28-06-2012, 05:50 PM
SEMINAR ON CYBER FORENSICS
CYBER FORENSICS.pptx (Size: 945.4 KB / Downloads: 41)
ABSTRACT
We cover the concepts of Forensic Science.
Some of the latest Forensic Tools are explained.
Another Highlight is the IDS.Intrusion Detection System (IDS) is now considered as standard requirement in building network security infrastructure.
Light has been thrown on IPS.
INTRODUCTION
“Cyber Forensics is the process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally acceptable.”(Rodney Mckemmish 1999).
The field began in the United States, in large part, when law enforcement and military investigators started seeing criminals get technical.
Michael Anderson was a “Father of computer forensics” .
ACQUISITION
Digital evidence can be collected from many sources. Obvious sources include computers, cell phones, digital cameras, hard drives, CD-ROM, USB memory devices, and so on.
Special care must be taken when handling computer evidence.
The process of creating an exact sector level duplicate of the media via write blocking device is called “acquisition”.
Tools: DCFLddIximager
REPORTING
Once the analysis is complete, a report is generated. This report may be a written report, oral testimony, or some combination of the two.
Completion of investigation leads to reporting of information in the form suitable for non-technical individuals.
Completed reports are passed to investigation commissions.