Jillian Brown. Develop realistic, high quality case material for computer forensic investigations Suitably complex primary data Apply theoretical aspects.

Slides:



Advertisements
Similar presentations
Digital Literacy. Productivity Programs Digital Literacy Courses and Topics Computer Basics Security and Privacy Internet and Web Basics Digital Lifestyle.
Advertisements

Tanmoy Sarkar, Johnny Wong, Samik Basu Response to Collaborative Attacks Against Network Vulnerability Iowa State University, Department Of Computer Science.
Managing Spread September 18, Target Population for Spread Population of Focus for your Aim Spread -Other clinicians -Other clinics -Other organizations.
1 Vol. 01. p Vol. 01. p Vol. 01. p.20.
1 Vol. 03. p Vol. 03. p Vol. 03. p.21.
1 Vol. 02. p Vol. 02. p Vol. 02. p.19.
1 Vol. 03. p Vol. 03. p Vol. 03. p.16.
1 Vol. 02. p Vol. 02. p Vol. 02. p.30.
1 Vol. 03. p Vol. 03. p Vol. 03. p.35.
1 Vol. 02. p Vol. 02. p Vol. 02. p.10.
1 Vol. 01. p Vol. 01. p Vol. 01. p.14.
MSc in Business Information Technology
Fingerprinting Continued...
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
IMS5024 Week 3 Semester 2, IMS 5024 Object orientation (1)
IMS5024 Week 61 IMS 5024 Object orientation (1). IMS5024 Week 62 Content Individual assignment date Group assignment What is object orientation? n Place.
Preserving and Providing Access to Complex Objects PASIG Washington DC, 23 May, 2013 (Speaker Info) Frodo Baggins Ring Bearer FOTR, LLC Natasa Milic-Frayling.
Mastering Windows Network Forensics and Investigation Chapter 14: Other Audit Events.
Comparing Python and Visual Basic
Digital Literacy. Productivity Programs Digital Literacy Courses and Topics Computer Basics Security and Privacy Internet and Web Basics Digital Lifestyle.
Distributed Systems. Outline  Services: DNSSEC  Architecture Models: Grid  Network Protocols: IPv6  Design Issues: Security  The Future: World Community.
Quality Assurance for a modern treatment planning system
Unit 1 – Digital Literacy – Computer Terms Mr. M. Goldberg, Martingrove C.I., 2011 Digital Literacy Review By Mr. M. Goldberg – Martingrove C.I. October,
Winrunner Usage - Best Practices S.A.Christopher.
Models of Models: Digital Forensics and Domain-Specific Languages Daniel A. Ray and Phillip G. Bradford The University of Alabama Tuscaloosa, AL
Minors in Information System Dr. Feng Liu Department of Mathematics, Sciences and Information System.
Marking Scheme ISM ISM Top-up. Project Contents Abstract, – A one page summary (max. 400 words) of the Intent, work undertaken. Introduction, – An overview.
Synopsis of current BIEN and Enquist projects managed by Martha iPlant 2014.
Aspects of Music Information Retrieval Will Meurer School of Information University of Texas.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
VIRTUAL WORLDS IN EDUCATIONAL RESEARCH © LOUIS COHEN, LAWRENCE MANION & KEITH MORRISON.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 23 – The Registry.
Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection.
Artificial Intelligence Final Project Text document Classification with new type Rule-based PLM Chang, Jung Woo Shin, Dong In Jung, Hyun Joon School of.
IST 222 Day 3. Homework for Today Take up homework and go over Go to Microsoft website and check out their hardware compatibility list.
Northumbria Conference 2009 Philip Anderson – Programme Leader BSc Computer Forensics Christopher Laing – Programme Leader BSc Ethical Hacking.
First week. Catalog Description This course explores basic cultural, social, legal, and ethical issues inherent in the discipline of computing. Students.
2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA Automatically Creating Realistic Targets for Digital Forensics Investigation  Frank Adelstein.
Harnessing P2P Power in the Classroom Julita Vassileva Department of Computer Science University of Saskatchewan, Canada.
© 2005 Illinois Mathematics and Science Academy Evaluating information on the Web: How have college students learned to evaluate Internet information?
Models of Models: Digital Forensics and Domain-Specific Languages
Chapter 16 – Careers in Information Technology
A.M. Mustehsan E Commerce: Chapter-1
Unit 2, Lesson 5 Windows User Accounts
Cryptography Sage Interlude 1.
© The Author(s) Published by Science and Education Publishing.
Digital Forensics Dr. Bhavani Thuraisingham
Hierarchy of Data in a Database
(Advanced Human Computer Interaction)
The life cycle.
Table 9. Current user information
Knut Kröger & Reiner Creutzburg
Setting the Permissions
اصول مديريت و تئوري سازمان / نيمسال اول
Introduction to Geoinformatics L-10. Managing GIS
Digital Asset Management Part 1: Overview and Objective
Services, Security, and Privacy in Cloud Computing
Research Challenges in Enterprise Privacy Authorization Language
Digital Asset Management Part 1: Overview and Objective
TPAD training protocol.
An evaluation of a complex simulated scenario with final year undergraduate children's nursing students  Jane Davies, Martina Nathan, Dave Clarke  Collegian 
A novice user executing various subtasks from study 1.
© The Author(s) Published by Science and Education Publishing.
Text Format Files Number Files Size(Bytes) Words Number
Research Software Group
Pooled analysis of association between (nonexclusive) breast-feeding and childhood-onset type 1 diabetes in studies investigating ∼2 weeks (nonexclusive)
Knowledge Lost in Information
Windows Professional xp Microsoft® ® Copyright ©
Compressive Strength difference at 1 week (MPa)
Evaluating the performance of the robotic system through comparison with human trackers. Evaluating the performance of the robotic system through comparison.
Presentation transcript:

Jillian Brown

Develop realistic, high quality case material for computer forensic investigations Suitably complex primary data Apply theoretical aspects of research to the resolution of computer forensics cases 4 weeks Setting up realistic, high quality forensic scenarios is a difficult problem (Brueckner, S 2008)

Time Realistic Reproducibility Without reproducibility there can be no objective evaluation of student work (Garfinkel, 2009) Sufficient data Students Copyright & Privacy Intellectual Property Duty of care

Time Realistic Reproducibility Without reproducibility there can be no objective evaluation of student work (Garfinkel, 2009) Sufficient data Students Copyright & Privacy Intellectual Property Duty of care

NTFS file system running Windows XP Pro Research, Planning & Testing Five user accounts Four scenarios Creation of cases Final Year Project

Many problems to consider Need careful consideration, planning and plenty of time Better investigator Sharing case studies or creating a single database of case studies

Brueckner, S et al (2008) Automated Computer Forensics Training in a Virtualized Environment, Digital Investigation, Vol 5, Supp 1, September 2008, pp s105-s111. Garfinkel, S et al (2009) Bringing Science to Digital Forensics with Standardised Forensic Corpora, Digital Investigation, Vol 6, Supp 1, September 2009, pp s2-s11.