Forensics Week 2.

Slides:



Advertisements
Similar presentations
Complex Recovery/ Data Reduction DFRWS Technical Issues Lots of info to be recovered in in deleted file space Partial data recovery: does this give.
Advertisements

Formative assessment of the Engineering Design process
Argumentative and Rhetorical Analysis Essay Review.
Evidence Collection & Admissibility Computer Forensics BACS 371.
Investigation Myths and Facts November 29, 2011 IOT Security: Caroline Drum Bradley.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
BACS 371 Computer Forensics
Writing the Syllabus Teaching Skills Purpose of Syllabus Communicates what the course is about Communicates what students need to know in the beginning.
Network security policy: best practices
Introduction To Information Technology. Defining Information What is Information? Information is any knowledge that comes to our attention. That could.
By Drudeisha Madhub Data Protection Commissioner Date:
Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland.
Get Off of My I-Cloud: Role of Technology in Construction Practice Sanjay Kurian, Esq. Trent Walton, CTO U.S. Legal Support.
3.02 The Information Superhighway
Accreditation & Certification in Forensic Science Understanding the Difference Phil T. Pulaski, Esq. Retired Chief of Detectives, NYPD.
Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent.
Forensic Science Types of Evidence. What is Forensic Science? The use of science in the examination of evidence associated with crime.
INTRODUCTION TO RA.
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
Undergraduate Technology Programs John Baker Johns Hopkins University Carey Business School
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 7, 2015 DRAFT1.
Computer Forensics Principles and Practices
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
The process side of forensic investigations Patrick Green Network and Security Manager.
Class #6: Teaching a Lab Science Chapter 13: Lab Work & Field Work Chapter 14: Safety in the Lab & Classroom.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
CJ317: Computer Forensics
CJ 317 – Computer Forensics
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
IB-ITGSIB-ITGS Mr. Ketner Assigned Seats. IB-ITGS Syllabus please get signed and return!
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA Search.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
What A Forensic Scientists Does Ch 1 Notes Pages
Mobile Device Collection More Than Just a Phone. More than just a phone… Cell phone Address book Planner & Organizer Messenger Photo & Video camera GPS.
Project Management Methodology Project Closing. Project closing stage Must be performed for all projects, successfully completed or shut off by management.
Tech Acodemy Highline College August 20, 2015 Cybersecurity Steve Simpson S2 Forensics.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Wrong Presentation Put In
Fraud Examination, 3E Chapter 18: Legal Follow-Up
Forensic Computer Techniques
DATA SECURITY FOR MEDICAL RESEARCH
Chapter 13: The IT Professional
Good Morning  Please be sure to take care of your belongings.
SA Capstone Requirements and Design Week 10 SYST Winter 2016
Chapter 1 The Nature of Science.
Good Morning  Please be sure to take care of your belongings.
Preliminary Recommendations to the Tribal/Interior Budget Council
Good Morning  Please be sure to take care of your belongings.
Good Morning  Please be sure to take care of your belongings.
The Breakdown of “Civil Disobedience”
WebQuest: Where you design your own Space Exploration Mission
Investigation Myths and Facts
Digital Learning in Portree Primary School
OBSERVATION SKILLS.
Scientific Processes Scientific Method.
Formative assessment of the Engineering Design process
SNMP (Simple Network Management Protocol) based Network Management
Ad Hoc Phase Structured Phase Enterprise Phase
Write Job Applications
Digital forensics Andrej Brodnik Andrej Brodnik: Digital forensics.
Professional Knowledge and Skills
Chapter 13: The IT Professional
2019 IP5 heads of office Meeting with IP5 Industry
Unit 1 Lesson 2: Argumentative writing
TOK Essay: Unpacking the Title
On-Site Investigations
Presentation transcript:

Forensics Week 2

What is Forensic? The Definition! Definition of forensic 1:  belonging to, used in, or suitable to courts of judicature or to public discussion and debate <a lawyer's forensic skills> 2:  argumentative, rhetorical <forensic eloquence> 3:  relating to or dealing with the application of scientific knowledge to legal problems <forensic medicine> <forensic science> <forensic pathologist> <forensic experts>

What Do We Really Do? When do we do Forensic? How do we handle active investigation vs. court preparation? What information are we gathering? Hard drives and other storage devices, emails, documents, files, PDFs, executables, internet history, MetaData, system configuration information, IP addresses, host names, user names, system logs, last log-on, active time on-line, system status reports, text messages, phone logs,etc. #1 to remember – is that what you are reviewing/working on could end up part of a case and that your research needs to be non-biased.

Four Main Principals of Forensic Investigation Do everything possible to ensure no data is modified when conducting your investigation The individual doing the investigation must be competent and explain how and why of his/her actions. Keep a clear log of exactly what you did. Make sure everyone understands. The person in charge has overall responsibility for ensuring that the law and principles are adhered to.

Live Acquisitions What do you do if you can’t shut the machine off? What do you do if you’re worried about losing critical “forensic” information? Not all systems can be shut down to do Forensic Banks/Financial Systems ERPs/CRMs (Payroll/HR) Point of Sale Worried that something will change What do you do? How would you handle the process?

Forensic Methods Readiness Evaluation Collection Analysis Presentation Mandate Preliminary Assessment Execution Reporting Data Collection Examination Analysis Reporting Recommendation

Issues with Forensics Technical Issues Legal Issues Administrative   http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800- 86.pdf