Transcript: Computer Forensics Srivatsa Deshpande Yingquan Yuan Pranav Sharma Hang Shao Sarat Chandra Sista Introduction Srivatsa Deshpande Techniques Yingquan Yuan Applications Pranav Sharma Education Hang Shao Careers Sarat Chandra Sista The End Computer Crime Search/identifying Extract Preserve Analyze/interpret Decision chrome://newtabhttp//www.ccs.neu.edu/graduate/degreeprograms/msia.html MS Programs Online Programs Related Courses Graduate Certifications https://www.umuc.edu/form_generator/formbuilder/index.cfm?fid=543&gclid=CKKx1IaPlbMCFelFMgodRB8ADQ indeed.com http://en.wikipedia.org/wiki/Computer_forensics Deleted Files Recovery - Most OS and FS do not always erase physical file data - Searching file header + Reconstruct deleted materials Cyber Terrorism Drug Trafficking Application of science to answer questions in interest of the above Status needed For Classified Information TAKES TIME Has Impact on your Job Application and Salary DoD, DHS, DoE, DoJ Tools Private Organizations Government Your own Office simplyhired.com www.middlesexcc.edu/faculty/steven_zale/Computer_%2520Forensics.ppt NYPD to boost gang unit over social media violence To combat teen violence fueled by dares and insults traded on social media. "By capitalizing on the irresistible urge of these suspects to brag about their murderous exploits on Facebook, detectives used social media to draw a virtual map of their criminal activity over the last three years," Volatile Data Digital Forensics http://www.computer-forensics-recruiter.com/ Ground rules Sabotage Advantages Private Organizations Spam Overview http://en.wikipedia.org/wiki/List_of_digital_forensics_tools Acceptance of Computer Forensics www.astm.org/SNEWS/FEBRUARY_2006/barbara_feb06.html "Buying drugs on the Internet is really easy. You only need an Internet cafe, a credit card, and it's done," said Daniel Altmeyer, an Interpol officer attending the World Forum Against Drugs in the Swedish capital this week. Live Analysis on RAM - Data stored in RAM may be lost owing to powering down - Using tools like COFEE to recover data by "Live Analysis" References: https://www.cia.gov/careers/index.html https://www.fbijobs.gov/ Computer forensics Network forensics Database forensics Mobile device forensics References: http://content.taonline.com/security-clearences/ http://www.fbi.gov/stats-services/publications/law-enforcement-bulletin/november-2011/cyber-terror Crime Blood Fraud Robbery Computer forensics is not limited only to computer media ... Skills Needed • Bachelor’s Degree in Computer Science, Information Systems or Related Field • Master’s Degree Preferred • One or More Related Certifications such as the EnCE, CFCE, CCE, or CISSP • Knowledge of a programming or scripting language • Experience with volatile memory analysis This position requires the candidate to already possess an active Top Secret clearance and to maintain the clearance with the ability to obtain a SCI/CI Poly. Identify Collect Preserve Present Some Useful Links Where? Disadvantages Cmtraining.Com.Au Hacked By NE3L - Bangladesh Cyber Army http://en.wikipedia.org/wiki/Computer_forensics Education Technically Forensics ? Certifications en.wikipedia.org/wiki/Forensics Private Investigator Social Media Violence Spam Fraud Sabotage Harassment Threats Drug trafficking Cyber terrorism Cyber warfare References: www.datachasers.com, www.forensicon.com, www.evestigate.com, www.talonforensics.com http://education-portal.com/articles/List_of_the_Best_Computer_Forensics_Schools_in_the_US.html Salary The use of computer network tools to shut down critical national infrastructures (e.g., energy, transportation, government operations) To coerce or intimidate a government or civilian population. The intimidation of civilian enterprise through the use of high technology to bring about political, religious, or ideological aims, actions that result in disabling or deleting critical infrastructure data or information. en.wikipedia.org/wiki/Digital_forensics http://www.bu.edu/met/ads/digitalforensics/?9gtype=search&9gkw=computer%20forensics%20certification&9gad=7026502146.1&9gag=1172145936&gclid=CI2kkoeelbMCFYQ7MgodTx0A3Q Security Clearance Scan through massive data. Quick & exhaustive Government Cross-Drive Analysis - Not mature enough Live Analysis - Volatile data recovery Deleted Files - Persistent data recovery Steganography - Hiding data + Hash Proof of legitimacy The judge & prosecutor must have extensive computer knowledge. http://en.wikipedia.org/wiki/Computer_forensics Sample Job Description Image Source - http://computer-forensics.sans.org/blog/2008/10/24/alternate-data-streams-overview What is more? News Source -http://en.kioskea.net/news/10681-internet-drug-trafficking-skyrockets-experts-warn www.purdue.edu/securepurdue/docs/training/ComputerForensics References http://www.indeed.com/salary/Computer-Forensics.html http://www.simplyhired.com/a/salary/search/q-Computer+Forensics+Analyst Emerging Field Status of evidence when
Transcript: Does the retrieved information help? Where can they retrieve the information? Alia, Pardeep, Kishan and Jasdeep 8E Computer forensics analysis information contained within and created with computer systems and computing devices. They help figure out crimes. In the interest of figuring out what happened, when it happened, how it happened, and who was involved. THE END Computer Forensics - twitter, facebook and any other social network - chat rooms -any device that has memory (iPods, phones iPads etc) -emails -phones -computers( files, photos etc) -webs sites that were visited In many cases the information retrieved help solve cases and help identify the person who committed the crime. It also helps them know if the person is going to attack again and where. What are computer forensics? Why are computer forensics important? Video
