11Digital Evidence as Alibi Dr. John P. Abraham Professor UTPA.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Internet Investigations COEN 252 Computer Forensics  Thomas Schwarz, S.J
Safety on the Internet Chat Rooms. The Things to do to keep safe when using the Chat Rooms Use a different name Don’t do anything that you want to do.
Forensics. Case Study An attached to a $20 million dollar lawsuit purported to be from the CEO of “Tech.com” to a venture capital broker.
2 Language of Computer Crime Investigation
INTERNET SAFETY FOR STUDENTS
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
F6-Preparing for forensic Duplication Dr. John P. Abraham Professor UTPA.
Stranger Danger: Internet Safety. Not everyone on the internet are who they say they are…  Sometimes a stranger can try to gain your trust by pretending.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
Computer & Network Forensics
Hastings Middle School  Gives parents the ability to go online anytime and check their student’s:  Attendance  Grades  Homework Assignments.
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
Redundancy DHCP and Domain Controller Dr. John P. Abraham Professor UTPA.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Self-Serve tools for... My password My login My Secondary Address*
13Computer Intrusions Dr. John P. Abraham Professor UTPA.
A Student’s Guide to Proper and Safe Web Behavior
Making connections Connecting a computer to a LAN donna Bair-Mundy.
3Digital Evidence in the Courtroom Dr. John P. Abraham Professor of Computer Science UTPA.
Computer Networks.  The OSI model is a framework containing seven layers that defines the protocols and devices used at each stage of the process when.
Violent Crime and Digital Evidence. Challenges Violent crimes are challenging to investigate – the severe behavior that is involved, – the complexity.
COMPUTER FORENSIC EXAMINATION IN AUSTRALIAN Wanwimol Panpeng
Viruses & Destructive Programs
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Forensic and Investigative Accounting Chapter 14 Digital Forensics Analysis © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Professional Development: Group 1 Career Topic COMPUTER FORENSICS.
Digital Evidence in Violent crime John P. Abraham Professor UTPA.
Computer viruses are small software programs designed to spread from one computer to another corrupt or delete data on your computer.
Copyright 2002, S.D. Personick. All Rights Reserved.1 Telecommunications Networking II Topic 24 Internet Wrap-up Dr. Stewart D. Personick Drexel University.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Digital Citizenship. Scenario #1 – A student sends an annoying to another student. The receiving student gets even with a “flaming .” Is.
Digital Citizenship Grade Create a map that shows all of the places your family goes online and with whom you connect With a parent, find three.
8Investigative Reconstruction with Digital Evidence
s By Jordon walker. Sending an attachment.
 Jaden Terry.  To obtain privacy and protect data from other people. o Businesses Customer/Employee information Credit card numbers To gain a competitive.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
On-line Safety and Student . I understand there are certain rules I need to follow when I am online.
Let’s Talk About ! Instructor: Robert Griffiths Spring 2010 (original presentation developed by Jill Bond)
Why Do We Use Computers For Communication?. Read the words and make up the word combinations fax phone electronic to receive to send printed to use computer.
Digital Communication By: Kimmie LaRich. Digital Communication- is how we communicate with people all over the world Two main ways we communicate are.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Has your been hacked (or hijacked)? 1.What a Spam looks like 2.How to change your password to a stronger one.
E-Safety Challenge College. Learning Objectives To summarise electronic games which allow access to the Internet and assess the Internet Safety aspects.
Technical Awareness on Analysis of Headers.
Internet Infrastructure Mapping the World Wide Web.
Connection Technologies and IP Addressing CONNECTING TO THE INTERNET.
Ethics Unit 1. What does ethical mean? Following rules or doing the right thing.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
OBJECTIVE Understanding process and timelines for Vodafone customer orders.
Cybersecurity Test Review Introduction to Digital Technology.
By Toby Reed.
12 FEB 2016 BELL ACTIVITY: TOTAL YOUR READING LOGS MINUTES AND PAGES. MAKE SURE YOU HAVE A FULL HEADING AND THE TITLE AND AUTHOR’S NAME AT THE TOP. FILL.
 Attempts to steal your identity since most people who use Facebook post personal information and click things without thinking about it.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Digital Forensics Assignment 1. Exercise 1 File : 1.pcap Question : reconstruct the telnet session Q1 : who logged into ? – Username : ________.
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
Welcome to the DDN Campus Parent Portal Hanson School District School District.
Facebook privacy policy
Dangers of the internet
Use same User ID and password as computer login
Online safety.
Computer Security.
Dr. John P. Abraham Professor UTPA
s.
Week1 software - Lecture outline & Assignments
Dr. John P. Abraham Professor UTPA
E-LEARNING SOURCES IN COMPUTER NETWORKS SECURITY
Dr. John P. Abraham Professor UTPA
Presentation transcript:

11Digital Evidence as Alibi Dr. John P. Abraham Professor UTPA

Alibi Key pieces are: time and location – Jerry Durado was found guilty of killing his parents despite his claim that he was at work 300 miles away. A forensic analysis showed that only thing that happened in his computer at work was a virus scan. Telephone logs, credit card records, internet activities, etc. Computer times and IP address are used as Alibi. Keep in mind these can be manipulated creating a false alibi.

Investigating an alibi Establish reliability of digital evidence DHCP records will show assigned IP addresses. Can IP address be changed by the user? Can the time be changed by the user? A suspect claimed he was at home, doing nothing other than sending an to his friend. The friend shared the , and the header revealed that was not sent from the suspects home. The date and time did not match, and the was forged. His own computer showed evidence of attempts at forging to learn how to do it.