Digital Forensics Works
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science technology
Active In SP

Posts: 740
Joined: Jan 2010
17-01-2010, 11:36 PM

.pdf   Digital Forensics Works.pdf (Size: 376.78 KB / Downloads: 201)
digital forensic investigation is a investigation might follow.
form of digital investigation in which the process follow The process isnâ„¢t unlike that of a physical crime lows rules that allow the results to be entered into a scene investigation.1 In the physical word, investigalegal
court”for example, by maintaining the digital tors first preserve the scene to prevent evidence from data™s chain of custody. being lost. Next, they survey the scene and locate propose that most subscribers to this magazine

obvious evidence”for example, by looking at the victim have conducted a form of digital investigation at some at a murder scene to determine whether she was shot
point in their careers. Debugging your software to decode or stabbed and, based on the obvious evidence, contermine how it got into a given digital state is a form
conducting ducting a detailed search to find more evidence,
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
seminar class
Active In SP

Posts: 5,361
Joined: Feb 2011
08-03-2011, 12:10 PM

Presented By:
sauveer Pandey.

.pptx   Sauveer - Original ppt.pptx (Size: 625.07 KB / Downloads: 58)
Technical Definition: Digital Forensics
“Tools and techniques used to recover, preserve, and examine digital evidence on or transmitted by digital devices.”
Definition for the Masses
“Deleted” files, on almost any kind of digital storage media, are almost never completely “gone”.
Who Needs It?
 Law enforcement officials
 Prosecution of crimes which involve computers or other digital devices.
 Defending the innocent & Prosecuting the guilty.
 Security agencies (e.g. Secret Service, CIA, FBI, NSA)
 Anti-terrorism efforts.
 Digital espionage.
 General
 Employee misconduct in corporate cases.
 For accidental deletion or malicious deletion of data by a user (or a program).
 Military
 Prosecution of internal computer-related crimes.

 Insurance Companies
Evidence discovered on computer can be used to mollify costs (fraud in accident, arson & worker’s compensation cases etc.)
Digital Forensics-Possibilities & Limitations
 What’s possible?
 Recovery of deleted data.
 Discovery of when files were modified, created, deleted, organized etc.
 Can determine which storage devices were attached to a specific computer.
 Which applications were installed, even if they were uninstalled by the user.
 Which web sites a user visited…
 What’s not…
 If digital media is completely (physically) destroyed, recovery is impossible.
 If digital media is securely overwritten, recovery is very, very complicated, or practically impossible.
A Digital Computer Forensics investigation, involves four major steps
 Acquisition
Obtaining the original evidence.
 Preservation
Protecting the original evidence.
 Analysis
Finding relevant evidence.
 Presentation
Presenting the evidence in court.
Traditional: Where’s the evidence?
 Undeleted files
 Deleted files
 Windows registry
 Print spool files
 Hibernation files
 Temp files (all those .TMP files!)
 Slack space
 Swap files
 Browser caches
 Alternate or “hidden” partitions
 On a variety of removable media (floppies, ZIP, Jazz, tapes, …)
Sources of Digital Evidence
 Computers
 Email
 Digital images
 Documents
 Spreadsheets
 Chat logs
 Illegally copied software or other copyrighted material
 Wireless telephones
 Numbers called
 Incoming calls
 Voice mail access numbers
 Email addresses
 Call forwarding numbers

 PDAs/Smart Phones
 Above, plus contacts, maps, pictures, passwords, documents, …
 Landline Telephones/Answering machines
 Incoming/outgoing messages
 Numbers called
 Incoming call info
 Access codes for voice mail systems
 Contact lists
 Copiers
 Especially digital copiers, which may store entire copy jobs.
 “Deletion” Fallacies
 “I deleted, the file, it’s gone.”
 Deleted files are recoverable using digital forensics tools.
 “I changed the name of the file, now no one will find it”
 Digital forensics tools immediately identify files based on content—names don’t matter at all.
 “I formatted the drive”
 This destroys almost nothing.
 “Deletion” Fallacies
 “I cut the floppy into little pieces- Media Mutilation ”
 At this point, it’s a question of how important it is to recover the data, because it is harder to recover the data.
 “I use only web-based email”
 Some email fragments are still present locally.
 Tools of Digital Forensics
 Encase –
includes tools for data acquisition, file recovery, indexing/search and file parsing.
 Forensic Toolkit –
scans a hard drive looking for various information.
 PTK Forensics –
runs as a GUI interface for The Sleuth Kit, acquiring and indexing digital media for investigation.

 Tools of Digital Forensics
 The Sleuth Kit –
provides a large number of specialized command-line based utilities.
 The Coroner’s Toolkit –
analysis of data recovery from computer disasters.
 Computer Online Forensic Evidence Extractor (COFEE) –
automated forensic tool during a live analysis.
Zacarias Moussaoui
 20th hijacker in the 9/11 (2001) terrorist
attacks against the U.S.
 His laptop, 4 computers, and several email accounts ( were searched for e-evidence.
 FBI discovered that the 19 hijackers used Kinko's computers in various cities to gain access to the Internet to plan 9/11.
Digital Forensics tools found immense application in investigating
various digital media used in Mumbai Terror attack 26/11.
Future of Digital Forensics
 Digital forensics is now part of criminal investigations.
 Crimes & methods to hide crimes are becoming more sophisticated.
 Digital forensics will be in demand for as long as there are criminals and misbehaving people.
 Will attract students and law professionals who need to update their skills.
 Digital Forensics has gained an important place in criminal investigations pertaining to digital media. Increasing number of computer crime means increasing demand for digital forensics services .
 Today, everyone is exposed to potential attacks and has a responsibility to its network neighbors to minimize their own vulnerabilities in an effort to provide a more secure and stable network.
 The digital forensic needs and challenges can be accomplished only with the cooperation of the private, public, and international sectors.

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: digital forensic computer science project, methods used in present to identify criminals in forensics science, seminar topics in forensics, seminar on computer forensics pdf, mumbai attack case study pptx, digital forensics, digital works forensic,
Popular Searches: technical seminar on vx works, qr code how it works, digital forensics full report, civil project works, vx works system pppt, digital forensics investigations, project for digital image forensics via intrinsic fingerprints,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  What is the difference between smart quill and digital pen seminar paper 2 1,428 09-09-2014, 10:08 AM
Last Post: ideastopic
Music Digital audio broadcasting, DAB (Download Full Report And Abstract) computer science crazy 22 13,481 07-10-2013, 10:11 PM
Last Post: Guest
Last Post: seminar projects maker
  Computer Forensics and Investigations ppt seminar projects maker 0 295 20-09-2013, 02:21 PM
Last Post: seminar projects maker
  DIGITAL JEWELLERY MADE POSSIBLE USING WIRELESS COMMUNICATIONS Report seminar projects maker 0 953 13-09-2013, 12:26 PM
Last Post: seminar projects maker
  Report on Digital Watermarking study tips 0 319 20-07-2013, 04:12 PM
Last Post: study tips
  Personal Identification With Digital Photogrammetrical Techniques pdf study tips 0 240 28-06-2013, 02:47 PM
Last Post: study tips
  Digital Video Technology Report study tips 0 317 18-06-2013, 01:02 PM
Last Post: study tips
  FULL REPORT ON DIGITAL IMAGE PROCESSING study tips 0 380 13-06-2013, 02:32 PM
Last Post: study tips
  Colour-Decoupled Photo Response Non-Uniformity for Digital Image Forensics pdf study tips 0 379 04-06-2013, 12:47 PM
Last Post: study tips