To Catch a Thief: Computer Forensics in the Classroom
|
|
|
- Linda Scott
- 10 years ago
- Views:
Transcription
1 To Catch a Thief: Computer Forensics in the Classroom Anna Carlin [email protected] Steven S. Curl [email protected] Daniel Manson [email protected] Computer Information Systems Department California State Polytechnic University Pomona, CA 91768, USA Abstract The subject of computer forensics can be challenging and intriguing for students. Teaching this course involves both the technical and legal aspects of investigative procedures as applied to digital evidence. For the instructor, it can involve challenges not found in other areas of information systems. This paper discusses the triumphs and pitfalls of including computer forensics as part of an undergraduate information assurance curriculum. Keywords: curriculum, forensics, security 1. OVERVIEW Computer forensics is the collection and study of computerized evidence as part of a larger investigation. The purpose can be either civil or criminal in nature. Teaching a computer forensics course can be quite an endeavor and can involve challenges not found in other areas of information systems. Furthermore, this course was taught as part of a College of Business Administration curriculum. In addition to relevant information technology, topics covered include the law, seizure of evidence, extraction of evidence, chain of custody, and presentation of relevant findings in court. The course involves specialized hardware and software and puts students on the trail of an imaginary thief. Studies have shown that conducting computer forensics classes in a well-equipped lab helps to ensure a successful and effective learning experience (Logan, 2005 and Whitman, 2004). Labs allow access to specialized tools and provide a hands-on learning experience that textbooks and lectures could never provide. 2. COURSE STRUCTURE The course was taught over a ten week quarter and divided into three parts each with a corresponding project. The students were primarily undergraduates who were placed into groups and assigned to a case. The first part of the course involved the creation of evidence for a particular crime. The second part involved the seizing of digital evidence, maintaining a chain of custody, and analysis of the evidence created by a different group. The last part involved presentation of findings. The crime did not need to be a computer crime but did have to involve evidence stored Proc ISECON 2005, v22 (Columbus OH): 3574 (refereed) c 2005 EDSIG, page 1 1
2 on digital media. One example of a possible crime would be identity theft. Creation of Evidence: For part one, each student had to identify a crime and create supporting evidence of criminal activity. Each team was given a 15 GB hard drive with Windows XP Professional and Microsoft Office installed. To facilitate this part of the course, external USB drive enclosures were purchased and attached to existing, surplus hard drives. The hard drives were connected to the lab computers and students created a second partition. Excel spreadsheets, Word documents, messages, and images were stored on the hard drive. Steganography, password protection, and encryption were used to hide evidence. Some evidence was placed on the second partition and that partition subsequently deleted. The deliverable from this phase was the hard drive, an evidence list, and a case summary. The case summary detailed the laws broken and the events leading up to the seizure of evidence, including the persons (or suspects) involved and exactly what media was seized. The process was also followed, to a lesser degree, for a secondary crime on the same hard drive. The purpose for the secondary crime was to emphasize the Fourth Amendment protection against unreasonable searches and to understand that the search warrant did not encompass the secondary crime. A new warrant would have to be issued to analyze the secondary evidence. The Search for Clues: Hard drives were collected for assignment to a different team. All evidence was secured in evidence bags along with the case summary. The bags were assigned code numbers and sealed. The team analyzing the evidence did not know which team created the evidence and was prohibited from discussing their project with other teams. Each team was assigned an evidence locker to protect the evidence and maintain a chain of custody. In order to ensure that the evidence did not become tainted, each team created an image of the original hard drive and a backup image for contingency purposes. All original evidence was then secured in evidence lockers. Hash totals (or numbers) were generated on the original evidence and the image to ensure that the image file was an exact duplicate of the original. Matching hash totals are important so that the evidence can be presented in court. Analysis was always performed on the duplicate drive. Several tools were used to analyze the evidence, such as EnCase, Access Data Forensic Imaging, Forensic Toolkit, and Password Recovery. The Password Recovery software was sensitive since it could provide logon passwords as well as passwords for files. It took sometimes two to three days for a password to be recovered. Invisible Secrets and Stegdetect were used on images to detect steganography. The Access Data software was also used to unencrypt files. EnCase worked best when viewing images. The team