Digital Forensics: Current and Future Needs
|
|
|
- Emil Jones
- 10 years ago
- Views:
Transcription
1 Digital Forensics: Current and Future Needs Katrin Franke Norwegian Information Security Laboratory (NISlab) Gjøvik University College 1
2 Crime in the Modern World Massive amount of data: 247 billion per day 234 million websites 5 billion mobile-phone users ICT Infrastructures: Complex, rapidly growing Dynamically changing Hostile, adversary environment Cybercrime: One million victims daily Expected losses 297 billion Euro Crowd sourcing -> Crime sourcing Flash mobs -> Flash robs Proactive, Ultra-large scale Forensic Investigations, : Situation-aware methods Quantified, measurable indicators Adaptive, self-organizing models Distributed, cooperative, autonomous Rule-of-Law: Culture, social behaviours Legal & privacy aspects Cross-jurisdiction cooperation European / International cyberlaw Law as framework for ICT Law as contents of ICT, Automation, programming of legal rules 2
3 Forensic Science Forensic methods consist of multi-disciplinary approaches to perform the following tasks: Investigate and to Reconstruct a crime scene Forensic experts study a broad area of objects, substances (blood, body fluids, drugs), chemicals (paint, fibers, explosives, toxins), tissue traces (hair, skin), impression evidence (shoe or finger print, tool or bite marks), electronic data and devices (network traffic, , images). Some further objects to be studied are fire debris, vehicles, questioned documents, physiological and behavioral patterns. or a scene of an accident, Collect and Analyze trace evidence found, Identify, Classify, Quantify, Individualize persons, objects, processes, Establish linkages, associations and reconstructions, and Use those findings in the prosecution or the defense in a court of law. So far, mostly dealt with previously committed crime, greater focus is now to prevent future crime. 3
4 Crime in the Modern World cont. Digital devices are used everywhere: Computers, mobile phones, PDAs, cameras, copy machines, printers, videogame consoles Used to plan/conducted physical and cyber crimes Digital evidence: 4 System registry, Event logs, Print spool, Swap files, Recycle bin Mobile phone SMS messages, Contacts, Connections etc. Threatening s or chats messages Documents (e.g., in places they shouldn t be) Suicide notes Bomb-making diagrams Malicious Software, Viruses, Worms, Botnet Child pornography
5 Types of Computer Crime 6 Alkaabi, A., G. M. Mohay, A. J. McCullagh and A. N. Chantler (2010). "Dealing with the problem of cybercrime", Conference Proceedings of 2nd International ICST Conference on Digital Forensics & Cyber Crime, 46 October 2010, Abu Dhabi.
6 Computer Crime Offences & Costs Report of the Belgian Economic and Financial Crimes Division (DJF) Online crime complaints and dollar loss in the United States (IC3, 2010) German Annual Federal Criminal Police Office Situation Report on Cybercrime 2009 and
7 European Status European Commission, Directorate- General Home Affairs, Directorate Internal Security Unit A.2: Organised Crime RAND Corporation, Feasibility Study for a European Cybercrime Centre, Technical Report 1218," Prepared for the EC 8
8 Strengthening Forensic Science in the United States: A Path Forward Committee on Identifying the Needs of the Forensic Sciences Community, National Research Council ISBN: , 352 pages, 6 x 9, (2009) This PDF is available from the National Academies Press at: 9
9 US Department of Defense Strategy for Operating in Cyberspace, July 2011 I. New collaborative approaches and partnerships with private and research sector II. Active support and investment in cutting-edge research and development III. Adoption of research results, development of investigative tools and methods, and further advancement of ICT in police work 10
10 Interpool Global-Complex Singapore Mission Enhance capability to tackle the crime threats of the 21st century Strengthen international policing worldwide Strategic Initiatives Innovative research and development to enhance forensics and database capabilities (incl. identification of crimes and criminals, biometrics, database technologies) Addressing the demand for technology and innovation based capacity building and training (e.g. training in advanced investigation techniques) Enhancing capacity to provide 24/7 operational support to police across time zones and distances with greater mobility 11
