COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J. 2009 w/ T. Scocca.

Slides:



Advertisements
Similar presentations
MSc in Business Information Technology
Advertisements

Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. Computer Forensics Consultant Jawz Inc.
Computer Forensics and Digital Investigation – a brief introduction Ulf Larson/Erland Jonsson.
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Third Edition
Forensic and Investigative Accounting Chapter 2 Forensic Accounting Education, Institutions, and Specialties © 2007 CCH. All Rights Reserved W. Peterson.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Fraud, Waste & Abuse DEFICIT REDUCTION ACT OF 2005 Presented by: MARCH Vision Care, 2013.
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations Third Edition
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
COEN 152 Computer Forensics Introduction to Computer Forensics.
Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland.
COEN 252 Computer Forensics Windows Evidence Acquisition Boot Disk.
An Event-based Digital Forensic Investigation Framework Brian D. Carrier Eugene H. Spafford DFRWS 2004.
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations Fourth Edition Chapter 1 Computer Forensics and Investigations as a Profession.
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
CSN08101 Digital Forensics Lecture 4A: Forensic Processes Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak.
What is FORENSICS? Why do we need Network Forensics?
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
Undergraduate Technology Programs John Baker Johns Hopkins University Carey Business School
Computer Forensics Principles and Practices
Guide to Computer Forensics and Investigations Fourth Edition Chapter 1 Computer Forensics and Investigations as a Profession.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
University of Sunderland Professionalism and Personal Skills Unit 7 Professionalism and Personal Skills Lecture 7: Computer Crime.
ISA Domain 10: Legal, Regulations, Compliance, & Investigations ISA 562 Internet Security Theory & Practice.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
Laws and Resources. Understanding Case Law  Technology is evolving at an exponential pace  Existing laws and statutes can’t keep up change  Case law.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
Chapter 1 Computer Forensics and Investigations as a Profession.
Guide to Computer Forensics and Investigations, Second Edition Chapter 1 Computer Forensics and Investigations as a Profession.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau
& Selected Topics: Digital Forensics Introduction Xinwen Fu.
Thomas Schwarz, S.J. SCU Comp. Eng COEN 252 Collection of Evidence.
Cybercrime What is it, what does it cost, & how is it regulated?
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
Ethics Ethics – Rules that help tell the difference between right and wrong Values – Tell us what we think is important and helps us make decision about.
Computer Forensics: A 5 Minute Introduction Santa Clara University Department of Computer Engineering April 2007.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
Dr. Terry M. Mors, Ed.D. © Mors Copyright 2010 What is the definition of crime? There are multiple definitions But basically, it is … conduct that.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Electronic Crime: Incident Reporting and Forensics Between Law Enforcement and Private Industry D/Sgt. Michael Harrington CEECS, CFCE, EnCE Michigan State.
CyberLaw. Assignment Review Cyber LawCyberLaw 6/23/2016 CyberLaw 3 Securing an Organization  This Chat: CyberLaw and Compliance –Forensics –Privacy.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Criminal Prosecutors with Computer Forensics
Associate Degree in Cyber security
Chapter 13 The IT Professional
Computer Forensics 1 1.
Introduction to Computer Forensics
Computer Forensics Discovery and recovery of digital evidence
Introduction to Computer Forensics
Guide to Computer Forensics and Investigations Fourth Edition
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Ad Hoc Phase Structured Phase Enterprise Phase
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Chapter 13: The IT Professional
Introduction to Digital Forensics
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J w/ T. Scocca

Computer Forensics Digital Investigation Focuses on a digital device Computer Router Switch Cell-phone SIM-card …

Computer Forensics Digital Investigation Focuses on a digital device involved in an incident or crime Computer intrusion Generic criminal activity Perpetrator uses internet to gather information used in the perpetration of a crime. Digital device is an instrument of a crime Perpetrator uses cell-phone to set-off a bomb. Details are sensitive to national security. If you get clearance, I can tell you who to ask. scams Internet auction fraud Computer is used for intrusion of another system.

Computer Forensics Digital Investigation Has different goals Prevention of further intrusions. Goal is to reconstruct modus operandi of intruder to prevent further intrusions. Assessment of damage. Goal is to certify system for safe use. Reconstruction of an incident. For criminal proceedings. For organization-internal proceedings.

Computer Forensics Digital Investigation Process where we develop and test hypotheses that answer questions about digital events. We can use an adaptation of the scientific method where we establish hypotheses based on findings and then (if possible) test our hypotheses against findings resulting from additional investigations.

Computer Forensics Evidence Procedural notion That on what our findings are based. Legal notion Defined by the “rules of evidence” Differ by legislation “Hear-say” is procedurally evidence, but excluded (under many circumstances) as legal evidence.

Computer Forensics Forensics Used in the “forum”, especially for judicial proceedings. Definition: legal

Computer Forensics Digital Crime Scene Investigation Process System Preservation Phase Evidence Searching Phase Event Reconstruction Phase Note: These phases are different activities that intermingle.

Computer Forensics Who should know about Computer Forensics Those involved in legal proceedings that might use digital evidence Judges, Prosecutors, Attorneys, Law Enforcement, Expert Witnesses Those involved in Systems Administration Systems Administrators, Network Administrators, Information Security Officers Those writing procedures Managers

Computer Forensics Computer Forensics presupposes skills in Ethics Law, especially rules of evidence System and network administration Digital data presentation Number and character representation Systems OS, especially file systems. Hardware, especially disk drives, memory systems, computer architecture, … Networking Network protocols, Intrusion detection, … Information Systems Management

Computer Forensics Swiss Army Knife for Investigations Useful in the following areas: HR Policy Violations Insider Trading Allegations Compliance Audits / Validation Network Misuse Workplace Harassment Intellectual Property Protection IT Check & Balance Ombudsman’s Office Whistleblower Allegations Internal Fraud eDiscovery

COEN 252 Prerequisites Required: Good moral character. Ability and willingness to respect ethical boundaries. Familiarity with at least one type of operating system. (Windows, Unix/Linux, DOS experience preferred.) Some programming. Access to a computer with Hex editor. Desired: Familiarity with OS Theory. Familiarity with Networking. Some Knowledge of U.S. Legal System.

COEN 252 Text Books COHEN, F. Digital Forensic Evidence Examination. 2 nd edition. Fred Cohen & Associates, (Optional)

COEN 252 Text Books - Optional NELSON, B., PHILLIPS, A., STEUART, C. Guide to Computer Forensics And Investigations. 2 nd edition. Course Technology, 2010.

COEN 252 Text Books – Of Interest Carrier, Brian: File System Forensic Analysis. Addison-Wesley Professional

Computer Forensics Software Commercial FTK – Forensic Toolkithttp:// WinHexhttp:// EnCasehttp:// Parabenhttp:// NTIhttp:// Maresware Digital Intelligence Open Source Coroner’s Toolkit Knoppix The Sleuth Kit Penguin Sleuth Kit BackTrackhttp://