computer forensics
DESCRIPTION
Computer forensics is the “who, what, when, and how” of electronic evidence. Typically narrow in scope, it attempts to reconstruct events, focusing on the computer-based conduct of an individual or group of individuals. The types of cases involving computer forensics are numerous and varied – from the personal (i.e. locating hidden assets in a messy divorce case), to the political (i.e. investigating alleged misuse of government computers for political gain), to the dramatic (i.e. “What was your client’s former employee downloading from the Internet before he was fired and brought suit for wrongful termination?”).TRANSCRIPT
![Page 1: Computer forensics](https://reader034.vdocuments.net/reader034/viewer/2022052617/5469dafdaf7959653c8b5df5/html5/thumbnails/1.jpg)
Computer Forensics By
Sarwar Hossain
![Page 2: Computer forensics](https://reader034.vdocuments.net/reader034/viewer/2022052617/5469dafdaf7959653c8b5df5/html5/thumbnails/2.jpg)
Introduction
Computer forensics is a field of expertise in the use of analytical techniques to examine digital evidence.
Computer forensics performs a structured investigation while maintaining a documented chain of evidence.
![Page 3: Computer forensics](https://reader034.vdocuments.net/reader034/viewer/2022052617/5469dafdaf7959653c8b5df5/html5/thumbnails/3.jpg)
Types of Cyber CrimesForgeryBreech of Computer SecurityFraud/TheftCopyright ViolationsIdentity TheftThreats
BurglaryHomicideAdministrative InvestigationsCyber TerrorismSales and Investment FraudElectronic Fund Transfer Fraud
![Page 4: Computer forensics](https://reader034.vdocuments.net/reader034/viewer/2022052617/5469dafdaf7959653c8b5df5/html5/thumbnails/4.jpg)
Forensic Process Acquire data to be examined
Photographs
Make an image
Review of logical file structure
Review of unallocated space and file
slack
Recover deleted data (If any)
Report
Expert testimony
![Page 5: Computer forensics](https://reader034.vdocuments.net/reader034/viewer/2022052617/5469dafdaf7959653c8b5df5/html5/thumbnails/5.jpg)
GOAL OF COMPUTER FORENSICSThe main goal of computer forensic experts is not only to find the criminal but also to find out the evidence and the presentation of the evidence in a manner that leads to legal action of the criminal.
![Page 6: Computer forensics](https://reader034.vdocuments.net/reader034/viewer/2022052617/5469dafdaf7959653c8b5df5/html5/thumbnails/6.jpg)
Methodology1) Shut Down the Computer.2) Document the Hardware
Configuration of the System3) Transport the Computer System to
A Secure Location4) Make Bit Stream Backups of Hard
Disks and Floppy Disks5) Mathematically Verify Data on All
Storage Devices6) Document the System Date and
Time7) Make a List of Key Search Words
![Page 7: Computer forensics](https://reader034.vdocuments.net/reader034/viewer/2022052617/5469dafdaf7959653c8b5df5/html5/thumbnails/7.jpg)
Cyber Crime : Top 20 countries
![Page 8: Computer forensics](https://reader034.vdocuments.net/reader034/viewer/2022052617/5469dafdaf7959653c8b5df5/html5/thumbnails/8.jpg)
Applications# FINANCIAL FRAUD DETECTION
# CRIMINAL PROSECUTION
# CIVIL LITIGATION
# “CORPORATE SECURITY POLICY AND VIOLATIONS”
![Page 9: Computer forensics](https://reader034.vdocuments.net/reader034/viewer/2022052617/5469dafdaf7959653c8b5df5/html5/thumbnails/9.jpg)
Forensic Tools1.Disk Imaging Software.
2.Software Write Tools.
3.Hashing Tools.
4.File recovery programs.
5.Analysis Software.
6.Password cracking software.
![Page 10: Computer forensics](https://reader034.vdocuments.net/reader034/viewer/2022052617/5469dafdaf7959653c8b5df5/html5/thumbnails/10.jpg)
The End