SlideShare a Scribd company logo
Computer Forensics
By John Intindolo
ISSC4551
Instructor Michael Lewis
(“Computer forensics,” n.d.)
What is Computer Forensics?
• Computer Forensics is the process of
identifying, preserving, extracting,
interpreting, and documenting
computer evidence so that it may be
used in a court of law
(“Forensic process,” n.d.)
Benefits of Computer Forensics
• Computer Forensics is used to protect
from and solve cases involving the
following computer crimes:
• Theft of Intellectual Property
• Financial Fraud
• Hacking Techniques
• Distributing of Viruses, Trojans, Worms, and
other malicious attacks
• Illegal Trafficking of Pornographic Material
Such as Child Pornography
Computer Forensics Investigator
Needs Responsibilities
Ensure the integrityand existenceof an organization’s
computer system and network infrastructure
Extracts, processes, and interprets the actual evidence to
validatethe organization’s innocence, while maintaining
that the attackeris guilty
Help to capture important information if an
organization’scomputer systemsnetworks have been
breached
Ensures the preservation of evidence throughout the
entire investigation process including during the
extraction of possibleevidence
Assistsin prosecuting the case Ensures the prevention of contamination of evidence
Saves the organization time and money Ensures a continuous chain of custody is established
throughout the entire investigation process
Efficientlytrack down cyber criminalsfrom all over the
world
Ensures that normal operations are limited for only a
short amount of time
Track complicatedcriminalcases Ensures professionalethicsand legalityare maintained
(“Cfce,” n.d.)
Becoming A Computer
Forensics Investigator
• Obtain a Degree
• A Bachelor’s Degree in Criminal Justice, Computer Science,
Computer Forensics or another related field
• Get Certified
• Such as EnCase Certified Examiner (EnCE) or Certified
Ethical Hacker (CEH)
• Look for Work in Law Enforcement Agencies and
Private Investigation Agencies
• For example: Homeland Security, NSA, FBI, etc.
(“Forensic investigator,” n.d.)
Cyber Crimes
• What is a cyber crime?
• Cyber crime refers to any criminal activity that is conducted
via the Internet or another computer network
• Examples- Identity Theft, Transaction Fraud, Piracy,
Hacking, Child Pornography Trafficking, etc.
(“Cyber crime,” n.d.)
Cyber Crimes Cont’d.
Types
• Identity Theft
• Hacking
• Computer Viruses and Worms
• Cyber Stalking
• Piracy
• Drug Trafficking
• Credit Card Fraud
• Child Pornography
• Etc.
(“Cyber attack sign,” n.d.)
Performing a Forensic
Investigation
• Fundamental Steps
• Collect preliminary evidence
• Court warrant for seizure is obtained when necessary
• First responder procedures are performed
• Evidence is seized at the scene of the crime
• Evidence is securely transported to the forensics lab
• Two bit-stream copies of the evidence are created
• An MD5 checksum is generated on images
• Chain of custody is prepared and followed throughout
• Original evidence is securely stored
• Image copy is analyzed for evidence
• Preparation of Forensic report
• Report is submitted
• Investigator may be used as an expert witness when necessary
Performing a Forensic
Investigation Cont’d.
• Rules and Procedures
• Must make duplicate copies of the original evidence
• Always works off of duplicate copies and never the original
evidence
• Duplicate copies must be an accurate reproduction of the
original
• Must stay within his or her knowledge or skill level
Forensic Tools
• Types
• Storage Bags
• Wireless and Passport
• Remote Chargers
• To retrieve evidence from devices that have run out of power
• Write Block Protection Devices
• Hard Drives, USB, media cards, etc.
• Data Acquisition Tools
• SIM card readers, Video-capture devices, mobile forensic
laptops, forensic workstations, imaging workstations, and
different software
Computer Forensic
Companies
• Forensicon
• Cyber Investigation Services
• Kroll
Summary
• Computer Forensics play a vital role to crimes today
more than they ever have before. Everything and
everyone is reliant upon technology, and thus the use of
digital evidence in even a typical criminal case has
become more prevalent. Furthermore, it is extremely vital
that an investigator follows the chain of custody
throughout the entire investigation process and
documents everything, because if they do not do so it
can cause the evidence gathered to be unusable in the
court room.
(“Crime scene,” n.d.)
References
• Cfce. (n.d.). Retrieved from
http://www.coloradocomputerforensics.com/images/CFCE.gif
• Computer forensics. (n.d.). Retrieved from http://verdict.net/home/wp-
content/uploads/2013/08/computer_forensics.jpg
• Crime scene. (n.d.). Retrieved from http://xiarch.com/testing/wp-
content/uploads/2012/07/computer-forensics.jpg
• Cyber attacks sign. (n.d.). Retrieved from
http://www.abchs.com/upload/_aimg_0a798b8f929ec2826ebbacad327b7455
• Cyber crime. (n.d.). Retrieved from
http://image.shutterstock.com/display_pic_with_logo/221737/97531346/stock-photo-
cyber-crime-concept-in-word-tag-cloud-isolated-on-black-background-97531346.jpg
• Forensic investigator. (n.d.). Retrieved from
http://www.accountingcertificateprograms.org/wp-content/uploads/2011/11/computer-
forensics-certificate-picture.jpg
• Forensic process. (n.d.). Retrieved from http://e-
datadiscovery.com/resources/_wsb_401x343_Forensics Process.jpg