could view thumbnails of the images with several thumbnails viewed at once. Considering that Microsoft Office alone has over one thousand images, this saved teams time and energy. Students needed guidance on the process of sifting through files on a hard drive and identifying evidence. Most evidence was in pieces and appeared at different locations. s could contain passwords for other files. At times, the primary crime was too similar to the secondary crime and caused some confusion. Students were required to document their process, list tools used, identify any evidence recovered and its relationship to the crime. A report was prepared summarizing this information. Once the report was submitted, the instructor gave the team the evidence inventory list from the original team. Presentation of Findings: All teams were required to present their findings to the class. As a part of this presentation, students also discussed what evidence was overlooked based on the listing provided by the instructor. Each team then discussed what could have been done better to recover missed evidence. Instructors who have taught this type of class noted that students experience difficulty presenting the evidence in a coherent, logical manner (Harrison, 2005). The teams had to show how all the artifacts either supported or denied that a crime had been committed. Again this requires the student teams to de- Proc ISECON 2005, v22 (Columbus OH): 3574 (refereed) c 2005 EDSIG, page 2 2
3 termine what elements of the crime should be present to support the charges against the suspect or suspects. 3. TRIUMPHS AND PITFALLS The class was a good learning experience and the students discovered the majority of the evidence created for them. Their final presentations indicated they had developed a solid understanding of the principles of computer forensics and the criminal investigative procedures related to digital evidence. To a lesser extent, the students also learned the meaning of good detective work. The class experienced one or two false starts at the beginning of the search for clues. When imaging the evidence drive, it was possible to exceed the capacity of the destination drive. The seized drive was 15 GB and the image drive was only 8 GB. If the destination hard drive for the image is not large enough, then the software terminates and all work is lost. Imaging a 15 GB hard drive took approximately 55 minutes. The students needed to free up disk space and then recreate the image. Once the image was created and a hash total generated, a different software package was used to create a hash total that should have matched the first hash total. Some students chose to use a software product that was an evaluation version and did not perform the hash total calculation properly. The hash total verification took about 20 minutes to complete. The teams had to use a different software package with full capabilities. The forensics software used to analyze the evidence required a dongle, or electronic key, to access its full capability. A dongle resembles a USB flash drive and works to authorize the use of the software. To operate correctly, the dongle needs to be inserted into the USB drive the entire time the forensics software is running. In one instance, when trying to obtain a password, students inadvertently removed the dongle and all work performed to crack the password was lost. While the forensics software can be installed on many computers, the dongle is the key that allows use of the application. Each team was given a dongle whenever it was necessary to use the forensics software. Since the images were stored on hard drives in the lab, this required time outside of class for working on the group project. Over five weeks of study, four to six hours were needed each week to complete the project. 4. INSTRUCTOR PREPARATION Specific instructor skills are needed to teach digital forensics. These skills include practical aspects of the software, hands-on conduct of an investigation, and theoretical, procedural, and legal material that the students should learn in the class. All faculty members who have taught Computer Forensics at our school have taken digital forensics training courses, and have been involved with the Digital Forensics Educators Working Group. 5. CONCLUSION The computer forensics field will continue to grow since computers are being used to commit numerous crimes. Students in our program will be experienced in the laws surrounding internal and external investigations, acquiring digital media, analyzing the digital media, and presenting their findings. Conducting an exhaustive search for clues is time-consuming. A careful and deliberate analysis cannot be done in a timely manner without the use of appropriate software tools. This class used tools from Guidance Software s EnCase and AccessData s FTK, among others. Students were exposed to a variety of software tools that verified their findings. Verification solidifies the authenticity of evidence presented in court. The analysis itself is of little use without a well written report that presents the evidence in a coherent and logical manner. Reports are relied upon to document what digital evidence was seized and what items were found related to the crime. Expert witnesses will use these reports to familiarize themselves again with the case since it is not unusual for several months or even years go by before the evidence is presented in court. Our class experienced some success and difficulties. Students had a firm grasp on the principles of computer forensics and the Proc ISECON 2005, v22 (Columbus OH): 3574 (refereed) c 2005 EDSIG, page 3 3
