computer crimes and forensics
TRANSCRIPT
CYBER CRIMES & CYBER FORENSICS -AVINASH
OUTLINE• What is computer crimes?
• What is computer forensics?
• Types of crimes
• Evidences taken for forensics
• Forensic tools
• Applications of cyber forensics
• Cyber crimes analysis
• Conclusion
Computer crimes• Any crime where computer is a tool, target or both.
• Unauthorized access, modification or impairment of a computer or digital system
• Annual damage of social economy.
• Altering in an unauthorized way.
• criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim
directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and
groups) and mobile phones (SMS/MMS)".
Types of crimes Child pornography
fraud
espionage
cyber stalking
Cont.. Copyright Violations
Identity Theft
Sales and Investment Fraud
Forgeries
Admistrative investigation
Computer forensics• Computer forensics is a field of expertise in the use of analytical techniques to examine digital evidence.
• Computer forensics is the practice of collecting, analyzing and reporting on digital data in a way that is legally admissible.
• Computer forensics performs a structured investigation while maintaining a documented chain of evidence.
• It can be used in the detection and prevention of crime and in any dispute .
• The preservation, identification, extraction, documentation and interpretation of computer data.
Process followed
Evidences for cyber crimes • Cross-drive analysis
A forensic technique that correlates information found on multiple hard drives.
• Live analysis
The examination of computers from within the operating system using custom forensics or existing sysadmin tools to extract
evidence
• Deleted files
A common technique used in computer forensics is the recovery of deleted files. Modern forensic software have their own
tools for recovering or carving out deleted data.
• Steganography
the practice of concealing messages or information within other non-secret text or data.
Cont..• Stochastic forensics
Investigating insider data theft. It is the modern forensic technic came existence.
• PERSISTANT DATA
Meaning data that remains intact when the computer is turned off. E.g. hard drives, disk drives and removable
storage devices (such as USB drives or flash drives).
• VOLATILE DATA
Which is data that would be lost if the computer is turned off. E.g. (deleted files, computer history, the
computer's registry, temporary files and web browsing history).
Forensic tools• Typical forensic analysis includes a manual review of material on the media, reviewing the Windows registry for suspect
information, discovering and cracking passwords, keyword searches for topics related to the crime, and extracting e-mail and
pictures for review.
• Disk Imaging Software.
• Software Write Tools.
• Hashing Tools.
• File recovery programs.
• Analysis Software.
• Password cracking software.
Applications of cyber forensics• FINANCIAL FRAUD DETECTION
• CRIMINAL PROSECUTION
• CIVIL LITIGATION
• “CORPORATE SECURITY POLICY AND ACCEPTABLS USE VIOLATIONS”
Crimes analysis
In India
Conclusion
• Use of computer in daily life has increased mostly as we humans doesn’t satisfy with limited addition we require more than
our hungry so the man was moving towards crime to fulfills his stomach to stop the man to feed the other man these forensics
are required….,
• -- Thank you