More Related Content

What's hot

Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009ClubHack
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
unnilala11
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
Filip Maertens
 
Latihan2 comp-forensic
Latihan2 comp-forensicLatihan2 comp-forensic
Latihan2 comp-forensicsabtolinux
 
Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2
Neha Raju k
 
cyber Forensics
cyber Forensicscyber Forensics
cyber Forensics
Muzzammil Wani
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Shreya Singireddy
 
Computer forensic
Computer forensicComputer forensic
Computer forensicbhavithd
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
Dr. Prashant Vats
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
Muzzammil Wani
 
Chap 1 general introduction to computer forensics
Chap 1  general introduction to computer forensicsChap 1  general introduction to computer forensics
Chap 1 general introduction to computer forensics
Malobe Lottin Cyrille Marcel
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
Manu Mathew Cherian
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Mithileysh Sathiyanarayanan
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
Manu Mathew Cherian
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
Neha Raju k
 
Anti forensic
Anti forensicAnti forensic
Anti forensicMilap Oza
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
Malobe Lottin Cyrille Marcel
 
Digital Forensics Workshop
Digital Forensics WorkshopDigital Forensics Workshop
Digital Forensics Workshop
Tim Fletcher
 
Information security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information securityInformation security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information security
Neha Raju k
 

What's hot (20)

Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Latihan2 comp-forensic
Latihan2 comp-forensicLatihan2 comp-forensic
Latihan2 comp-forensic
 
Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2
 
cyber Forensics
cyber Forensicscyber Forensics
cyber Forensics
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
 
Chap 1 general introduction to computer forensics
Chap 1  general introduction to computer forensicsChap 1  general introduction to computer forensics
Chap 1 general introduction to computer forensics
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
Anti forensic
Anti forensicAnti forensic
Anti forensic
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
 
Digital Forensics Workshop
Digital Forensics WorkshopDigital Forensics Workshop
Digital Forensics Workshop
 
Information security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information securityInformation security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information security
 

Viewers also liked

Mu0012 employee relations management
Mu0012 employee relations managementMu0012 employee relations management
Mu0012 employee relations management
consult4solutions
 
My last
My lastMy last
My last
Juandaviid08
 
Access control basics-7
Access control basics-7Access control basics-7
Access control basics-7
grantlerc
 
ACC 491 Week 4 Learning Team Assignment Apollo Shoes Case Assignment (1) 2015...
ACC 491 Week 4 Learning Team Assignment Apollo Shoes Case Assignment (1) 2015...ACC 491 Week 4 Learning Team Assignment Apollo Shoes Case Assignment (1) 2015...
ACC 491 Week 4 Learning Team Assignment Apollo Shoes Case Assignment (1) 2015...
amoryatlanta
 
