The Need For Forensic Capabilities In The Commercial Sector

Slides:



Advertisements
Similar presentations
BTEC Application of Science Year 11 Unit 6 Health Applications of Life Science Unit 13 Investigating a Crime Scene.
Advertisements

Preventing Infringement of Intellectual Property (IP) Rights in the Workplace Awareness raising to prevent infringement within [business name] September.
OC RIMS Cyber Safety & Security Incident Response.
What is Digital Piracy? Digital piracy is a form of online piracy and includes the unauthorized online distribution of electronic copies of copyrighted.
PROSECUTORIAL DISCRETION: Plea Bargaining By: Katie Cobb and Summer Bailey.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Serving with pride and confidence Cyber Crime in Thames Valley Police DCS Richard List.
Working Jointly to Tackle e-Crime Paul Wright Hi-Tech Crime Team City of London Police.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Guide to Computer Forensics and Investigations, Second Edition
Jarrett Kolthoff, Advisor - Corporate Legal Counsels.
1 An Overview of Computer Security computer security.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
Chapter 21 E-Policy The debate rages. Cryptography Policy What do you think about: Who controls the keys? Public opinion with government IT, civil liberty.
Complete ACTA negotiations and implement in 2010 Expand counterfeiting and piracy database Enhance transparency and monitoring Build respect for IPR’s.
Technology for Computer Forensics by Alicia Castro.
Helping you to achieve your full business potential Presented by Mr. Stephen Clarke Clarke & Hartland Solicitors 48 The Parade Cardiff Wales Wales .
What is meant by computer forensics?  Principle, Function of computer forensics.  History about computer forensics.  Needs of computer forensics.
Graphic File Carving Tool Testing Jenise Reyes-Rodriguez National Institute of Standards and Technology AAFS - February 19 th, 2015.
Digital Evidence Collection Training for Law Enforcement Developed by the Electronic Crime Partnership Initiative Satellite Receiver HD Start Animation.
Computer Forensics Mr.PRAWEE PROMPONMUANG M.Sc(Forensic Science) NO
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Private Detective BY: Jocelyn Vazquez
Guide to Computer Forensics and Investigations, Second Edition
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
INTRODUCTION TO FORENSICS Science, Technology, & Society MR. CANOVA PERIOD 11.
© 2012 Edwards Wildman Palmer LLP & Edwards Wildman Palmer UK LLP Criminal & civil recovery mechanisms to recover the proceeds of corruption a common law.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Professional Development: Group 1 Career Topic COMPUTER FORENSICS.
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
Digital Evidence Collection Training for Law Enforcement Developed by the Electronic Crime Partnership Initiative Tape Drive Start Animation.
Digital Evidence Collection Training for Law Enforcement Developed by the Electronic Crime Partnership Initiative USB Watch Start Animation.
Computer Forensics Principles and Practices
© 2010 Verizon. All Rights Reserved. PTE / DBIR.
Operational (Forensic) Analysis. Differences between Prosecutorial vs. Operational Investigations Timeliness of the investigation –There is no criminal.
Jurisprudence The Theory of Law Ricky Cuervo Maxwell Turner Ms. Hatmaker.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau
CJ 317 – Computer Forensics
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Digital Evidence Collection Training for Law Enforcement Developed by the Electronic Crime Partnership Initiative Desktop Computer Start Animation.
Digital Evidence Collection Training for Law Enforcement Developed by the Electronic Crime Partnership Initiative Mouse and Keyboard Start Animation.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter Extension 24 Computer Crime and Forensics.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Digital Evidence Collection Training for Law Enforcement Developed by the Electronic Crime Partnership Initiative Wireless Access Point Start Animation.
ADMINISTRATIVE AGENCIES Crystal Wahlstrom-Kauffman April 1 st, 2008 MGT 335.
IMPORTANT TERMS America’s Courts. Important Terms Defense/Defendant: The accused party Prosecution: In a criminal trial, the accuser. Usually the state.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
CYBER AND COMPUTER FORENSICS. 2016/06/082 Network of experienced stakeholders in the cybercrime environment Information gathering capability and analytical.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Digital Evidence Collection Training for Law Enforcement Developed by the Electronic Crime Partnership Initiative Memory Stick Start Animation.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
What is Law? Stage 1.
PhD Oral Exam Presentation
DNA technology in court
Providing Access to Your Data: Handling sensitive data
Computer Forensics 1 1.
Introduction to Computer Forensics
U.S. Department of Justice
Valuation Tools webcast: Valuing a patent
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Counter Forensic for Computer Forensic By: Lara Amanj Gulan Azad.
By Anwar Campbell.
Welcome to Forensic Science!
Recovering Employee Dishonesty Claims
Public Safety What is it?.
Presentation transcript:

The Need For Forensic Capabilities In The Commercial Sector Dominique Brezinski 11/14/2018

Computer Forensics Methodology and tool set for analyzing computer systems for evidence of compromise or misuse Methods and tools must be defensible in a court of law 11/14/2018

Problem Space Without the ability to tell when our digital assets have been compromised, we have an incomplete security solution at best Forensic tools fill the gap between what computer security should be and what it is today 11/14/2018

Where we are today Computer security solutions and architectures are incomplete One and a half trillion dollars of loss due to computer crime in 1999 worldwide (PricewaterhouseCoopers) Computer crime increasing in parallel with overall Internet growth Current forensic tools support analysis of captured personal computers, not business computing environments 11/14/2018

How Did We Get Here? Computer security solutions have not kept up with the risks associated with worldwide interconnectivity High value digital assets that are easy to move and sell with a low risk profile (attractive to criminals) Law enforcement has to transition to support Third Wave criminal investigation 11/14/2018

Still Getting There Time consuming to do initial analysis to determine if system has been compromised Law enforcement does not have the staff or expertise to investigate even a small percentage of computer crime Currently a bit lawless, so we need to defend our own homesteads 11/14/2018

Available Options Gap analysis—where do we need to be and where are the holes We cannot effectively prevent computer crime with current technology Need to be able to investigate and prosecute computer crime and recover losses (civil action) 11/14/2018

Recommendation Develop accepted methodologies for investigating computer crime Develop robust tools for system analysis and evidence collection to support investigations Augment law enforcement by taking up slack Pursue civil action (must support burden of proof) 11/14/2018