tools and techniques that frustrate forensic tools, investigations,
and investigators
ANTI FORENSICS
a model that enables customers to be in control of their
computing resource needs and add computing resources as they
wish through a highly automated and responsive set of processes.
CLOUD COMPUTING
any device capable of performing logical, arithmetic, routing, or
storage facility, or equipment or communications facility or
equipment directly to or operating in conjunction with such
device
COMPUTER
-
any representation of facts, information, or concepts in
a local computer system or online
COMPUTER DATA
refers to any device or group of interconnected or related devices, one or more of which, pursuant to a
program, performs automated processing data
COMPUTER SYSTEM
application of scientific principles to the process of discovering information from a digital device
DIGITAL FORENSICS
stores and provides relatively quick access to large amounts of data on an electromagnetically charged surface
HARD DISK/ DISK DRIVE/HARD DRIVE/HARD DISK DRIVE
physical components of a computer
HARDWARE
involves the application of scientific principles to the process of discovering information from mobile devices which include cell phones, smartphones, and table devices.
MOBILE FORENSICS
involves capturing, recording, and analysis of network events to discover source of security attack
NETWORK FORENSICS
a set of instructions compiled into a program that performs a particular task
SOFTWARE
criminal act committed via computer
Computer Crime
criminal activities in which a
computer was peripherally/incidentally involved
Computer Related Crime
a criminal activity which has been committed through, or facilitated by the Internet.
Cybercrime
any criminal activity which involves the
unauthorized access, dissemination, manipulation, destruction, or corruption of electronically stored data
Digital Crime
application of investigation and analysis techniques to gather
and preserve evidence from a particular computing device in a
way that is suitable for presentation in a court of law
COMPUTER FORENSICS
Computer Forensic is concerns in the process of
a. obtaining
b. processing and analyzing
c. storing digital information
for criminal, civil and administrative cases
USES OF COMPUTER FORENSICS IN LAW ENFORCEMENT
COMPUTER FORENSICS ASSISTANCE TO HUMAN RESOURCES /
EMPLOYMENT PROCEEDINGS
employer safeguard program
COMPUTER FORENSICS SERVICES
data duplication/preservation
a. the data must not be altered in any way
b. the seizure must not put an undue burden on the
responding party
Computer evidence service options
a. Standard service
b. On site service
c. Emergency service
d. Priority service
e. Weekend service
Other miscellaneous services
BENEFITS OF PROFESSIONAL
FORENSIC METHODOLOGY