FORZA – Digital Forensics Investigation Framework that Incorporate Legal Issues Eric Ly.

Slides:



Advertisements
Similar presentations
Critical Reading Strategies: Overview of Research Process
Advertisements

HELP Water Law and Policy Dr. Patricia Wouters Director, Water Law and Policy Programme University of Dundee, Scotland Member of HELP Task Force.
Six Blind Men from Indostan Mark M. Pollitt Digital Evidence Professional Services, Inc.
Evidence Collection & Admissibility Computer Forensics BACS 371.
THE COURTROOM WORK GROUP
Fundamentals of Computer Forensics Fundamentals of Computer Forensics by Jim Bates,published Feb 1997, International Journal of Forensic Computing “…This.
BACS 371 Computer Forensics
Gender Difference on Academic Workload and Committed Relationships Mallory Van Lin and Amanda Barnes, Advisor: Susan Wolfgram Research Problem In today's.
Computer Forensics Principles and Practices
E. Wainright Martin Carol V. Brown Daniel W. DeHayes Jeffrey A. Hoffer William C. Perkins MANAGINGINFORMATIONTECHNOLOGY FIFTH EDITION CHAPTER 9 (part a)
Specialised Commercial Crime Unit John Ross House Johnson Lane Durban
Advance evidence collection and analysis of web browser activity by Junhoon Oh David Rivera 11/7/2013 Digital Forensics.
By Drudeisha Madhub Data Protection Commissioner Date:
Private Detective & Investigator Quristain Hand. What Do They Do? (Duties)  Interview people to gather information  Do various types of searches, using.
Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland.
Criminal Investigations. Wayne W. Bennett and Karen M. Hess Wadsworth Publisher CSI.
LITIGATION COSTS IN CIVIL AND ADMINISTRATIVE PROCEEDINGS IN ENVIRONMENTAL MATTERS AND PRINCIPLE OF OBJECTIVE INVESTIGATION MARTA OŠLEJA LEGAL DEPARTMENT,
NATIONAL COMMUNICATIONS COMMISSION REGULATORY PRACTICES WORKSHOP MODULE: 4 INVESTIGATION.
© 2012 Edwards Wildman Palmer LLP & Edwards Wildman Palmer UK LLP Criminal & civil recovery mechanisms to recover the proceeds of corruption a common law.
Computer Forensics Iram Qureshi, Prajakta Lokhande.
Presented by Margaret Robbins Program Director, TMCEC.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Model For Effective Self-Regulation November 2002 Daniel M. Sibears Senior Vice President & Deputy Member Regulation, NASD.
Computer Forensics Principles and Practices
Deloitte Forensic Forensic Technology Conference of Regulatory Officers - CORO November 2012.
Day 1 - Panel Discussion DFRWS 2004 Linthicum, MD.
By: Megan Guild and Lauren Moore. Concept Map Mountain Stream Co. OS Active wear Computer Security Their Questions Details Examples Computer Forensics.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
3 rd Athens Process Forum /24, Sofia CEER WG SEEER – Regulatory Benchmarking Standards for SEE.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Frameworks for Digital Forensics November 5, 2010.
Mediation with the Information Commissioner’s Office Cory Martinson Appeals and Policy Analyst 25 November 2009.
_______________________________________________________________________________________________________________ ____________ Successfully Investigating.
The U.S. Securities and Exchange Commission (SEC).
Social Roles and Relationships.
Cyber Forensics From Data To Digital Evidence Book by - A. Marcella, F. Guillossou.
A Hierarchical, Objectives-Based Framework for the Digital Investigations Process Nicole Beebe & Jan Guynes Clark University of Texas at San Antonio DFRWS.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
Mastering Windows Network Forensics and Investigation Chapter 17: The Challenges of Cloud Computing and Virtualization.
INVESTIGATION KAROLINA KREMENS, LL.M. (Ottawa), Ph.D. International Criminal Procedure.
Tax Court of Canada THIRD PARTY INFORMATION IN MAKING ASSESSMENT INTERNATIONAL ASSOCIATION OF TAX JUDGES Lucerne, Switzerland September 4, 2015 The Hon.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Cell Phone Forensics Investigator - ICFECI
Digital Forensics Ryan Lord. Road Map - What is Digital Forensics? - Types of computer crimes - Tools - Procedures - Cases - Problems.
Intrusion Detection MIS ALTER 0A234 Lecture 12.
CJ210: Criminal Investigation. Information  Instructor: Terry Campbell   AIMS: campbell4tlc  Class Syllabus.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 28 – Consumer and Health Protection.
STRENGTHENING FORENSIC SCIENCE IN THE UNITED STATES: A PATH FORWARD The Future of Forensic Science John Marshall Law Center, Cleveland, OH 19 March 2009.
What standards, relevant to me, are there? Barbara Reed Chair, Standards Australia IT 21 Committee on Records and Document Management Systems.
PhD Oral Exam Presentation
Washington D.C., March 23, 2017 Improving Quality and Reliability of Land Records: Germany’s Experience Dr. Nicola Hoischen, LL.M. (Cologne/Paris 1)
Computer Forensics 1 1.
Dr. Bhavani Thuraisingham The University of Texas at Dallas
The Need For Forensic Capabilities In The Commercial Sector
Operations Director, CTRU
Fundamental Principles for Official Statistics – Threats and Responses
FORZA – Digital Forensics Investigation Framework that Incorporate Legal Issues Eric Ly Basically this is about people who practice DF and only follow.
ROLE OF LAWYER IN THE DEVELOPMENT OF LARGE MINING PROJECTS
CHAPTER 9 (part a) BASIC INFORMATION SYSTEMS CONCEPTS
©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Electronic Surveillance, Post 9/11
Identify the laws and guidelines that affect day-to-day use of IT.
1-3 Functions of a Forensic Scientist
A blueprint for experiment success.
THE ENVIRONMENT THAT INFLUENCES NURSING CARE
Hashing files Searching files for keywords
AUDIT PLANNING AND DOCUMENTATION
General Crime Scene Considerations
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

