This website uses cookies to ensure you have the best experience. Learn more

Cyber Forensics Essay

5441 words - 22 pages

Dis c lai m er
• Even though this class touches on quite a few legal topics - nothing should be
construed as advice or legal instruction

• Before performing many of the skills
learned this week on a computer other
than your own, you may need to seek
permission (possibly written) and or
seek advice from your own legal

Whereas computer forensics is defined as
"the collection of techniques and tools used to find evidence in a computer",
digital forensics has been defined as
"the use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation, and presentation of ...view middle of the document...

• "academia" is becoming a fourth




Each perspective has different objectives, even though there is overlap, the approaches of each remain mainly ah-hoc and uncoordinated
• Technology is vendor-driven
• No industry certification
• No standards
- ASCLAD - for labs
• Interesting situations with the courtsystem
- Evidence isn't questioned

Coverage from OS perspective

Coverage from OS perspective

• Windows
- 95% of cases involve Windows (FBI)
- Topics
• File systems: FAT & NTFS
• Multiple tools:
- Commercial
- Freeware
» Windows & Linux
• Live response
• Network forensics

Topics we will cover

• We're going to start by establishing a basis for
- Hexadecimal notation
- Traditional "post-mortem" forensics
• Duplication
• Analysis
• File systems
• Footprints
• Etc
• Then build upon this foundation and explore other
• Generally speaking, if you don't know how a
particular tool is working 'behind the scenes' you
might not be able to hold weight on the witness14
stand (or corporate report, or ____ )

Cybercrime &

• "Information warfare specialists at
the Pentagon estimate that a
properly prepared and well-
coordinated attack by fewer than
30 computer virtuosos strategically
located around the world, with a
budget of less than $10 million,
could bring the United States to its
Center for Strategic & International Studies (CSIS) 15

Cybercrime &

• "Such a strategic attack, mounted
by a cyberterrorist group, either
substate or nonstate actors, would
shut down everything from electric
power grids to air traffic control

Center for Strategic & International Studies (CSIS) 16

Scope of the Problem

• In1990 a computer hard drive seized in
a criminal investigation would contain
approximately 50,000 pages of text

• The same hard drives now contain 5
million to 50 million pages of data.

- But the ability of these agencies to retain
computer talent is seriously jeopardized by
the compensation packages offered by the
private sector.

Center for Strategic & International Studies (CSIS) 17

Computer Crime

• Sample of computer crimes from 2001

- Demoted employee installs a logic bomb,
which later deactivates hand-held
computers used by the sales force.
- eBay

• User advertises goods, but on receiving payment
never ships the goods.
• Advertised collectibles turn out to be fakes
- Disgruntled student sends threatening
emails, leading to school closing down.
- Ring of software pirates use web site to
distribute pirated software
S t ephens on, 2001. 18

Computer Crimes


Other Papers Like Cyber Forensics

Data-Hiding Techniques Essay

1158 words - 5 pages .). A Certified Cyber Forensics Professional (CCFP) whose average salary is between $50,000-60,000.  This averages out to be about $30.00/hr. the professional that holds this certification has a mastery of  current forensics techniques and procedures, legal knowledge, how to handle digital evidence and an wide array of security techniques.  This certification ensures the professional has been in the forensics field for five plus years and knows

Cyber Crime in the World Essay

1824 words - 8 pages must set some standards and strictly enforce them. We must attack cyber crime globally to fully combat this new age crime. Having laws Nationallynationally as well as Internationallyinternationally is the first step. References: Ross, M., Staples, G. & Udall M. (2009), “Cybercrime – raising awareness for future professionals,” International Journal of Electronic Security and Digital Forensics – Vol.2, No. 2 pp. 228-238

Computer Forensics Tools

1779 words - 8 pages attorney and CFCE he is qualified to assist district attorneys and prosecutors in computer crime prosecution, to assist plaintiff's or defense counsel in civil cases involving computer evidence, or to explain and interpret forensically significant digital evidence to defense counsel in criminal cases (Cyber Lab, 2005). Computer forensics can play a vital role in criminal investigations. State v. Guthrie, a case dealing with a criminal

Assignment 1

477 words - 2 pages intelligence agencies. Computer crime is prosecution is relatively new in this New Age, and the court system is catching up with how to handle computer crimes and that is why computer forensics is coming to the forefront of many criminal cases that has to do with the computer-related crime. A profitable computer crime is credit card fraud, and the criminals know that computer crimes rarely prosecuted because companies and corporations do not want