11 Crime in the Modern World Massive amount of data: 247 billion per day 234 million websites 5 billion mobile-phone users ICT Infrastructures: Complex, rapidly growing Dynamically changing Hostile, adversary environment Cybercrime: One million victims daily Expected losses 297 billion Euro Crowd sourcing -> Crime sourcing Flash mobs -> Flash robs Proactive, Ultra-large scale Forensic Investigations, : Situation-aware methods Quantified, measurable indicators Adaptive, self-organizing models Distributed, cooperative, autonomous Rule-of-Law: Culture, social behaviours Legal & privacy aspects Cross-jurisdiction cooperation European / International cyberlaw Law as framework for ICT Law as contents of ICT, Automation, programming of legal rules 12
12 Challenges and Demands in Forensic Science Challenges: Tiny Pieces of Evidence are hidden in a mostly Chaotic Environment, Trace Study to reveal Specific Properties, Traces found will be Never Identical, Reasoning and Deduction have to be performed on the basis of - Partial Knowledge, - Approximations, - Uncertainties and 13 - Conjectures. Demands: Objective Measurement and Classification, Robustness and Reproducibility of the Results, Secure against Falsifications.
13 Current Forensic Practice Evidence becoming increasingly data intensive and widely distributed Common practice to seize all data carriers; amounts to many terabytes of data Enrich with data available on the Internet, Social networks, etc. Huge amounts of Paper Documents 14
14 Testimon-Research Agenda Research in the area of large-scale investigations; automatic search through terabytes of electronic data storage within closed systems and the Internet, Research and development for the rapid acquisition, correlation and analysis of Internet-related evidence, Technologies for cross-media search and data integration to access diverse sources of information, in particular data enrichment from Internet sources, Algorithms for the analysis of encrypted evidence and cryptographic credentials, Design of advanced computing technologies to achieve more objective evidence analysis and final decision making by implementing computational intelligence, Develop of methods and tools for digital penetrator attribution and profiling, visualization of serious criminal relationships and associations, and geographical mapping of digital and physical evidence. 15
15 Computational Foreniscs Study and development of computational intelligence methods to Assist in basic and applied research, e.g. to establish or prove the scientific basis of a particular investigative procedure, Support the forensic examiner in their daily casework. Modern crime investigation shall profit from the hybrid-intelligence of humans and machines. 16
16 Computational Methods Signal / Image Processing : one-dimensional signals and two-dimensional images are transformed for better human or machine processing, Computer Vision : images are automatically recognized to identify objects, Computer Graphics / Data Visualization : two-dimensional images or three-dimensional scenes are synthesized from multi-dimensional data for better human understanding, Statistical Pattern Recognition : abstract measurements are classified as belonging to one or more classes, e.g., whether a sample belongs to a known class and with what probability, Machine Learning : a mathematical model is learnt from examples. Data Mining : large volumes of data are processed to discover nuggets of information, e.g., presence of associations, number of clusters, outliers, etc. Robotics : human movements are replicated by a machine. 17
17 Definition It is understood as the hypothesis-driven investigation of a specific forensic problem using computers, with the primary goal of discovery and advancement of forensic knowledge. CF works towards: 1) In-depth Understanding of a forensic discipline, 2) Evaluation of a particular scientific method basis and 3) Systematic Approach to forensic sciences by applying techniques of computer science, applied mathematics and statistics. It involves Modeling and computer Simulation (Synthesis) and/or computer-based Analysis and Recognition 18
18 Example: Ongoing Research Malware and Botnet Detection Number of Selected Indicators Achieved Recognition Performance Nyugen, Franke, et all 19
19 Admission of 1. Need of Automatization, Standardization, and Benchmarking 2. Need of Education, Joint Research, and Development by Forensic and Computer Scientist 3. Need of Legal Framework 20
20 Automatization, Standardization, and Benchmarking Increase Efficiency and Effectiveness Perform Method / Tool Testing regarding their Strengths/Weaknesses and their Likelihood Ratio (Error Rate) Gather, manage and extrapolate data, and to synthesize new Data Sets on demand. Establish and implement Standards for data, work procedures and journal processes Fulfillmenthttp://en.wikipedia.org/wiki/Daubert_Standard of Daubert Criteria 21
