Computer Forensics Mr.PRAWEE PROMPONMUANG M.Sc(Forensic Science) NO.515020181-9.

Slides:



Advertisements
Similar presentations
Security and Control Soetam Rizky. Why Systems Are Vulnerable ?
Advertisements

COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
CC4100 Active Cellular Intercept Technologies
Computer Forensics and Access Data’s Ultimate Tool Kit Presented by: Kaukab ZuberiVice Chairman KRYS Dustin HulburtSenior Trainer and Manager Acces Data.
The next generation in digital forensics Mobile Phones A New Frontier in Digital Forensics BK Forensics.
2 Language of Computer Crime Investigation
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Data Collection, Analysis and Preservation Computer Forensics: Data Collection, Analysis and Preservation Kikunda Eric Kajangu, Cher Vue, and John Mottola.
MSc in Business Information Technology
Guide to Computer Forensics and Investigations Fourth Edition
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
Computer Forensics What is Computer Forensics? What is the importance of Computer Forensics? What do Computer Forensics specialists do? Applications of.
What is meant by computer forensics?  Principle, Function of computer forensics.  History about computer forensics.  Needs of computer forensics.
Computer Forensics Tools
L EE & A LLEN F ORENSIC C OMPUTING S ERVICES A CAREER IN FORENSIC COMPUTING CRAIG G EARNSHAW L EE & A LLEN F ORENSIC C OMPUTING S ERVICES.
Bank Crime Investigation Techniques by means of Forensic IT
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
By Drudeisha Madhub Data Protection Commissioner Date:
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Guide to Computer Forensics and Investigations, Second Edition
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Guide to Computer Forensics and Investigations, Second Edition
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent.
SUMMER BRIDGE PROGRAM DR. HWAJUNG LEE DR. ASHLEY PODHRADSKY Computer Forensics.
Launch Pack EMEA PCS Product Marketing & Consumer Business Group v1.0 Motorola Document Confidential MOTOROLA and the Stylized M Logo are registered in.
Licitware a forensic software tool designed to investigate computer crimes.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
Computer Forensics Iram Qureshi, Prajakta Lokhande.
Digital Forensics
Objectives Overview Identify the qualities of valuable information Describe various information systems used in an enterprise Identify the components of.
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
Computer Forensics Principles and Practices
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 1 Computer Forensics and Investigations as a Profession.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
© Sapphire 2006 Computer Misuse in the Workplace You only get one chance..... David Horn You only get one chance...
First Look at Security and Privacy Jeremiah Burleson.
Deloitte Forensic Forensic Technology Conference of Regulatory Officers - CORO November 2012.
Guide to Computer Forensics and Investigations, Second Edition Chapter 1 Computer Forensics and Investigations as a Profession.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
January 2001NETWORK ICE1 Forensics. January 2001NETWORK ICE2 What is Computer Forensics? Acquisition of Computer Evidence Preservation Analysis Court.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
CONTROLLING INFORMATION SYSTEMS
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
By: Jeremy Henry. Road Map  What is a cybercrime?  Statistics.  Tools used by an investigator.  Techniques and procedures used.  Specific case.
Digital Forensics Market Analysis: By Forensic Tools; By Application (Network Forensics, Mobile Forensics, Database Forensics, Computer Forensics) - Forecast.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
* Fingerprint Development* OUR ORGANIZATION PROVIDES THE SERVICES OF FINGERPRINT (INVISIBLE OR PARTIAL) DEVELOPMENT THROUGH VARIOUS TECHNIQUES I.E. POWDER.
Cell Phone Forensics Investigator - ICFECI
Visit:  If you have lost important files, take a deep breath and rest assured that disk recovery software can likely help.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Chapter 7: Investigating Theft Acts
Computer Forensics 1 1.
Published Date: 24 February, 2016
ANALYSIS OF CELL PHONES
Kbv Research | +1 (646) | Global Digital Forensics Market Knowledge Based Value (KBV) Research Full report:
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
GLOBAL DIGITAL FORENSICS MARKET 2017 – 2025 Published by :Accurize Market Research Pvt. Ltd. Copyright © 2019 Accurize Market Research
Introduction to Digital Forensics
Presentation transcript:

Computer Forensics Mr.PRAWEE PROMPONMUANG M.Sc(Forensic Science) NO

Computer forensics is the scientific examination and analysis of data held on, or retrieved from, computer storage media in such a way that the information can be used as evidence in a court of law. The subject matter includes:analysis

The secure collection of computer data The examination of suspect data to determine details such as origin and content The presentation of computer based information to courts of law The application of a country's laws to computer practice.

