Presented by Phillip Gavin, Lesly- Ann Robinson and Roberto Ellis

Slides:



Advertisements
Similar presentations
Security and Control Soetam Rizky. Why Systems Are Vulnerable ?
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
Computer Forensics and Access Data’s Ultimate Tool Kit Presented by: Kaukab ZuberiVice Chairman KRYS Dustin HulburtSenior Trainer and Manager Acces Data.
2 Language of Computer Crime Investigation
Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley.
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
Computer Threats I can understand computer threats and how to protect myself from these threats.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Computer Forensics BACS 371
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Computer Forensics What is Computer Forensics? What is the importance of Computer Forensics? What do Computer Forensics specialists do? Applications of.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Computer Forensics Mr.PRAWEE PROMPONMUANG M.Sc(Forensic Science) NO
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Discovering Computers 2010
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Cyber Crimes.
Cyber crime & Security Prepared by : Rughani Zarana.
Company LOGO Computer Security and Forensics By Kim Cassinelli, Eriko Yamaguce and Stefan Schuebel.
PAPER AC 1 : E-BUSINESS AND CYBER LAWS. MEANING OF E-BUSINESS  E-business, is the application of information and communication technologies (ICT) which.
CYBER CRIME.
Computer Forensics Principles and Practices
Cyber Security Nevada Businesses Overview June, 2014.
Computer Security Management: Assessment and Forensics Session 8.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
Computers Computer & Internet Security How Computer Forensics Works What is the Year 2038 problem? Could hackers devastate the U.S. economy?
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
Computer security By Isabelle Cooper.
Police are not prepared for rising incidence of Identity Fraud By Chris DeVito.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
By: Jeremy Henry. Road Map  What is a cybercrime?  Statistics.  Tools used by an investigator.  Techniques and procedures used.  Specific case.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Digital Forensics Market Analysis: By Forensic Tools; By Application (Network Forensics, Mobile Forensics, Database Forensics, Computer Forensics) - Forecast.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Securing Information Systems
Introduction Of Information Technology
The Disadvantages of ICT
To Know what Cyber crime is
Application Software Chapter 6.
Advantages of ICT over Manual Methods of Processing Data
Data Compromises: A Tax Practitioners “Nightmare”
Published Date: 24 February, 2016
Chapter 11 crime and security in the networked economy
Securing Information Systems
U.S. Department of Justice
Chapter 6 Innovative Systems: From E-Government and E-Learning to C2C E-Commerce and Collaborative Commerce.
Faculty of Science IT Department By Raz Dara MA.
Prosecuting International Intellectual Property Crimes
Protecting Yourself from Fraud including Identity Theft
Forensic and Investigative Accounting
Protecting Yourself from Fraud including Identity Theft
Introduction to Digital Forensics
Presentation transcript:

Presented by Phillip Gavin, Lesly- Ann Robinson and Roberto Ellis Digital Forensics Presented by Phillip Gavin, Lesly- Ann Robinson and Roberto Ellis

What is Digital Forensics? Digital Forensics is the preservation, identification, extraction, interpretation and documentation of computer evidence which can be used in the court of law.

Branches of Digital Forensics Branches of Digital Forensics include: Network Forensics Firewall Forensics Database Forensics Mobile Device forensics The names of the different branches speaks to the different areas which they focus on.

The Benefits of Digital Forensics Digital Forensics help to protect from and solve cases involving: Theft of intellectual property- This pertains to any act that allows access to patient, trade secrets, customer data, and any confidential information. Financial Fraud- This pertains to anything that uses fraudulent solicitation of victims information to conduct fraudulent transactions.

The Benefits of Digital Forensics cont’d Hacker system penetration- Taking advantage of vulnerabilities of systems or software using tools such as rootkits and sniffers. Distribution and execution of viruses and worms- These are the most common forms of cyber crime and often cost the most damage.

Challenges faced by Digital Forensics. The increase of PC’s and internet access has made the exchange of information quick and inexpensive. Easy availability of Hacking Tools. Lack of physical evidence makes crimes harder to prosecute.

Challenges faced by Digital Forensics. Cont’d The large amount of storage space available to suspects, up to over 10 Terabytes. The rapid technological changes requires constant upgrade or changes to solutions.