4 criminal investigation process. The difficulties were more hardware and software related issues. Between hard drives full to capacity, trial software with partial functionality, and missing dongles, we experienced several false starts that required more lab time spent repeating analysis work. Checklists and software tools should not be solely relied on when conducting an investigation. Each piece of evidence recovered requires evaluation by an experienced examiner. Consequently the need for experienced examiners is growing. Programs like ours will expose students to the computer forensics field and help fill the growing industry need for knowledgeable computer forensic examiners. 6. FUTURE IMPROVEMENTS While the course was well received by the students, there is always room for improvement. For this session, the search warrants were provided by the instructor. To better teach the meaning of the Fourth Amendment, we would have students write their own search warrants for the primary crime. We would also put more emphasis on the legal significance and handling of evidence related to secondary crimes. The tools worked well from a technical perspective but do nothing to determine whether or not any evidence discovered is covered by the search warrant. The team performing the analysis needs to exercise judgment and prudence when interpreting evidence of crimes and should then go back and write appropriate warrants whenever evidence is discovered for other crimes. These crimes would not fall under the authority of the search warrant and that a new warrant is needed for that evidence to be admissible in court. We also believe that checklists for the seizing, analyzing, and reporting of evidence would be helpful for those not experienced in computer forensics. Our hesitation in using checklists is that the students would blindly follow the steps listed and not consider other avenues of investigative thought. When analyzing evidence, one clue can lead the investigator in a different direction. If the checklist does not include that additional analysis, the evidence may be overlooked. The evidence seized should include more than one type of media. The student teams were provided USB hard drives but it would be helpful to include a flash or floppy drive, cell phones, and a PDA. In addition, photographs from the crime scene would add a creative touch to the exercise. Some evidence created by the students was too good. For example, one team created fake drivers licenses for an identity theft case. Photoshop was used and the resulting licenses were very convincing. It was only apparent that the images were faked due to the fact that fictitious names and supporting data were used along with faculty photos. In the future, we would require evidence banners to be placed on any images related to fictitious crimes. A forensics software usage policy should be required for the class. Since the software involved in the course can be used for recovering passwords, a usage policy restricting use to class projects seems appropriate. The policy should also describe consequences for failure to comply with this rule. 7. ACKNOWLEDGEMENTS We would like to acknowledge the Digital Forensics Educators Working Group. They provide a forum for educators to discuss changes in the field and ways to share program information and digital forensics curriculum. We would also like to thank Warren Harrison, Professor of Computer Science at Portland State University and a Police Reserve Specialist in Digital Forensics with the Hillsboro (Oregon) Police Department. Sharing his experience in teaching computer forensics was instrumental to how we structured our group project. 8. REFERENCES Harrison, Warren (2005) Forensics Course Project Development, Digital Forensic Working Group, University of Central Florida, February Logan, Patricia and Allen Clarkson (2005) Teaching Students to Hack: Curriculum Proc ISECON 2005, v22 (Columbus OH): 3574 (refereed) c 2005 EDSIG, page 4 4
5 Issues in Information Security, ACM Special Interest Group on Computer Science Education, St. Louis, Missouri, February Soe, Louise, Marcy Wright, and Dan Manson (2004) Establishing Network Computer Forensics Classes, Annual Conference on Information Systems Security Curriculum Development, Kennesaw State University, October 8. Whitman, Michael and Herbert Mattord (2004) An Introduction to Teaching & Developing Information Security Curriculum, Annual Conference on Information Systems Security Curriculum Development, Kennesaw State University, October 8. Proc ISECON 2005, v22 (Columbus OH): 3574 (refereed) c 2005 EDSIG, page 5 5
To Catch a Thief II: Computer Forensics in the Classroom
To Catch A Thief II: Computer Forensics in the Classroom Anna Carlin Computer Information Systems Department, California State Polytechnic University Pomona, CA 91768, USA [email protected] Steven
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
What is Digital Forensics?
DEVELOPING AN UNDERGRADUATE COURSE IN DIGITAL FORENSICS Warren Harrison PSU Center for Information Assurance Portland State University Portland, Oregon 97207 [email protected] What is Digital Forensics?
Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC
Digital Forensics: The aftermath of hacking attacks AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC Topics Digital Forensics: Brief introduction Case Studies Case I:
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
Certified Digital Forensics Examiner
Cyber Security Training & Consulting Certified Digital COURSE OVERVIEW 5 Days 40 CPE Credits $3,000 Digital is the investigation and recovery of data contained in digital devices. This data is often the
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
Digital Forensics. Larry Daniel
Digital Forensics Larry Daniel Introduction A recent research report from The Yankee Group found that 67.6 percent of US households in 2002 contained at least one PC The investigators foresee three-quarters
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING MODULE A INTRODUCTION TO COMPUTER FORENSICS AND NVESTIGATIONS A1.0 Explain concepts related to computer forensics. A1.1 This module is measured
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer
How To Get A Computer Hacking Program
CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator
Course Title: Computer Forensic Specialist: Data and Image Files
Course Title: Computer Forensic Specialist: Data and Image Files Page 1 of 9 Course Description The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute
CERTIFIED DIGITAL FORENSICS EXAMINER
CERTIFIED DIGITAL FORENSICS EXAMINER KEY DATA Course Title: C)DFE Duration: 5 days CPE Credits: 40 Class Format Options: Instructor-led classroom Live Online Training Computer Based Training Who Should
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
Design and Implementation of Digital Forensics Labs:
Design and Implementation of Digital Forensics Labs: A Case Study for Teaching Digital Forensics to Undergraduate Students Hongmei Chi, Christy Chatmon, Edward Jones, and Deidre Evans Computer and Information
CDFE Certified Digital Forensics Examiner (CFED Replacement)
Course: CDFE Certified Digital Forensics Examiner (CFED Replacement) Description: Price: $3,450.00 Category: Popular Courses Duration: 5 days Schedule: Request Dates Outline: COURSE OVERVIEW Computer Forensics
Digital Forensics for Attorneys Overview of Digital Forensics
Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence
AN INVESTIGATION INTO COMPUTER FORENSIC TOOLS
AN INVESTIGATION INTO COMPUTER FORENSIC TOOLS K.K. Arthur 1 H.S. Venter 2 Information and Computer Security Architectures (ICSA) Research Group University of Pretoria Pretoria Department of Computer Science
Introduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014
Introduction to Data Forensics Jeff Flaig, Security Consultant January 15, 2014 WHAT IS COMPUTER FORENSICS Computer forensics is the process of methodically examining computer media (hard disks, diskettes,
Computer Hacking Forensic Investigator v8
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer
Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
Getting Physical with the Digital Investigation Process
Getting Physical with the Digital Investigation Process Brian Carrier Eugene H. Spafford Center for Education and Research in Information Assurance and Security CERIAS Purdue University Abstract In this
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices Introduction As organizations rely more heavily on technology-based methods of communication, many corporations
https://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820
Page 1 of 5 DAKOTA COUNTY Employee Relations Administration Center, 1590 Highway 55 Hastings, MN 55033-2372 651.438.4435 http://www.dakotacounty.us INVITES APPLICATIONS FOR THE POSITION OF: Electronic
CYBER FORENSICS (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 CYBER FORENSICS (W/LAB) Course Syllabus Course Number: CSFS-0020 OHLAP Credit: Yes OCAS Code: 8134 Course Length: 130 Hours Career Cluster: Information
Digital Forensics for Attorneys - Part 2
Lars Daniel, EnCE Digital Forensics for Attorneys - Part 2 Experts, Analysis, Challenging Evidence Digital Forensics For Attorneys Part I Overview of Digital Forensics Types of Digital Evidence Acquisition
CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS
Chapter 22 CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS April Tanner and David Dampier Abstract Research in digital forensics has yet to focus on modeling case domain information involved in investigations.
Digital Evidence Search Kit
Digital Evidence Search Kit K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K. H. Pun, W.W. Tsang, H.W. Chan Center for Information Security and Cryptography Department of Computer Science The University
DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM
DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM Proposed Program Title: Bachelor of Science in Computing Science- Specialization in Digital Forensics Specialization
CASPER SECURE DRIVE BACKUP
TM CASPER SECURE DRIVE BACKUP USER GUIDE V4.0 TM Copyright and Trademark Information Information in this document is subject to change without notice. Federal law prohibits unauthorized use, duplication,
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL)
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL) COURSE DESCRIPTION: Computer Forensics is focused on teaching
Chapter 7 Securing Information Systems
1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,
Introduction to Computer Forensics ITP 499 (3 Units)
Introduction to Computer Forensics ITP 499 (3 Units) Description In 2007, the FBI reported that over 200 major companies reported a loss of over 60 million dollars due to computer crime. Computers are
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected]
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected] SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,
Computer Forensics Processing Checklist. Pueblo High-Tech Crimes Unit
Computer Forensics Processing Checklist Pueblo High-Tech Crimes Unit Cmdr. Dave Pettinari Pueblo County Sheriff's Office [email protected] The purpose of this document is to provide computer forensic technicians
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
Technical Procedure for Evidence Search
Technical Procedure for Evidence Search 1.0 Purpose - The purpose of this procedure is to provide a systematic means of searching digital evidence in order to find data sought by the search authorization.
