Implementation of Digital Forensics Lab Group : CNWIS-04 Mevan Alles Buddhika R.A.P Heshan Kumarage Lahiru Wijayapala.

Slides:



Advertisements
Similar presentations
Keyboarding Vocabulary III Finals Study Guide Basic Computer.
Advertisements

2 Introduction A central issue in supporting interoperability is achieving type compatibility. Type compatibility allows (a) entities developed by various.
Tasks in Setting Up a Hard Disk
Chapter 4 Storing Information in a Computer Peter Nortons Introduction to Computers.
Utility program + driver program Thomas Wat 4D (21)
Systems Software System Software Enables the applications software to interact with the computer and Helps the computer manage its internal and external.
Gathering digital evidence by the EU Commission in inspections
ROOTKIT VIRUS by Himanshu Mishra Points to be covered Introduction History Uses Classification Installation and Cloaking Detection Removal.
COEN 250 Computer Forensics Windows Life Analysis.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Introduction to Computers Section 5A. home Storage Involves Two Processes Writing data Reading data.
Storage Devices and Media
PROJECT PROPOSAL TOPIC: CAPACITY PLANNING MODEL USING SIP AND IAX WITH G. 726 AND ILBC By: Vishal and Anoosha.
By Drudeisha Madhub Data Protection Commissioner Date:
Library Automation: Planning and Implementation
Classification of Viruses. A Government Report from Gibb, McMillan and Wylie.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Capturing Computer Evidence Extracting Information.
COEN 152 Computer Forensics Introduction to Computer Forensics.
David white. List objectives for the chapter identify problems that can occur if hardware is not properly maintained. Identify routine maintenance that.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
COEN 252 Computer Forensics Windows Evidence Acquisition Boot Disk.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Digital Communications Math class.
Computer Forensics Iram Qureshi, Prajakta Lokhande.
Live Forensics Investigations Computer Forensics 2013.
SYSTEM SOFTWARE Prepared by: Mrs. Careene McCallum-Rodney.
Ben Livelsberger NIST Information Technology Laboratory, CFTT Program
Unit R005: Understanding Computer Systems Introduction System Software Software (i.e., programs) used to control the hardware directly Used to run the.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
COEN 250 Computer Forensics Windows Life Analysis.
Disclaimer Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation or.
Computer Hardware Sources: Discovering Computers Information & Software technology.
Attack Plan Alex. Introduction This presents a step-by-step attack plan to clean up an infected computer This presents a step-by-step attack plan to clean.
11 CHAPTER INFORMATION TECHNOLOGY, THE INTERNET, AND YOU.
Configuring Disk Devices. Module 4 – Configuring Disk Devices ♦ Overview This module deals with making partitions using fdisk, implementing RAID and Logical.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
 Indentify problems that can occur if hardware is not properly maintained.  Identify routine maintenance that can be performed by users.  Identify.
 Identify problems that can occur if hardware is not properly maintained  Identify routine maintence that can be performed by users  Identify maintence.
B.Ramamurthy11/9/20151 Computers and Programming Bina Ramamurthy 127 Bell Hall
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
COEN 250 Computer Forensics Windows Life Analysis.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
5/2/  Online  Offline 5/2/20072  Online  Raw data : within the DAQ monitoring framework  Reconstructed data : with the HLT monitoring framework.
1 May File allocation system with minimized reallocation for multimedia home server Hironori Sakakihara TA 8 Technical Secretary 100/AGS483.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Hacking, Data Recovery, and Digital Evidence DIGITAL FORENSICS.
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
Unit 19 Computer Music Systems 1 Examine the hardware options available for the composition and production of music using computer technology assess the.
Operating systems What is an operating system? A program that: Controls hardware Controls software Creates an interface between the hardware and the user.
Mastering Windows Network Forensics and Investigation Chapter 6: Live Analysis Techniques.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
By: Jeremy Henry. Road Map  What is a cybercrime?  Statistics.  Tools used by an investigator.  Techniques and procedures used.  Specific case.
Hyper-V Recovery Software Ideal Application to Get Data from VHD v2.1.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
Contents What is Reverse Engineering (RE)? Why do we need Reverse Engineering? Scope and Tasks of Reverse Engineering Reverse Engineering Tools Reverse.
Jenny Knackmuß, Thomas Möller, Wilfried Pommerien & Reiner Creutzburg Brandenburg University of Applied Sciences, IT- and Media Forensics Lab, P.O.Box.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Introduction to Performance Tuning Chia-heng Tu PAS Lab Summer Workshop 2009 June 30,
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Computer virus Topic: Prepared For Salmeen Rahman Prepared By
COEN 252: Computer Forensics
ورود اطلاعات بصورت غيربرخط
Presentation transcript:

Implementation of Digital Forensics Lab Group : CNWIS-04 Mevan Alles Buddhika R.A.P Heshan Kumarage Lahiru Wijayapala

Digital Forensics Lab2 Introduction A framework to carry out digital forensics investigation  Live system analysis (System + Memory)  Offline media analysis (hard disks, removable drives, optical disks, etc)  Online traffic (network related) data analysis and threat identification  Independent of the underlying platform.

Digital Forensics Lab3 Work carried out Preparation of the initial documents  Project Proposal  System Requirements Specification  Discussion of the design document Research done until now  Live System process analysis  File Carving  Online traffic data acquisition and analysis

Digital Forensics Lab4 Prepared Documents Project Proposal Systems Requirements Specification  Finalize the requirements by discussing with the project mentor. (especially hardware requirements)  Identify the functional and the non- functional requirements.  Abstract design of the framework.

Digital Forensics Lab5 Research work Live System process analysis (HijackThis, KillBox, Uniblue processScanner )  Helpful to identify the status of the current system, identify risky processes, processes that are likely to cause the problems. Online network traffic analysis (Wireshark)  Helpful in situations where bot-net(s) are in action  Identify the spreading of viruses and understand the communication of running viruses with the source cpmputers.

Digital Forensics Lab6 Research work cont… File Carving (File Scavenger)  Is basically a method of recovering deleted files or parts of the files that are lost. Helix Live System analysis CD  Provides methods to analyze live systems in various aspects like obtain memory dumps, file carve, Cookie analyze, root kit scans, etc.

Digital Forensics Lab7 Q & A

Digital Forensics Lab8 Thank You for Listening…