CJ 317 – Computer Forensics

Slides:



Advertisements
Similar presentations
TIME = MONEY. Save money by processing case paperwork… In a fraction of the time!
Advertisements

Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
The next generation in digital forensics Mobile Phones A New Frontier in Digital Forensics BK Forensics.
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
BACS 371 Computer Forensics
Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.
Guide to Computer Forensics and Investigations Fourth Edition
COS413 Capstone – EnCase Software Review Nathan Perkins.
Guide to Computer Forensics and Investigations Third Edition
Technology for Computer Forensics by Alicia Castro.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COEN 252 Computer Forensics
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
Chapter 4 Application Software: Programs that Let You Work and Play
Unit 5 Spreadsheets 5.10 Formatting & Printing. Introduction Now that you have completed the tasks associated with creating spreadsheets, formulas, functions,
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations Fourth Edition
Licitware a forensic software tool designed to investigate computer crimes.
Digital Forensics
Preserving Evidence ● Number one priority ● Must also find incriminating evidence ● Must search the contents of the hard drive ● Can not change the hard.
Digital Crime Scene Investigative Process
Undergraduate Technology Programs John Baker Johns Hopkins University Carey Business School
FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Unit 4: Guide to Computer Forensics and Investigations CJ 317.
Unit 8 – & Cell Phones Dr. Joe Ciccone – CJ 317
Computer Forensics Principles and Practices
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University.
CJ 266 Deviance and Violence Seminar 8. SEMINAR OVERVIEW Welcome Final Assignment Guidelines Managing Serial Murder Cases Forensics Profiling—Benefits.
CJ 266 Deviance and Violence Seminar 8. SEMINAR OVERVIEW Welcome Final Essay Guidelines Managing Serial Murder Cases Forensics Profiling—Benefits and.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
Guide to Computer Forensics and Investigations Fourth Edition
Ohana Software’s PAF INSIGHT Part 1 By Tina Abplanalp
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Computer Forensics CJ 317 Dr. Joe Ciccone – Week 6 RIP – Dep
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
CJ386-Unit 7 Review A questioned document is any material that contains marks, symbols or signs conveying a meaning or message and whose source or authenticity.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
UNIT 6: SECURITY MEASURES IN WORD PROCESSORS. Functions of Word Processing Software Preparing written forms of communications for clients, other lawyers,
CJ317: Computer Forensics
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
IT IS ALL ABOUT THE CRIME Unit 7 – Recovering files & Network Forensics CJ Dr. Joe Ciccone.
Making a great Project 2 OCR 1994/2360. Implementation This is about how you make your system. It should have enough detail for a competent user to be.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
CEG 2400 FALL 2012 Windows Servers Network Operating Systems.
Presentation subhead CJ316 Investigating Cyber Crime Unit 9 Seminar Brandon Gregg.
Chapter 3 Data Acquisition Guide to Computer Forensics and Investigations Fifth Edition All slides copyright Cengage Learning with additional info from.
By: Jeremy Henry. Road Map  What is a cybercrime?  Statistics.  Tools used by an investigator.  Techniques and procedures used.  Specific case.
Digital Forensics Market Analysis: By Forensic Tools; By Application (Network Forensics, Mobile Forensics, Database Forensics, Computer Forensics) - Forecast.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
ITMT Windows 7 Configuration Chapter 4 – Working with Disks and Devices ITMT 1371 – Windows 7 Configuration 1.
By: Tom Maloney. Overview What is ProDiscover What it can be used for A few quick tools A real example ProDiscover vs. ENCASE ProDiscover IR Applications.
Investigations 2016 First semester [ 12 week ]-Forensic Analysis of the Windows 7 Registry.
Creighton Barrett Dalhousie University Archives
Computer Forensics By: Chris Rozic.
Application Software Chapter 6.
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
Google Drive.
Guide to Computer Forensics and Investigations Fifth Edition
office.com/setup installation and Activation
office.com/setup download,installation and Activation support guide
The Need For Forensic Capabilities In The Commercial Sector
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Forensics Week 2.
Digital Forensics Dr. Bhavani Thuraisingham
Digital Forensics Chris Rozic.
Exam Information CSI5107 Network Security.
1 Guide to Computer Forensics and Investigations Sixth Edition Chapter 3 Data Acquisition.
Presentation transcript:

CJ 317 – Computer Forensics Explore the Past to Know the Future of “DATA” Dr. Joe ciccone

Last Week & This Week Questions and Comments of last week ~ This chapter explains data acquisition. You will learn about digital evidence storage formats and how to determine the best acquisition method. The chapter will address contingency planning for data acquisitions and how to use acquisition tools. Chapter 4 also explains how to validate data acquisitions, reviews various RAID acquisition methods and how to use remote network acquisition tools. Finally, Chapter 4 lists other forensic tools available for data acquisitions.

History of Technological Advances The history of technology and policing can be categorized within four stages. Be sure that when you begin to use ProDiscover that they have enough hard drive space. On the larger drive images, they will need at least 20 GB or more free after they have copied the image to their working drive.

The Second Stage: 1946-1959 The world of digital forensics is changing quickly and it is a relatively new field. As a result, a lot of tools are on the market, some of which are compatible with each other, some are not. It is critical for you as an investigator to verify any tool you use and to validate any image you take of a digital device.

What IT tools did I have here?

Digital Forensics Documentation of what you do is extremely important. You need to note what software you use and what version. In many cases, it may be several years before you go to court. Most of us are not going to remember exactly what we did on each individual case without our notes.

What Does History Tell Us? Technology Facilitated the Reactive Model of Policing. Advances of technology has allowed for a more proactive approach. Criminals Get Smarter and New Crimes Emerge Questionable Homicides Rapist more knowledgeable about physical evidence Computer Crime Technology Enhances Law Enforcement but Law Enforcement misuses Technology. - Taser Again? Who am I?

Project 4-1 Your supervisor has asked you to research current acquisition tool. Using your preferred Internet search engine and the vendors listed in this chapter, prepare a report containing the following information for each tool and stating which tool you would prefer to use: Computer forensics vendor name Acquisition tool name and latest version number Features of the vendor's product With this data collected, prepare a spreadsheet listing the vendors in the rows. For the column headings, list the following features: Raw format Proprietary format AFF format Other proprietary formats the tool can read Compression of image files Remote network acquisition capabilities Method used to validate (MD5, SHA-1, and so on)

Your Questions & Comments What Questions do you have? Suggestions for next weeks Seminar