Computer Forensics
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Computer Science Clay
Active In SP
**

Posts: 712
Joined: Jan 2009
#1
01-03-2009, 10:03 AM


Computer Forensics

The proliferation of computer use in today's networked society is creating some complex side effects in the application of the age-old greed, jealousy, and revenge. Criminals are becoming much more sophisticated in committing crimes. Computers are being encountered in almost every type of criminal activity. Gangs use computers to clone mobile telephones and to re-encode credit cards. Drug dealers use computers to store their transaction ledgers. Child pornography distributors use the Internet to peddle and trade their wares.

Fraud schemes have been advertised on the Internet. Counterfeiters and forgers use computers to make passable copies of paper currency or counterfeit cashiers checks, and to create realistic looking false identification.In addition, information stored in computers has become the target of criminal activity. Information such as social security and credit card numbers, intellectual property, proprietary information, contract information, classified documents, etc., have been targeted. Further, the threat of malicious destruction of software, employee sabotage, identity theft, blackmail, sexual harassment, and commercial and government espionage is on the rise.

Personnel problems are manifesting themselves in the automated environment with inappropriate or unauthorized use complaints resulting in lawsuits against employers as well as loss of proprietary information costing millions of dollars. All of this has led to an explosion in the number and complexity of computers and computer systems encountered in the course of criminal or internal investigations and the subsequent seizure of computer systems and stored electronic communications.

Computer evidence has become a 'fact of life' for essentially all law enforcement agencies and many are just beginning to explore their options in dealing with this new venue. Almost overnight, personal computers have changed the way the world does business. They have also changed the world's view of evidence because computers are used more and more as tools in the commission of 'traditional' crimes. Evidence relative to embezzlement, theft, extortion and even murder has been discovered on personal computers. This new technology twist in crime patterns has brought computer evidence to the forefront in law enforcement circles
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
syfizz
Active In SP
**

Posts: 4
Joined: Sep 2009
#2
15-09-2009, 03:15 PM

please gv me complete report on the topic COMPUTER FORENSIC and 3D-OPTICAL DATA STORAGE TECHNOLOGY
Reply
computer science crazy
Super Moderator
******

Posts: 3,048
Joined: Dec 2008
#3
15-09-2009, 09:41 PM

Computer forensics is a forensic science pertaining to legal evidence found in computers and digital storage mediums. Computer forensics is also known as digital forensics.computer forensics is to explain the current state of a digital artifact. The term digital artifact can include a computer system, a storage medium (such as a hard disk or CD-ROM),electronic document (e.g. an email message or JPEG image) or even a sequence of packets moving over a computer network. The explanation can be as straightforward as "what information is here?" and as detailed as "what is the sequence of events responsible for the present situation?" computer forensics also has sub branches within it such as firewall forensics, network forensics, database forensics and mobile device forensics.many reasons to employ the techniques of computer forensics:
In legal cases, computer forensic techniques are frequently used to analyze computer systems belonging to defendants (in criminal cases) or litigants (in civil cases).
To recover data in the event of a hardware or software failure.
To analyze a computer system after a break-in, for example, to determine how the attacker gained access and what the attacker did.
To gather evidence against an employee that an organization wishes to terminate.
To gain information about how computer systems work for the purpose of debugging, performance optimization, or reverse-engineering.Special measures should be taken when conducting a forensic investigation if it is desired for the results to be used in a court of law. One of the most important measures is to assure that the evidence has been accurately collected and that there is a clear chain of custody from the scene of the crime to the investigator-and ultimately to the court. In order to comply with the need to maintain the integrity of digital evidence, British examiners comply with the Association of Chief Police Officers (A.C.P.O.) .
These are made up of four principles as follows:-

Principle 1: No action taken by law enforcement agencies or their agents should change data held on a computer or storage media which may subsequently be relied upon in court.

Principle 2: In exceptional circumstances, where a person finds it necessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions.

Principle 3: An audit trail or other record of all processes applied to computer based electronic evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result.

Principle 4: The person in charge of the investigation (the case officer) has overall responsibility for ensuring that the law and these principles are adhered to.


for more about computerforensic read en.wikipediawiki/Computer_forensics
computer-forensicold_site/presentations/ASIS_Presentation.pdf
us-cert.gov/reading_room/forensics.pdf
certarchive/pdf/FRGCF_v1.3.pdf
dns.co.uk/NR/rdonlyres/5ED1542B-6AB5-4CCE-838D-D5F3A4494F46/0/ComputerForensics.pdf
e-evidence.info/thiefs_page.html
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
computer science crazy
Super Moderator
******

Posts: 3,048
Joined: Dec 2008
#4
15-09-2009, 09:55 PM

read topicideashow-to-3D-OPTICAL-DATA-STORAGE-TECHNOLOGY for 3D-OPTICAL-DATA-STORAGE-TECHNOLOGY
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
pruthvikumar.123
Active In SP
**

Posts: 16
Joined: Feb 2010
#5
18-03-2010, 06:52 PM

could u pls send me ppt on the above topic
Reply
seminar-avatar
Active In SP
**

Posts: 549
Joined: Mar 2010
#6
22-03-2010, 08:43 PM

Hi,
The ppt of this topic is available in this thread:
topicideashow-to-Computer-Forensics-Full-Download-Seminar-Report-and-Paper-Presentation
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Computer Memory Based on the Protein Bacteriorhodopsin seminar projects crazy 16 9,052 06-09-2015, 04:54 PM
Last Post: Larbaski
  essay about computer in tamil jaseelati 0 334 26-02-2015, 04:30 PM
Last Post: jaseelati
  seminar topics for computer networking with ppt jaseelati 0 297 18-02-2015, 02:37 PM
Last Post: jaseelati
  assembling and disassembling of computer ppt jaseelati 0 283 17-02-2015, 02:51 PM
Last Post: jaseelati
  computer oriented numerical methods ppt jaseelati 0 252 13-02-2015, 01:15 PM
Last Post: jaseelati
  basic computer knowledge pdf in marathi jaseelati 0 319 11-02-2015, 01:21 PM
Last Post: jaseelati
  basic computer knowledge pdf in marathi jaseelati 0 269 07-02-2015, 02:23 PM
Last Post: jaseelati
  advantages and disadvantages of computer in tamil language jaseelati 0 395 05-02-2015, 04:51 PM
Last Post: jaseelati
  computer science project topics and materials pdf jaseelati 0 330 05-02-2015, 01:23 PM
Last Post: jaseelati
  computer forencis jaseelati 0 238 22-01-2015, 01:41 PM
Last Post: jaseelati