Digital Forensics Dr. Bhavani Thuraisingham

Slides:



Advertisements
Similar presentations
Browser Guideline Powered by DonorCommunity TM DonorCommunity eLearning Series v1.2, February 2012 Browser Guideline.
Advertisements

By David Williams. What is CCleaner ? CCleaner (formerly Crap Cleaner), developed in 2003 by Piriform is a donationware utility program for windows operating.
Darren Quick Supervisor: Dr Kim-Kwang Raymond Choo.
Mining Digital Evidence in Microsoft Windows – Answering Who, When, Why and How?
Internet Artifacts Dr. John Abraham Professor UTPA.
Meet Belkasoft Evidence Center 3.0! Yuri Gubanov CEO, Belkasoft What's new in the recent Belkasoft release?
Hong-Kong, Mar Mobile Data in Legal Proceedings and methods for Extraction, Analysis and Delivering Yuval Ben-Moshe Forensics Technical Director.
Operating System & Application Files BACS 371 Computer Forensics.
OS and Application Files BACS 371 Computer Forensics.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Capturing Computer Evidence Extracting Information.
Forensic analysis of Windows hosts using UNIX-based tools Source : Digital Investigation (2004) 1, Writer : Cory Altheide Reporter : Yao Professor.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Review for Final Exam November 19, 2010.
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
Digital Forensics and the Most Famous Egg How did Humpty Dumpty fall?
Technology Hardware Internet & WWW. Outline  Hardware  System Unit  CPU  Memory  Ports  Internet  Internet services  WWW  Types of Sites  E-Commerce.
Belkasoft Evidence Center Yuri Gubanov CEO, Belkasoft What the flagship Belkasoft product can do for you?
1 and Internet Evidence Mark Pollitt Associate Professor, Engineering Technology.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
Send An with an Attachment in Microsoft Outlook Use Skype to Talk with Others Communicate with Windows Live Messenger on Mobile Create a Signature.
Technology in Computer Forensics  Alicia Castro  Thesis Defense  Master of Software Engineering  Department of Computer Science  University of Colorado,
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 20, 2007.
Steps to clear the browser cache Internet Explorer 11 (IE11)
1 Computer Forensics Dr. Randy M. Kaplan. 2 Browser Forensics.
1 Title: Transmission Efficiency for Some Applications Abstract: This contribution provides examples of transmission efficiency of some popular mobile.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Web Forensics Matthew M. Kimball.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
I.S 512 TOPIC 2 : THE INTERNET AND THE WORLD WIDE WEB.
Internet Explorer 7 Safari 4 & 5 Internet Explorer 8 Firefox 7.
Computer Forensics: A 5 Minute Introduction Santa Clara University Department of Computer Engineering April 2007.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
Digital Forensics. Hardware components Motherboard Motherboard System bus System bus CPU CPU ROM ROM RAM RAM HDD HDD Input devices Input devices Output.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
Welcome To All Participants.
The Internet & Web Browsers Business Webpage Design Created by Kelly Seale Adapted by Jill Einerson.
Investigations 2016 First semester [ 12 week ]-Forensic Analysis of the Windows 7 Registry.
Internet Basics 10/23/2012. What is the Internet? It’s a world-wide network of computer networks. It grows hourly and involves national governments, communities,
Data and Applications Security Developments and Directions
Digital Forensics Dr. Bhavani Thuraisingham
How to install Skype (Step by Step Guide).
Lets get on to A+ from Home
Windows XP Professional
Internet Basics.
Extract and Correlate Evidences in Computer Forensics
أساسيات تقنية المعلومات
الانترنت والبريد الإلكتروني
Dr. Bhavani Thuraisingham The University of Texas at Dallas
User Profiles.
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Building Trustworthy Semantic Web
CET4860 Mark Pollitt Associate Professor
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Week1 software - Lecture outline & Assignments
Data and Applications Security Developments and Directions
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Data and Applications Security Developments and Directions
Building Trustworthy Semantic Web
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Hashing files Searching files for keywords
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Some Digital Forensics Topics for GCFE Dr. Bhavani Thuraisingham November 15, 2013

Outline Digital Forensics Methodology Incident Response, Data Carving, Data Culling, Hashing, Crime Scene Analysis, Event Reconstruction Operating System Forensics File System, Memory Forensics Email Forensics Registry Analysis Windows Artifact Analysis Log File Analysis Event Analysis Network Forensics Browser Forensics Mobile System Forensics Report Writing

Registry Analysis SAM Security System Software Applications NTUser.Dat

Widows Artifact Analysis Windows Jumplists Recycle Bin Analysis Chat/Message Analysis Skype, Facebook, Yahoo email, Yahoo Messenger, ….

Browser Forensics History Cache Cookies Bookmarks Auto Complete Internet Explorer Inedex.Dat Firefox SQLite