Professional Development: Group 1 Career Topic COMPUTER FORENSICS.

Slides:



Advertisements
Similar presentations
Internet Investigations COEN 252 Computer Forensics  Thomas Schwarz, S.J
Advertisements

Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Computer Forensics and Digital Investigation – a brief introduction Ulf Larson/Erland Jonsson.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Aim: What strategies can we use to keep our financial information safe online? Do Now: What do you do to protect your information online?
Skills: none Concepts: data and program files, IP packet, packet header, packet body, IP address, host name This work is licensed under a Creative Commons.
The University of Hull Centre For Internet Computing Spam ‘n’ chips A discussion of internet crime Angus M. Marshall BSc CEng MBCS FRSA.
Design Aspects. User Type the URL address on the cell phone or web browser Not required to login.
Technology for Computer Forensics by Alicia Castro.
Computer Forensics What is Computer Forensics? What is the importance of Computer Forensics? What do Computer Forensics specialists do? Applications of.
Overview of Computer Forensics Highline Community College Seattle University University of Washington in conjunction with the National Science Foundation.
Introduction To Information Technology. Defining Information What is Information? Information is any knowledge that comes to our attention. That could.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Lesson 1: Understanding Browsers. This unit is a set of investigations into how to protect against digital threats, and how to detect digital crimes.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
COEN 152 Computer Forensics Introduction to Computer Forensics.
APA of Isfahan University of Technology In the name of God.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent.
Licitware a forensic software tool designed to investigate computer crimes.
Skills: finding IP addresses, domain names and organization (whois) information Concepts: host, IP address, domain name, command line interface, graphical.
Computer Forensic Technician and Digital Data Recovery You can hit delete, but it’s not gone.
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University.
Objective Understand concepts used to web-based digital media. Course Weight : 5%
Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
Computer Forensics specialist By Andrew Shore Davis Sanders.
S-1 © RGP & UW-CISA 2010 Business & Technology Environment Summer 2010 Robert G Parker.
Disciplines of Forensic Science Chapter 1. Disciplines of Forensic Science Criminalistics Digital & Multimedia Sciences Engineering Sciences Jurisprudence.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
The process side of forensic investigations Patrick Green Network and Security Manager.
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University September 28, 2007.
Guide to Computer Forensics and Investigations, Second Edition Chapter 1 Computer Forensics and Investigations as a Profession.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
Copyright Grace, Ienash, Nick. Copyright - International  Instruments of copyright  World Intellectual Property Organisation and EU Convention on Cybercrime.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau
Cybercrime What is it, what does it cost, & how is it regulated?
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Internet FTP to network. Preliminary Steps a FTP program is used and executed such as WS_FTP LE Information needed –host name –user id –password.
11Digital Evidence as Alibi Dr. John P. Abraham Professor UTPA.
Computer Forensics: A 5 Minute Introduction Santa Clara University Department of Computer Engineering April 2007.
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
* Fingerprint technicians typically work in a crime laboratory or within law enforcement agencies. * A fingerprint technician works to recreate the circumstances.
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Digital Forensics Market Analysis: By Forensic Tools; By Application (Network Forensics, Mobile Forensics, Database Forensics, Computer Forensics) - Forecast.
Julian Moore DIGITAL ENTREPRENEUR. My Skills Information Technology ◦IC3 Certified ◦Experience with Core Microsoft Office Programs Interactive Media ◦Multiple.
Cell Phone Forensics Investigator - ICFECI
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Introduction: Understanding Information Technology
Forensic Computer Techniques
Criminal Prosecutors with Computer Forensics
Associate Degree in Cyber security
Web page a hypertext document connected to the World Wide Web.
Section 4 Crime and Punishment
Digital Forensics Chris Rozic.
What is Information Security?
CET4860 Mark Pollitt Associate Professor
Careers & Education Crime Scene Investigation
Careers & Education in Forensic Science
Careers & Education in Forensic Science
Forensic Psychiatrist
Presentation transcript:

Professional Development: Group 1 Career Topic COMPUTER FORENSICS

COMPUTER FORENSICS… ΩiΩis the technological aspect of retrieving evidence to use within criminal or civil courts of law ΩaΩallow the recovery of damaged and deleted files ΩcΩcan used as lead evidence to indict criminal offenders or find the location of a missing person

COMPUTER FORENSICS EXPERTS… ΩIΩIdentify sources digital evidence. ΩPΩPreserve the evidence. ΩAΩAnalyze the evidence. ΩPΩPresent the findings.

COMPUTER FORENSICS DEPICTION ΩRΩResurrect "deleted" files. ΩRΩRecover passwords. ΩAΩAnalyze file access, modification and creation times. ΩVΩView and analyze system and application logs.

ΩDΩDetermine the activity of users and/or applications on a system. ΩDΩDiscover IP addresses, host names, network routes and Web site information. ΩAΩAnalyze s for source information and content

COMPUTER FORENSIC QUALIFICATIONS ΩIΩIT/CRIMINAL JUSTICE BA/MASTERS DEGREE ΩCΩCERTIFICATIONS –C–COMPUTER FORENSIC EXTERNAL CERT (CFCE) –C–CERTIFIED COMPUTER CRIME INVESTIGATOR (CCCI) –G–GCFA (CERTIFIED ANALYST) –I–ICAP (INTERNET CRIMES AGAINST PEOPLE) –P–Presenting Digital Evidence at Trial - (PDET)