Cyber Forensics From Data To Digital Evidence Book by - A. Marcella, F. Guillossou.

Slides:



Advertisements
Similar presentations
Chapter 2 The Process of Experimentation
Advertisements

FCAT Review The Nature of Science
Guide to Computer Forensics and Investigations Fourth Edition
COEN 252 Computer Forensics
Data Collection, Analysis and Preservation Computer Forensics: Data Collection, Analysis and Preservation Kikunda Eric Kajangu, Cher Vue, and John Mottola.
Crime Scene Investigation Roles 1.0 Describe responsibilities of various personnel involved in crime scene investigations. Examples: police, detectives,
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Guide to Computer Forensics and Investigations, Second Edition
Fundamentals of Computer Forensics Fundamentals of Computer Forensics by Jim Bates,published Feb 1997, International Journal of Forensic Computing “…This.
BACS 371 Computer Forensics
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
Guide to Computer Forensics and Investigations Fourth Edition
Research Methods in Crime and Justice Chapter 1 The Research Practice.
Testifying Skills Julia Pallentino MSN, JD, ARNP.
By Drudeisha Madhub Data Protection Commissioner Date:
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland.
An Event-based Digital Forensic Investigation Framework Brian D. Carrier Eugene H. Spafford DFRWS 2004.
Project A² A CADEMICS IN A CTION A Colton-Redlands-Yucaipa ROP Project.
Today we will learn: Daily TEKS Objectives April 1, 2014.
Requirements Engineering
CHAPTER 1 – THE SCIENCE OF BIOLOGY. 1-1 What is Science.
Computer Forensics Principles and Practices
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University.
1 Science as a Process Chapter 1 Section 2. 2 Objectives  Explain how science is different from other forms of human endeavor.  Identify the steps that.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
QUALITY OF EVIDENCE FRCC Compliance Workshop September/October 2008.
Training and Certification. Who needs digital forensic training and professional certification? Forensic examiners Investigators Crime scene specialists.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Guide to Computer Forensics and Investigations Fifth Edition
1.2 METHODS IN BIOLOGY SCIENTIFIC METHODS.
Chapter 1 The Science of Biology. Section 1 – What is Science? The goal of science is to investigate and understand nature, to explain events in nature,
1 Chapter 1- The Science Of Biology. 2 I. What is Science A. What Science is and is Not. 1. The goal of science is to investigate and understand the natural.
Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection.
Computers Computer & Internet Security How Computer Forensics Works What is the Year 2038 problem? Could hackers devastate the U.S. economy?
Forensic Science: Fundamentals & Investigations, Chapter 16 1 Chapter 16 Tool Marks By the end of this chapter you will be able to: o Describe the three.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Describe Your Big Question What are you investigating? Why did you choose this topic? What did you expect the outcome to be? See
CONTENTS Area of study 2 Key knowledge Key skills.
SCIENTIFIC METHOD THE PROCESS OF THINKING SCIENTIFICALLY.
Scientific Method One way of describing the scientific method.
Scientific Method 7 th Grade Science. What is the scientific method? It is a process that is used to find answers to questions about the world around.
 It is the process that is used to find answers to questions about the world around us.
CJ 317 – Computer Forensics
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
ENVIRONMENTAL SCIENCE Chapter 2 Tools of Environmental Science 2.1 Scientific Methods.
Census Processing Baku Training Module.  Discuss:  Processing Strategies  Processing operations  Quality Assurance for processing  Technology Issues.
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA Search.
Chapter 7 Volume versus Partition. Cylinder, Head, and Sector (CHS) Hard or fixed disks store information on a revolving platter of metal or glass coated.
Scientific Method 1.Observe 2.Ask a question 3.Form a hypothesis 4.Test hypothesis (experiment) 5.Record and analyze data 6.Form a conclusion 7.Repeat.
Chapter 9 Refining the Research Process. 1. Investigate the facts and identify issues 1. Investigate the facts and identify issues 2. Collect the appropriate.
Copyright © 2011 Wolters Kluwer Health | Lippincott Williams & Wilkins Chapter 1 Research: An Overview.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
SCIENTIFIC METHOD NATURE OF SCIENCE AND EXPERIMENTAL DESIGN VANCE
Chapter 16 Tool Marks By the end of this chapter you will be able to:
How to do an Internal Audit
Chapter 16 Tool Marks By the end of this chapter you will be able to:
Computer Forensics Discovery and recovery of digital evidence
Chapter 5 Data Resource Management.
The Scientific Method.
Chapter 16 Tool Marks By the end of this chapter you will be able to:
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Chapter 16 Tool Marks By the end of this chapter you will be able to:
Sixth Grade Earth Science
Electronic Discovery Sabrina Jones 4/14/2011.
Chapter 16 Tool Marks By the end of this chapter you will be able to:
Nature of Science Warm Up
Business Law Final Exam
The Scientific Method.
Presentation transcript:

Cyber Forensics From Data To Digital Evidence Book by - A. Marcella, F. Guillossou

The Role and Responsibility of a Cyber Forensic Investigator 1.Accurately report upon actions taken (warrants etc…) 2.To expertly identify, extract, and analyze data 3.Keep a detail log of procedures

As an Expert A Cyber Forensic Investigator who relies upon automated, generated results of a forensic software tool, without an in-depth knowledge of how the results have been achieved, is risky to your professional reputation but also to a successful outcome to the investigation.

Chapter Goals Take you from the very beginning of data being an electrical impulse to it becoming data to storage to potential evidence. As a Cyber Forensic Investigator, it is extremely important you understand this process.

Evolution of Bits and Bytes The evolution of bits and bytes into data and finally into human understanding text might be somewhat technical but not that hard.

The How, Where and Why We will be discussing the following: – How data become digital forensic evidence – Where to look for this evidence, buried beneath hundreds of million of bytes of data. – Why specific data may lead the investigator to the smoking gun.

In Court to Testify So when the lawyer questions you, and ask you “How did you identify the specific data you examined to reach your conclusion,” knowing the How’s, Where’s and Why’s and the theory and logic behind your answer will help you get favorable results.

Data Flow Intro. We will start small, in fact very small “bits & bytes” small. We will explain the following: – Bits & Bytes – Origin of Data – Data Storage – Boot Records – Partitions – Volumes – File Systems

Data Flow Intro. We will discuss how each of the topics are interrelated and essential in a cyber forensic investigation. The role each plays in an investigation and what type of evidential data may be identified within each of the areas. We will look at Cases involving forensics.

The Fundamentals of Data To be a professional in cyber forensics one must have a foundation rooted in: 1. Basics of information technology 2. Data Storage 3. Handling 4. Processing 5. How data is moved 6. How data is manipulated

Data is Evidence Understanding how evidence emerges from data is pivotal. One must articulate how evidence data was: 1.Identify 2.Collected 3.Processed

Cyber Forensic Investigator As a cyber forensic investigator, simply pressing buttons and checking options in a forensic software suite can create a potential liability. Understanding the “Life Cycle” of data is very important from its beginning as electronic bits, evolving into bytes characters, then words, finally emerging as a language, as information and eventually as evidence.