1 / 9

Computer Forensics

Computer Forensics. Presented by: Monika Kamburova Eric Flores Ifat Aharoni. Computer Forensics. What is Computer Forensics? What is the importance of Computer Forensics? What do Computer Forensics specialists do? Applications of computer forensics. What is Computer Forensics?.

mattox
Download Presentation

Computer Forensics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Forensics Presented by: Monika Kamburova Eric Flores Ifat Aharoni

  2. Computer Forensics • What is Computer Forensics? • What is the importance of Computer Forensics? • What do Computer Forensics specialists do? • Applications of computer forensics

  3. What is Computer Forensics? • Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer specialists can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information. Any or all of this information may help during discovery, depositions, or actual litigation.

  4. Cracking web sites Gain information such as: bank account numbers, credit card numbers Trade secrets for financial gain Trade top secret information such as: military info Hidden information The Underworld: Drug distribution A prostitution ring Illegal gambling using computer software Computer Related Crimes

  5. Hidden information discovery • There are many possibilities of where the hidden information of a hard drive can be retrieved. One of these locations are: Hidden log files and Deleted files

  6. Percentage of businesses who suffered from computer crimes

  7. What do Computer Forensics specialists do? • Identify sources of documentary or other digital evidence • Preserve the evidence • Analyze the evidence • Present the findings • The electronic evidence is the information and data of investigative value that is stored on or transmitted by an electronic device

  8. Applications of computer forensics: • Terrorism • Child pornography • Crimes of violence • The Theft or Destruction to Intellectual Property • Internet crime • Fraud • Corruption

  9. RESOURCES • www.chicagorefl.org • www.answers.com/topic/computr-forensics?method=22 • http://news.com.com/Computer+crime+costs+67+billion,+FBI+says/2100-7349_3-6028946.html

More Related