Technology for Computer Forensics by Alicia Castro.

Slides:



Advertisements
Similar presentations
1 Computer Forensics Michael Watson Director of Security Incident Management NSAA Conference 10/2/
Advertisements

1 SANS Technology Institute - Candidate for Master of Science Degree 1 Assessing Privacy Risks of Flash Cookies Kevin Fuller and Stacy Jordan February.
Complex Recovery/ Data Reduction DFRWS Technical Issues Lots of info to be recovered in in deleted file space Partial data recovery: does this give.
OC RIMS Cyber Safety & Security Incident Response.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Internet Artifacts Dr. John Abraham Professor UTPA.
Computer Forensics and Digital Investigation – a brief introduction Ulf Larson/Erland Jonsson.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
Recovering and Examining Computer Forensic Evidence Noblett, Pollit, & Presley Forensic Science Communications October 2000 (Cited by 13 according to Google.
What is meant by computer forensics?  Principle, Function of computer forensics.  History about computer forensics.  Needs of computer forensics.
Advance evidence collection and analysis of web browser activity by Junhoon Oh David Rivera 11/7/2013 Digital Forensics.
11 CONFIGURE INTERNET EXPLORER Chapter 5. Chapter 5: Configure Internet Explorer2 CHAPTER OVERVIEW AND OBJECTIVES  Configuring Accessibility and Language.
Capturing Computer Evidence Extracting Information.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Jared Cinque Section 6.  Internet tracking is the process of following internet activity backwards from recipient to user through a special type of software.
Forensic analysis of Windows hosts using UNIX-based tools Source : Digital Investigation (2004) 1, Writer : Cory Altheide Reporter : Yao Professor.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
Extended Learning Module I
“Breach of Privacy” nPresented by Sumit Yadav. Computer Science and Engineering Computer security Aspects nPrivacy (confidentiality ) n integrity n availability.
Forensics Investigation of Peer-to- Peer File Sharing Networks Authors: Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine & Clay Shields.
Computer Forensics Iram Qureshi, Prajakta Lokhande.
Investigating Cybercrime DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
Dr Richard Overill Department of Informatics King’s College London Cyber Sleuthing or the Art of the Digital Detective.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
Computer Forensics Principles and Practices
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
Computer Forensics specialist By Andrew Shore Davis Sanders.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
Investigation of a USB Storage Device (FAT16)
Technology in Computer Forensics  Alicia Castro  Thesis Defense  Master of Software Engineering  Department of Computer Science  University of Colorado,
Regulating Employee Use of Social Media Health Directors Legal Conference April 26, 2012 Diane M. Juffras School of Government UNC- Chapel Hill.
Deloitte Forensic Forensic Technology Conference of Regulatory Officers - CORO November 2012.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
1 CREATING A RESEARCH PAPER (25 June 2010) Objectives: To create a Research Paper using MLA Documentation style.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
1 Computer Forensics Dr. Randy M. Kaplan. 2 Browser Forensics.
& SELECTED TOPICS: DIGITAL FORENSICS Xinwen Fu, UMass Lowell, USA Center for Cyber Forensics, UMass Lowell.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Cybercrime What is it, what does it cost, & how is it regulated?
CJ 317 – Computer Forensics
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein FORENSIC SCIENCE AND.
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA Search.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter Extension 24 Computer Crime and Forensics.
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Build Technology Into Tutoring Importance of Computer Literacy Help students get a better job Parents will be able to teach their children Learning Tool.
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Investigations 2016 First semester [ 12 week ]-Forensic Analysis of the Windows 7 Registry.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Legal Implications.
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Computer Forensics 1 1.
ICT meeting Business needs
Extract and Correlate Evidences in Computer Forensics
Extract and Correlate Evidences in Computer Forensics
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
Extract and Correlate Evidences in Computer Forensics
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Threats to Privacy in the Forensic Analysis of Database Systems
Presentation transcript:

Technology for Computer Forensics by Alicia Castro

Introduction The objective of Computer forensics is to find legal evidence in computers and digital storage mediums. The goal of computer forensics is to explain the current state of a digital artifact. There are many reasons to employ the techniques of computer forensics like legal cases, data recovery, gathering evidence against an employee, debugging, performance optimization, or reverse-engineering Computer scientists can take steps to move computer forensics into a more rigorous position as a science by being able to make well-reasoned and concrete claims about the accuracy and validity of conclusions presented in court

Computer Forensics Areas of Law These are the areas of law related to computer security that are important to know about. Anyone concerned with computer forensics must know how these laws affect them: Fourth Amendment of the US Constitution. Wiretap Act (18 U.S.C ) Pen Registers and Trap and Trace Devices Statute (18 U.S.C ) Stored Wired and Electronic Communications Act (18 U.S.C )

Study of cases Devices subject to Forensic examination Digital storage Study of cases that have been prosecuted using computer forensics. Forensic examination of erased or deleted files, slack spaces and steganography Types of evidence

Forensic Tool Galleta is an Internet Explorer Cookie Forensic Analysis Tool that may be used to recover critical electronic evidence that is often found in the suspect's web browsing history in the form of received s, sites visited and attempted Internet searches. Galleta will parse the information in a cookie file Why Galleta? A lot of child pornography cases involves web browsing, so improving this tool can be beneficial to the law enforcement agencies

Testing Galleta

Galleta Output

Galleta Limitations - With Galleta you can only parse one cookie at a time and this only creates one parsed export file per cookie. GUI - No user friendly

Galleta Proposed Improvements With the new Galleta you can tell it a cookie directory and it will parse all cookies in the directory and include them all in one file or one file per cookie date. Allow user to enter parameters for search Expand it to work with other browsers GUI – User friendly