Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.

Slides:



Advertisements
Similar presentations
Practical Application of Computer Forensics Lisa Outlaw, CISA, CISSP, ITIL Certified.
Advertisements

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
COEN 252 Computer Forensics
Guide to Computer Forensics and Investigations Fourth Edition
Data Collection, Analysis and Preservation Computer Forensics: Data Collection, Analysis and Preservation Kikunda Eric Kajangu, Cher Vue, and John Mottola.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
MSc in Business Information Technology
Guide to Computer Forensics and Investigations, Second Edition
Teaching Computer Forensics Using Student Developed Evidence Files Anna Carlin Cal Poly Pomona.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.
Guide to Computer Forensics and Investigations Fourth Edition
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 5. Agenda Questions? Assignment 2 Redo –Due September 3:35 PM Assignment 3 posted –Due September 3:35 PM Quiz 1 on September.
COS/PSA 413 Lab 4. Agenda Lab 3 write-ups over due –Only got 9 out of 10 Capstone Proposals due TODAY –See guidelines in WebCT –Only got 4 out of 10 so.
Computer Forensics Tools
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
By Drudeisha Madhub Data Protection Commissioner Date:
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
COEN 252 Computer Forensics
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J w/ T. Scocca.
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
SUMMER BRIDGE PROGRAM DR. HWAJUNG LEE DR. ASHLEY PODHRADSKY Computer Forensics.
Guide to Computer Forensics and Investigations Fourth Edition
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
Computer Forensics Iram Qureshi, Prajakta Lokhande.
Digital Crime Scene Investigative Process
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
Computer Forensics Principles and Practices
Chapter 2 Understanding Computer Investigations
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
Computer Forensics An introduction Jessie Dunbar, Jr. Lynn Johnston Andrew Preece Kathy Spaulding September 18, 2007.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
By: Megan Guild and Lauren Moore. Concept Map Mountain Stream Co. OS Active wear Computer Security Their Questions Details Examples Computer Forensics.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
Crime Scene Basics Forensic Science.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
By: Jeremy Henry. Road Map  What is a cybercrime?  Statistics.  Tools used by an investigator.  Techniques and procedures used.  Specific case.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
Digital Forensics Market Analysis: By Forensic Tools; By Application (Network Forensics, Mobile Forensics, Database Forensics, Computer Forensics) - Forecast.
Chapter 8 Forensic Duplication Spring Incident Response & Computer Forensics.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Computer Forensics By: Chris Rozic.
Chapter 7: Investigating Theft Acts
Presented by Steve Abrams, M.S. Charleston, SC / Long Island, NY
Computer Forensics 1 1.
Guide to Computer Forensics and Investigations Fifth Edition
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Digital Forensics Dr. Bhavani Thuraisingham
Digital Forensics Chris Rozic.
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Presentation transcript:

Computer Forensics By Chris Brown

Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures to thoroughly examine a computer system with the use of software and tools.

History of Computer Forensics Dated back 30 years when it first appeared in courts. When computer evidence first appeared in courts, At first, judges treated computer forensics evidence as any other piece of evidence. As technology evolved, it became necessary to distinguish guidelines on the interpretation of computer evidence that simply was different from conventional physical evidence. This interpretation came in the form of the US Federal Rules of Evidence of Computer forensics also gave way to three other important acts

Governmental Acts Economic Espionage Act of 1996 – dealt with trade secret theft Electronic Communications Privacy Act of 1986 – dealt with the interception of electronic communications Computer Security Act of 1987 – dealt with the security of government computer systems

Major Duties of Computer Forensic Experts 1) Identifying sources of digital evidence 2) Preserving this evidence 3) Analyzing this evidence 4) Presenting the findings from analysis

Identifying sources of digital evidence One of the most important time frames in computer forensics is the initial response to a computer related crime and how to identify vital evidence necessary to make a legal case against perpetrator. Different environments of criminal activity mean different approaches to collecting evidence. For example, in a corporate setting, a perpetrators workstation can be located and a imaging of the hard drive and related media can be done while in a criminal situation that requires law enforcement, a search warrant must be obtained before any collection of evidence can be done.

Preserving this evidence Similar to a police investigation, all printouts, notes, disk media, keydrives, MP3 players, security tokens, or other physical evidence or removable storage device are collected for analysis in a lab. Digital photographs of the scene are also taken before any hardware is dealt with. The way in which the hardware is dealt with, and specifically the hard drive is by the use of imaging.

Imaging Imaging is the process of creating an exact duplicate of the original evidence. This duplication can be accomplished by a standalone hard-drive duplicator or a software imaging tool. Examples of such tools include DCFLdd and IXimager. Once the entire hard drive is copied, the original is physically secured in storage to prevent tampering. The actual imaging process is verified through the use of the SHA-1 message digest algorithm (with a program such as sha1sum).

Analyzing the evidence The actual forensic analysis is done through the use of special tools that display information important to investigators. Examples of such tools include:  AccessData’s FTK  Guidance Software’s EnCase  Brian Carrier’s Sleuth Kit In a typical analysis:  A manual review of all materials on media is conducted  Windows registry is reviewed for suspicious activity  Passwords are cracked and discovered  Keyword searches are done for the topic of the crime  A review of extracted s and images is done

Conclusion Computer forensics is a vital part of the computer security process. As more knowledge is obtained about how crimes are committed with the use of computers, more forensic tools can be fine tuned to gather evidence more efficiently and combat the crime wave on technology.

Reference b7MJ:homepage.cs.uri.edu/courses/fall2005/csc 492s2/readings/ComputerForensics.doc+comput er+forensics+history&hl=en&ct=clnk&cd=6&gl=u s&client=firefox-a