computer crimes and forensics

16
CYBER CRIMES & CYBER FORENSICS -AVINASH

Upload: avinash-mavuru

Post on 26-Jan-2017

73 views

Category:

Education


2 download

TRANSCRIPT

Page 1: Computer crimes and forensics

CYBER CRIMES & CYBER FORENSICS -AVINASH

Page 2: Computer crimes and forensics

OUTLINE• What is computer crimes?

• What is computer forensics?

• Types of crimes

• Evidences taken for forensics

• Forensic tools

• Applications of cyber forensics

• Cyber crimes analysis

• Conclusion

Page 3: Computer crimes and forensics

Computer crimes• Any crime where computer is a tool, target or both.

• Unauthorized access, modification or impairment of a computer or digital system

• Annual damage of social economy.

• Altering in an unauthorized way. 

•  criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim

directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and

groups) and mobile phones (SMS/MMS)".

Page 4: Computer crimes and forensics

Types of crimes Child pornography

fraud

 espionage

 cyber stalking

Page 5: Computer crimes and forensics

Cont.. Copyright Violations

Identity Theft

Sales and Investment Fraud

Forgeries

Admistrative investigation

Page 6: Computer crimes and forensics

Computer forensics• Computer forensics is a field of expertise in the use of analytical techniques to examine digital evidence.

• Computer forensics is the practice of collecting, analyzing and reporting on digital data in a way that is legally admissible.

• Computer forensics performs a structured investigation while maintaining a documented chain of evidence.

•  It can be used in the detection and prevention of crime and in any dispute .

• The preservation, identification, extraction, documentation and interpretation of computer data.

Page 7: Computer crimes and forensics

Process followed

Page 8: Computer crimes and forensics

Evidences for cyber crimes • Cross-drive analysis

A forensic technique that correlates information found on multiple hard drives.

• Live analysis

The examination of computers from within the operating system using custom forensics or existing sysadmin tools to extract

evidence

• Deleted files

A common technique used in computer forensics is the recovery of deleted files. Modern forensic software have their own

tools for recovering or carving out deleted data.

• Steganography

the practice of concealing messages or information within other non-secret text or data.

Page 9: Computer crimes and forensics

Cont..• Stochastic forensics

Investigating insider data theft. It is the modern forensic technic came existence.

• PERSISTANT DATA

Meaning data that remains intact when the computer is turned off. E.g. hard drives, disk drives and removable

storage devices (such as USB drives or flash drives).

• VOLATILE DATA

Which is data that would be lost if the computer is turned off. E.g. (deleted files, computer history, the

computer's registry, temporary files and web browsing history).

Page 10: Computer crimes and forensics

Forensic tools• Typical forensic analysis includes a manual review of material on the media, reviewing the Windows registry for suspect

information, discovering and cracking passwords, keyword searches for topics related to the crime, and extracting e-mail and

pictures for review.

• Disk Imaging Software.

• Software Write Tools.

• Hashing Tools.

• File recovery programs.

• Analysis Software.

• Password cracking software.

Page 11: Computer crimes and forensics

Applications of cyber forensics• FINANCIAL FRAUD DETECTION

• CRIMINAL PROSECUTION

• CIVIL LITIGATION

• “CORPORATE SECURITY POLICY AND ACCEPTABLS USE VIOLATIONS”

Page 12: Computer crimes and forensics

Crimes analysis

Page 13: Computer crimes and forensics

In India

Page 14: Computer crimes and forensics
Page 15: Computer crimes and forensics

Conclusion

• Use of computer in daily life has increased mostly as we humans doesn’t satisfy with limited addition we require more than

our hungry so the man was moving towards crime to fulfills his stomach to stop the man to feed the other man these forensics

are required….,

Page 16: Computer crimes and forensics

• -- Thank you