SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
COMPUTER FORENSICS AND
INVESTIGATION
Module:1 Understand the importance of
computer forensics
Topic: Introduction to computer forensics
BY,
Neha Raju K
Assistant Professor
BCA-CloudTechnology and Information Security Management
Contents
• Overview
• Introduction
• Definition of Computer Forensics
• Evolution of Digital forensics
• Assignment
• Why do we need computer forensics?
Overview
➢The main objective is to find the
criminal which is directly or indirectly
related to cyber world.
➢To find out the digital evidences.
➢Presenting evidences in a manner that
leads to legal action of the criminal.
Introduction • Many people across the globe prefer using gadgets like
computers, laptops, smart phones, ipads, etc. for
communication and online transactions.
• Organizations use various security measures to protect
confidential data.
• In spite of the security measures taken, cyber-crime still
occurs and is growing day by day.
• Hence we use Computer Forensics to investigate digital
crimes such as hacking of information online via bank
accounts, credit cards, emails, social networking websites
etc.
What is computer
forensics?
➢Computer forensics is a technological practice to
identify, collect, analyse and report various forms
of digital evidences in such a manner that
evidences are legally acceptable.
Evolution of Digital
Forensics
➢The computer forensics domain began to evolve
more than 30 years ago when computers were
developed and were being used extensively for
data processing.
➢The US’s law enforcement and military
organizations were the first to use computer
forensics.
➢The development of computer forensics can be
divided into three phases.
1. Ad-hoc phase
2. Structured phase
3. Enterprise phase
1.AD-HOC PHASE
➢ In the beginning, there was a lack of structure, appropriate tools, written processes and
procedures.
➢ No clear goals were defined and there was a lack of legal framework.
TIMELINE
➢ 1970- First crime cases involving computers, mainly financial fraud.
➢ 1980’s-first financial investigators and courts to realize that evidence can be stored in various
digital media devices.
➢ Norton utilities developed an “un-erase” tool.
➢ ACFE was founded.
➢ HTCIA was formed in Southern California.
STRUCTURED PHASE
➢Various first generation tools and techniques were developed and employed. But
most of them were quite complex.
➢The most important thing in this phase was the development and enabling of
the criminal legislation.
Timeline
➢1984- FBI Magnetic media program was created and become the computer
analysis and response team(CART)
➢1987-Access Data- Cyber Forensics company was formed.
➢1988-Founding of the International Association of computer investigative
Specialists(IACIS).
➢The first seized Computer Evidence Recovery Specialists (SCERS) training classes
were conducted.
• 1993- First International Conference on Computer Evidence was held.
• 1995-International Organization of Computer Evidence (IOCE) was formed.
• 1997-The G8 countries, in Moscow, declared that “Law enforcement personnel
must be trained and equipped to address high-tech crimes.
• 1998-In march,G8 appointed IICE to create international principles, guidelines
and procedures relating to digital evidence.
• 1998-INTERPOL Forensic Science Symposium.
3. ENTERPRISE PHASE
➢1999-FBI CART case load exceeds 2000 cases,
examined 17Terabytes of data.
➢2000-First FBI Regional Computer Forensic
Laboratory established.
➢2003- FBI CART case load exceeds 6500 cases,
examining 782 terabytes of data.
Basic Terminology
• Cybercrime, or computer-oriented crime, is a crime that involves a computer and a
network.
• The computer may have been used in the commission of a crime, or it may be the target.
• Cybercrimes can be defined as: "Offences that are committed against individuals or
groups of individuals with a criminal motive to intentionally harm the reputation of the
victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using
modern telecommunication networks such as Internet (networks including chat rooms,
emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)".
Why do we
need
computer
forensics?
• To produce evidence in the court that can lead to
the punishment of the actual.
• To ensure the integrity of the computer system.
• Hence the use of computer forensics is growing
for the following reasons:
1. Criminal investigations
2.Security investigations
3.Domestic cases
4.Data/IPTheft cases
DAILY ASSIGNMENT NO 1:
TOPIC :Myths about computer forensics
ThankYou

Mais conteúdo relacionado

Mais procurados

Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
Encase Forensic
Encase ForensicEncase Forensic
Encase ForensicMegha Sahu
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics Avinash Mavuru
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsSCREAM138
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital ForensicsManik Bhola
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)AltheimPrivacy
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptxAmbuj Kumar
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationSam Bowne
 
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniInvestigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniDr Raghu Khimani
 
Computer forensic
Computer forensicComputer forensic
Computer forensicbhavithd
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidenceOnline
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Anpumathews
 

Mais procurados (20)

Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Encase Forensic
Encase ForensicEncase Forensic
Encase Forensic
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
 
Current Forensic Tools
Current Forensic Tools Current Forensic Tools
Current Forensic Tools
 
