Computer Forensics and Digital Investigation – a brief introduction Ulf Larson/Erland Jonsson.

Slides:



Advertisements
Similar presentations
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Advertisements

Fields in Forensic Science The following are fields of forensic science that pertain to our 7 th grade Life Science class. We have studied these fields.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Forensic and Investigative Accounting
Introduction to Forensic Science Chemistry 300 sci·ence n. a.The observation, identification, description, experimental investigation, and theoretical.
Technology for Computer Forensics by Alicia Castro.
Computer Forensics What is Computer Forensics? What is the importance of Computer Forensics? What do Computer Forensics specialists do? Applications of.
PROCESSING EVIDENCE.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J w/ T. Scocca.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
COEN 152 Computer Forensics Introduction to Computer Forensics.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Nine Police Technology External Systems.
An Event-based Digital Forensic Investigation Framework Brian D. Carrier Eugene H. Spafford DFRWS 2004.
INTRODUCTION TO FORENSICS Science, Technology, & Society MR. CANOVA PERIOD 11.
Forensic Science Professor
Professional Development: Group 1 Career Topic COMPUTER FORENSICS.
By: Zach Oltmanns.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
The Nature of Evidence A Guide to Legal Evidence & the Courts.
Forensic Science Introduction to forensics. Learning outcomes Be able to describe a range of forensic methods Describe how SOCO’s avoid contaminating.
Analytical Forensic Science The adventure Begins Now.
I’ll get a good education along the way. I’ll get to help people. I’ll make $30-60,000 a year And mainly because I like mysteries!!
Welcome to Forensic Science! Today’s Lesson Question: What is Forensic Science?
Intro to Forensic Science What is Forensic Science?
Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved.
Computer Forensics specialist By Andrew Shore Davis Sanders.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Forensic Science Introduction. What is Forensic Science? Basic Definition: Science in the service of the law Basic Definition: Science in the service.
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University September 28, 2007.
1 Chapter 14 Obtaining Physical and other Evidence Obtaining Physical and other Evidence.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
What vulnerabilities do you face in cyberspace?  Cyberbullying  Cyberstalking  Racial hatred  Exposure to violent, disturbing and/or illegal material.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Crime Scene Investigator. About Crime scene investigators (CSIs) go by many names, including: –evidence technician, –crime scene technician, –forensic.
Crime Laboratories Forensic Science Services. Objectives   List and describe the functions of the various units found in a modern all- purpose crime.
Introduction to Forensic Science and Crime Scene Processing.
Forensic Science Introduction. CSI Challenge #1 Penny Challenge February 1 st, 2016 Week 1 - Monday.
Who Dunnit? A Park High School Murder Mystery A Park High School Murder Mystery.
Forensic and Investigative Accounting Chapter 13 Computer Forensics: A Brief Introduction © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago,
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Digital Forensics Market Analysis: By Forensic Tools; By Application (Network Forensics, Mobile Forensics, Database Forensics, Computer Forensics) - Forecast.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Forensics. Forensics: The study and application of science to matters of law. Evidence: anything that tends to establish or disprove a fact Forensic scientists.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Computer Forensics By: Chris Rozic.
College of Adult & Professional Studies Criminal Justice Program
Computer Crime CJ 520 / CJ October 27, 2010.
Science of Crime – Intro to Forensic Science
Introduction to Computer Forensics
Vocabulary Terms and Definitions
Forensic Science Services
Introduction to Computer Forensics
Evidence & Investigation: An Introduction
Introduction to Digital Forensics
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Private Investigations vs. Public Investigations
Recap How is constitutional law created?.
Lethal Agents Introduction.
Public Safety What is it?.
Presentation transcript:

Computer Forensics and Digital Investigation – a brief introduction Ulf Larson/Erland Jonsson

Defining the word forensic American Heritage Dictionary definition of forensic: – “Relating to the use of science or technology in the investigation and establishment of facts or evidence in a court of law.” Many methods use science and technology to investigate and establish facts. Forensics are used when the results of the method should be valid in a court of law

Defining Computer forensics Corresponding definition for computer forensics would be: – “Relating to the use of computer science or technology in the investigation and establishment of facts or evidence regarding crimes committed with computers, or against computers, in a court of law.” – or… ”The art and science of applying computer science to aid the legal process” – or… ”The application of computer investigation and analysis techniques to determine potential legal evidence” Thus, when computers are involved in the process of establishing facts that should be valid in a court of law, we denote this process as “computer forensics”

The digital investigation However, not all investigations goes to court.. – Corporate investigations – Private investigations..and therefore, all investigations are not “computer forensics” – A better name for the investigation process is digital investigation, or digital crime scene investigation

The digital investigation A digital investigation takes place when a digital incident is reported and evidence needs to be found Analogy to physical investigation: – A physical investigation considers fibers, footprints, blood stains and fingerprints. – A digital investigation considers text files, messages, log entries and alerts.

The digital investigation: Targets The digital investigation regards: – Crimes committed against computers: Intrusions and break-ins and insider jobs by networked attackers – Crimes committed with computers: Communication between criminals engaged in murder, kidnapping, assault, extortion, drug dealing, espionage, terrorism, child pornography.

The digital investigation: purpose Its purpose is to provide information about: – What happened – When did events that led to the crime occur – In what order did the events occur – What was the cause of the events – Who caused the events to occur – What enabled the events to take place – What was affected, how much was it affected