Presentation is loading. Please wait.

Presentation is loading. Please wait.

(Discussion – The Department of Defense)

Similar presentations


Presentation on theme: "(Discussion – The Department of Defense)"— Presentation transcript:

1 (Discussion – The Department of Defense)
Monday April 30, 2018 (Discussion – The Department of Defense)

2 The Daily CSI Monday, 4/30/18 1/1 Identify and briefly describe the four areas where latent data can exist. RAM slack is the area from the end of the logical file to the end of the sector. Cluster slack is the remaining area from the end of the final sector containing data to the end of the cluster. Latent data might be found in unallocated space – space on a HDD that the operating system sees as empty and ready for data. When a user deletes files the data typically remains behind, so deleted files are another source of latent data.

3 We will take Quiz 16 this Thursday!
Announcements We will take Quiz 16 this Thursday! CYDI

4 4/18 N/A 4/19 4/23 4/24 4/25 Assignment F2 F4 F5 F6 Last Day Accepted
Summative or Formative # Date Issued Gone Missing Day Last Day Accepted WS – Dennis Rader, Input to Output: How Does the Computer Work? F2 4/18 N/A Hold for eResearch Paper WS – Storing and Retrieving Data, Processing the Electronic Crime Scene F4 4/19 4/23 Forensic Files – Hack Attack F5 4/24 WS – Analysis of Electronic Data F6 4/25

5 Computer Forensics (Part 4)
The Department of Defense Computer Forensics (Part 4)

6 The Department of Defense
The Department of Defense (DOD) is an executive branch department of the federal government of the United States charged with coordinating and supervising all agencies and functions of the government concerned directly with national security and the United States Armed Forces. The Department is also the largest employer in the world, with more than 2.13 million active duty servicemen and women as well as their support staff of civilian workers.

7 The Department of Defense
Adding to the total is over 1.1 million National Guardsmen and Reservists from the four services, bringing the total to just over 3.2 million employees. The United States Cyber Command (USCYBERCOM) is an armed forces sub-unified command subordinate to United States Strategic Command. The command is located in Fort Meade, Maryland, and centralizes command of cyberspace operations, organizes existing cyber resources and synchronizes defense of U.S. military networks.

8 NCIS The United States Naval Criminal Investigative Service (NCIS) is the primary law enforcement agency of the United States Department of the Navy. It investigates activities concerning crimes against or by United States Navy and U.S. Marine Corps personnel, along with national security, counter-intelligence, and counter-terrorism cases, and is the successor organization to the former Naval Investigative Service (NIS).

9 NCIS Roughly half of the 2,500 NCIS employees are civilian special agents who are trained to carry out a wide variety of assignments at locations around the globe. NCIS special agents are armed federal law enforcement investigators, who frequently coordinate with other U.S. government agencies. NCIS special agents are supported by analysts and other experts skilled in disciplines such as forensics, surveillance, surveillance countermeasures, computer investigations, physical security, and polygraph examinations.

10 Forensic Dossier The Forensic Dossier is a drive-to-drive duplication device. Typically, a suspect hard drive and a destination drive will be connected to the unit. Within minutes of starting the process, the contents of the suspect drive are accurately copied over to the target drive for further examination. Handling of the suspect drive is held to a minimum with zero alteration of its contents. Designed with the Forensics investigator in mind, the system ensures that proper evidence capture procedures are maintained, while speeding up the process significantly.

11 Malware Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Malware is defined by its malicious intent, acting against the requirements of the computer user, and does not include software that causes unintentional harm due to some deficiency.

12 Malware Malware may be stealthy, intended to steal information or spy on computer users for an extended period without their knowledge, or it may be designed to cause harm, often as sabotage , or to extort payment. 'Malware' is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software.

13 Video 5 Things You Don't Know: Department of Defense


Download ppt "(Discussion – The Department of Defense)"

Similar presentations


Ads by Google