Mb0051 legal aspects of business
Mb0051 legal aspects of businessMb0051 legal aspects of business
Mb0051 legal aspects of business
consult4solutions
 
A.T.A.A.- 2013/14
A.T.A.A.- 2013/14 A.T.A.A.- 2013/14
A.T.A.A.- 2013/14
nikifelena
 
LamceBoxer_Mirvjena_Dissertation_Hood (2) (1)
LamceBoxer_Mirvjena_Dissertation_Hood (2) (1)LamceBoxer_Mirvjena_Dissertation_Hood (2) (1)
LamceBoxer_Mirvjena_Dissertation_Hood (2) (1)Mira Boxer
 
Iigi presentation1.2.1
Iigi presentation1.2.1Iigi presentation1.2.1
Iigi presentation1.2.1
Howard Douglas
 
Etwinning Workshop for Young Tourism
Etwinning Workshop for Young TourismEtwinning Workshop for Young Tourism
Etwinning Workshop for Young Tourism
Youngtourismtr
 
ISSC362_Research_Paper_Intindolo
ISSC362_Research_Paper_IntindoloISSC362_Research_Paper_Intindolo
ISSC362_Research_Paper_IntindoloJohn Intindolo
 
Team project ebook
Team project ebookTeam project ebook
Team project ebook
지현 이
 
Nowości czytelnicze cz.2
Nowości czytelnicze cz.2Nowości czytelnicze cz.2
Nowości czytelnicze cz.2
biblioteka1lo
 

Viewers also liked (17)

EL SISTEMA RESOCIALIZADOR
EL SISTEMA RESOCIALIZADOREL SISTEMA RESOCIALIZADOR
EL SISTEMA RESOCIALIZADOR
 
Mu0012 employee relations management
Mu0012 employee relations managementMu0012 employee relations management
Mu0012 employee relations management
 
thesis defense presentation
thesis defense presentationthesis defense presentation
thesis defense presentation
 
calvin cv
calvin cvcalvin cv
calvin cv
 
Resume_Santosh
Resume_SantoshResume_Santosh
Resume_Santosh
 
My last
My lastMy last
My last
 
Access control basics-7
Access control basics-7Access control basics-7
Access control basics-7
 
ACC 491 Week 4 Learning Team Assignment Apollo Shoes Case Assignment (1) 2015...
ACC 491 Week 4 Learning Team Assignment Apollo Shoes Case Assignment (1) 2015...ACC 491 Week 4 Learning Team Assignment Apollo Shoes Case Assignment (1) 2015...
ACC 491 Week 4 Learning Team Assignment Apollo Shoes Case Assignment (1) 2015...
 
Macroeconomics
MacroeconomicsMacroeconomics
Macroeconomics
 
Mb0051 legal aspects of business
Mb0051 legal aspects of businessMb0051 legal aspects of business
Mb0051 legal aspects of business
 
A.T.A.A.- 2013/14
A.T.A.A.- 2013/14 A.T.A.A.- 2013/14
A.T.A.A.- 2013/14
 
LamceBoxer_Mirvjena_Dissertation_Hood (2) (1)
LamceBoxer_Mirvjena_Dissertation_Hood (2) (1)LamceBoxer_Mirvjena_Dissertation_Hood (2) (1)
LamceBoxer_Mirvjena_Dissertation_Hood (2) (1)
 
Iigi presentation1.2.1
Iigi presentation1.2.1Iigi presentation1.2.1
Iigi presentation1.2.1
 
Etwinning Workshop for Young Tourism
Etwinning Workshop for Young TourismEtwinning Workshop for Young Tourism
Etwinning Workshop for Young Tourism
 
