You are on page 1of 1

1.

There is no cybercrime without digital evidence


2. Before we perform digital evidence, we must learn how machines work
3. How computers process information
4. Binary number system
5. Hash value
6. Check sum
7. Hash algorithm
8. Avalance effect – small change, massive effect into output
9. Computers are extension of ourselves
10. The computer is the crime scene
11. We need a cyber-crime warrant in searching the computer
12. We conduct imaging copy on the copy not the original
13. Sector by sector copy
14. MAC operating system
15. 60 days to finish the examination.
16. Specific and relevant files as evidence
17. Live digital forensics – on site: in the act of doing the criminal activity
18. Post mortem digital forensic – offsite:
19. Dead computer
20. Temporary files no longer in the computer when you transfer
21. Expert: when was the picture taken, device use in capturing, the platform used
22. Existence and integrity of digital evidence
23. Deep fakes
24. Uniform resource locator (FB)
25. Cellebritell,
26. Do you know that it is easy to hack the username and password of facebook
www.truecaller.com
27. There are only 6 cyber crime offenses (Section 4-A
a.
b.
c.
d.
e.
28.

You might also like