Computer Forensics: A 5 Minute Introduction Santa Clara University Department of Computer Engineering April 2007.

Slides:



Advertisements
Similar presentations
2 Language of Computer Crime Investigation
Advertisements

Investigation Myths and Facts November 29, 2011 IOT Security: Caroline Drum Bradley.
Computer Forensics and Digital Investigation – a brief introduction Ulf Larson/Erland Jonsson.
Computer Forensics What is Computer Forensics? What is the importance of Computer Forensics? What do Computer Forensics specialists do? Applications of.
COS/PSA 413 Day 17. Agenda Lab 8 write-up grades –3 B’s, 1 C and 1 F –Answer the Questions!!! Capstone progress report 2 overdue Today we will be discussing.
LittleOrange Internet Security an Endpoint Security Appliance.
Technology Round 7 Exploring I.C.T. in the Syllabus.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J w/ T. Scocca.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
COEN 152 Computer Forensics Introduction to Computer Forensics.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
BY: BRENT MILLER. What is Computer Crime? Crime involving a computer and a network. A computer may be used or targeted. Divided into two categories: Crimes.
Guide to Computer Forensics and Investigations, Second Edition Chapter 13 Investigations.
Module #2: What Sensitive Data is and how to handle it Module 2 is approximately 3min and 30 sec.
Licitware a forensic software tool designed to investigate computer crimes.
Network Forensics: When conventional forensic analysis is not enough Manuel Humberto Santander Peláez GIAC GCFA Gold, GNET Silver, GCIA Gold.
What is FORENSICS? Why do we need Network Forensics?
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
Dr Richard Overill Department of Informatics King’s College London Cyber Sleuthing or the Art of the Digital Detective.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Undergraduate Technology Programs John Baker Johns Hopkins University Carey Business School
Professional Development: Group 1 Career Topic COMPUTER FORENSICS.
1 IT Investigative Tools Tools and Services for the Forensic Auditor.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
Computer Forensics SEED Overview Computer Forensics Reconstructs events from digital traces on a device such as Computer Router Switch Cell-phone,
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University September 28, 2007.
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
CJ386-Unit 7 Review A questioned document is any material that contains marks, symbols or signs conveying a meaning or message and whose source or authenticity.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Cybercrime What is it, what does it cost, & how is it regulated?
CJ 317 – Computer Forensics
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Staying Safe Online. Who are we ? What do we do ? Why are we here ?
Security A Payments Perspective Terry Dooley EVP & CIO SHAZAM Network.
Computer crimes.
COEN 252: Computer Forensics Hard Drive Evidence.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
MIS323 – Business Telecommunications Chapter 10 Security.
Information Security January What is Information Security?  Information Security is about the physical security of our equipment and networks as.
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
CYBER AND COMPUTER FORENSICS. 2016/06/082 Network of experienced stakeholders in the cybercrime environment Information gathering capability and analytical.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
Cell Phone Forensics Investigator - ICFECI
1 1 Advanced Cyber Security Event - Introduction 11 th May 2016 Matt Locker.
FBI Phoenix Computer Crime Squad SA Tom Liffiton 10/23/2003 Maricopa Association of Governments Telecommunications Advisory Group.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Fraud and the internet Sandra Peaston Assistant Director, Insight Cifas, The UK’s Fraud Prevention Service.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
USB Printing Scanner Log-In – Two ways Insert USB drive
Systems Security Keywords Protecting Systems
Investigation Myths and Facts
Cyber Crimes Chunlian QU 9/18/2018.
Network Forensics: When conventional forensic analysis is not enough
NETWORK SECURITY LAB Lab 9. IDS and IPS.
Network Intrusion Responder Program
ISMS Information Security Management System
Computers: Tools for an Information Age
COEN 252: Computer Forensics
Digital Forensics Dr. Bhavani Thuraisingham
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Computer Forensics: A 5 Minute Introduction Santa Clara University Department of Computer Engineering April 2007

Information Assurance Continued need in the US for experts in Information Assurance. Legislative & Regulatory Pressure  Sarbanes Oxley  HIPPA  … Safe from Off-shoring

Computer Forensics Reconstructs events from digital traces on a device such as Computer Router Switch Cell-phone, SIM-card GPS system (car accident investigation) SCADA

Computer Forensics Goal of Forensics:  Reconstruction based on digital traces Criminal:  Apprehension and conviction of offenders  Computer is instrument of crime: Auction fraud, Check fraud, …  Computer is target of crime: intrusion, …  Computer contains evidence: s, printings Commercial:  IP protection, Internet abuse, Security breaches, …  Prevention

Computer Forensics Computer Forensics Types:  Media Forensics Hard drive, USB, PDA, SIM, …  Network Forensics Router logs, IDS logs, network capture files, SMTP logs, headers, …  Malware Analysis Given malware code (Assembly Language), reconstruct its functionality Code Red Worm: GET /default.ida?NNNNNNNNNNNNNNNNNNNNNNNNN NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN NNN NNNNNNNNNNNNNNNNNNN%u9090%u6858%ucbd 3%u7801%u9090%u6858%ucbd3%u7801%u9090%u 6858%ucbd3%u7801%u9090%u9090%u8190%u00c3 %u0003%u8b00%u531b%u53ff%u0078%u0000%u00

Activity Internet Explorer uses index.dat file to store past history.