FAQs

Is forensic sciences all about medico-legal case investigations?
Forensic sciences in common parlance may be defined as application of science to the court of law.
It deals with analysis and examination of physical evidence recovered from the scene of crime. The input, thus provided by the forensic scientists is incorporated by the investigating officer (I O) in preparation of the case for presentation in the court. A forensic scientist may, if required, visit the crime scene to look for trace of evidence.

 

Who should go for forensic sciences?
Any science graduate can do forensic sciences at PG level. However, for UG course in forensic science one requires science at plus two level as well.
In three-year degree course the students are provided detailed knowledge on all the aspects of forensic science as compared to the diploma courses.
The subject matter is divided into six semesters in all and in each semester they have theory as well as practical work to do in much detail. Besides, a student of BSc Hons also studies two subsidiary subjects like chemistry/physics/ maths/biology.

At the postgraduation level the course content is much advanced as compared to the one offered at the graduation level. The subject matter is divided into four semesters where they have examination at the end of each semester.

What are the different specialisations within forensic sciences?
Following are the different specialisations within forensic sciences:
. Physics and instrumentation
. Chemistry and toxicology
. Biology including molecular biology
. Anthropology
. Serology
. Forensic medicine
. Ballistics and explosives
. Questioned documents
. Fingerprints
. Photography
. Polygraphy
. Narco analysis
. Brain fingerprinting
. Cyber forensic
. Voice identification

 

Is any new branch emerging within forensic sciences?
Yes, forensic sciences is a non- static science and it keeps on adding new dimensions form time to time.
For example, ear biometrics is a new addition in the already existing branches of forensic sciences. Prior to this identification through iris, bite marks, speaker’s voice identification, narco analysis, brain fingerprinting, DNA profiling were frequently used in the process of identification.

 

What are the latest trends in this field?
.
 DNA profiling is an extremely useful technique to identify individuals. It is applicable in establishing identity in case of mass disaster victims. It is also important in
solving cases of disputed paternity.
. Cyber Forensics: Collects, processes, preserves, analyzes, and presents computer-related evidence in support of network vulnerability mitigation and/or criminal, fraud, counterintelligence, or law enforcement investigations.
. Voice identification is another aspect of forensic sciences, which is useful in identification of speaker.
. Polygraphy, narco analysis and brain fingerprinting are other techniques that are being employed by the forensic scientists in cases that are very high profile.
. Ear biometrics is yet another technique which is used by forensic scientists for the purpose of identification.

 

How is Cyber Forensics different from Data Recovery?

 

Data recovery seeks to restore the missing data so the user can access and use that data again. Cyber forensics seeks to determine and uncover the evidence that verifies or denies a suspicion about a series of events or activities. Recovering deleted files is a large part of cyber forensics but the purpose for restoring that deleted or lost data is completely different from simple data recovery.

 

Can evidence be extracted from PDAS and cell phones?

 

Yes, evidence can be extracted from desktop hard drives, personal computers ( laptops ), PDAs, cell phones, Tapes, DVDs, CDs, digital cameras, and other electronic devices.

 

If digital evidence is present, whom should be called first IT person or a computer forensic examiner?

Companies that fall victim to claim or to a computer crime may be inadvertently destroying evidence in their efforts to find the perpetrators. You only have one opportunity to collect the evidence you need to prove your case.

Human resource departments often send in well-meaning IT staff that do not know what they are doing, and who inadvertently ruin the evidence. Although the internal IT staff is often highly knowledgeable regarding their working environment and the technology employed within, computer forensic investigations are best performed by outside certified experts. Due to the nature of the forensic analysis process coupled with the requirements in preserving evidence and chain-of-custody requirements, the court system requires that investigations are performed by certified professionals. What we frequently see is IT experts going in and doing what you see on every bad crime film: they muddy the waters. Therefore, it is a wise business decision to consult a professional certified computer forensic team as soon as possible.

Additionally, using in-house personnel can raise issues related to authentication that can increase the cost of admitting evidence. In-house personnel may be put through challenges that could threaten the admissibility of critical evidence. If there is a remote chance that the matter could end up in court, best practices strongly suggest having the data analyzed by a computer forensic expert. The cost of expert analysis will almost always be far less than the cost of defeating a challenge to the admission of critical evidence.

Professional, third party companies like Integrated Security Service – Data Forensics are experienced in this type of work. Our involvement in the matter is neutral and unbiased and evidence is collected in a scientific manner. Evidence obtained and submitted by certified professionals is likely to carry much more weight in front of opposing counsel, corporate management, a jury or any other party.

Are there any risks if a computer forensics expert is not consulted at initial stage of the problem?
The most frustrating aspect of forensic analysis is that the operating system randomly overwrites data on the hard drive. This means the longer a computer is used, the more likely it becomes that evidence will be lost. Fortunately, the operating system frequently records evidence in several places simultaneously. So, if the data is overwritten in one area, it may still reside in another. It is impossible to tell, however, whether the data most important to you will survive the constant use of the computer. In fact, the simple act of turning the computer on or looking through files can potentially damage the very data you’re looking for. The dates that files were created can be changed, files can be overwritten and evidence can be corrupted. The safest practice is to acquire an image of the computer as soon as possible; however, in the hands of a skilled forensics examiner, it may still be possible to find relevant data even after years of use.

 

What is CHFI certification?

Achieving the CHFI – Computer Hacking Forensic Investigator certification validates that you have the knowledge and skills to detect hacking attacks, to properly obtain evidence needed to report the crime and prosecute the cybercriminal, and to conduct an analysis that enables you to prevent future attacks.

 

What is the Eligibility Criteria for CHFI Certification?

Option 1: If you attend Official Training at an accredited Training Center, you can attempt the Certification exam without going through application process.

Option 2: If you have not attended any Official Training, your application must first be approved via the eligibility application process.

 

What is the format of CHFI Certification exam, duration, what types of questions, passing criteria, number of attempts allowed?

CFHI Exam duration is 4 hours. You have to answer 150 multiple choice questions.

EC Councils exams are provided in multiple forms (I.e. different question banks). The Questions not only test the academic knowledge but also the real-world applicability. The passing scores “cut off” are determined on ” per exam form basis”. Usually the passing scores range between 60% to 78%.

If you do not pass the exam on the first attempt, you can attempt 1st retake immediately without any cooling period. Thereafter you will have to allow a cooling period of 14 days between each attempt. You cannot appear for an exam more than 5 times in a year.

What is “Computer Forensics”?

What types of digital media devices can potentially hold data?

What are the common situations in which Computer Forensics is used?

What can a Computer Forensic examination provide?

Can deleted emails be recovered?

If someone uses a webmail account like Gmail, Yahoo or Hotmail, is it possible to find that email?

Can deleted files be recovered?

Can password protected files be accessed?

What is does the term “metadata” mean?

I think that a computer in my company may contain important evidence. What do I do?

I think that a cellphone in my company may contain important evidence. How should I handle it?

What are the cons to NOT calling a Computer Forensic expert immediately?

We have no plans to take anyone to court and merely want to make sure that an employee is not violating our company policy. Can’t we just have our in-house IT staff take a look?

What if we have already utilized our in-house IT staff and the recovery didn’t go as planned —can you still assist us?

How does Computer Forensics differ from data recovery?

What types of data do you focus on in your investigations?

How does the Certified Computer Forensic Investigators’ recovery process work?

What do I receive after a computer investigation?

What does a computer forensic examination cost?

 

 

 

 

 

 

 

 

 

Call Now
Open chat
Powered by