Introduction to Digital Forensics

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Mohd Taufik Abdullah Department of Computer Science
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Computer Forensics What is Computer Forensics? What is the importance of Computer Forensics? What do Computer Forensics specialists do? Applications of.
What is Computer Forensics? (Some definitions) “ The process of identifying, preserving, analyzing and presenting digital evidence in a manner that is.
Computer Forensics Mr.PRAWEE PROMPONMUANG M.Sc(Forensic Science) NO
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
By Drudeisha Madhub Data Protection Commissioner Date:
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Guide to Computer Forensics and Investigations Third Edition
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
1 Cyber Laws: Uganda UGANDA’S CYBER LAWS Presentation Presentation by by Ambrose Ruyooka, PMP® Ag Commissioner Information Technology Ministry of ICT ISACA.
Guide to Computer Forensics and Investigations, Second Edition
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Computer Forensics Iram Qureshi, Prajakta Lokhande.
The National Cyber Security Strategy and Action Plan A presentation by Ms. Antoinette Lucas-Andrews Director, International Affairs Ministry.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Cybersecurity Governance in Ethiopia
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Computer Forensics Principles and Practices
Guide to Computer Forensics and Investigations Fourth Edition Chapter 1 Computer Forensics and Investigations as a Profession.
Lecture 11: Law and Ethics
Laws and Resources. Understanding Case Law  Technology is evolving at an exponential pace  Existing laws and statutes can’t keep up change  Case law.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Deloitte Forensic Forensic Technology Conference of Regulatory Officers - CORO November 2012.
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University September 28, 2007.
Guide to Computer Forensics and Investigations, Second Edition Chapter 1 Computer Forensics and Investigations as a Profession.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
January 2001NETWORK ICE1 Forensics. January 2001NETWORK ICE2 What is Computer Forensics? Acquisition of Computer Evidence Preservation Analysis Court.
Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter Extension 24 Computer Crime and Forensics.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Digital Forensics Market Analysis: By Forensic Tools; By Application (Network Forensics, Mobile Forensics, Database Forensics, Computer Forensics) - Forecast.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
By Saketh Rasakatla (08831A1257) Under the guidance of Prof. Sandeep Singh Rawat.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Law and Ethics INFORMATION SECURITY MANAGEMENT
Lecture 10 Computer and Network Forensics
Application of data mining to computer forensics
Ogletree, Deakins, Nash, Smoak & Stewart PC
Criminal Prosecutors with Computer Forensics
Portfolio Committee on Police DNA National Forensics Oversight and Ethics Board 23 November 2016.
Computer Forensics 1 1.
Reducing Cost and Risk During an Investigation
Introduction to Computer Forensics
Chapter 3: IRS and FTC Data Security Rules
8 Building Blocks of National Cyber Strategies
Introduction to Computer Forensics
Overview of the Budapest Convention on Cybercrime (2001)
Prosecuting International Intellectual Property Crimes
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Neil Kirton and Zoë Newman
Counter Forensic for Computer Forensic By: Lara Amanj Gulan Azad.
NATIONAL AND INTERNATIONAL MEASURES OF CYBERSECURITY
Engineering Secure Software
Portfolio Committee on Police DNA National Forensics Oversight and Ethics Board 23 November 2016.
West Midlands Police response to Cybercrime:
Presentation transcript:

Introduction to Digital Forensics Cyber Security & Anti-Crime Services Ltd

Cyber Security & Anti-Crime Services Ltd Objectives Defining Computer Forensics Reasons for gathering evidence Who uses Computer Forensics Steps of Computer Forensics Handling Evidence Investigation initiation / response Handling Information Cyber Security & Anti-Crime Services Ltd

Trinidad’s Cyber Security Landscape ‘There is no singular organisation or mechanism at the governmental level for the detection, tracking and mitigation of cyber-attacks and cybercrime. Isolated cases are treated on an ad-hoc basis either by the ISPs or computer related departments in the government. Existence of a cybercrime unit within the TTPS. Reliance on ISPs to provide support and knowledge sharing on best practices and security awareness. High need for training of individuals in cyber security Cyber security initiatives are currently in progress and are being co-ordinated by an Inter-Ministerial Committee appointed by Cabinet to develop a coordinated approach to cyber security   ’ Ms. Antoinette Lucas-Andrews Director International Affairs,MNS National ICT Business and Innovation Symposium 2012

