMPUTER FORENSIC ANALYSIS:
Using the internal IT staff to conduct a
computer forensics investigation
Waiting until the last minute to perform a
computer forensics exam
Too narrowly limiting the scope of
computer forensics
COMMON MISTAKES CONTINUES:
Not being prepared to preserve
electronic evidence
Not selecting a qualified computer
forensics team
COMPUTER FORENSIC CERTIFICATIONS:
ISFCE Certified Computer Examine
IACRB Certified Computer Forensics Examine
IACIS offers the Certified Computer Forensic
Examiner (CFCE) program.
Asian School of Cyber Laws offers
international level certifications in Digital
Evidence Analysis and in Digital Forensic
Investigation
CONCLUSION:
Though this area is a bit new to some
people in computing, but it is very important
to battle cybercrimes in the society which is
difficult to handle in the real world
scenarios. Large companies should be able
to train some of their IT staff in computer
forensics which could become asset to the
company.
QUESTIONS:
REFERENCES:
Michael G. Noblett; Mark M. Pollitt, Lawrence A. Presley
(October 2000). "Recovering and examining computer forensic
evidence”
Leigland, R (September 2004). "A Formalization of Digital
Forensics".
A Yasinsac; RF Erbacher, DG Marks, MM Pollitt (2003).
"Computer forensics education". IEEE Security & Privacy.
CiteSeerX: 10.1.1.1.9510.
www.google.com
Wikipedia, the free encyclopedia.htm
Shelly, Cashman Vermaat (2006);Discovery Computers A

Mais conteúdo relacionado

Mais procurados

Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
gueste0d962
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
Milap Oza
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
Kranthi
 

Mais procurados (20)

Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Chap 1 general introduction to computer forensics
Chap 1  general introduction to computer forensicsChap 1  general introduction to computer forensics
Chap 1 general introduction to computer forensics
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
 
Digital Forensic Case Study
Digital Forensic Case StudyDigital Forensic Case Study
Digital Forensic Case Study
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigation
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 

Destaque

Computer forensic
Computer forensicComputer forensic
Computer forensic
bhavithd
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
Cell Site Analysis (CSA)
 
What Is Evidence?
What Is Evidence?What Is Evidence?
What Is Evidence?
nikkiec89
 
Identifying and Collecting Digital Evidence Webinar
Identifying and Collecting Digital Evidence WebinarIdentifying and Collecting Digital Evidence Webinar
Identifying and Collecting Digital Evidence Webinar
Case IQ
 
Electornic evidence collection
Electornic evidence collectionElectornic evidence collection
Electornic evidence collection
Fakrul Alam
 
Lecture1
Lecture1Lecture1
Lecture1
rjaeh
 
Access lesson 02 Creating a Database
Access lesson 02 Creating a DatabaseAccess lesson 02 Creating a Database
Access lesson 02 Creating a Database
Aram SE
 

Destaque (20)

Computer forensic
Computer forensicComputer forensic
Computer forensic
 
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic ExaminersBoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Document clustering for forensic analysis an approach for improving compute...
Document clustering for forensic   analysis an approach for improving compute...Document clustering for forensic   analysis an approach for improving compute...
Document clustering for forensic analysis an approach for improving compute...
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
 
Evidence based policy
Evidence based policy Evidence based policy
Evidence based policy
 
What Is Evidence?
What Is Evidence?What Is Evidence?
What Is Evidence?
 
Identifying and Collecting Digital Evidence Webinar
Identifying and Collecting Digital Evidence WebinarIdentifying and Collecting Digital Evidence Webinar
Identifying and Collecting Digital Evidence Webinar
 
The design of forensic computer workstations
The design of forensic computer workstationsThe design of forensic computer workstations
The design of forensic computer workstations
 
MattockFS Computer Forensic File-System
MattockFS Computer Forensic File-SystemMattockFS Computer Forensic File-System
MattockFS Computer Forensic File-System
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Electornic evidence collection
Electornic evidence collectionElectornic evidence collection
Electornic evidence collection
 
Capturing forensics image
Capturing forensics imageCapturing forensics image
Capturing forensics image
 
File000173
File000173File000173
File000173
 
Lecture1
Lecture1Lecture1
Lecture1
 
OWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security SessionOWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security Session
 
Access lesson 02 Creating a Database
Access lesson 02 Creating a DatabaseAccess lesson 02 Creating a Database
Access lesson 02 Creating a Database
 

Semelhante a Computer Forensics in Fighting Crimes

computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdf
Gnanavi2
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
ssuser2bf502
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
forensicsnation
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
forensicsnation
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
Aqib Memon
 

Semelhante a Computer Forensics in Fighting Crimes (20)

Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdf
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 

Mais de Isaiah Edem (8)

Sleep and Dreams
Sleep and DreamsSleep and Dreams
Sleep and Dreams
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Outdated Technology
Outdated TechnologyOutdated Technology
Outdated Technology
 
Green Computing
Green ComputingGreen Computing
Green Computing
 
Importanc of softwaretesting
Importanc of softwaretestingImportanc of softwaretesting
Importanc of softwaretesting
 
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy InvasionCyber Security & User's Privacy Invasion
Cyber Security & User's Privacy Invasion
 
Fear
FearFear
Fear
 
Redis IU
Redis IURedis IU
Redis IU
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Computer Forensics in Fighting Crimes