Transcript: Forensic Computer Science involves the identification, collection, preservation, examination, and analysis of computer evidence stored in the form of magnetically encoded information. Law enforcement officers, investigators, computer auditors, network administrators, and other professionals have had to respond to the above need for collection of evidence by developing tools and techniques to extract computer evidence that is admissible in court. The salary a computer forensic investigator earns can depend on the industry. For example, investigators who work as government contractors earn a salary between $55,378 and $86,451, while workers in legal services earn a lower salary, between $50,090 and $81,441. What kind of training would you need? You would need a strong background in computer hardware, software systems and networks. Often computer forensics degrees are graduate level degrees. Computer forensic professionals typically have a bachelor’s degree in computer science. According to the Bureau of Labor Statistics, colleges and universities may offer degree programs in computer forensics. Forensic investigators in finance may have additional education in accounting and finance. The salary a computer forensic investigator earns can depend on the industry. For example, investigators who work as government contractors earn a salary between $55,378 and $86,451, while workers in legal services earn a lower salary, between $50,090 and $81,441. What would you do as a computer forensics specialist? You would assist others in the recovery of evidence by accessing microcomputer systems, networks, or data storage devices to recover data and determine whether it has been tampered with, deleted, or damaged. Even data that has been deleted is often recoverable from the hard drive and you would be the person trying to recover it. Computer Forensics
Transcript: New computer viruses Cyber Stalking : the use of internet to stalk someone Image by Tom Mooring https://www.google.com/#q=what+is+computer+forensics http://www.slideshare.net/ferumxxl/types-of-computer-crime http://www.criminaldefenselawyer.com/crime-penalties/federal/computer-crimes.htm http://www.forensicanalyst.org/Computer-Forensic-Analyst.html up to 6 months in prison a fine up to $1,000 class B felony up to 20 years in prison Types Of Computer Crimes. ID THEFT 12.6 million Americans were victimized by ID theft in 2012. Identity Theft a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media What is Computer Forensics? computer programs that are replicating themselves and harming computer systems present in a network. Computer Forensics 70k per day by not clicking on pop ups stealing money and getting benefits by using an identity of another person. pursue an associate’s degree in a field such as computer forensics, criminal justice, forensic computing, or another area of computer majors with a specialization in digital forensics Punishment For Computer Crimes... Computer Viruses REFERENCES. Becoming a Computer Forensics Analyst...
Transcript: Example of a Jeopardy Template By: Laken Feeser and Rachel Chapman When creating without a template... http://www.edtechnetwork.com/powerpoint.html https://www.thebalance.com/free-family-feud-powerpoint-templates-1358184 Example of a Deal or No Deal Template PowerPoint Game Templates There are free templates for games such as jeopardy, wheel of fortune, and cash cab that can be downloaded online. However, some templates may cost more money depending on the complexity of the game. Classroom Games that Make Test Review and Memorization Fun! (n.d.). Retrieved February 17, 2017, from http://people.uncw.edu/ertzbergerj/msgames.htm Fisher, S. (n.d.). Customize a PowerPoint Game for Your Class with These Free Templates. Retrieved February 17, 2017, from https://www.thebalance.com/free-powerpoint-games-for-teachers-1358169 1. Users will begin with a lot of slides all with the same basic graphic design. 2. The, decide and create a series of questions that are to be asked during the game. 3. By hyper linking certain answers to different slides, the game jumps from slide to slide while playing the game. 4. This kind of setup is normally seen as a simple quiz show game. Example of a Wheel of Fortune Template https://www.teacherspayteachers.com/Product/Wheel-of-Riches-PowerPoint-Template-Plays-Just-Like-Wheel-of-Fortune-383606 Games can be made in order to make a fun and easy way to learn. Popular game templates include: Family Feud Millionaire Jeopardy and other quiz shows. http://www.free-power-point-templates.com/deal-powerpoint-template/ Quick video on template "Millionaire" PowerPoint Games Some games are easier to make compared to others If users are unsure whether or not downloading certain templates is safe, you can actually make your own game by just simply using PowerPoint. add logo here References Example of a Family Feud Template PowerPoint Games are a great way to introduce new concepts and ideas You can create a fun, competitive atmosphere with the use of different templates You can change and rearrange information to correlate with the topic or idea being discussed. Great with students, workers, family, etc. For example: With games like Jeopardy and Family Feud, players can pick practically any answers. The person who is running the game will have to have all of the answers in order to determine if players are correct or not. However, with a game like Who Wants to be a Millionaire, the players only have a choice between answers, A, B, C, or D. Therefore, when the player decides their answer, the person running the game clicks it, and the game will tell them whether they are right or wrong.
