COS/PSA 413 Day 5. Agenda Questions? Assignment 2 Redo –Due September 3:35 PM Assignment 3 posted –Due September 3:35 PM Quiz 1 on September.

Slides:



Advertisements
Similar presentations
Guide to Computer Forensics and Investigations Fourth Edition
Advertisements

Evidence Collection & Admissibility Computer Forensics BACS 371.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Guide to Computer Forensics and Investigations, Second Edition
Teaching Computer Forensics Using Student Developed Evidence Files Anna Carlin Cal Poly Pomona.
Guide to Computer Forensics and Investigations Fifth Edition
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
COS/PSA 413 Day 23. Agenda Lab 12 not graded –Missing two submissions Assignment 4 Posted –Due December 6 –Requires forensics analysis of evidence which.
Guide to Computer Forensics and Investigations Third Edition
COS 413 Day 13. Agenda Questions? Assignment 4 Due Assignment 5 posted –Due Oct 21 Capstone proposal Due Oct 17 Lab 5 on Oct 15 in N105 –Hands-on Projects.
COS/PSA 413 Day 5. Agenda Questions? Assignment 1 Corrected –3 A’s, 5 B’s & 1 C –Answers on next slide Assignment 2 Due Assignment 3 posted Quiz 1 on.
Guide to Computer Forensics and Investigations Third Edition
COS/PSA 413 Day 10. Agenda Lab 4 Write-ups are in –Will have corrected by next class Lab 5 write-ups due Oct 19 Assignment 3 posted (due Oct 21) Capstone.
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Third Edition
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 5: Data, PDA, and Cell Phone Forensics.
COS/PSA 413 Lab 4. Agenda Lab 3 write-ups over due –Only got 9 out of 10 Capstone Proposals due TODAY –See guidelines in WebCT –Only got 4 out of 10 so.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 5: Data, PDA, and Cell Phone Forensics.
COS/PSA 413 Day 15. Agenda Assignment 3 corrected –5 A’s, 4 B’s and 1 C Lab 5 corrected –4 A’s and 1 B Lab 6 corrected –A, 2 B’s, 1 C and 1 D Lab 7 write-up.
COS/PSA 413 Day 5. Agenda Questions? Assignment 2 corrected –Everyone failed this assignment! –Read the questions! Provide answers to THIS case not generic.
COS 413 Day 21. Agenda Assignment 6 Corrected –2 D’s, 6 F’s and 1 non-submit –Discussion on assignment Lab 7 Corrected –1 A, 2 B’s, 1 C, 3 D’s and 2 non-submits.
COS/PSA 413 Day 2. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Begin.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
By Drudeisha Madhub Data Protection Commissioner Date:
Data Acquisition Chao-Hsien Chu, Ph.D.
COEN 252 Computer Forensics
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
SUMMER BRIDGE PROGRAM DR. HWAJUNG LEE DR. ASHLEY PODHRADSKY Computer Forensics.
Guide to Computer Forensics and Investigations Fourth Edition
Teaching Digital Forensics w/Virtuals By Amelia Phillips.
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Computer Forensics Principles and Practices
Guide to Computer Forensics and Investigations Fourth Edition Chapter 1 Computer Forensics and Investigations as a Profession.
Chapter 2 Understanding Computer Investigations
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
1 IT Investigative Tools Tools and Services for the Forensic Auditor.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Guide to Computer Forensics and Investigations Fourth Edition
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Chapter 4 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fifth Edition All slides copyright Cengage Learning with.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
& Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
By: Jeremy Henry. Road Map  What is a cybercrime?  Statistics.  Tools used by an investigator.  Techniques and procedures used.  Specific case.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Guide to Computer Forensics and Investigations Fifth Edition
Guide to Computer Forensics and Investigations Third Edition
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Guide to Computer Forensics and Investigations Third Edition
Digital Forensics Chris Rozic.
Forensic Recovery of Evidence Device (FRED)
1 Guide to Computer Forensics and Investigations Sixth Edition Chapter 4 Processing Crime and Incident Scenes.
Presentation transcript:

COS/PSA 413 Day 5

Agenda Questions? Assignment 2 Redo –Due September 3:35 PM Assignment 3 posted –Due September 3:35 PM Quiz 1 on September 30 –Chaps 1-5, Open book, Open notes –20 M/C and 5 essays Lab 1 corrected –2 B’s, 6 C’s and 1 F –RTDQ! Lab 2 w rite-ups due Finish Discussion Processing Crime and incident Scenes Lab 3 in N105 –Hands-on project 5-4 and 5-5 –Follow instructions in

Lab –File listing, contents & memo –Just the facts>>no bias and no conclusions 2-2 –Memo – 25 clusters hits 2-3 –Memo 4 files, 30 clusters for BOOK 1 image files name and where found 2-4 –File listing 2-5 –Prodiscover resport with “deleted and file type” 2-6 –Prodiscover report with proper comments –3 files with the 3 words (one file each) Guide to Computer Forensics and Investigations3

4 Reviewing Background Information for a Case Company called Superior Bicycles –Specializes in creating new and inventive modes of human-driven transportation Two employees, Chris Murphy and Nau Tjeriko, have been missing for several days A USB thumb drive has been recovered from Chris’s office with evidence that he had been conducting a side business using company computers

Guide to Computer Forensics and Investigations5 Identifying the Case Requirements Identify requirements such as: –Nature of the case –Suspect’s name –Suspect’s activity –Suspect’s hardware and software specifications

Guide to Computer Forensics and Investigations6 Planning Your Investigation List what you can assume or know –Several incidents may or may not be related –Suspect’s computer can contain information about the case –If someone else has used suspect’s computer Make an image of suspect’s computer disk drive Analyze forensics copy \\Wallagrass\Software for N105 lab\COS413 Software\Chap05\InChap05\\Wallagrass\Software for N105 lab\COS413 Software\Chap05\InChap05

Guide to Computer Forensics and Investigations7 Conducting the Investigation: Acquiring Evidence with AccessData FTK Functions –Extract the image from a bit-stream image file –Analyze the image

Guide to Computer Forensics and Investigations8

9 Conducting the Investigation: Acquiring Evidence with AccessData FTK (continued)

Guide to Computer Forensics and Investigations10

Guide to Computer Forensics and Investigations11

Guide to Computer Forensics and Investigations12 Conducting the Investigation: Acquiring Evidence with AccessData FTK (continued)

Guide to Computer Forensics and Investigations13

Guide to Computer Forensics and Investigations14 Conducting the Investigation: Acquiring Evidence with AccessData FTK (continued)

Guide to Computer Forensics and Investigations15 Summary Digital evidence is anything stored or transmitted on electronic or optical media Private sector –Contained and controlled area Publish right to inspect computer assets policy Private and public sectors follow same computing investigation rules Criminal cases –Require warrants

Guide to Computer Forensics and Investigations16 Summary (continued) Protect your safety and health as well as the integrity of the evidence Follow guidelines when processing an incident or crime scene –Security perimeter –Video recording As you collect digital evidence, guard against physically destroying or contaminating it Forensic hash values verify that data or storage media have not been altered

Guide to Computer Forensics and Investigations17 Summary (continued) To analyze computer forensics data, learn to use more than one vendor tool You must handle all evidence the same way every time you handle it After you determine that an incident scene has digital evidence, identify the digital information or artifacts that can be used as evidence