COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J. 2013.

Slides:



Advertisements
Similar presentations
Investigating Deaths at Work
Advertisements

Chapter 13: Advanced Security and Beyond
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. Computer Forensics Consultant Jawz Inc.
Computer Forensics and Digital Investigation – a brief introduction Ulf Larson/Erland Jonsson.
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
What is meant by computer forensics?  Principle, Function of computer forensics.  History about computer forensics.  Needs of computer forensics.
Forensic and Investigative Accounting Chapter 2 Forensic Accounting Education, Institutions, and Specialties © 2007 CCH. All Rights Reserved W. Peterson.
Online Gambling A Law Enforcement Perspective Brigadier Piet Pieterse South African Police Service Directorate for Priority Crime Investigation (DPCI)
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J w/ T. Scocca.
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations Third Edition
COEN 152 Computer Forensics Introduction to Computer Forensics.
Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland.
An Event-based Digital Forensic Investigation Framework Brian D. Carrier Eugene H. Spafford DFRWS 2004.
Guide to Computer Forensics and Investigations, Second Edition
Proving Your Case - Computer Security Terrence P. Maher Abrahams Kaslow & Cassman
CSN08101 Digital Forensics Lecture 4A: Forensic Processes Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak.
What is FORENSICS? Why do we need Network Forensics?
INTRODUCTION TO FORENSICS Science, Technology, & Society MR. CANOVA PERIOD 11.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Dr Richard Overill Department of Informatics King’s College London Cyber Sleuthing or the Art of the Digital Detective.
Undergraduate Technology Programs John Baker Johns Hopkins University Carey Business School
The Forensic Accounting Legal Environment McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Professional Development: Group 1 Career Topic COMPUTER FORENSICS.
Cybersecurity Governance in Ethiopia
Computer Forensics Principles and Practices
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
Computer Security Management: Assessment and Forensics Session 8.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
Crime Scene Processing.  Any questions before we begin about anything?  Unit 2 Seminar -Chain of Custody -Modus Operandi (MO) -Criminal Profiling -Importance.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
By: Megan Guild and Lauren Moore. Concept Map Mountain Stream Co. OS Active wear Computer Security Their Questions Details Examples Computer Forensics.
IPTS Workshop on Cyber Crime German Developments.
Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau
Computer Security Fundamentals by Chuck Easttom Chapter 14 Introduction to Forensics.
Thomas Schwarz, S.J. SCU Comp. Eng COEN 252 Collection of Evidence.
Thomas Schwarz, S.J. SCU Comp. Eng COEN 252 Collection of Evidence.
Cybercrime What is it, what does it cost, & how is it regulated?
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
“ Copyright © Allyn & Bacon 2008 Criminal Evidence Chapter Twelve: Documentary and Scientific Evidence This multimedia product and its contents are protected.
Computer Forensics: A 5 Minute Introduction Santa Clara University Department of Computer Engineering April 2007.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
Dr. Terry M. Mors, Ed.D. © Mors Copyright 2010 What is the definition of crime? There are multiple definitions But basically, it is … conduct that.
Crime Scene Basics Forensic Science.
MIS323 – Business Telecommunications Chapter 10 Security.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Cell Phone Forensics Investigator - ICFECI
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Strengthening national capacities to prevent and combat cybercrime: UNODC Global Programme on Cybercrime Tania Banuelos Crime Prevention and Criminal Justice.
Prof. Dr. Lorena Bachmaier, Universidad Complutense Madrid, Spain Section III- Criminal Procedure Information Society and Penal Law Lorena Bachmaier Doha,
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Computer Forensics 1 1.
A Level Computing AQA (7517)
Computer Forensics Discovery and recovery of digital evidence
Introduction to Computer Forensics
Law, Public Safety, Corrections, and Security
Introduction to Digital Forensics
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Ad Hoc Phase Structured Phase Enterprise Phase
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Introduction to Digital Forensics
Presentation transcript:

COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J. 2013

Computer Forensics Digital Investigation Focuses on a digital device Computer Router Switch Cell-phone SIM-card Kindle …

Computer Forensics Digital Investigation Focuses on a digital device involved in an incident or crime Computer intrusion Generic criminal activity Perpetrator uses internet to gather information used in the perpetration of a crime. Digital device is an instrument of a crime Perpetrator uses cell-phone to set-off a bomb. scams Internet auction fraud Crimeware Computer is used for intrusion of another system Botnet

Computer Forensics Digital Investigation Has different goals Prevention of further intrusions. Goal is to reconstruct modus operandi of intruder to prevent further intrusions. Assessment of damage. Goal is to certify system for safe use. Reconstruction of an incident. For criminal proceedings. For organization-internal proceedings.

Computer Forensics Digital Investigation Process where we develop and test hypotheses that answer questions about digital events. We can use an adaptation of the scientific method where we establish hypotheses based on findings and then (if possible) test our hypotheses against findings resulting from additional investigations.

Computer Forensics Evidence Procedural notion That on what our findings are based. Legal notion Defined by the “rules of evidence” Differ by legislation “Hear-say” is procedurally evidence, but excluded (under many circumstances) as legal evidence.

Computer Forensics Forensics Used in the “forum”, especially for judicial proceedings. Definition: legal

Computer Forensics Digital Crime Scene Investigation Process System Preservation Phase Evidence Searching Phase Event Reconstruction Phase Note: These phases are different activities that intermingle.

Computer Forensics Who should know about Computer Forensics Those involved in legal proceedings that might use digital evidence Judges, Prosecutors, Attorneys, Law Enforcement, Expert Witnesses Those involved in Systems Administration Systems Administrators, Network Administrators, Security Officers Those writing procedures Managers

Computer Forensics Computer Forensics presupposes skills in Ethics Law, especially rules of evidence System and network administration Digital data presentation Number and character representation Systems OS, especially file systems. Hardware, especially disk drives, memory systems, computer architecture, … Networking Network protocols, Intrusion detection, … Information Systems Management

COEN 252 Prerequisites Required: Good moral character. Ability and willingness to respect ethical boundaries. Familiarity with at least one type of operating system. (Windows, Unix/Linux, DOS experience preferred.) Some programming. Access to a computer with Hex editor. Desired: Familiarity with OS Theory. Familiarity with Networking. Some Knowledge of U.S. Legal System.