21 Joint Research & Development: Forensic and Computer Scientist Education and training, 22 Revealing the state-of-the art in *each* domain Sources of information on events, activities and financing opportunities International forum to peer-review and exchange, e.g., IWCF workshops Performance evaluation, benchmarking, proof and standardization of algorithms Resources in forms of data sets, software tools, and specifications e.g. data formats New Insights on problem description and procedures
22 Legal Framework?! Questions on methods for dimensionality reduction loss of relevant information Questions on extracted numerical parameters loss of information due to inappropriate features Questions on the reliability of applied computational method / tool Questions on the final conclusion due to wrong computational results 23
23 Crime in the Modern World Massive amount of data: 247 billion per day 234 million websites 5 billion mobile-phone users ICT Infrastructures: Complex, rapidly growing Dynamically changing Hostile, adversary environment Cybercrime: One million victims daily Expected losses 297 billion Euro Crowd sourcing -> Crime sourcing Flash mobs -> Flash robs Proactive, Ultra-large scale Forensic Investigations, : Situation-aware methods Quantified, measurable indicators Adaptive, self-organizing models Distributed, cooperative, autonomous Rule-of-Law: Culture, social behaviours Legal & privacy aspects Cross-jurisdiction cooperation European / International cyberlaw Law as framework for ICT Law as contents of ICT, Automation, programming of legal rules 24
24 Open Forensic Discussion 1. Need of Automatization, Standardization, and Benchmarking 2. Need of Education, Joint Research, and Development 3. Need of Legal Framework 4. Stakeholders & PP-Partnerships 25
25 Thank you for your consideration of comments! Getting in touch WWW: kyfranke.com Skype/gTalk: kyfranke 26
26 Katrin Franke, PhD, Professor Professor of Computer Science, 2010 PhD in Artificial Intelligence, 2005 MSc in Electrical Engineering, 1994 Industrial Research and Development (15+ years) Financial Services and Law Enforcement Agencies Courses, Tutorials and post-graduate Training: Police, BSc, MSc, PhD Chair IAPR/TC6 IAPR Young Investigator Award, 2009 International Association of Pattern Recognition 27 kyfranke.com
BIG DATA & Forensics. Katrin Franke, PhD Norwegian Information Security Laboratory, Gjøvik, Norway
BIG DATA & Forensics Katrin Franke, PhD Norwegian Information Security Laboratory, Gjøvik, Norway 1 Computational Forensics Katrin Franke, PhD Norwegian Information Security Laboratory, Gjøvik, Norway
Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute. NFI Academy
Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute NFI Academy Welcome to the NFI Academy Key to the expertise of The Netherlands Forensic Institute In the context
Workshop on Building international cooperation WG2 : Network Information Security / cyber security
Workshop on Building international cooperation WG2 : Network Information Security / cyber security Michel Riguidel [email protected] WG2 : network information & cybersecurity International
DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM
DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM Proposed Program Title: Bachelor of Science in Computing Science- Specialization in Digital Forensics Specialization
EXPERIENCED PROFESSIONAL CERTIFICATE IN Forensic Science
Certificate Description This certificate provides professionals the opportunity to enhance specialized skills in Forensic Science. Arson Investigation CRJS 350 This course will explore criminal and scientific
The College of Forensic Sciences at NAUSS: The pioneer of Forensics in the Arab world
12 Arab Journal of Forensic Sciences and Forensic Medicine 2014; Volume 1 Issue (0), 12-16 Naif Arab University for Security Sciences Arab Journal of Forensic Sciences and Forensic Medicine www.nauss.edu.sa
How To Understand Forensic Science
Forensic Science Lesson 1: CSI Basics What is Forensic Science? Forensic Science is the application of science to law. Locard s Exchange Principle states that with contact between two items there will
CRIME SCENE FORENSICS
CRIME SCENE FORENSICS Description Crime Scene Forensics, which is a laboratory-based course, will promote and cultivate the development of student s scientific inquiry and scientific method skills, which
The Netherlands Forensic Institute. Strengthening the rule of law together
The Netherlands Forensic Institute Strengthening the rule of law together The Netherlands Forensic Institute The Netherlands Forensic Institute (NFI) is one of the world s leading forensic laboratories.
