Company LOGO Computer Security and Forensics By Kim Cassinelli, Eriko Yamaguce and Stefan Schuebel.

Slides:



Advertisements
Similar presentations
Security and Control Soetam Rizky. Why Systems Are Vulnerable ?
Advertisements

Things To Consider  If you were an employer would you condone the use of personal electronics?  Would screening s that come through the work.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
Computer Forensics What is Computer Forensics? What is the importance of Computer Forensics? What do Computer Forensics specialists do? Applications of.
Exotic Delivery :: Jeremiah, Corey, & Alan. Exotic Delivery No matter how rare you think it is, We can make your dream pet a reality! We import exotic.
Bank Crime Investigation Techniques by means of Forensic IT
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
New Data Regulation Law 201 CMR TJX Video.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Module 1: Installing Windows XP Professional. Overview Manually Installing Windows XP Professional Automating a Windows XP Professional Installation Using.
Securing Information Systems
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
MANAGEMENT INFORMATION SYSTEMS Data Raw facts and figures. Information Knowledge gained from processing data. Management information system (MIS) Organized.
IT Security for Users By Matthew Moody.
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
Computer Forensics Iram Qureshi, Prajakta Lokhande.
Ways to organize electronic files Witness fitness By: Simran and Navneet.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
SSD: Cryptography. Learning Outcomes After the scenario has been completed, you are expected to be able to: Explain the relative strengths of encryption.
Crime & Malpractice AS Module Heathcote Ch. 10.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Dangerous Documents. Legal Compliances State and federal laws Contractual obligations Subject to an affirmative legal duty to establish and maintain certain.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.
Computers Computer & Internet Security How Computer Forensics Works What is the Year 2038 problem? Could hackers devastate the U.S. economy?
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
By: Megan Guild and Lauren Moore. Concept Map Mountain Stream Co. OS Active wear Computer Security Their Questions Details Examples Computer Forensics.
Topic 5: Basic Security.
Scott Charney Cybercrime and Risk Management PwC.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter Extension 24 Computer Crime and Forensics.
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
1 The 28 th Annual International Computer Software and Applications Conference COMPSAC 2004 Hong Kong September 28, :30 am – 12:00 noon Session.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
By: Jeremy Henry. Road Map  What is a cybercrime?  Statistics.  Tools used by an investigator.  Techniques and procedures used.  Specific case.
Digital Forensics Market Analysis: By Forensic Tools; By Application (Network Forensics, Mobile Forensics, Database Forensics, Computer Forensics) - Forecast.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Ron Enger Southern Oregon Educational Service District Medford, Oregon Cliff Ehlinger Grant Wood Area Education Agency Cedar Rapids, Iowa December, 2006.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Digital Forensics Ryan Lord. Road Map - What is Digital Forensics? - Types of computer crimes - Tools - Procedures - Cases - Problems.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
Security Risks Todays Lesson Security Risks Security Precautions
Systems Security Keywords Protecting Systems
Computers: Tools for an Information Age
Computer Forensics 1 1.
UNIT 19 Data Security 2.
Types of information systems in organizations and its characteristics
Securing Information Systems
Global Digital Forensics Market Research Digital Forensics Market, Size, Share, Intelligence, Company Profiles, Market Trends, Strategy, Analysis, Forecast.
digital forensics market analysis, digital forensics market size, global digital forensics market,
Unit 1.6 Systems security Lesson 3
Digital Forensics in the Corporation
Digital Forensics Ryan Lord.
Web Service Accounting System
Ad Hoc Phase Structured Phase Enterprise Phase
Neil Kirton and Zoë Newman
Introduction to the PACS Security
Presentation transcript:

Company LOGO Computer Security and Forensics By Kim Cassinelli, Eriko Yamaguce and Stefan Schuebel

Agenda 1. Overview of Desert Tan 2. Computer Security 3. Computer Forensics 4. Conclusions

Concept Map

Desert Tan Desert Tan is a small company which provides customers with tanning options. They offer state-of-the-art equipment in both light beds and spray on tans. Currently they have 10 different franchise locations within the Northwest. Their unique online presence allows customers to create an online account similar to online banking.

Desert Tans‘ Questions How can we provide customers safe and secure online transactions? How can computer forensics help monitor inappropriate employee and franchise activity? What are the costs associated with implementing a monitoring system?

Definition Computer Security Computer security is a branch of technology known as information security as applied to computer. The objective of computer security varies and can include protection of information from theft or corruption, or the preservation of availability, as defined in the security policy. Computer security imposes requirements on computers that are different from most system requirements because they often take the form of constraints on what computers are not supposed to do. Source:

What Covers Computer Security? Source: data bases on CSI Survey 2007

Survey Reading List

What type of computer attacks do you know? Source: CSI Survey 2007

Estimate the total loss in Dollar due to computer attacks in 2007 for the US: $ 66,930,950 Source: CSI Survey 2007

Estimate the percentage loss due to insiders: Source: CSI Survey 2007

Estimate the percentage of users having an anti virus software, firewall, anti spyware software, forensic tools: Source: CSI Survey % 97% 80% 40%

6 layers of security Source:

Telephone Interview to Trend Micro Question: What are the common 3 questions about computer security from small companies? No. 3 How often should they upload their computer security software? No. 2 What should they do? No. 1 How much should they prepare for computer security?

Definition Computer Forensics Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums. Computer forensics adheres to standards of evidence admissible in a court of law. Computer forensics experts investigate data storage devices, (such as hard drives, USB Drives, CD-ROMs, floppy disks, tape drives, etc.), identifying, preserving, and then analyzing sources of documentary or other digital evidence. Computer Forensics Video Source:

Enron Case Arthur Andersen & Company said the accounting firm had destroyed a ''significant but undetermined'' number of documents relating to Enron and its finances. Questions for the Class: –What should Enron have done as an organization when these allegations were made? –What would you have done if you were the CEO, CTO, or lawyer of Enron?

Question 1 How can we provide customers safe and secure online transactions? –Only certain employees have access to customer information –PayPalPayPal PayPal includes all these features: Secure system Fraud protection Reporting tools Shipping and sales tax tools

Question 2 How can computer forensics help monitor inappropriate employee and franchise activity? All internet security Your company needs to decide the level of protection they are looking for.

Question 3 - Cost Analysis Source: CSI Survey 2007

Recommendet next steps Do more research on what you are currently using Use PayPal Discuss with your IT specialist which security programs are best for your company and what are appropriate next steps

QUESTIONS??