Presentation subhead CJ316 Investigating Cyber Crime Unit 9 Seminar Brandon Gregg.

Slides:



Advertisements
Similar presentations
Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.
Advertisements

The M57 Patents Case Investigating criminal activity within m57.biz
Multimedia Systems Course Overview & Introduction Instructor: Leila Sharifi UUT Fall
COS/PSA 413 Day 23. Agenda Lab 12 not graded –Missing two submissions Assignment 4 Posted –Due December 6 –Requires forensics analysis of evidence which.
COS/PSA 413 Day 5. Agenda Questions? Assignment 2 Redo –Due September 3:35 PM Assignment 3 posted –Due September 3:35 PM Quiz 1 on September.
0 How to Customize This Template Choose an appropriate title slide and delete the others Edit presentation title, author names, and affiliation(s) Choose.
Elements of Webdesign Week 1 \\ Website Layout, Software Overview, Proposal Guidelines.
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
Criminal Investigations CJ 210 Week 8 Seminar. Sex Crimes: Investigative Techniques Interview with victim. – Get a description of the offender or offenders.
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University.
Game Design LIVE Class Session 01/12/2012. Agenda for LIVE Class Weekly road map Review of basic course information Review of key course information and.
Comparative Justice Systems CJ343 – Prof Frulio Unit 9.
MD5 ALGORITHM past and present. History Initial checking of integrity – checksums, then CRC These are only good at detecting lost information due to hardware.
CJ 317 – Computer Forensics
Microsoft Office Grade 10 A / B Cahaya Bangsa Classical School (C) 2010 Digital Media Production Facility 04 Basic Application.
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
WELCOME TO CJ 125 Shital Thakkar, J.D. Adjunct Professor Kaplan University
Lippincott Procedures Training Tour for General Users- NetLearning LMS Users.
Lippincott Procedures Training Tour for General Users-HealthStream Learning Center Users.
Lippincott ProceduresLippincott Procedures Training Tour for General UsersTraining Tour for General Users.
Mr. R * x hour * AIM: brianrobison1010* While you wait try out these brain teasers…. 1. Do they have a 4th of July.
Welcome to AB113 Accounting for Non-Majors
CS Tutoring Help Your friends in need.. Hours:  Monday – Friday 11:00 AM – 6:00 PM  Saturday Noon – 5:00 PM Note: hours apply during finals week.
Science and Engineering Library Your Research Center.
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
By: Jeremy Henry. Road Map  What is a cybercrime?  Statistics.  Tools used by an investigator.  Techniques and procedures used.  Specific case.
ICS 151 Digital Logic Design Spring 2004 Administrative Issues.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Cell Phone Forensics Investigator - ICFECI
Effects of Online Services. Learning Objectives To understand the effects of the use of online services on society.
Presented by Steve Abrams, M.S. Charleston, SC / Long Island, NY
How I Survived AIST2330 and Learned to Love Server Admin
The Advantages of a Trial Balance Software
Synchronizing Text & Objects
[First Name] [Last Name] [Date]
[First Name] [Last Name] [Date]
Informational Seminar
Presentation title goes here
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.
Presentation title goes here
A1 Student Posters Posters Print Services  Robinson Library  University of Newcastle  phone: Introduction The.
<ELLIIT Project Name>
Investigation and/or management Discussion or Conclusion
Option for more information
Presentation title goes here
Insert Presentation Title
Presentation title.
Presentation title.
Poster Title Heading Heading Heading Heading Heading Heading
2016 REPORTING The quick brown fox jumps over the lazy dog. The quick brown fox jumps over the lazy dog. The quick brown fox jumps over the lazy dog.
The Weirdest Case I Ever Saw Dr. AN Other, Dr. J Doe & Prof
Presentation title goes here
Definición y tipos discriminación
A0 PowerPoint Poster Posters at Print Services Robinson Library, Newcastle University • • phone Introduction.
2016 REPORT.
Presentation title goes here
Presentation title goes here
A1 Student Posters Posters at Print Services  Robinson Library  University of Newcastle  phone: Introduction.
T A R S E L I T L I S S T O TEMPLATE – SUBTITLE
[First Name] [Last Name] [Date]
201X REPORT.
目 录 The quick brown fox. 目 录 The quick brown fox.
[First Name] [Last Name] [Date]
[First Name] [Last Name] [Date]
Title of Your Presentation Presenter Name, Job Title
KEYBOARDING: SPEED & ACCURACY
2016 REPORT.
Presentation transcript:

Presentation subhead CJ316 Investigating Cyber Crime Unit 9 Seminar Brandon Gregg

Presentation subhead CJ316 Investigating Cyber Crime Unit 9 Seminar Brandon Gregg

Seminar Tonight- Material Questions Seminar Final General Questions Closing Class: Make Up Work, Grades, etc…

Unit 9- Digital Evidence

MD5("The quick brown fox jumps over the lazy dog") = 9e107d9d372bb6826bd81d3542a419d6

MD5("The quick brown fox jumps over the lazy dog") = 9e107d9d372bb6826bd81d3542a419d6 MD5("The quick brown fox jumps over the lazy dog.") = e4d909c290d0fb1ca068ffaddf22cbd0

MD5 vs SHA-256

What is the purpose of a write protector?

Read / Write

Read Only

FTK Imager 3.0

FTK 4.01

Scenario 1: You have full access to suspect’s computer be he or she cannot know you made a copy.

Scenario 2: The employee works at a remote office in Alaska and you need a copy ASAP.

Scenario 3: The employee works at a remote office in Alaska but your network imaging software isn’t working.

Scenario 4: You have full access to suspect’s computer but the drive is no longer working.

Scenario 5: You have full access to suspect’s computer be he or she cannot know you made a copy AND the computer cannot be turned off.

Presentation subhead Final Projects

Grades

Final Due: Tue 4/30 before midnight Make up: Sunday 5/6 before noon (EST)

Grades Final Due: Tue 4/30 before midnight Final Due: Sunday 5/6 before noon (EST) Make up: Sunday 5/6 before noon (EST)

Contact Info: Brandon Gregg Yahoo IM: BrandonGYahoo IM: BrandonG Phone#: (831) Phone#: (831)

Contact Info: Computer Forensics: –Monday 9 pm and Thursday 10 pm Computers, Technology, and Criminal Justice Information Systems: –Monday 10 pm