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
Dudesville: A crime scene under the microscope. QUT Extreme Science
Dudesville: A crime scene under the microscope QUT Extreme Science Glossary QUT Extreme Science DNA Chromatography Forensic Science Locard s Principle (Deoxyribonucleic acid) an extremely long macromolecule
Supported by. A seven part series exploring the fantastic world of science.
Supported by A seven part series exploring the fantastic world of science. Find out what techniques are used by forensic scientists and why they are so useful. Forensic science is the term given to the
Security and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map
Security and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map Prepared by: Booz Allen Hamilton Career Progression within the 1811 Occupational Series is Marked by Support
(FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. June 2015
Faculty of Engineering and Informatics Programme Specification Programme title: MSc Big Data Science and Technology (BDST) Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
Forensics in Nuclear Security. by the Netherlands Forensic Institute
Forensics in Nuclear Security by the Netherlands Forensic Institute Combating the threat of nuclear terrorism In an age when the threat of terrorist violence appears more immediate and more extreme than
Psychology, Social Work and Human Sciences
School of, Social Work and Human Sciences UG PG Our courses provide our students with an exciting and diverse education in scientific discovery and social and health studies, based at our Brentford site
Forensic Science Curriculum
Forensic Science Curriculum The Georgia Performance Standards are designed to provide students with the knowledge and skills for proficiency in science. The Project 2061 s Benchmarks for Science Literacy
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
In 2009, the nation s 411 publicly funded crime
U.S. Department of Justice Office of Justice Programs Bureau of Justice Statistics Census of Publicly Funded Forensic Crime Laboratories, Matthew R. Durose, BJS Statistician Kelly A. Walsh, Research Associate,
Rules and Procedures. Rule 312 August 23, 2001. Rule 312 - CRIME LABORATORY - EVIDENCE AND CRIME SCENES
Rules and Procedures Rule 312 August 23, 2001 Rule 312 - CRIME LABORATORY - EVIDENCE AND CRIME SCENES Rule 312, Crime Laboratory - Evidence and Crime Scenes, is hereby re-issued to establish Police Department
Research Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
Evidence Technician s School
Evidence Technician s School Program Overview The Evidence Technician s School is designed to provide your Evidence Technician or Crime Scene Investigator with a sound foundation of the basic principles
CRIME SCENE INVESTIGATION
CRIME SCENE INVESTIGATION CHAPTER 2 Mr. Moss 1 CRIME SCENE INVESTIGATION Crime scenes tell a story Crime scene investigators must be careful and systematic Crime scene investigators must follow protocol
Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
How To Become A Forensic Scientist
A c a r e e r i n By Hall Dillon Blood spatters, spent shell casings, and forged signatures are the nuts and bolts of forensic science. Studying the messy details of crime, forensic scientists help identify
Analyzing Huge Data Sets in Forensic Investigations
Analyzing Huge Data Sets in Forensic Investigations Kasun De Zoysa Yasantha Hettiarachi Department of Communication and Media Technologies University of Colombo School of Computing Colombo, Sri Lanka Centre
Dealing with disasters with the Netherlands Forensic Institute. NFI Forensic response to disasters
