Computer Forensics What is Computer Forensics? What is the importance of Computer Forensics? What do Computer Forensics specialists do? Applications of.

Slides:



Advertisements
Similar presentations
2 Language of Computer Crime Investigation
Advertisements

Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
CYBERCRIME – WEEK 1 (Lectures 1, 2) DAVID THAW University of Connecticut School of Law.
Guide to Computer Forensics and Investigations, Second Edition
Computer Forensics and Digital Investigation – a brief introduction Ulf Larson/Erland Jonsson.
Teaching Computer Forensics Using Student Developed Evidence Files Anna Carlin Cal Poly Pomona.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
1 E-Discovery Changes to Federal Rules of Civil Procedure Concerning Discovery of Electronically Stored Information (ESI) Effective Date: 12/01/2006 October,
Technology for Computer Forensics by Alicia Castro.
What is Computer Forensics? (Some definitions) “ The process of identifying, preserving, analyzing and presenting digital evidence in a manner that is.
Computer Forensics Mr.PRAWEE PROMPONMUANG M.Sc(Forensic Science) NO
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
* 07/16/96 The production of ESI continues to present challenges in the discovery process even though specific rules have been drafted, commented on, redrafted.
Prepared and presented by Group 5: 1. NGABOYERA Valens 2. TWAGIRAMUNGU Serge 3. KAYIRANGA Augustin 4. BAYINGANA Aimable 5. SAMVURA Jean de Dieu 6. RUKUNDO.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Computer Forensics Iram Qureshi, Prajakta Lokhande.
Company LOGO Computer Security and Forensics By Kim Cassinelli, Eriko Yamaguce and Stefan Schuebel.
Professional Development: Group 1 Career Topic COMPUTER FORENSICS.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Rewriting the Law in the Digital Age
Computer Forensics Principles and Practices
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University September 28, 2007.
Computer Forensics An introduction Jessie Dunbar, Jr. Lynn Johnston Andrew Preece Kathy Spaulding September 18, 2007.
By: Megan Guild and Lauren Moore. Concept Map Mountain Stream Co. OS Active wear Computer Security Their Questions Details Examples Computer Forensics.
January 2001NETWORK ICE1 Forensics. January 2001NETWORK ICE2 What is Computer Forensics? Acquisition of Computer Evidence Preservation Analysis Court.
Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau
Computer Security Fundamentals by Chuck Easttom Chapter 14 Introduction to Forensics.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
CONTROLLING INFORMATION SYSTEMS
Computer Forensics: A 5 Minute Introduction Santa Clara University Department of Computer Engineering April 2007.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter Extension 24 Computer Crime and Forensics.
COMPUTER FORENSICS By Jason Ford and Anthony Kniffin.
COEN 252: Computer Forensics Hard Drive Evidence.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Computer Forensics Kelsey Bretz. Overview Introduction What happens when a file is deleted Typical Computer Forensic Investigations Who uses Computer.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
By: Jeremy Henry. Road Map  What is a cybercrime?  Statistics.  Tools used by an investigator.  Techniques and procedures used.  Specific case.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Cell Phone Forensics Investigator - ICFECI
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Computer Forensics and Cyber Crimes. Computer Forensics The systematic identification, preservation, extraction, documentation, and analysis of electronic.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Digital Forensics Anthony Lawrence. Overview Digital forensics is a branch of forensics focusing on investigating electronic devises. Important in for.
The information that is stored on business computer and hard drives needs to be securely destroyed and is important part of managing the information security.
Application of data mining to computer forensics
Computer Forensics Ms. Wade.
Computer Security Fundamentals
Criminal Prosecutors with Computer Forensics
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Computer Crime CJ 520 / CJ October 27, 2010.
Computer Forensics 1 1.
Reducing Cost and Risk During an Investigation
Introduction to Computer Forensics
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Introduction to Computer Forensics
COEN 252: Computer Forensics
Presented by Phillip Gavin, Lesly- Ann Robinson and Roberto Ellis
Counter Forensic for Computer Forensic By: Lara Amanj Gulan Azad.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
COEN 252: Computer Forensics
Electronic Discovery Sabrina Jones 4/14/2011.
Introduction to Digital Forensics
Presentation transcript:

Computer Forensics What is Computer Forensics? What is the importance of Computer Forensics? What do Computer Forensics specialists do? Applications of computer forensics

What is Computer Forensics? Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer specialists can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information. Any or all of this information may help during discovery, depositions, or actual litigation.

Computer Related Crimes

Hidden information discovery There are many possibilities of where the hidden information of a hard drive can be retrieved. One of these locations are: Hidden log files and Deleted files

Percentage of businesses who suffered from computer crimes

What do Computer Forensics specialists do? Identify sources of documentary or other digital evidence Preserve the evidence Analyze the evidence Present the findings The electronic evidence is the information and data of investigative value that is stored on or transmitted by an electronic device

Applications of computer forensics: Terrorism Child pornography Crimes of violence The Theft or Destruction to Intellectual Property Internet crime Fraud Corruption

RESOURCES forensics?method=22www.answers.com/topic/computr- forensics?method=22 sts+67+billion,+FBI+says/ _ htmlhttp://news.com.com/Computer+crime+co sts+67+billion,+FBI+says/ _ html