Transcript: Forensics: The Voice For The Voiceless Nonviolence is the answer to the crucial political and moral questions of our time: the need for man to overcome oppression and violence without resorting to oppression and violence. Man must evolve for all human conflict a method which rejects revenge, aggression and retaliation. The foundation of such a method is love. If If you can keep your head when all about you Are losing theirs and blaming it on you; If you can trust yourself when all men doubt you, But make allowance for their doubting too; If you can wait and not be tired by waiting, Or, being lied about, don't deal in lies, Or, being hated, don't give way to hating, And yet don't look too good, nor talk too wise; If you can dream - and not make dreams your master; If you can think - and not make thoughts your aim; If you can meet with triumph and disaster And treat those two imposters just the same; If you can bear to hear the truth you've spoken Twisted by knaves to make a trap for fools, Or watch the things you gave your life to broken, And stoop and build 'em up with wornout tools; If you can make one heap of all your winnings And risk it on one turn of pitch-and-toss, And lose, and start again at your beginnings And never breath a word about your loss; If you can force your heart and nerve and sinew To serve your turn long after they are gone, And so hold on when there is nothing in you Except the Will which says to them: "Hold on"; If you can talk with crowds and keep your virtue, Or walk with kings - nor lose the common touch; If neither foes nor loving friends can hurt you; If all men count with you, but none too much; If you can fill the unforgiving minute With sixty seconds' worth of distance run - Yours is the Earth and everything that's in it, And - which is more - you'll be a Man my son! The Unconquerable Soul Honastly I believe that my soul has much to experiance before such a title could be placed on it. Although I can say that what I have experianced in the small portion of life which i've lived, is that it could have been so much less painful. Everyone deals with strife in their lives but I choose to try and learn from my experiances to make me better as an individual. To learn from those mistakes of others and make sure that I can prevent anything like it from happening to other people so that no one else has to go through what others have. This I believe, can make people the masters of their own souls. I was born and raised here in Union City. I was born on the 9th day of the 9th month on the year of 1995! Hence forth my favorite and in my beliefe "lucky number" has and always will be 9 I live with my parents and my brother. My grandparents also live right next door to us leading to frequent visits I'm mostly Portuguese, but I am also mixed with a Mexican backround from my fathers side, My mother is full blooded Portuguese. I am mostly exposed to my Portuguese background since my grandparents that live right next to me are both full blooded. Leading to many authentic cultural dishes as well as festivals! Goals for the future Dreams and goals dont just pop in my head, they are developed from life experiance and what directly effected me as an individual. Forensics has a much deeper meaning to me than just simply posting on a powerpoint or just saying but for the lack of better terms, I could define it as an insperation for those who are lost. A voice for the voiceless A workshop to enhance and strengthen your life in general. Favorite moment? Honestly to numerous to count. My time within the forensics team has allowed me have the experiance which can never be replaced in a lifetime. One Million Dollars? If i had a million dollars? Well I would divide the money up because not all of it is going my way. I myself would probably recieve 300,000 for both that of college as well as the price of living for a while after I graduate. Im going to give my mother 100,000 so that she may have a better life than the one shes currently living. The rest would be divided in two, 300,000 to the James Logan Forensics team BECUASE of what it stands for. Which is that of the numberous amounts of people that it has saved over its lifetime. The second half of the 300,000 would go to charity to help those in poverty. "And he's so scared to get close to anyone becuase everyone who said "I'll be there" left." Dont forget to live your life to the fullest. And dont forget, Don't limit yourself to dream just big. You need to learn to dream For Change And for A Better future! ^.^ What does it all mean? Me a Writer? Though this poem may have indeed been writing from a racist whos alternative meaning could have been for hateful purpose. I feel as if that doesnt matter becuase poetry, or any words of wisdom in general should be as you interpret it, so that it may better your life and understanding. Martin Luther King, Jr., The Trumpet of Conscience, 1967. IF Thank You The poem If, by Rudyard Kipling is in my opinion, a
