Forensic

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 11

Cryptography

DR. TOMI YULIANTO, ST, M.PD, MCE


Forensic
Computer forensics is the application of investigation
and analysis techniques to gather and preserve
evidence from a particular computing device in a way
that is suitable for presentation in a court of law.
What is the role of cyber forensics?
The purpose of cyber forensics is the forensically-
sound investigation of digital media with the intent to:
identify, preserve, recover, analyze, present facts, and
opinions; concerning the digital information.
What is cyber forensics example?

Cyber forensics helps in collecting important digital


evidence to trace the criminal. Electronic equipment stores
massive amounts of data that a normal person fails to see.
For example: in a smart house, for every word we speak,
actions performed by smart devices, collect huge data which
is crucial in cyber forensics.
What is the difference between cyber
crime and cyber forensic?
Cyber crimes refer to any criminal offence that involves a
computer/network, where the computer is used to either commit the
crime or as the target of the crime, while computer forensics focuses
on finding digital evidence in a computer or any other digital media
after a crime has occurred
What are the 5 principles of digital
forensics?
What are the 7 steps of forensic science?

The Seven S'S of Crime-Scene Investigation


• Securing the Scene.

• Separating the Witnesses.

• Scanning the Scene.

• Seeing the Scene.

• Sketching the Scene.

• Searching for Evidence.

• Securing and Collecting Evidence.


What is the signature of a file?
A file signature is a unique identification number seen at the
beginning of a file. It tells you the file’s type and provides
information about the data it contains. A computer uses it to
determine how to read it or what application to use to open
it. If a user saves the file using the wrong extension, the
computer will return an error saying it can’t be opened.
Where can I find file signature?
Click File > Info > View Signatures. In the list, on a
signature name, click the down-arrow, and then click
Signature Details.
Network forensics
Network forensics is a sub-branch of digital
forensics relating to the monitoring and analysis
of computer network traffic for the purposes of
information gathering, legal evidence, or
intrusion detection.

You might also like