3043 words - 13 pages . Take advantage of not only the Google web search but also the Group-search. Repeat this process with other leading search engines like Yahoo or (Fick, 2009). References Dashora, K. (2011). Cyber Crime in the Society: Problems and Preventions. Journal of Alternative Perspectives in the Social Sciences, 3(1). Fick, J. (2009). Prevention is Better than Prosecution: Deepening the Defence against Cyber Crime. Journal of Digital Forensics

Auditing Principles

1008 words - 5 pages past couple of decades. That being said, the potential of cybercrimes being committed drastically increased, as the cyber criminals have been able to break into the companies’ systems and manipulate and extract crucial data sets. This article is focusing on chronological development of the new area of accounting, forensic accounting. Forensic accounting is primarily focused on fraud protection, investigation of the security breaches and any other

Assignment 1: Digital Computer Crimes

1527 words - 7 pages management program to protect critical infrastructures. The U.S. Immigration and Customs Enforcement agency or ICE enforces federal laws and government border control, customs, trade and immigration to promote homeland security and public safety. ICE operates the Cyber Crimes Center, or C3, which has four separate categories focused on child exploitation, computer forensics, cybercrimes, and information technology and administration, also offers

Social Media

921 words - 4 pages due to lack of knowledge of how to set privacy settings. In 2011, NYPD added a tracking unit on Twitter and have tracked down on criminals that brag about their crimes online. People are sharing and posting all sorts of activity on media sites like YouTube. These videos are helping law enforcement agencies to solve crimes quicker. Anthony Martino, director of the Northeast Cyber Forensics Center at Utica College stated “Since 2010 we've

You Decide

749 words - 3 pages Security Manager. Section 2- Relationships between IT workers, UT users, and employers Maintaining a strong relationship between employer, IT workers and UT users can be the key to the success of an organization. If a strong relationship is in place, the employees will be more productive, more efficient, create less conflict and will be more loyal to the company. Section 3- Malicious insiders and cyber-criminals A malicious insider

Computer Crimes

1006 words - 5 pages everyday life, with the widespread use of computers comes one more way we can be victimized by criminals. Computer crimes are usually done by someone with a high level of technical expertise, also known as a hacker. Most people imagine a “hacker” as an anonymous cyber-intruder who spends an enormous amount of time trying to breach a security of networks, web servers and email servers. But half of the unauthorized system intrusions involve insiders


1146 words - 5 pages narrowing down their suspects to one man who worked for the company and his name is Oleg Covelin. After he found a vulnerability in the computer network that RBS WorldPay uses, he passed the information to Sergei Tsurikov of Tallinn, Estoria who then distributed 44 counterfeit cards to a team of cashers around the world. The hackers tried to cover their tracks but the FBI traced the hackers by using Cyber forensics and also with the help of foreign

Related Essays

Cyber Forensics Essay

4852 words - 20 pages Introduction What is Cyber Forensics? “Computer forensics, also called cyberforensics, is the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computer and who was responsible for it” (Techtarget

Computer Forensics And Cyber Crime Essay

701 words - 3 pages Computer Forensics and Cyber Crime Author Institution Computer Forensics and Cyber Crime A security survey or audit can also be referred to as a vulnerability analysis. A security survey is an exhaustive physical examination whereby all operational systems and procedures are inspected thoroughly (Fischer & Green, 2004). A security survey involves a critical on-site examination and analysis of a facility, plant, institution

Cyber Crimes A Diabolic Jeopardy Essay

542 words - 3 pages crime takes place. In many cases, law enforcement officers have lacked the tools needed to tackle the problem; old laws didn’t quite fit the crimes being committed, new laws hadn’t quite caught up to the reality of what was happening, and there were few court precedents to look to for guidance. But Police in India are trying to become cyber crime savvy and hiring people who are trained in the area. Initiatives of cyber forensics are being

Ist 454 Project Essay

837 words - 4 pages |[pic] |Term Project Guideline |[pic] | Introduction The intent of this project is for your project group to conduct independent investigation and demonstrate an in-depth knowledge of a specific area related to Computer and Cyber Forensics (or digital forensics). The project can take several forms. Your team may (1) design a hands-on lab