Dealing with disasters with the Netherlands Forensic Institute NFI Forensic response Dealing with disasters NFI Forensic response The Netherlands Forensic Institute (NFI) is an agency of the Netherlands
How To Become A Data Scientist
Programme Specification Awarding Body/Institution Teaching Institution Queen Mary, University of London Queen Mary, University of London Name of Final Award and Programme Title Master of Science (MSc)
This Symposium brought to you by www.ttcus.com
This Symposium brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com Big Data Analytics as a Service (BDAaaS) Big Data
Forensic Science : Course Syllabus Forensic Science : Secrets of the Dead
Forensic Science : Course Syllabus Forensic Science : Secrets of the Dead COURSE DESCRIPTION: Fingerprints. Blood spatter. DNA analysis. The world of law enforcement is increasingly making use of the techniques
Forensic Science: Crime Scene Basics. T. Trimpe 2006 http://sciencespot.net
Forensic Science: Crime Scene Basics T. Trimpe 2006 http://sciencespot.net Crime Scene Vocabulary CRIME SCENE: Any physical location in which a crime has occurred or is suspected of having occurred. PRIMARY
Computer Forensics Preparation
Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics
Center for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC) Vision and Mission
Photo courtesy of Justin Reuter Center for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC) Vision and Mission CDDA Mission Mission of our CDDA
How To Be A Forensic Investigator
CLASS SPECIFICATION Class Code: 2226 Date Est: 10/1989 Last Rev: 04/2014 Last Title Chg: 04/2014 FLSA: Non-exempt Probation: 12 Months FORENSIC INVESTIGATOR II DEFINITION Under general supervision, performs
Cyber Risks in Italian market
Cyber Risks in Italian market Milano, 01.10.2014 Forum Ri&Assicurativo Gianmarco Capannini Agenda 1 Cyber Risk - USA 2 Cyber Risk Europe experience trends Market size and trends Market size and trends
TIETS34 Seminar: Data Mining on Biometric identification
TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland [email protected] Course Description Content
Fighting Identity Fraud with Data Mining. Groundbreaking means to prevent fraud in identity management solutions
Fighting Identity Fraud with Data Mining Groundbreaking means to prevent fraud in identity management solutions Contents Executive summary Executive summary 3 The impact of identity fraud? 4 The forgery
Cyber Security @ DTU. Lars Ramkilde Knudsen
Cyber Security @ DTU Lars Ramkilde Knudsen Professor @ Technical University of Denmark (DTU) Member of the Academy of Technical Sciences in Denmark Chief Cryptographer @ Dencrypt Finans IT Dagen About
Internet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
Georgia Perimeter College Common Course Outline
Georgia Perimeter College Common Course Outline Course Abbreviation & Number: FRSC 2100 Course Title: Credit Hours: 3 Prerequisites: Co-requisites: Introduction to Forensic Science Exit or exemption from
Republic of Latvia State Police Forensic Service Department
With the financial support of the Prevention of and Fight against Crime Programme European Commission Directorate General Home Affairs Republic of Latvia State Police Forensic Service Department implements
Naif Arab University for Security Sciences (NAUSS): Pursuing excellence in security science education and research
Arab Journal of Forensic Sciences and Forensic Medicine 2014; Volume 1 Issue (0), 5-11 5 Naif Arab University for Security Sciences Arab Journal of Forensic Sciences and Forensic Medicine www.nauss.edu.sa
