Fdocuments - in - Computer Forensics 5584a063871ca
Fdocuments - in - Computer Forensics 5584a063871ca
Forensics
Yogesh E. Sonawane
yogesh.dfe@gmail.com
CYBER
CRIMES
REAL-WORLD & VIRTUAL-
WORLD
Two aspects:
•Computer as a tool to commit crime
Child porn, Threatening email, identity
theft, sexual harassment, defamation,
phishing.
SOFTWARE PIRACY
An unauthorized copying of software.
PORNOGRAPHY
Computer pornography covers pornographic
websites, pornographic magazines produced using
computers (to publish and print the material) and
the Internet (to download and transmit
pornographic pictures, photos.
CONT… TYPES OF COMPUTER
CRIME
FORGED DOCUMENTS
To create fake documents such as, fake
academic certificates, mark sheets etc.
Computer STALKING
Use of the e-mail, Internet to harass or
threaten an individual.
CONT… TYPES OF COMPUTER
CRIME
PHISHING
In the field of computer security, phishing is the
criminally
fraudulent process of attempting to acquire sensitive
information such as usernames, passwords and credit
card details by masquerading as a trustworthy entity in
an electronic communication.
Computer DEFAMATION
This occurs when defamation takes place with the help of
computers and / or the Internet.
e.g. Mr. X publishes defamatory matter about Ms. Y on a
website or sends e-mails containing defamatory
information to Ms. Y’s friends.
WHAT IS DIGITAL EVIDENCE?
Definition:
Methodology:
Presentation
Analysis
Scene of Crime
Acquisition
Authentication
Seizure
Identification
What to carry?
crime
Identification
Seizure
Acquisition
Exhibits Seized
Identification
Identification
CD/DVD Floppy
Identification Continued….
Mobile
Phones
Skimmer
Credit
Cards
Identification Continued….
Dongle
and Pen
Drives
Identification Continued….
Identification Continued….
Identification Continued….
Seizure
What is Seizure?
Definition :-
Seizure is the process of capturing the
suspect computer or storage media for
evidence collection.
Seizure
The case related reference documents should
also be
seized from the crime scene.
For Example -
In case of Economical Crime look for Account
Book
Details, Passbook details, Bank Transaction
Details,
ATM Credit/Debit Card Details.
Two Ways
Using Software
Acquisition & Authentication
Analysis
Presentation
Preservation
Authentication : Hash
Value
How to verify the integrity of Forensic
Duplicate?
It is also known as, “Message Digest” or
“Fingerprint”, is basically a digital signature.
E.g.
Analysis
Current and Emerging Cyber Forensic Tools of Law Enforcement
Analysis
Process
The Process of searching for crime relevant
data
and extract it.
Unallocated Space
(New Drive)
Allocated Space
Unallocated Space
(After File deletion)
Allocated Space
(Reallocated, new file)
Slack Space
Why isn’t this also slack space?
Analysis Process
Continued….