ForensicsInvestigationsUsing EnCase
By John Intindolo
ISSC458
Professor Bryan Bell
(“EnCase Forensic,” n.d.)
Computer Forensics
(“Computer Forensics”, n.d.)
 Computer Forensics has become a vital part of criminal
investigations now more than it has ever in the past. With the
advancement in technology being used in people’s every day
lives, it is being used more commonly by criminals as well.
Computer Forensics is what is being used to catch criminals that
are using technology to support their criminal acts.
Investigation Process
(“Investigation Procedures”, n.d.)
Introduction To EnCase
(“EnCase Overview,” n.d.)
 Encase is a forensic software program that is used to assist
computer forensics investigators in acquiring data so that it may
be used in a court of law.
EnCaseForensic
(Nelson, 2011)
 Index attributes in EnCase by using EnScript.
EnCase-Recovering Text Messages
(“Ip hider pro”, 2013)
References
• Computer Forensics. (n.d.). Retrieved from
http://www.ossrisk.com/consultant/assets/images/Cyberspace.jpg
• Encase Forensic. (n.d.). Retrieved from http://computerforensicsblog.champlain.edu/wp-
content/uploads/2013/09/Blog27.jpg
• EnCase Overview. (n.d.). Retrieved from
https://ralphlosey.files.wordpress.com/2007/10/encaseforensicsprocess.jpg
• Investigation Procedures. (n.d.). Retrieved from
http://www.cms.livjm.ac.uk/cmpjhagg/gmfc.jpg
• Recovering Deleted Files Using Encase. (n.d.). Retrieved from
http://forensicmethods.com/wp-content/uploads/2011/09/EnCase_I30_Parse2.jpg
Referencescont’d.
• Text Message Recovery. (n.d.). Retrieved from
https://dietrolldie.files.wordpress.com/2015/01/encase.png

Power_Point_Presentation_ISSC458_Intindolo

  • 1.
    ForensicsInvestigationsUsing EnCase By JohnIntindolo ISSC458 Professor Bryan Bell (“EnCase Forensic,” n.d.)
  • 2.
    Computer Forensics (“Computer Forensics”,n.d.)  Computer Forensics has become a vital part of criminal investigations now more than it has ever in the past. With the advancement in technology being used in people’s every day lives, it is being used more commonly by criminals as well. Computer Forensics is what is being used to catch criminals that are using technology to support their criminal acts.
  • 3.
  • 4.
    Introduction To EnCase (“EnCaseOverview,” n.d.)  Encase is a forensic software program that is used to assist computer forensics investigators in acquiring data so that it may be used in a court of law.
  • 5.
    EnCaseForensic (Nelson, 2011)  Indexattributes in EnCase by using EnScript.
  • 6.
  • 7.
    References • Computer Forensics.(n.d.). Retrieved from http://www.ossrisk.com/consultant/assets/images/Cyberspace.jpg • Encase Forensic. (n.d.). Retrieved from http://computerforensicsblog.champlain.edu/wp- content/uploads/2013/09/Blog27.jpg • EnCase Overview. (n.d.). Retrieved from https://ralphlosey.files.wordpress.com/2007/10/encaseforensicsprocess.jpg • Investigation Procedures. (n.d.). Retrieved from http://www.cms.livjm.ac.uk/cmpjhagg/gmfc.jpg • Recovering Deleted Files Using Encase. (n.d.). Retrieved from http://forensicmethods.com/wp-content/uploads/2011/09/EnCase_I30_Parse2.jpg
  • 8.
    Referencescont’d. • Text MessageRecovery. (n.d.). Retrieved from https://dietrolldie.files.wordpress.com/2015/01/encase.png

Editor's Notes

  • #7 Here is what recovered text messages look like in EnCase.