The Computer Forensic Objective The objective in computer forensics is quite straightforward. It is to recover, analyze and present computer based material in such a way that it is useable as evidence in a court of law.

The Need for Computer Forensics The need for computer forensic services and equipment has derived from the widespread use of personal computers in both business and the home and the subsequent needs of crime investigators to have access to computer based information.

The group has activities in four main area Computer Forensic Equipment Computer Forensic Training Computer Forensic Analysis Computer Forensic Case Support

Equipment DIBS USA Inc produces the world's largest, most well-known and respected range of computer forensic hardware and software. Specifically designed to copy, analyze and present computer data in a forensically sound manner, DIBS equipment has been in use for nearly a decade. Evidence gathered using the equipment has been presented in courts around the world on thousands of occasions. It has never been rejected.

Equipment DIBS® Mobile Forensic Workstation DIBS® Mobile Forensic Workstation DIBS are regarded by the international investigative community as the definitive solution in computer forensics, with offices in Europe, the USA, Asia, South America and the Middle East.

DIBS Aircapture A complete mobile forensic laboratory for collection and analysis of suspect data. Supplied fully configured with advanced software Fast copying of suspect hard drives

An advanced, but easy to use, forensic workstation for the analysis of most media types and compatible with all major forensic software Comprehensive on-site collection and analysis of suspect computer data

DIBS Aircapture For the first time the wireless network communications of hi-tech criminals and terrorists can be identified, recorded and analysed

AccessData's Ultimate Toolkit The Ultimate Toolkit contains everything needed to investigate, secure and analyze computer or digital data. The UTK includes the Forensic Toolkit, Registry Viewer, Password Recovery Toolkit, Distributed Network Attack and includes technical phone support with free software subscription service for twelve months

DIBS Turnkey Solutions Complete, custom designed laboratories to meet individual client needs

Computer forensics is a burgeoning discipline. With the use of the DIBS® range of dedicated computer forensic equipment and the proven and accepted DIBS® methodology, civil and criminal computer crime cases continue to be prosecuted in courts across the globe.

DIBS Investigation and Analysis Services In investigations the crucial document is increasingly found only in an intangible form, as a series of patterns in microscopic magnetic particles. To translate these patterns into meaningful documents that will be accepted as evidence requires specialist techniques and equipment.

The DIBS group can: Find and recover information apparently lost in deleted files Search all corners of a hard disk for suspect data Print out computer evidence and present it in court Write the reports to support a case Testify as experts and help to prove the facts

The types of cases worked on in both the commercial and criminal arenas include: Theft of intellectual property Employment disputes Destruction of/misappropriation of data Alteration of data, alteration/misuse of programs Use of unlicensed software

Illegal duplication of software Unauthorized access to a computer system Unauthorized use of a company's computer for private gain Unofficial access to confidential data Downloading/distribution of pornographic material misuse

Terrorism Blackmail Money laundering Murder Rape Pedophilia Insurance fraud

Computer forensics software Hard Drive Wipe Sector Forensics offers hard drive wipe services which will completely over write all information on the hard drive.

Computer forensics software Hard Drive Copy Hard disk cloning and duplicating services for business that need to continue trading uninterrupted.

Computer forensics software Mobile Phone Investigations The Mobile telephone has evolved from a remote voice communication tool into a multi purpose personal communications device.

Computer forensics software Mobile phone examinations Due to the many types of phones on the market today all with the own unique operating systems, various techniques are used to extract the information from the mobile phone.

Computer forensics software Computer Expert Witness In lawsuits, it’s ever more likely that digital evidence will be used as an integral part of your case.

Computer forensics software SIM Card Forensic The SIM (Subscriber Identity Module) is a smart card that is used in all Mobile phones; The SIM can contain valuable evidence.

Computer forensics software USIM Card Forensics The USIM (Universal Subscriber Identity Module) is a smart card that is used in all 3G Mobile phones; The USIM can contain more information than a standard SIM.

Computer forensics software Information Technology Audits Information Technology Audits can provide a snapshot of any computer system to aid in an audit of employee usage. Information Technology Audits

Digital Forensic Specialists: Our highly experienced team are fully trained in all aspects of: Digital Forensics Computer Forensics Mobile Phone Forensics Computer Forensic Advice Computer Analysis Cell Site Analysis E-Discovery

REFERANCE ts.html (©2009 DIBS® USA Inc. DIBS® is a Registered Trademark of DIBS USA, Inc.)

สวัส ดี