  • 1. Computer Forensics In Fighting Crimes Paul Umoren
  • 2. OUTLINES DEFINITION OF COMPUTER FORENSICS COOMPUTER FORENSICS TECHNIGUES SCOPE OF COMPUTER FORENSIC COMPUTER FORENSICS PROCESS IMPORTANCE OF COMPUTER FORENSICS
  • 3. ITEMS USE FOR EXAMINATION COMPUTER FORENSICS CASES COMMON MISTAKES MADE DURING A COMPUTER FORENSIC ANALYSIS CONCLUSION QUESTIONS REFERENCES
  • 4. DEFINITION: This is the discovery, collection, and analysis of evidence found on computers and networks to investigate and establish faces in criminal or civil courts.
  • 5. COMPUTER FORENSICS TECHNIQUES: Cross-drive analysis: A forensic technique that correlates information found on multiple HDD Live analysis: The practice is useful when dealing with Encrypting File System and recovery of RAM data when the system was shutdown Deleted files: This is a common technique
  • 6. TECHNIQUES CONTNUE: Analysis of chat logs: This involves the Analysis of log files Reviewing of trace nodes
  • 7. SCOPE OF COMPUTER FORENSIC: It focuses on computers and networks for finding crimes evidence for government, private business and other sectors of organization. Computers: (examination of computer media, program, data & log files, Internet messaging conversation, internet chat, e- mail, etc)
  • 8. SCOPE CONTINUES: Networks: (analysis of server contents, server and router log files, packet traffic and information obtain from Internet access providers.) It is critical for Law enforcement as an evidence gathering and criminal investigation tool
  • 9. COMPUTER FORENSICS PROCESS: Acquisition/Preserve the media (The original drives need be imaged, make copies of original) Extract evidence (this depends on the type of investigation,the specialist needs to determine what kind of information on the computer is pertinent to the case)
  • 10. PROCESS CONTUNUES: Analysis: (The most tasking part, the information retrieve can be incriminating or exculpatory.) Reporting/Documentation: (Configuration of the computer and BIOS settings to every step taken and pertinent evidence that is found should be reported and
  • 11. WHY COMPUTER FORENSICS? Computer forensics allows for the general integrity of your network infrastructure and ensures that your organization’s private information remains private. Protection From employee abuse, as well as protects your company from violating government regulations such as those rules regarding customer data privacy.
  • 12. WHY COMPUTER FORENSICS? CONTS. CUT DOWN COST: (Working with professionals who have both technological and practical understandings of computer forensics and electronic discovery can also cut costs for your company) ANTITERRORISM :It is important as an antiterrorism tool for both criminal persecution and intelligent gathering.
  • 13. COMPUTER FORENSICS TOOLS: The Forensics Recovery of Digital Evidence Guidance Software’s EnCase Ultimate Toolkit The FireChief hardware A portable Tableau write blocker attached to a Hard Drive
  • 14. SOME ITEMS USE FOR EXAMINATION:
  • 15. COMPUTER FORENSICS CASES : Soham murders The alibi of the killer was disproved when mobile phone records of the person he claimed to be with showed she was out of town at the time. BTK Killer(Dennis Rader was convicted of a string of serial killings that occurred over a period of sixteen years)
  • 16. COMPUTER FORENSICS CASES CONTS. : Joseph E. Duncan III (Forensic investigators found a spreadsheet in which Duncan was planning his murders; this helped prove he was planning the crimes.) Sharon Lopatka (After going through hundreds of emails, investigators were able to find her killer, Robert Glass.)
  • 17. COMPUTER FORENSICS CASES CONTS. : Dr. Conrad Murray (Michael Jackson’s doctor was convicted partially by digital evidence on his computer. This evidence included medical documentation showing lethal amounts of propofol.)
  • 18. COMMON MISTAKES MADE DURING A COMPUTER FORENSIC ANALYSIS: Using the internal IT staff to conduct a computer forensics investigation Waiting until the last minute to perform a computer forensics exam Too narrowly limiting the scope of computer forensics
  • 19. COMMON MISTAKES CONTINUES: Not being prepared to preserve electronic evidence Not selecting a qualified computer forensics team
  • 20. COMPUTER FORENSIC CERTIFICATIONS: ISFCE Certified Computer Examine IACRB Certified Computer Forensics Examine IACIS offers the Certified Computer Forensic Examiner (CFCE) program. Asian School of Cyber Laws offers international level certifications in Digital Evidence Analysis and in Digital Forensic Investigation
  • 21. CONCLUSION: Though this area is a bit new to some people in computing, but it is very important to battle cybercrimes in the society which is difficult to handle in the real world scenarios. Large companies should be able to train some of their IT staff in computer forensics which could become asset to the company.
  • 23. REFERENCES: Michael G. Noblett; Mark M. Pollitt, Lawrence A. Presley (October 2000). "Recovering and examining computer forensic evidence” Leigland, R (September 2004). "A Formalization of Digital Forensics". A Yasinsac; RF Erbacher, DG Marks, MM Pollitt (2003). "Computer forensics education". IEEE Security & Privacy. CiteSeerX: 10.1.1.1.9510. www.google.com Wikipedia, the free encyclopedia.htm Shelly, Cashman Vermaat (2006);Discovery Computers A