Open Source Digital Forensics Tools
The Legal Argument 1 [email protected] Abstract This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a
Digital Forensic Techniques
Digital Forensic Techniques Namrata Choudhury, Sr. Principal Information Security Analyst, Symantec Corporation Professional Techniques T23 CRISC CGEIT CISM CISA AGENDA Computer Forensics vs. Digital Forensics
Introduction to Network Security Comptia Security+ Exam. Computer Forensics. Evidence. Domain 5 Computer Forensics
Introduction to Network Security Comptia Security+ Exam Domain 5 Computer Forensics Computer Forensics Forensics relates to the application of scientific knowledge and method to legal problems Investigating
RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University
December 12, 2006 RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University Dear Applicant Agency: The Center for Regional and National Security are pleased to announce the seventh
Information Technologies and Fraud
Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting Information Technologies for Fraud investigation A.
Impact of Digital Forensics Training on Computer Incident Response Techniques
Impact of Digital Forensics Training on Computer Incident Response Techniques Valorie J. King, PhD Collegiate Associate Professor University of Maryland University College Presentation to AFCEA June 25,
CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS. Brian Carrier & Eugene H. Spafford
CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS Brian Carrier & Eugene H. Spafford Center for Education and Research in Information Assurance and Security, Purdue University,
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY-274 Privacy, Ethics & Computer Forensics I. Basic Course Information A. Course Number & Title: CISY-274 - Privacy, Ethics, & Computer Forensics B. New
Guidelines on Digital Forensic Procedures for OLAF Staff
Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE Vahidin Đaltur, Kemal Hajdarević, Internacional Burch University, Faculty of Information Technlogy 71000 Sarajevo, Bosnia
Incident Response and Forensics
Incident Response and Forensics Yiman Jiang, President and Principle Consultant Sumus Technology Ltd. James Crooks, Manager - Advisory Services PricewaterhouseCoopers LLP UBC 2007-04-12 Outline Computer
Computer Forensics Preparation
Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics
Cell Phone Forensics For Legal Professionals
1 Cell Phone Forensics For Legal Professionals Lars E. Daniel, EnCE, ACE, AME, CTNS, SCE, SCCM, SCA Digital Forensics Examiner Cell Phone Acquisition and Examination Collection and Acquiring Cell Phones
EnCase 7 - Basic + Intermediate Topics
EnCase 7 - Basic + Intermediate Topics Course Objectives This 4 day class is designed to familiarize the student with the many artifacts left behind on Windows based media and how to conduct a forensic
HIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
Legal Notices. AccessData Corp.
Legal Notices AccessData Corp. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability
CYBER FORENSICS. KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad.
CYBER FORENSICS KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad. 11 DIGITAL EVIDENCE? Cyber crimes Digital evidence Digital evidence is any information of
York County Sheriff's Office Identity Theft Victim s Packet
York County Sheriff's Office Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have received a copy of your police report from the York County Sheriff's
CRJ 460/560 Survey of Technology and Crime FSC 450/550 Computer Forensics Spring 2005
CRJ 460/560 Survey of Technology and Crime FSC 450/550 Computer Forensics Spring 2005 Instructor: Bobby Moore, Ph.D. Course Time: MWF: 11:00 to 11:50 Phone: 846-4073 E-mail: [email protected] Webpage:
RECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES
RECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES KEVIN MANSELL CONTROL-F LTD. [email protected] DARREN LOLE & FIONA LITCHFIELD SERVICE
T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E
T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E A I D E N T I T Y T H E F T G U I D E Prepared and distributed as a Public
Evidence Technician s School
Evidence Technician s School Program Overview The Evidence Technician s School is designed to provide your Evidence Technician or Crime Scene Investigator with a sound foundation of the basic principles
Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2
Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.