FORZA – Digital Forensics Investigation Framework that Incorporate Legal Issues Eric Ly

Digital Forensics? What is it? - It is a process, not an elephant, and it is not just one single process, but a group of tasks and processes in an investigation.

Fundamental Principles -IT Security - Confidentiality - Integrity - Availability -Digital Forensic - Reconnaissance - Reliability - Relevancy

RRR Reconnaissance - Collect, recover, decode, discover, extract, analyze and convert data that is kept on different storage media to readable evidence. Reliability - If the integrity of the evidence and the person relationship with the evidence is accepted as digital forensics, then it can be reliable in court. Relevancy - Even if evidence is admissible, relevancy of the evidence with the case affects the weight and usefulness of the evidence. Use a legal practitioner to advise what should be collected, to reduce time and cost in investigation.

FORZA Framework Eight Roles o Case leader o System/business owner o Legal advisor o Security/system architect/auditor o Digital forensics specialist o Digital forensics investigator/system administrator/operator o Digital forensics analyst o Legal prosecutor

FORZA Framework cont.

To bind roles, responsibilities and procedures together, a technology- independent digital forensics investigation framework would be required. Created by Zachman: FORensics ZAchman framework (FORZA) Each role or layers in this framework are interconnected to each other through sets of six categories of questions: o What o Why o How o Who o Where o When

Role example: Legal Advisor Legal objectives (Why) o What is the purpose of the dispute? Legal background and preliminary issues (What) o What data should be collected? Legal procedures for further investigation (How) o Is any warrant, search warrant required? Legal geography (Where) o Is that within jurisdiction of the country? Legal entities and participants (Who) o Who is/are the claimant/respondent? Legal timeframe (When) o What is the time limit of the case?

End Web hacking case Questions?

Reference Ieong, Ricci S.C. "FORZA – Digital Forensics Investigation Framework That Incorporate Legal Issues." Digital Investigation 3 (2006): Web. 31 Oct