Browser forensics
Browser forensicsBrowser forensics
Browser forensics
 
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniInvestigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Cyber Forensics & Challenges
Cyber Forensics & ChallengesCyber Forensics & Challenges
Cyber Forensics & Challenges
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 

Semelhante a Computer forensics and Investigation

Semelhante a Computer forensics and Investigation (20)

Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Computer Forensics.pptx
Computer Forensics.pptxComputer Forensics.pptx
Computer Forensics.pptx
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
Cybercrime_PPT.ppt
Cybercrime_PPT.pptCybercrime_PPT.ppt
Cybercrime_PPT.ppt
 
An insight view of digital forensics
An insight view of digital forensicsAn insight view of digital forensics
An insight view of digital forensics
 
Week1_2.ppt
Week1_2.pptWeek1_2.ppt
Week1_2.ppt
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Presentation wk6
Presentation wk6Presentation wk6
Presentation wk6
 
File000114
File000114File000114
File000114
 

Último

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 

Último (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

Computer forensics and Investigation

  • 1. COMPUTER FORENSICS AND INVESTIGATION Module:1 Understand the importance of computer forensics Topic: Introduction to computer forensics BY, Neha Raju K Assistant Professor BCA-CloudTechnology and Information Security Management
  • 2. Contents • Overview • Introduction • Definition of Computer Forensics • Evolution of Digital forensics • Assignment • Why do we need computer forensics?
  • 3. Overview ➢The main objective is to find the criminal which is directly or indirectly related to cyber world. ➢To find out the digital evidences. ➢Presenting evidences in a manner that leads to legal action of the criminal.
  • 4. Introduction • Many people across the globe prefer using gadgets like computers, laptops, smart phones, ipads, etc. for communication and online transactions. • Organizations use various security measures to protect confidential data. • In spite of the security measures taken, cyber-crime still occurs and is growing day by day. • Hence we use Computer Forensics to investigate digital crimes such as hacking of information online via bank accounts, credit cards, emails, social networking websites etc.
  • 5. What is computer forensics? ➢Computer forensics is a technological practice to identify, collect, analyse and report various forms of digital evidences in such a manner that evidences are legally acceptable.
  • 6. Evolution of Digital Forensics ➢The computer forensics domain began to evolve more than 30 years ago when computers were developed and were being used extensively for data processing. ➢The US’s law enforcement and military organizations were the first to use computer forensics. ➢The development of computer forensics can be divided into three phases. 1. Ad-hoc phase 2. Structured phase 3. Enterprise phase
  • 8. ➢ In the beginning, there was a lack of structure, appropriate tools, written processes and procedures. ➢ No clear goals were defined and there was a lack of legal framework. TIMELINE ➢ 1970- First crime cases involving computers, mainly financial fraud. ➢ 1980’s-first financial investigators and courts to realize that evidence can be stored in various digital media devices. ➢ Norton utilities developed an “un-erase” tool. ➢ ACFE was founded. ➢ HTCIA was formed in Southern California.
  • 10. ➢Various first generation tools and techniques were developed and employed. But most of them were quite complex. ➢The most important thing in this phase was the development and enabling of the criminal legislation. Timeline ➢1984- FBI Magnetic media program was created and become the computer analysis and response team(CART) ➢1987-Access Data- Cyber Forensics company was formed. ➢1988-Founding of the International Association of computer investigative Specialists(IACIS). ➢The first seized Computer Evidence Recovery Specialists (SCERS) training classes were conducted.
  • 11. • 1993- First International Conference on Computer Evidence was held. • 1995-International Organization of Computer Evidence (IOCE) was formed. • 1997-The G8 countries, in Moscow, declared that “Law enforcement personnel must be trained and equipped to address high-tech crimes. • 1998-In march,G8 appointed IICE to create international principles, guidelines and procedures relating to digital evidence. • 1998-INTERPOL Forensic Science Symposium.
  • 12. 3. ENTERPRISE PHASE ➢1999-FBI CART case load exceeds 2000 cases, examined 17Terabytes of data. ➢2000-First FBI Regional Computer Forensic Laboratory established. ➢2003- FBI CART case load exceeds 6500 cases, examining 782 terabytes of data.
  • 13. Basic Terminology • Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network. • The computer may have been used in the commission of a crime, or it may be the target. • Cybercrimes can be defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)".
  • 14. Why do we need computer forensics? • To produce evidence in the court that can lead to the punishment of the actual. • To ensure the integrity of the computer system. • Hence the use of computer forensics is growing for the following reasons: 1. Criminal investigations 2.Security investigations 3.Domestic cases 4.Data/IPTheft cases
  • 15. DAILY ASSIGNMENT NO 1: TOPIC :Myths about computer forensics