Overview of Computer Forensics Highline Community College Seattle University University of Washington in conjunction with the National Science Foundation.

Slides:



Advertisements
Similar presentations
Digital Literacy. Productivity Programs Digital Literacy Courses and Topics Computer Basics Security and Privacy Internet and Web Basics Digital Lifestyle.
Advertisements

Basic Computer Vocabulary
Guide to Computer Forensics and Investigations Fourth Edition
Data Collection, Analysis and Preservation Computer Forensics: Data Collection, Analysis and Preservation Kikunda Eric Kajangu, Cher Vue, and John Mottola.
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
Intrusion Detection Systems and Practices
CSCI 3 Introduction to Computer Science. CSCI 3 Course Description: –An overview of the fundamentals of computer science. Topics covered include number.
Manuka project IEEE IA Workshop June 10, Agenda Introduction Inspiration to Solution Manuka Use SE Approach Conclusion.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
Computer Forensics Mr.PRAWEE PROMPONMUANG M.Sc(Forensic Science) NO
Robert Crawford, MBA West Middle School.  Describe what an operating system does.  Summarize why compatibility is an issue for computer users.  Explain.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Developed by Klaus Knopper Linux Consultant. What is Knoppix?  Unix-like operating system  Run directly from CD or DVD  Bootable from USB flash drive.
Guide to Computer Forensics and Investigations, Second Edition
Hands-on: Capturing an Image with AccessData FTK Imager
Guide to Computer Forensics and Investigations, Second Edition Chapter 9 Data Acquisition.
Digital Literacy. Productivity Programs Digital Literacy Courses and Topics Computer Basics Security and Privacy Internet and Web Basics Digital Lifestyle.
COEN 252 Computer Forensics Windows Evidence Acquisition Boot Disk.
Technology Solutions Conference School Security Technology Solutions Conference School Security.
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations Fourth Edition
Course ILT Course Code CSN 208 Network Security. Course ILT Course Description This course provides an in-depth study of network security issues, standards,
Damien Leake. Definition To examine digital media to identify and analyze information so that it can be used as evidence in court cases Involves many.
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Electronic Discovery refers to the discovery of electronic documents and data…including , web pages, word processing files, computer databases, and.
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
Computer Forensics Iram Qureshi, Prajakta Lokhande.
Digital Crime Scene Investigative Process
Computer & Network Security
Professional Development: Group 1 Career Topic COMPUTER FORENSICS.
Models of Models: Digital Forensics and Domain-Specific Languages Daniel A. Ray and Phillip G. Bradford The University of Alabama Tuscaloosa, AL
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Security in Computer System 491 CS-G(172) By Manesh T
Guide to Computer Forensics and Investigations Fourth Edition Chapter 1 Computer Forensics and Investigations as a Profession.
Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Guide to Computer Forensics and Investigations Fourth Edition
Laws and Resources. Understanding Case Law  Technology is evolving at an exponential pace  Existing laws and statutes can’t keep up change  Case law.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University September 28, 2007.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Topic 5: Basic Security.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Topic 5a Operating System Fundamentals. What is an operating system? a computer is comprised of various types of software device drivers (storage, I/O,
Security fundamentals Topic 2 Establishing and maintaining baseline security.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Virtualization One computer can do the job of multiple computers, by sharing the resources of a single computer across multiple environments. Turning hardware.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
Chapter 3 Data Acquisition Guide to Computer Forensics and Investigations Fifth Edition All slides copyright Cengage Learning with additional info from.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Digital Forensics and Hand Held Devices Robert Trimble COSC
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
CompTIA Server+ Certification (Exam SK0-004)
Alicia A. Coon COSC 480 October 27, 2006
Backdoor Attacks.
A Level Information Communication Technology AQA (2520)
TexPREP Summer Camp Computer Science
Exam Information CSI5107 Network Security.
CET4860 Mark Pollitt Associate Professor
John Thomas Dimitropoulos Team and website: Lostoneprodigy.com
Presentation transcript:

Overview of Computer Forensics Highline Community College Seattle University University of Washington in conjunction with the National Science Foundation

Computer Forensics The application of forensic science techniques to the discovery, collection and analysis of digital evidence.

Data Recovery Digital recovery of data Digital recovery of data Not connected with an investigation typically Not connected with an investigation typically Have a good idea of what you are looking for Have a good idea of what you are looking for Can involve Can involve file repairfile repair repair repair Physical damage to drives Physical damage to drives

Disaster Recovery Natural Disaster Natural Disaster Power outages Power outages Mechanical failures Mechanical failures Productivity Productivity

Suspect / Victim Drive corporate investigation corporate investigation fraudfraud embezzlementembezzlement corporate espionagecorporate espionage policy violationspolicy violations criminal investigation criminal investigation kidnappingkidnapping murdermurder drugsdrugs

Suspect / Victim Drive civil investigations civil investigations divorcedivorce harassmentharassment stalkingstalking

Host Based Forensics External or internal attack External or internal attack Known OS Known OS Known vulnerabilities Known vulnerabilities isolate what harm was done isolate what harm was done determine method determine method notify Network Admin notify Network Admin

Network Based Forensics External and Internal attacks External and Internal attacks determines how someone got in determines how someone got in what they did what they did what ports were used what ports were used tries to determine source tries to determine source

Course Topics Review OSs Review OSs file structurefile structure boot up issuesboot up issues Review hardware and storage media Review hardware and storage media Available software Available software Evaluation of new software Evaluation of new software Windows Registry Windows Registry

Course Topics RAID devices RAID devices PDAs PDAs Cell phones Cell phones Combos Combos Compressed drives Compressed drives Multiple drives Multiple drives Sparse collection Sparse collection

Course Topics Linux and computer forensics Linux and computer forensics Knoppix STD Knoppix STD The Auditor and Helix The Auditor and Helix Database Investigations Database Investigations