(Discussion – The Department of Defense)

Slides:



Advertisements
Similar presentations
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Advertisements

What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1 Intelligence Community and Classified Information.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Viruses & Destructive Programs
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
Computer Forensics Principles and Practices
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Thomas Glancy.  Formed August 10, 1949  Headed by the US Secretary of Defense  Headquarters: The Pentagon, Virginia  Employees: 700,000 civilian 1,418,542.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
BAE Systems Small Business Program
CONTROLLING INFORMATION SYSTEMS
© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Software.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cell Phone Forensics Investigator - ICFECI
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
Network Security Fundamentals
3.6 Fundamentals of cyber security
CYBER SECURITY...
Using Technology to Manage Information
Lecture 8. Cyber Security, Ethics and Trust
Introduction The Regional Computer Forensics Laboratory (RCFL) National Program Office created this toolkit to help law enforcement executives assess.
COMPUTER VIRUSES Computer Technology.
Unit 11 Task #1 Read the unit specification and create a glossary which defines each of the words / terms you don’t know.
The Internet of Unsecure Things
(Activity - Identifying Random Fingerprints)
Branches of the Military
(Discussion and WS – Analysis of Electronic Data)
(e-Research Paper - The Forensics of Explosions)
Tuesday April 17, 2018 (Discussion – Dennis Rader; Input to Output – How Does the Computer Work?)
Encryption and Hacking
Faculty of Science IT Department By Raz Dara MA.
(Discussion – The Internet and the World Wide Web)
Friday September 29, 2017 (Discussion – Crime Scene Reconstruction; Forensic Files – Material Evidence)
Wednesday February 7, 2018 (eResearch Paper – The Chemistry of Fire, Searching the Fire Scene, Forensics Files – Up in Smoke)
Thursday February 22, 2018 (Textbook Assignment – Collection and Analysis of Evidence of Explosions)
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Intelligence Oversight U.S. Army Inspector General School 1
(Final Review for Quiz 10 Using the Forensics Textbook)
(e-Research Paper - Impression Evidence)
Thursday April 19, 2018 (Discussion – Storing and Retrieving Data, Processing the Electronic Crime Scene)
(Thanksgiving Activities)
(eResearch Paper - DNA)
(Forensic Files - Letter Perfect)
Computer Security By: Muhammed Anwar.
(Forensic Files – Beaten by a Hair)
(Review for Quiz 6 & Ketchup Day)
(Quiz 1 – First Attempt Interrupted by Chromebook Problems)
Monday March 26, 2018 (Activity – My Prints).
Monday October 2, 2017 (??).
(Textbook Assignment – More Bloodstain Spatter Patterns)
(XC - Current Events Crossword)
(Discussion - Forensic Serology; Worksheet – Blood Basics Online)
(Forensic Files – Up in Smoke)
Wednesday May 23, 2018 (Quiz 18).
Tuesday May 15, 2018 (??).
Tuesday October 3, 2017 (eResearch Paper Drug Dependence)
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

(Discussion – The Department of Defense) Monday April 30, 2018 (Discussion – The Department of Defense)

The Daily CSI Monday, 4/30/18 1/1 Identify and briefly describe the four areas where latent data can exist. RAM slack is the area from the end of the logical file to the end of the sector. Cluster slack is the remaining area from the end of the final sector containing data to the end of the cluster. Latent data might be found in unallocated space – space on a HDD that the operating system sees as empty and ready for data. When a user deletes files the data typically remains behind, so deleted files are another source of latent data.

We will take Quiz 16 this Thursday! Announcements We will take Quiz 16 this Thursday! CYDI

4/18 N/A 4/19 4/23 4/24 4/25 Assignment F2 F4 F5 F6 Last Day Accepted Summative or Formative # Date Issued Gone Missing Day Last Day Accepted WS – Dennis Rader, Input to Output: How Does the Computer Work? F2 4/18 N/A Hold for eResearch Paper WS – Storing and Retrieving Data, Processing the Electronic Crime Scene F4 4/19 4/23 Forensic Files – Hack Attack F5 4/24 WS – Analysis of Electronic Data F6 4/25

Computer Forensics (Part 4) The Department of Defense Computer Forensics (Part 4)

The Department of Defense The Department of Defense (DOD) is an executive branch department of the federal government of the United States charged with coordinating and supervising all agencies and functions of the government concerned directly with national security and the United States Armed Forces. The Department is also the largest employer in the world, with more than 2.13 million active duty servicemen and women as well as their support staff of civilian workers.

The Department of Defense Adding to the total is over 1.1 million National Guardsmen and Reservists from the four services, bringing the total to just over 3.2 million employees. The United States Cyber Command (USCYBERCOM) is an armed forces sub-unified command subordinate to United States Strategic Command. The command is located in Fort Meade, Maryland, and centralizes command of cyberspace operations, organizes existing cyber resources and synchronizes defense of U.S. military networks.

NCIS The United States Naval Criminal Investigative Service (NCIS) is the primary law enforcement agency of the United States Department of the Navy. It investigates activities concerning crimes against or by United States Navy and U.S. Marine Corps personnel, along with national security, counter-intelligence, and counter-terrorism cases, and is the successor organization to the former Naval Investigative Service (NIS).

NCIS Roughly half of the 2,500 NCIS employees are civilian special agents who are trained to carry out a wide variety of assignments at locations around the globe. NCIS special agents are armed federal law enforcement investigators, who frequently coordinate with other U.S. government agencies. NCIS special agents are supported by analysts and other experts skilled in disciplines such as forensics, surveillance, surveillance countermeasures, computer investigations, physical security, and polygraph examinations.

Forensic Dossier The Forensic Dossier is a drive-to-drive duplication device. Typically, a suspect hard drive and a destination drive will be connected to the unit. Within minutes of starting the process, the contents of the suspect drive are accurately copied over to the target drive for further examination. Handling of the suspect drive is held to a minimum with zero alteration of its contents. Designed with the Forensics investigator in mind, the system ensures that proper evidence capture procedures are maintained, while speeding up the process significantly.

Malware Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Malware is defined by its malicious intent, acting against the requirements of the computer user, and does not include software that causes unintentional harm due to some deficiency.

Malware Malware may be stealthy, intended to steal information or spy on computer users for an extended period without their knowledge, or it may be designed to cause harm, often as sabotage , or to extort payment. 'Malware' is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software.

Video 5 Things You Don't Know: Department of Defense https://www.youtube.com/watch?v=MT_tw4JKo_g