Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley.

Slides:



Advertisements
Similar presentations
Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
Advertisements

2 Language of Computer Crime Investigation
Breaking Trust On The Internet
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Forensic and Investigative Accounting
Chapter 10 Privacy and Security McGraw-Hill
Securing Your Networks Personal Safety Rules Apply Here Too. Corporate Identity Theft SPAM.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
What is meant by computer forensics?  Principle, Function of computer forensics.  History about computer forensics.  Needs of computer forensics.
Computer Forensics Mr.PRAWEE PROMPONMUANG M.Sc(Forensic Science) NO
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Discovering Computers 2010
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
Issues Raised by ICT.
Guide to Computer Forensics and Investigations, Second Edition
Securing Information Systems
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
CYBER CRIME.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
University Health Care Computer Systems Fellows, Residents, & Interns.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 1 1 Browser Basics Introduction to the Web and Web Browser Software Tutorial.
Computer Forensics Principles and Practices
1 Protecting Consumers from Themselves Presented by the State Information Security Office & the California Office of Privacy Protection September 13, 2007.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Dangerous Documents. Legal Compliances State and federal laws Contractual obligations Subject to an affirmative legal duty to establish and maintain certain.
1 IT Investigative Tools Tools and Services for the Forensic Auditor.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
Deloitte Forensic Forensic Technology Conference of Regulatory Officers - CORO November 2012.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
January 2001NETWORK ICE1 Forensics. January 2001NETWORK ICE2 What is Computer Forensics? Acquisition of Computer Evidence Preservation Analysis Court.
SMARTPHONE FORENSICS 101 General Overview of Smartphone Investigations.
Cybercrime What is it, what does it cost, & how is it regulated?
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter Extension 24 Computer Crime and Forensics.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
By: Jeremy Henry. Road Map  What is a cybercrime?  Statistics.  Tools used by an investigator.  Techniques and procedures used.  Specific case.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Cell Phone Forensics Investigator - ICFECI
Security Issues & Ethics in Education By Maud Mushayamunda.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Computer Forensics 1 1.
Introduction to Computer Forensics
User access levels, Passwords, Encryption, Cipher, Key
Computers: Tools for an Information Age
Introduction to Digital Forensics
Introduction to Digital Forensics
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley

Computer Forensics Overview An overview on Cybercrime

What is Computer Forensics? Computer Forensics is the discovery, collection, and analysis of evidence found on computers and networks.  Also called: Digital forensics Network forensics Cyber forensics

Broad Examples Computer Forensics is helpful in the process of solving crimes. Examples Include but are not limited to: Theft Fraud CyberExtortion SPAM Investigations Tracking Virus Predators

Specific Examples An Employee in question for misusing the provided internet usage for illegal activity A Hard disk found in a high threat zone such as an assassin's home. In a security office, an unidentified log-in has been used several times to view unauthorized information.

What To Look For s Pictures Internet History Internet chat logs Spreadsheets Financial data PDF Files Documents And many more!

How To Obtain The Info Find trashed materials Recover passwords Find hidden files and folders Locate deleted s Re-construct scattered documents Decode encrypted messages

Qualities of a Computer Forensics Expert Knowledge of the law Technical experience with many types of hardware and software products Good communication skills Willingness to learn Good problem solver

Forensic Software Forensic ToolKit The Norton Utilities for Windows/DOS Encryption Linux Boot Disk SafeBack created by N.T.I. Encase Quick View Plus

Uses Recovering lost s Locating lost documents and files To assist law enforcement in investigating crimes To apply BioMetrics to crime scenes Within corporations in order to monitor employee activity

PRO’S Evidence found is not subject to time such as paper documents decaying over a long period of time. It accomplishes only that which computer technology can assist with. Use of passwords and logins make it easy to keep the evidence from just anyone’s eyes.

Cons Computer Evidence can be easily erased if mishandled It is difficult to conform Computer Forensics to the common law because of the implied power of citizen privacy. Asset Recovery Defamation Must be sure evidence is collected in a legally sound manner.

Cases that used computer forensics Michael Jackson trial  Law enforcement used computer forensics to track down Jackson’s previous messages and his internet history. BTK Killer  Computer forensics helped to locate the location of the BTK killer by tracing a letter he wrote to a particular computer.

Interesting Facts! In 2005 businesses produced approximately 18 Trillion electronic documents. (This number is over ten trillion higher than the amount of paper documents used in the same year.) Computer Forensics of the future includes the use of “brain fingerprinting” which records brain activity in response to stimulants such as words or pictures.

Interesting Fact (Cont) Encryption is used within computer forensics to protect information from unauthorized users. The Caesar Cipher is one example of an encryption code and this particular code shifts every letter of the alphabet three spaces to the right. Example:  B pbee tmmtvd tm fbwgbzam Will be translated to: “I will attack at midnight” using this Caesar Cipher code

Fraud From FaceBook Click here to view video

Are There Any Questions?!

Works Cited Computer Forensic Services, LLC Daniel, Larry. Digital Forensics Daniel, Larry. Digital Forensics