Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Forensics CJ 317 Dr. Joe Ciccone – Week 6 RIP – Dep

Similar presentations


Presentation on theme: "Computer Forensics CJ 317 Dr. Joe Ciccone – Week 6 RIP – Dep"— Presentation transcript:

1 Computer Forensics CJ 317 Dr. Joe Ciccone – Week 6 RIP – Dep
Computer Forensics CJ 317 Dr. Joe Ciccone – Week 6 RIP – Dep. Chief Maxwell (photo below – the Lead Inv. For the Rape Case) “Well, if I eat it, and if it makes me grow larger, I can reach the key; and if makes me grow smaller, I can creep under the door: so either way I'll get into the garden, and I don't care which happens!” - Alice's Adventures in Wonderland (1865)

2 Last Week & Grade Review
Midterm Comments – Time line Practical Application (This Week) PLEASE BE ON TIME with your Project this week!

3 Your Comments this week - WOW
Chapter 8 is simply an introduction to techniques for examining Linux and Macintosh file systems. Chapter 9 explains how to apply your computer forensics skills and techniques to a computing investigation. One of the most critical functions is validating your evidence during the analysis process.? Rape Case & Technology – what have we learned? Questions Comments

4 SARA – Project Analyzing Privacy
SARA is a problem-solving model. It stands for Scanning, Analysis, Response, and Assessment.

5 Project – Week 6 – Due Tomorrow
Case Project 9-2:  Combine these cases Several graphic files were transmitted via from an unknown source to a suspect in an ongoing investigation. The lead investigator gives you these graphics files and tells you that at least four messages should be embedded in them. Use your problem solving and brainstorming skills to determine a procedure to follow. Case Project 9-3:     A drive that you are investigating contains several password-protected files and other files with headers that do not match the extension. What procedures would you need to follow to retrieve the evidence? Identify the mismatched file headers to extensions and discuss techniques you can apply to recover passwords from the protected files. 3 Pages

6 Unit 7 : Case 10-3 & 10-4 You are investigating a case involving an employee who is allegedly sending inappropriate photos via in attachments that have been compressed with a zip utility. As you examine the employee’s hard disk drive, you will find a file named orkty.zip, which you suspect is a graphic file. When you try to open the file in an image viewer, a message is displayed indicating that the file is corrupt. Write a 2-3 page report explaining how to recover the file, orkty.zip, for further investigation. Case Project 10-4:    You work for a mid-sized corporation known for its inventions that does a lot of copyright and patent work. You are investigating an employee suspected of selling and distributing animations created for your corporation. During your investigations of the suspect’s drive, you find some files with an unfamiliar extension of  “.cde.”  The network administrator mentions that other “.cde” files have been sent through an FTP server to another site. Describe your findings after conducting an Internet search for “.cde” files.

7 For Next Weeks Seminar Rebuilding File Headers
Complete the exercise to repair a file header found on pages 414 to 417. You will notice how straightforward it can be but be aware that this is not always the case.    Check this out before next weeks seminar – let me know what you think.

8 GIS GIS (Geographic Information Systems) have a pivotal role in assisting law enforcement in the development of strategic and tactical assessments. The most popular of those systems is ARCVIEW. Are there Privacy issues with this technology? How does it effect law enforcement personnel? Who can see where you are and how?

9 CompStat – NYPD – Bernie Kerik
CompStat involves the use of computer-generated statistics to analyze crime problems and develop appropriate responses. COMPSTAT is a process. The success of COMPSTAT as a process is primarily because of the six core components.  Mission Clarification: Internal Accountability: Geographic Organization of Operational Command: Organizational Flexibility: Data-Driven Problem Identification and Assessment: Innovative Problem-Solving Tactics

10 Comments & Questions We are almost done – check grades
KEEP PROJECTS ON TIME – how have I changed? Your ~ Questions & Concerns


Download ppt "Computer Forensics CJ 317 Dr. Joe Ciccone – Week 6 RIP – Dep"

Similar presentations


Ads by Google