image29

CYBERSECURITY COMPUTER FORENSICS

  • Computers may constitute a ‘scene of a crime’, for example with hacking  or denial of service attacks or they may hold evidence in the form of emails, internet history or, documents er files relevant to computer crimes.
  • A computer forensic examination may reveal when a document first appeared on a computer, when it was last edited, when it was last saved or printed and which user carried out these actions.
  • More recently, commercial organizations have used computer forensics to their benefit in a variety of cases


  • What are the various types of forensics?
  • • Database Forensics
  • • Website Forensics
  • • Operating System Forensics
  • • Network Forensics
  • • Cloud Forensics
  • • Malware Forensics
  • • Email Forensics
  • • Mobile Device Forensics
  • • Computer Forensics
  • • Social Media Forensics

Certified Forensic Investigators

Cyber Crime Forensics

image30

  • Cyber crime is any unlawful act committed through the internet. Criminals can use hacks and codes to break into laptops, personal computers, corporate servers, and wireless devices. They can steal anything from intellectual property from corporations to personal information from individuals.


Computer Forensics

image31

  • Unexpected software installs on your computer
  • Your mouse moves by itself and actually shows purpose
  • Your antimalware software, task manager, or registry editor is disabled
  • Standard programs or files won’t open or function properly
  • Files you haven’t touched have been deleted or moved
  • Your passwords have been changed without your consent
  • Money is missing from your bank account or you get bill or calls about purchases you haven’t mad

Cellular Forensics

image32

  • Your battery is dying faster than usual and takes longer to charge
  • Your phone is constantly warm when not charging or playing games
  • Strange noises or echoing occurs during phone calls
  • Your data usage skyrocket