1. This report outlines the Force s current position in relation to the Policing of Cyber Crime.
Agenda Item No. 5 COMMUNITY OUTCOMES MEETING SUBJECT: CYBER CRIME 4 August 2015 Report of the Chief Constable PURPOSE OF THE REPORT 1. This report outlines the Force s current position in relation to the
POLICE SCENE TECHNICIAN I POLICE SCENE TECHNICIAN II
CITY OF ROSEVILLE POLICE SCENE TECHNICIAN I POLICE SCENE TECHNICIAN II DEFINITION To perform a variety of technical and specialized duties related to the investigation of crimes and traffic accidents;
Faculty of Organizational Sciences
Faculty of Organizational Sciences Management EC TS: 60/ L anguage of instruc tion: serbian/ degree: Specialis t Specialized academic study program in Management is the continuation of Master s studies
The UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
Forensic Science. Distance Learning Presentation For King Drew Magnet High School of Medicine and Science March 14, 2007
Forensic Science Distance Learning Presentation For King Drew Magnet High School of Medicine and Science March 14, 2007 Dorothy Harris Forensic Course Developer Science Teacher and Department Chairman
FORENSIC SCIENTIST MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION
MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION FORENSIC SCIENTIST JOB DESCRIPTION Employees in this job complete and oversee a variety of tests, analyses, identification, and classification of mechanical
Should you wish to contact me: o Barry Fisher o (213) 989-5002 o [email protected]
Physical Evidence: From the crime scene to the courtroom Should you wish to contact me: o Barry Fisher o (213) 989-5002 o [email protected] What is physical evidence? o Something legally submitted
Nottingham Trent University Course Specification
Nottingham Trent University Course Specification Basic Course Information 1. Awarding Institution: Nottingham Trent University 2. School/Campus: Science & Technology, Clifton campus 3. Final Award, Course
ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES
ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES CLASS TITLE POSITION CODE EFFECTIVE FORENSIC SCIENTIST TRAINEE 15897 5/1/10 FORENSIC SCIENTIST I 15891 5/1/10
Survey on Different Phases of Digital Forensics Investigation Models
Survey on Different Phases of Digital Forensics Investigation Models Priya S. Patil 1, Prof. A. S. Kapse 2 P. R. Patil College of Engineering and Technology, Amravati, India ABSTRACT: Most forensics models
SAULT COLLEGE SAULT STE. MARIE, ONTARIO COURSE OUTLINE
SAULT COLLEGE SAULT STE. MARIE, ONTARIO COURSE OUTLINE COURSE TITLE: Introduction to Applied Forensic Science CODE NO. : NRL 210 SEMESTER: 2 PROGRAM: AUTHOR: Natural Resources/Environmental Law Inspection
Data Mining Applications in Higher Education
Executive report Data Mining Applications in Higher Education Jing Luan, PhD Chief Planning and Research Officer, Cabrillo College Founder, Knowledge Discovery Laboratories Table of contents Introduction..............................................................2
FORENSIC SCIENCE COURSE DESCRIPTION
FORENSIC SCIENCE COURSE DESCRIPTION This course is an overview of how science is applied to solving crimes. Topics include history of forensic sciences, collecting of evidence, analyzing results and hands-on
WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME
WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME HELPING LAW ENFORCEMENT AGENCIES SOLVE CRIMES FASTER, WITH LOWER COSTS AND FEWER RESOURCES. 1 Wynyard Group Advanced Crime
The Nature of Evidence
The Nature of Evidence Chapter 3 Mrs. Svedstrup What is Evidence? Legal definition: That which tends to support something or show that something is the case Relevance of evidence- admissibility of evidence
SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness
SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper Safeguarding data through increased awareness November 2015 1 Contents Executive Summary 3 Introduction 4 Martime Security 5 Perimeters Breached
Introduction to Forensic Science. So what is Forensic Science? Major Contributors. Chapter 1: Intro to FS
Introduction to Forensic Science Chapter 1: Intro to FS So what is? In its broadest definition, forensic science is the application of science to criminal and civil laws. We will put emphasize on the applications
Criminal Justice II, August 2013, Page 1 of 5
Indiana Department of Education Academic Course Framework CRIMINAL JUSTICE II Criminal Justice II introduces students to concepts and practices in controlling traffic as well as forensic investigation
How To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
How To Understand The Basics Of Forensic Science