Term Report. Forensics for IT
Term Report Forensics for IT Trisia Yung ACC 626 Professor Malik Datardina June 28, 2012 Introduction Technology has enhanced the operational aspects of today s businesses by improving productivity and
CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 4A: Forensic Processes Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Forensics Processes - objectives Investigation Process Forensic Ethics Issues Forensic
Digital evidence obfuscation: recovery techniques
To appear in Proceedings of the Society for Optical Engineering Conference. Orlando, FL. Digital evidence obfuscation: recovery techniques J. Philip Craiger* a, Jeff Swauger b, Chris Marberry b a National
CCE Certification Competencies
CCE Certification Competencies May 10, 2012 Page 1 The Certified Computer Examiner (CCE) has evolved into one of the most desired certifications in the computer forensics industry. The certification is
Digital Forensics & e-discovery Services
Digital Forensics & e-discovery Services U.S. Security Associates Digital Forensics & e-discovery Services 21st century fraud investigations require expert digital forensics skills to deal with the complexities
Digital Image Integrity
WHITEPAPER Digital Image Integrity TABLE OF CONTENTS 1 Viability of digital images 2 Best practices 2 Archive image 3 Audit trail 4 Repeatability of image adjustments 5 History of tools to address issues
Computer Forensics. Computer Forensics: History, Tools and Outlooks. By John Burns IT-103-002. Research Paper
1 Computer Forensics: History, Tools and Outlooks By John Burns IT-103-002 Research Paper 02/25/2012 "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code
Computer Forensics CHAPTER
Computer Forensics 17 CHAPTER In this chapter, you will Learn the rules and types of evidence Review the collection of evidence Study the preservation of evidence Discover the importance of a viable chain
PREREQUISITE(S): CTS 1131, CTS 1133 and CTS 1120
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CAP 2140 COURSE TITLE: Data Forensics I PREREQUISITE(S): CTS 1131, CTS 1133 and CTS 1120 COREQUISITE(S):
CAPABILITY STATEMENT. > Forensic Technology Team < Daniel Hains, Director t (07) 3228 4028 e [email protected] w www.vincents.com.
CAPABILITY STATEMENT > Forensic Technology Team < Daniel Hains, Director t (07) 3228 4028 e [email protected] w www.vincents.com.au CAPABILITY FORENSIC TECHNOLOGY INDEX Page No. Introduction... 3
CTC 328: Computer Forensics
FALL 2010 CSUDH COMPUTER SCIENCE DEPARTMENT CTC 328: Computer Forensics Instructor: Adam Kaplan, Ph.D. E-Mail: [email protected] Office: NSM E-117 WWW (Blackboard Site): http://toro.csudh.edu Class Meetings:
Computer Forensics as an Integral Component of the Information Security Enterprise
Computer Forensics as an Integral Component of the Information Security Enterprise By John Patzakis 10/28/03 I. EXECUTIVE SUMMARY In addition to fending off network intrusions and denial of service attacks,
COEN 152 / 252 Lab Exercise 1. Imaging, Hex Editors & File Types
COEN 152 / 252 Lab Exercise 1 Imaging, Hex Editors & File Types In this lab we will explore the concepts associated with creating a forensic image. Write-blocking will be accomplished utilizing a mounted
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
I. PREREQUISITES For information regarding prerequisites for this course, please refer to the Academic Course Catalog.
Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase course
e-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:
IAPE STANDARDS SECTION 10 - MONEY
IAPE STANDARDS SECTION 10 - MONEY Standard 10.1: Money - Packaging Standard: Money should be packaged in uniquely colored envelopes or in containers with unique labels attached. Information on the label
Digital Forensics. Tom Pigg Executive Director Tennessee CSEC
Digital Forensics Tom Pigg Executive Director Tennessee CSEC Definitions Digital forensics Involves obtaining and analyzing digital information as evidence in civil, criminal, or administrative cases Analyze
CITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT
CITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT 101 4 TH Street Southeast Rochester, Minnesota 55904-3761 507-328-6800 Fax 507-328-6975 To: From: Subject: Identity Theft and Internet Crime Victims Rochester
Presentation Title Presentation Subtitle. The Unique Alternative to the Big Four
Presentation Title Presentation Subtitle The Unique Alternative to the Big Four Speaker Biography Tim L. Bryan, CPA/CFF/CITP, CISA, EnCE Senior Manager, Crowe Horwath LLP Forensic Technology Services Leader
Best Practices for Computer Forensics
Scientific Working Group on Digital Evidence Best Practices for Computer Forensics Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification
Software Installation and Creating a New Company
Chapter 1 Software Installation and Creating a New Company OBJECTIVES: 1 System Requirements 2 Software Installation 3 Starting QuickBooks and Creating a New Company 4 Backing up Company Data 5 QuickBooks
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