THE CABINET-APPOINTED INTERMINISTERIAL COMMITTEE ON CYBER SECURITY (IMC) ABOUT THE IMC: Mandate To develop a coordinated National Cyber Security Strategy and Action Plan To facilitate, guide and ensure the enactment of a national Cybercrime Act To facilitate, guide and ensure the implementation of a National Computer Security Incident Response Team (CSIRT) To establish an implementation mechanism that would have legislative authority to develop and enforce cyber security regulations To create a mechanism/framework that ensures that risk/vulnerability assessments of each Ministry’s cyber infrastructure and cyber security plan are conducted regularly Ms. Antoinette Lucas-Andrews Director International Affairs,MNS National ICT Business and Innovation Symposium 2012

Types of Digital Forensics Computer Forensics Network Forensics Live Forensics Mobile Forensics Database Forensics Cyber Security & Anti-Crime Services Ltd

What is Diital Forensics?? Diital forensics involves the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and/or root cause analysis ( Kateeb and Altimus) Cyber Security & Anti-Crime Services Ltd

What Constitutes Digital Evidence? Any information being subject to human intervention or not, that can be extracted from a computer Must be in human-readable format or capable of being interpreted by a person with expertise in the subject Cyber Security & Anti-Crime Services Ltd

Computer Forensics Examples Recovering thousands of deleted emails Performing investigation post employment termination Recovering evidence post formatting hard drive Performing investigation after multiple users had taken over the system Cyber Security & Anti-Crime Services Ltd

Why Computer Forensics Evidence is needed? It is needed in a wide range of computer crimes and misuses Non-Business Environment: evidence collected by the State and local law enforcement authorities for crimes relating to: Theft of trade secrets Fraud Extortion Industrial espionage Position of pornography SPAM investigations Virus/Trojan distribution Homicide investigations Intellectual property breaches Unauthorized use of personal information Forgery Perjury Cyber Security & Anti-Crime Services Ltd

Why Computer Forensics Evidence is needed? continued Computer related crime and violations include a range of activities including: Business Environment: Theft of or destruction of intellectual property Unauthorized activity Tracking internet browsing habits Reconstructing Events Inferring intentions Selling company bandwidth Wrongful dismissal claims Sexual harassment Software Piracy Cyber Security & Anti-Crime Services Ltd

Who Uses Digital Forensics? Private Corporations Obtained evidence from employee computers can be used as evidence in harassment, fraud, and embezzlement cases Criminal Prosecutors Rely on evidence obtained from a computer to prosecute suspects and use as evidence Cyber Security & Anti-Crime Services Ltd

Who Uses Digital Forensics? Law Enforcement Officials Rely on computer forensics to backup search warrants and post-seizure handling Civil Litigations Personal and business data discovered on a computer can be used in fraud, divorce, harassment, or discrimination cases Cyber Security & Anti-Crime Services Ltd

Who Uses Computer Forensics? Insurance Companies Evidence discovered on computer can be used to mollify costs (fraud, worker’s compensation, arson, etc) Law Enforcement Officials Rely on computer forensics to backup search warrants and post-seizure handling Individual/Private Citizens Obtain the services of professional computer forensic specialists to support claims of harassment, abuse, or wrongful termination from employment Cyber Security & Anti-Crime Services Ltd

Computer Forensic process Cyber Security & Anti-Crime Services Ltd

Cyber Security & Anti-Crime Services Ltd

Cyber Security & Anti-Crime Services Ltd

Cyber Security & Anti-Crime Services Ltd

Cyber Security & Anti-Crime Services Ltd

Cyber Security & Anti-Crime Services Ltd Future? Training Experience Cyber Security & Anti-Crime Services Ltd

Cyber Security & Anti-Crime Services Ltd Thank you! Any Questions? Cyber Security & Anti-Crime Services Ltd