Forensic Science for the Criminal Justice World The Pennsylvania Innocence Project is proud to partner with the Center for Forensic Science Research and Education to present the first comprehensive academy
RUAG Cyber Security. More security for your data
RUAG Cyber Security More security for your data More security in cyberspace The RUAG Cyber Security Portfolio offers greater protection for your data through inspection, event analysis and decision-making
School of Psychology, Social Work and Human Sciences
School of Psychology, Social Work and Human Sciences Our courses provide our students with an exciting and diverse education in scientific discovery and social and health studies. : Our courses are based
Promoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
Master of Science in Forensics
Master of Science in Forensics The Master of Science in Forensics provides students with an intensive and holistic criminalistics experience through a combination of didactic and practical educational
How To Become A State Pol Forensic Tech Leader
JOB DESCRIPTION MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION STATE POLICE FORENSIC TECHNICAL LEADER Employees in this job function as statewide technical leaders within the Michigan State Police,
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
National Cyber Crime Unit
National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme [email protected] Official Problem or opportunity Office for National Statistics In
Big Data Strategies Creating Customer Value In Utilities
Big Data Strategies Creating Customer Value In Utilities National Conference ICT For Energy And Utilities Sofia, October 2013 Valery Peykov Country CIO Bulgaria Veolia Environnement 17.10.2013 г. One Core
Exploring Big Data in Social Networks
Exploring Big Data in Social Networks [email protected] ([email protected]) INWEB National Science and Technology Institute for Web Federal University of Minas Gerais - UFMG May 2013 Some thoughts about
INF 3510 INFORMATION SECURITY Guest Lecture @UiO on Digital Forensics April 17 2012. André Årnes, PhD [email protected]
INF 3510 INFORMATION SECURITY Guest Lecture @UiO on Digital Forensics April 17 2012 André Årnes, PhD [email protected] Who am I? Enterprise Security @Telenor and Assoc Professor @HiG PhD and MSc from
What Can I Do With a Degree in ForSci?
What Can I Do With a Degree in ForSci? 1 Forensic Science Career Fields Forensic Science Tech Career Forensic science techs work in crime labs to analyze the evidence collected from crime scenes. They
Strengthening Forensic Science in the United States: A Path Forward
This PDF is available from The National Academies Press at Strengthening Forensic Science in the United States: A Path Forward ISBN 978-0-309-13135-3 Committee on Identifying the Needs of the Forensic
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS
ADVANCED CYBER THREAT ANALYTICS POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. Wynyard Advanced Cyber Threat Analytics (ACTA) is a Pro-active Cyber Forensics solution that helps protect organisations
Information Visualization WS 2013/14 11 Visual Analytics
1 11.1 Definitions and Motivation Lot of research and papers in this emerging field: Visual Analytics: Scope and Challenges of Keim et al. Illuminating the path of Thomas and Cook 2 11.1 Definitions and
Fight fire with fire when protecting sensitive data
Fight fire with fire when protecting sensitive data White paper by Yaniv Avidan published: January 2016 In an era when both routine and non-routine tasks are automated such as having a diagnostic capsule
BAA Course: Forensic Science 11
BAA Course: Forensic Science 11 District Name: Cowichan Valley District Number: 79 Developed by: Alanna Skene Date Developed: October 20, 2006 Schools Names: Principal s Name: Cowichan Secondary, Frances
MASTER COURSE OUTLINE
A. BIOL 1050 Introduction to Forensic Science B. COURSE DESCRIPTION: MASTER COURSE OUTLINE This introductory course will apply the principles and theories of biology, chemistry, etc. to the study of forensic
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.
(International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models
Mobile App Reputation
Mobile App Reputation A Webroot Security Intelligence Service Timur Kovalev and Darren Niller April 2013 2012 Webroot Inc. All rights reserved. Contents Rise of the Malicious App Machine... 3 Webroot App
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge
Cyber Security. A professional qualification awarded in association with University of Manchester Business School
ICA Advanced Certificate in Cyber Security A professional qualification awarded in association with University of Manchester Business School An Introduction to the ICA Advanced Certificate In Cyber Security