Computer crime fighting with Digital Forensics. Information lost or deleted from computers will be able to be uncovered or restored and be used as evidence. Digital Forensics will allow the tracing criminal activities and personnel online. Perpetrators can now be investigated and brought to justice regardless of their Geographical Location.

Computer crime fighting with Digital Forensics. Cont’d Various measures can now be put into place so that crimes such as espionage can be recognized easily and swift action to be undertaken.

Technologies that have Inspired the rise of Digital Forensics Logicube Created in 1993. One of the Leading digital forensic hard drive data recovery technology. Widely used by cybercrime experts and corporate security personnel. Provides mainly hardware based solutions but do have software solutions.

Technologies that have Inspired the rise of Digital Forensics. Cont’d DIBS Initiated in the early nineties. Hardware and software, specifically designed to copy, analyze and present computer data in a forensically sound manner. DIBS® RAID - Rapid Action Imaging Device

A pioneer in digital investigations since 1987. Technologies that have Inspired More Interest in Digital Forensics. Cont’d AccessData A pioneer in digital investigations since 1987. Provide state of the art cyber security, password cracking, eDiscovery and decryption solutions. Screenshot of AccessData Interface.

Digital Forensics Playing A Role

Case #1 On Friday September 03, 2010 in Abu Dhabi, United Arab Emirates, a case concerning the alleged raping of a 14 year old Brazilian girl was brought to the courts. As details of the case unfolded in the court the charges changed from rape to consensual sex. Digital forensics helped in uncovering evidence in the form of intimate text messages and photographs sent by the girl to the man from her mobile phone.

Case #1 Cont’d The girl was eventually sentenced to six months in jail followed by deportation and the 25 year old Pakistani bus driver was sentenced to one year in jail followed by deportation. Digital forensics played an important role in the final verdict of the case.

Case #2 A large publicly traded financial institution contacted reputable firm Global Digital Forensics (GDF) for assistance after suspecting multiple instance of fraud . It is alleged that the company charged customer ‘hidden fees’ to customers accounts. The problem one party faced included going through over 50 million transaction records to find evidence that would increase the damages to be paid by the company.

Case #2 Cont’d GDF using knowledge of the technology created processes that calculated the information needed and assisted in drafting deposition notices and document requests that narrowed the scope of the inquiry. This eased the concerns related to finding critical evidence and not spending huge amounts of money doing it.

Case #3 A pharmaceutical company received complaints that there was a dip in the usually high sales in some geographical locations. It was discovered that large amounts of drugs were being diverted into the US and being resold locally. An investigation led to the seizure of millions of dollar of diverted drugs , computers and other electronic equipment. There was however a problem as all communication done between the perpetrators through email which was encrypted and fairly complex as well as in a foreign language.

Case #3 Cont’d The Global Digital forensics (GDF) firm was contacted to carry out a digital analysis of the computers seized to gain evidence. GDF forensic specialist decrypted and extracted a wealth of information from the systems. GDF was able to provide documentation show that : The diverted drugs were being purchased from European and Canadian Distributor and shipped to the US. The distributors controlled several pharmacies and nursing homes in the area.

Case #3 Cont’d The distributors have been engaged in drug diversion for over 10 years. The distributor was repackaging vitamins manufactured to appear the same as the prescription drugs and selling and shipping them to Asia The distributor was operating unlicensed pharmacies and nursing homes. The company suffered 13 million dollars a year in lost revenues.

What is the Future for Digital forensics? There is an increasing wide array of tools used to preserve and analyze digital evidence. The single approach to utilize single evidence such as hard drives will change as there is increasing size of hundreds of Gigabytes and Terabytes to be used. Huge targets will require more sophisticated analysis techniques and equipment. There will also be better collaborative functions to allow forensics investigators to perform investigations a lot more efficiently that they do presently.

REFERERNCES (n.d.). www.accessdata.com. (2006). http//www.logicubeforensics.com/. (2008). http://www.dibsusa.com/. http://www.computerforensicshq.com. (n.d.). Panagiotis, K. (2006). Digital Crime and Forensic Science in Cyberspace. USA: Idea Group Publishing. Wiles Jack, C. K. (2007). The Best Damn Cybercrime and Forensics Book Period. USA: Syngress Publishing. www.zawya.com. (n.d.).

THE END