ISSC362_Research_Paper_Intindolo
ISSC362_Research_Paper_IntindoloISSC362_Research_Paper_Intindolo
ISSC362_Research_Paper_Intindolo
 
Team project ebook
Team project ebookTeam project ebook
Team project ebook
 
Nowości czytelnicze cz.2
Nowości czytelnicze cz.2Nowości czytelnicze cz.2
Nowości czytelnicze cz.2
 

Similar to ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo

Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
Avinash Mavuru
 
Computer Forensics (1).pptx
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptx
Gautam708801
 
164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt
harshbj1801
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh t
Manesh T
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
Shreya Singireddy
 
The Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptxThe Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptx
Applied Forensic Research Sciences
 
Scope of Cyber forensics
Scope of Cyber forensicsScope of Cyber forensics
Scope of Cyber forensics
Applied Forensic Research Sciences
 
First Responder Officer in Cyber Crime
First Responder Officer in Cyber CrimeFirst Responder Officer in Cyber Crime
First Responder Officer in Cyber Crime
Applied Forensic Research Sciences
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
Surajgroupsvideo
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
Kabul Education University
 
Diving into Digital Forensics
Diving into Digital Forensics Diving into Digital Forensics
Diving into Digital Forensics
Pranjal Vyas
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
ahmad abdelhafeez
 
Most promising cyber forensic solution providers from india forn sec solut...
Most promising cyber forensic solution providers  from india   forn sec solut...Most promising cyber forensic solution providers  from india   forn sec solut...
Most promising cyber forensic solution providers from india forn sec solut...
FORnSECSolutions
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
FORnSECSolutions
 
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...Danny609Davidson
 
Cyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics Lecture
Ollie Whitehouse
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
gamemaker762
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
Priya Manik
 

Similar to ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo (20)

Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 
Computer Forensics (1).pptx
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptx
 
164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh t
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
The Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptxThe Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptx
 
Scope of Cyber forensics
Scope of Cyber forensicsScope of Cyber forensics
Scope of Cyber forensics
 
First Responder Officer in Cyber Crime
First Responder Officer in Cyber CrimeFirst Responder Officer in Cyber Crime
First Responder Officer in Cyber Crime
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Diving into Digital Forensics
Diving into Digital Forensics Diving into Digital Forensics
Diving into Digital Forensics
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
Most promising cyber forensic solution providers from india forn sec solut...
Most promising cyber forensic solution providers  from india   forn sec solut...Most promising cyber forensic solution providers  from india   forn sec solut...
Most promising cyber forensic solution providers from india forn sec solut...
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
 
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
Laptop Or Computer Forensics Job - How Much Does Your Personal Computer Foren...
 
Cyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics Lecture
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 

More from John Intindolo

Power_Point_Presentation_ISSC458_Intindolo
Power_Point_Presentation_ISSC458_IntindoloPower_Point_Presentation_ISSC458_Intindolo
Power_Point_Presentation_ISSC458_IntindoloJohn Intindolo
 
ISSC368_Final_Project Proposal_Wk8_Intindolo
ISSC368_Final_Project Proposal_Wk8_IntindoloISSC368_Final_Project Proposal_Wk8_Intindolo
ISSC368_Final_Project Proposal_Wk8_IntindoloJohn Intindolo
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloJohn Intindolo
 
ISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloJohn Intindolo
 
Research_Paper_Final_ISSC431_Intindolo
Research_Paper_Final_ISSC431_IntindoloResearch_Paper_Final_ISSC431_Intindolo
Research_Paper_Final_ISSC431_IntindoloJohn Intindolo
 
Research_Paper_ISSC461_Intindolo
Research_Paper_ISSC461_IntindoloResearch_Paper_ISSC461_Intindolo
Research_Paper_ISSC461_IntindoloJohn Intindolo
 
Attack_Project_Presentation_ISSC461_Intindolo
Attack_Project_Presentation_ISSC461_IntindoloAttack_Project_Presentation_ISSC461_Intindolo
Attack_Project_Presentation_ISSC461_IntindoloJohn Intindolo
 
ISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloJohn Intindolo
 
Project_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_IntindoloProject_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_IntindoloJohn Intindolo
 
ISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloJohn Intindolo
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloJohn Intindolo
 
Wk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_IntindoloWk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_IntindoloJohn Intindolo
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloJohn Intindolo
 
ISSC490_Project_John_Intindolo
ISSC490_Project_John_IntindoloISSC490_Project_John_Intindolo
ISSC490_Project_John_IntindoloJohn Intindolo
 
ISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloJohn Intindolo
 
Project_Presentation_ISSC361_Intindolo
Project_Presentation_ISSC361_IntindoloProject_Presentation_ISSC361_Intindolo
Project_Presentation_ISSC361_IntindoloJohn Intindolo
 

More from John Intindolo (16)

Power_Point_Presentation_ISSC458_Intindolo
Power_Point_Presentation_ISSC458_IntindoloPower_Point_Presentation_ISSC458_Intindolo
Power_Point_Presentation_ISSC458_Intindolo
 
ISSC368_Final_Project Proposal_Wk8_Intindolo
ISSC368_Final_Project Proposal_Wk8_IntindoloISSC368_Final_Project Proposal_Wk8_Intindolo
ISSC368_Final_Project Proposal_Wk8_Intindolo
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_Intindolo
 
ISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_Intindolo
 
Research_Paper_Final_ISSC431_Intindolo
Research_Paper_Final_ISSC431_IntindoloResearch_Paper_Final_ISSC431_Intindolo
Research_Paper_Final_ISSC431_Intindolo
 
Research_Paper_ISSC461_Intindolo
Research_Paper_ISSC461_IntindoloResearch_Paper_ISSC461_Intindolo
Research_Paper_ISSC461_Intindolo
 
Attack_Project_Presentation_ISSC461_Intindolo
Attack_Project_Presentation_ISSC461_IntindoloAttack_Project_Presentation_ISSC461_Intindolo
Attack_Project_Presentation_ISSC461_Intindolo
 
ISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_Intindolo
 
Project_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_IntindoloProject_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_Intindolo
 
ISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_Intindolo
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_Intindolo
 
Wk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_IntindoloWk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_Intindolo
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_Intindolo
 
ISSC490_Project_John_Intindolo
ISSC490_Project_John_IntindoloISSC490_Project_John_Intindolo
ISSC490_Project_John_Intindolo
 
ISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloISSC361_Project_John_Intindolo
ISSC361_Project_John_Intindolo
 
Project_Presentation_ISSC361_Intindolo
Project_Presentation_ISSC361_IntindoloProject_Presentation_ISSC361_Intindolo
Project_Presentation_ISSC361_Intindolo
 

ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo

  • 1. Computer Forensics By John Intindolo ISSC4551 Instructor Michael Lewis (“Computer forensics,” n.d.)
  • 2. What is Computer Forensics? • Computer Forensics is the process of identifying, preserving, extracting, interpreting, and documenting computer evidence so that it may be used in a court of law (“Forensic process,” n.d.)
  • 3. Benefits of Computer Forensics • Computer Forensics is used to protect from and solve cases involving the following computer crimes: • Theft of Intellectual Property • Financial Fraud • Hacking Techniques • Distributing of Viruses, Trojans, Worms, and other malicious attacks • Illegal Trafficking of Pornographic Material Such as Child Pornography
  • 4. Computer Forensics Investigator Needs Responsibilities Ensure the integrityand existenceof an organization’s computer system and network infrastructure Extracts, processes, and interprets the actual evidence to validatethe organization’s innocence, while maintaining that the attackeris guilty Help to capture important information if an organization’scomputer systemsnetworks have been breached Ensures the preservation of evidence throughout the entire investigation process including during the extraction of possibleevidence Assistsin prosecuting the case Ensures the prevention of contamination of evidence Saves the organization time and money Ensures a continuous chain of custody is established throughout the entire investigation process Efficientlytrack down cyber criminalsfrom all over the world Ensures that normal operations are limited for only a short amount of time Track complicatedcriminalcases Ensures professionalethicsand legalityare maintained (“Cfce,” n.d.)
  • 5. Becoming A Computer Forensics Investigator • Obtain a Degree • A Bachelor’s Degree in Criminal Justice, Computer Science, Computer Forensics or another related field • Get Certified • Such as EnCase Certified Examiner (EnCE) or Certified Ethical Hacker (CEH) • Look for Work in Law Enforcement Agencies and Private Investigation Agencies • For example: Homeland Security, NSA, FBI, etc. (“Forensic investigator,” n.d.)
  • 6. Cyber Crimes • What is a cyber crime? • Cyber crime refers to any criminal activity that is conducted via the Internet or another computer network • Examples- Identity Theft, Transaction Fraud, Piracy, Hacking, Child Pornography Trafficking, etc. (“Cyber crime,” n.d.)
  • 7. Cyber Crimes Cont’d. Types • Identity Theft • Hacking • Computer Viruses and Worms • Cyber Stalking • Piracy • Drug Trafficking • Credit Card Fraud • Child Pornography • Etc. (“Cyber attack sign,” n.d.)
  • 8. Performing a Forensic Investigation • Fundamental Steps • Collect preliminary evidence • Court warrant for seizure is obtained when necessary • First responder procedures are performed • Evidence is seized at the scene of the crime • Evidence is securely transported to the forensics lab • Two bit-stream copies of the evidence are created • An MD5 checksum is generated on images • Chain of custody is prepared and followed throughout • Original evidence is securely stored • Image copy is analyzed for evidence • Preparation of Forensic report • Report is submitted • Investigator may be used as an expert witness when necessary
  • 9. Performing a Forensic Investigation Cont’d. • Rules and Procedures • Must make duplicate copies of the original evidence • Always works off of duplicate copies and never the original evidence • Duplicate copies must be an accurate reproduction of the original • Must stay within his or her knowledge or skill level
  • 10. Forensic Tools • Types • Storage Bags • Wireless and Passport • Remote Chargers • To retrieve evidence from devices that have run out of power • Write Block Protection Devices • Hard Drives, USB, media cards, etc. • Data Acquisition Tools • SIM card readers, Video-capture devices, mobile forensic laptops, forensic workstations, imaging workstations, and different software
  • 11. Computer Forensic Companies • Forensicon • Cyber Investigation Services • Kroll
  • 12. Summary • Computer Forensics play a vital role to crimes today more than they ever have before. Everything and everyone is reliant upon technology, and thus the use of digital evidence in even a typical criminal case has become more prevalent. Furthermore, it is extremely vital that an investigator follows the chain of custody throughout the entire investigation process and documents everything, because if they do not do so it can cause the evidence gathered to be unusable in the court room. (“Crime scene,” n.d.)
  • 13. References • Cfce. (n.d.). Retrieved from http://www.coloradocomputerforensics.com/images/CFCE.gif • Computer forensics. (n.d.). Retrieved from http://verdict.net/home/wp- content/uploads/2013/08/computer_forensics.jpg • Crime scene. (n.d.). Retrieved from http://xiarch.com/testing/wp- content/uploads/2012/07/computer-forensics.jpg • Cyber attacks sign. (n.d.). Retrieved from http://www.abchs.com/upload/_aimg_0a798b8f929ec2826ebbacad327b7455 • Cyber crime. (n.d.). Retrieved from http://image.shutterstock.com/display_pic_with_logo/221737/97531346/stock-photo- cyber-crime-concept-in-word-tag-cloud-isolated-on-black-background-97531346.jpg • Forensic investigator. (n.d.). Retrieved from http://www.accountingcertificateprograms.org/wp-content/uploads/2011/11/computer- forensics-certificate-picture.jpg • Forensic process. (n.d.). Retrieved from http://e- datadiscovery.com/resources/_wsb_401x343_Forensics Process.jpg