0% found this document useful (0 votes)
20 views

Computer Forensics: Ramisa Tabassum Chowdhury

Computer forensics is the process of identifying, preserving, analyzing, and presenting digital evidence in a suitable manner for use in a court of law. Evidence can be collected through analysis of structured crime-related data, acquiring forensic images from computer media, and reporting to provide verified data. It has advantages like analyzing evidence, tracking hackers, and modifying data, but also disadvantages such as high maintenance, human error, and potential for dishonest analysts. Cybercrimes include hacking, online theft, phishing, and online bullying, and can be prevented through protection methods.

Uploaded by

Ramisa Tabassum
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

Computer Forensics: Ramisa Tabassum Chowdhury

Computer forensics is the process of identifying, preserving, analyzing, and presenting digital evidence in a suitable manner for use in a court of law. Evidence can be collected through analysis of structured crime-related data, acquiring forensic images from computer media, and reporting to provide verified data. It has advantages like analyzing evidence, tracking hackers, and modifying data, but also disadvantages such as high maintenance, human error, and potential for dishonest analysts. Cybercrimes include hacking, online theft, phishing, and online bullying, and can be prevented through protection methods.

Uploaded by

Ramisa Tabassum
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Computer

Forensics
Ramisa Tabassum Chowdhury

1
What is Computer Forensics?
 It is an application or a process of
identifying, preserving, analyzing, and
presenting the digital evidence in such a
manner that the evidences are suitable for
presenting in a court of law.

2
How do we collect
evidence ?
ANALYS
Evidences can be collected IS
by three ways :

• Analysis- It investigates through EVIDEN


structured data related to crime. CE
• Acquisition- It is a process of making
a forensic image from computer
media. ACQUISI REPORTI
• Reporting- It provides the verification TION NG
of data.

3
ADVANTAGE
S
 Analyses evidence

 Tracks hackers

 Can modify data

4
DISADVANTAG
ES
 High maintenance

 Human error

 Dishonest analysist

5
6
Types of Cybercrimes
o Hacking
o Online theft
o Phishing
o Online bullying

How to prevent it ?
Examples of Protection

7
ULAB 8

You might also like