Hashing files Searching files for keywords

Slides:



Advertisements
Similar presentations
Watching the Detectives Forensic Information in Digital Objects (FIDO)
Advertisements

Complex Recovery/ Data Reduction DFRWS Technical Issues Lots of info to be recovered in in deleted file space Partial data recovery: does this give.
Computer Forensics.
Gathering digital evidence by the EU Commission in inspections
Guide to Computer Forensics and Investigations Fourth Edition
E-Discovery for System Administrators Russell M. Shumway.
Evidence Collection & Admissibility Computer Forensics BACS 371.
Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.
Guide to Computer Forensics and Investigations Fourth Edition
Computer & Network Forensics
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
Technology for Computer Forensics by Alicia Castro.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
Information Networking Security and Assurance Lab National Chung Cheng University F.I.R.E. Forensics & Incident Response Environment.
COS/PSA 413 Day 15. Agenda Assignment 3 corrected –5 A’s, 4 B’s and 1 C Lab 5 corrected –4 A’s and 1 B Lab 6 corrected –A, 2 B’s, 1 C and 1 D Lab 7 write-up.
Advance evidence collection and analysis of web browser activity by Junhoon Oh David Rivera 11/7/2013 Digital Forensics.
Scenario 1 Project title: Rural experiences of 'gay' sexual identity. Research questions: What is the role of the internet in providing an outlet through.
Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Guide to Computer Forensics and Investigations, Second Edition
11 CONFIGURE INTERNET EXPLORER Chapter 5. Chapter 5: Configure Internet Explorer2 CHAPTER OVERVIEW AND OBJECTIVES  Configuring Accessibility and Language.
Forensic analysis of Windows hosts using UNIX-based tools Source : Digital Investigation (2004) 1, Writer : Cory Altheide Reporter : Yao Professor.
An Event-based Digital Forensic Investigation Framework Brian D. Carrier Eugene H. Spafford DFRWS 2004.
Guide to Computer Forensics and Investigations Fourth Edition
Undergraduate Technology Programs John Baker Johns Hopkins University Carey Business School
Professional Development: Group 1 Career Topic COMPUTER FORENSICS.
Computer Forensics Principles and Practices
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University.
Chapter 2 Understanding Computer Investigations
1 IT Investigative Tools Tools and Services for the Forensic Auditor.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Data Collection and Forensics February 23, Complaint Document Acquisition DepositionsReview Discovery Begins Photocopy Discovery Closes Produce.
Chapter 9 – Page 1QM-130Dr. Sulaiman Al-Rafee Chapter 9: The Internet and World Wide Web Chapter Summary  Evolution of the Internet  Internet Connectivity.
Computers Computer & Internet Security How Computer Forensics Works What is the Year 2038 problem? Could hackers devastate the U.S. economy?
By: Megan Guild and Lauren Moore. Concept Map Mountain Stream Co. OS Active wear Computer Security Their Questions Details Examples Computer Forensics.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
FORZA – Digital Forensics Investigation Framework that Incorporate Legal Issues Eric Ly.
CSE 202 – Formal Languages and Automata Theory 1 REGULAR EXPRESSION.
By: Jeremy Henry. Road Map  What is a cybercrime?  Statistics.  Tools used by an investigator.  Techniques and procedures used.  Specific case.
CIT 180 Security Fundamentals Computer Forensics.
Forensic Investigation Techniques Michael Jones. Overview Purpose People Processes Michael Jones2Digital Forensic Investigations.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Forensic Investigation Techniques Michael Jones. Overview Purpose People Processes Michael JonesDigital Forensic Investigations2.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Creighton Barrett Dalhousie University Archives
Chapter 16 – Careers in Information Technology
Presented by Steve Abrams, M.S. Charleston, SC / Long Island, NY
Project 5: Generating Privacy and Security Threat Summary for Internet of Things REU Student: Nicole Fella Graduate Mentor: Kexin Liao Faculty Mentor:
Forensic and Investigative Accounting
Introduction to Computer Forensics
Guide to Computer Forensics and Investigations Third Edition
CCSI 410 Innovative Education- -snaptutorial.com
Computer Forensics Discovery and recovery of digital evidence
Acquisition and Examination of Forensic Evidence
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
Project 5: Generating Privacy and Security Threat Summary for Internet of Things REU Student: Nicole Fella Graduate Mentor: Kexin Liao Faculty Mentor:
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
File Extractor Pro’s File Signature Builder
FORZA – Digital Forensics Investigation Framework that Incorporate Legal Issues Eric Ly Basically this is about people who practice DF and only follow.
INTERNET PORNOGRAPHY.
Exam Information CSI5107 Network Security.
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Ad Hoc Phase Structured Phase Enterprise Phase
Digital Forensics CJ
What is AI course about? (Artificial Intelligence)

“At a basic level, digital data is a series of very small units on storage device that are set to 0 or 1 with the 0 or 1 representing a microscopic physical.
Digital Forensics Andrew Schierberg, Fort Mitchell Police, Schierberg LAw Jay Downs, Kenton County Police.
Digital Forensics Dr. Bhavani Thuraisingham
Presentation transcript:

Case 1- Python Scripts (scripts could be written in any programming language): Hashing files Searching files for keywords Searching files for regular expressions Deleting Duplicate Files in a folder

Case 2-Digital Forensics Concepts and Processes: Internet forensics Writing a digital forensics report File carving and physical extraction File recovery (broken header)

Case 3- Ethics and court admissibility : Tension between privacy and security Deception in investigations Privacy rights of the suspect/criminal Legal Considerations (4th amendment, 5th amendment, court admissibility)