Transcript: Criminal Prosecutors - Rely on evidence obtained from a computer to prosecute suspects and use as evidence Civil Litigations - Computer data can be used in fraud, divorce, harassment, or discrimination cases Insurance Companies - Evidence discovered on computer can be used to mollify costs (fraud, worker's compensations, arson, ect) Private Corporations - Obtained evidence from employee computers can be used as evidence in harassment, fraud, and embezzlement cases Law Enforcement Officials - Backup search warrants and post-seizure handling Individuals/Private Citizens - Obtain services of specialists to support claims Binary Code – Acquisition Physically or remotely obtaining possession of the computer, all network mappings from the system, and external physical storage devices – Identification This step involves identifying what data could be recovered and electronically retrieving it by running various Computer Forensic tools and software suites – Evaluation Evaluating the information/data recovered to determine if and how it could be used again the suspect for employment termination or prosecution in court – Presentation This step involves the presentation of evidence discovered in a manner which is understood by lawyers, non-technically staff/management, and suitable as evidence as determined by United States and internal laws Theft or trade secrets Fraud Extortion SPAM investigations Virus distribution Homicide Investigations Unauthorized use of personal information Forgery Embezzlement Unauthorized activity Tracking internet browsing habits Sexual Harassment Software Piracy http://videos.howstuffworks.com/investigation-discovery/34008-solved-computer-forensics-video.htm#mkcpgn=snag1 The role of computer Forensics will play a large role in society as computer technology emerges. It is an extremely hot topic and is used widely among all industries. Corporations and government agencies hire computer forensics specialists whenever they need a computer-related crime investigated. The specialists gather evidence from various media and present the evidence to whomever has ordered it or in some cases, in a court of law. And one more thing... Computer forensics involves the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and/or root cause analysis. Examples: -Recovering thousands of deleted emails -Performing investigation after multiple users had taken over the system Thank you for your attention! Computer Forensics is a four step process What is Computer Forensics? Conclusion • Need for information security workers will continue to grow, especially in computer forensics • Computer forensics specialists are highly trained consultants who have the ability to solve complex computer crime-related issues. Specialists typically hold degrees in computer science, computer engineering or computer information systems. Who uses Computer Forensics? Computer Forensics Reasons for Evidence As computers become more prevalent in the world, more computer crimes will occur.
Transcript: Forensic Science-Application of science to those criminals and civil laws that are enforced by police agencies in a criminal justice system History No exact origination, but said to be in China based off of a book with the earliest known mention of the concept. Mathiew Orfila was named the Father Of Toxicology. Alphonse Bertillion established the first sceince system of personal identification in 1879. Francis Galton conducted the first definitive studey of fingerprints and classification. Leone Lattis developed the procedure to determine blood type from dry blood stains. The first crime lab was established in Los Angeles, California in 1923. The first federal lab was established in 1932. Forensic Science is broken down into 4 subdivisions. 1) Forensic Anthropology-Application of physical anthropology in a legal setting 2) Cyber Forensics-The gathering of digital data that is used in the court of law 3) Forensic Engineering-The invetsigation of materials, products, structures or compounds that fail to operate or do not function as intended 4) Forensic Entomology-The use of insects and their anthropod relatives that inhabit decomposing remains to aid in legal investigations Convictions are made using this chosen area of chemistry. There are several millions, maybe billions, of pictures to show proof. This chosen area of chemistry helps find the culprits to murders and help link people to investigations everyday. Without forensics the crime rate would rise because noone would get caught. 2 Careers in Forensic Science 1) Associate Medical Examiner A) Doctors who work with deceased bodies to determine cause and time of death. They average up to $230,000 or higher a year based on experience. B) They require a medical degrees in Anatomy and Physiology. C) The University of Pheonix is one school that has these majors to take up. D) California Pacific Spine Institute is a company that offers this career. 2) Forensic Lab Scientist A) Help solve crimes by collecting and analyzing physical evidence and other facts found at the scene. B) They require a 4-year degree in either physics, biology, microbiology, chemistry, medical technology, or genetics. C) They average $1,900 monthly. Up to 3,000 monthly with previous experience. Also varies with states, can make up to $35,000 to $50,000. University of Springsboro has Genetics as one of the majors that can be taken up. Virginia Dept. of Forensic Science is a company that offers this career. Chemistry Project
Description: Add some color to your quarterly business review with this vibrant business presentation template. The bold visuals in this business template will make your next QBR a memorable one.
Description: Catch the eye and engage the imagination with this cool-looking Prezi proposal template. The bold, bright design and highly dynamic theme all but guarantee success for your next sales or marketing proposal. All Prezi presentation templates are easily customized.
Description: Storytelling is at the heart of great service. Use this stunning, customizable business presentation template to highlight employees who do exceptional work or position your customers as the heroes of your business.
Description: The sky’s the limit. Boost your new sales initiative into orbit with an engaging and compelling SKO presentation. This template features a effective sales kickoff theme that makes it easy to be engaging. Like all Prezi SKO templates, it’s fully customizable with your own information.
Now you can make any subject more engaging and memorable