LakewSemilar
LakewSemilar
First and foremost, we wish to thank our mentors and Advisor MR,Firomsa Kebede
whose guidance and insights have been invaluable in shaping the content and
direction of this seminar. Your expertise has provided the foundational knowledge
necessary for this exploration of computer forensic
I
1. Introduction to Computer Forensics
in the early 1980s, personal computers be came more accessible to consumers, leading
to their increased use in criminal activity (for example, to help commit fraud). At the
same time, several new "computer crimes" were recognized (such as cracking). The
discipline of computer forensics emerged during this time as a method to recover and
investigate digital evidence for use in court. Since then, computer crime and
computer-related crime has grown, with the FBI reporting a suspected 791,790
internet crimes in 2020, a 69% increase over the amount reported in 2019.Today,
computer forensics is used to investigate a wide variety of crimes, including child
pornography, fraud, espionage, cyberstalking, murder, and rape. The discipline also
features in civil proceedings as a form of information gathering (e.g., Electronic
discovery).
Computer forensics (also known as computer forensic science) is a branch of digital
forensic science pertaining to evidence found in computers and digital storage media.
The goal of computer forensics is to examine digital media in a forensically sound
manner with the aim of identifying, preserving, recovering, analyzing, and presenting
facts and opinions about the digital information..This seminar will explore the
evolution of computer forensics, its methodologies, technological advancements, and
its significance in modern cybersecurity and criminal investigation.
2. Background
The development of forensic science goes back centuries, and possibly millennia. The
first records are of specific, isolated cases. The examination of Julius Caesar's body
was one, but there was also the use of fingerprints to catch a debtor in 7th-century
China, and many other examples. The field of computer forensics has evolved
significantly since its emergence in the 1980s. Initially, forensic investigators relied
on simple file recovery techniques. As cybercrimes became more sophisticated,
forensic methodologies advanced, incorporating complex digital analysis techniques.
2
2.1 Scope of Computer Forensics
Disk Forensics:
Examines storage devices like hard drives, SSDs, and USB drives.
Network Forensics:
Uses tools like Wireshark and Snort to capture and analyze network packets.
Cloud Forensics:
Investigates data stored on cloud platforms such as Google Drive, AWS, and
Microsoft Azure.
Mobile Forensics:
Recovers and analyzes data from smartphones, tablets, and wearable devices.
Malware Forensics:
Identifies, analyzes, and traces the origins of malicious software like viruses,
ransomware, and spyware.
Email Forensics:
3
Examines email communications for fraud, phishing, and cyber threats.
Memory Forensics:
Internet Forensics:
Investigates online activities, including browsing history, social media interactions, and digital
transactions
3. Motivation
Computer forensics is motivated by the need to uncover digital evidence that can be
used in legal proceedings. It's a vital tool for solving crimes and ensuring digital
security.
Legal proceedings
4
Computer forensics is used in criminal investigations, civil litigation, and internal
corporate investigations.
Digital security
Computer forensics helps ensure digital security by identifying and removing
malicious activities.
Solving crimes
Computer forensics helps solve crimes by identifying and analyzing digital
evidence.
Goal
5
Documentation: Recording findings in a clear, structured format.
Presentation: Presenting evidence in court or investigative reports.
Advantages:
✔ Aids law enforcement in solving cybercrimes.
✔ Helps businesses prevent fraud and data breaches.
✔ Ensures data integrity and security compliance.
Disadvantages:
✖ Time-consuming and resource-intensive.
✖ Encryption and anti-forensic techniques make investigations difficult.
✖ Legal challenges related to jurisdiction and privacy laws.
6
7