Module: 01 Computer Forensics in Today’s World
The learning objectives of this module are to:
✓ LO#01: Understand the Fundamentals of Computer Forensics ✓
LO#02: Understand Cybercrimes and their Investigation Procedures ✓
LO#03: Understand Digital Evidence ✓
LO#04: Understand Forensic Readiness, Incident Response, and the Role of SOC (Security Operation Center) in Computer Forensics
✓ LO#05: Identify the Roles and Responsibilities of a Forensic Investigator ✓
LO#06: Understand the Challenges Faced in Investigating Cyber Crimes ✓
LO#07: Understand Legal Compliance in Computer Forensics
LEARNING OBJECTIVES
Understand the Fundamentals of Computer Forensics
Understand the Fundamentals of Computer Forensics
Computer forensics plays a key role in tracking, investigating, and prosecuting cybercriminals. This section introduces computer forensics and its objectives. It also elaborates on why and when various enterprises may need to conduct a computer forensic investigation
Understanding Computer Forensics.
Need for Computer Forensics.
Why and When Do You Use Computer Forensics?
Need for Computer forensics
An exponential increase in the number of cybercrimes and civil litigations involving large organizations has emphasized the need for computer forensics. It has become a necessity for organizations to employ the service of a computer forensics agency or to hire a computer forensics expert to solve cases involving the use of computers and related technologies. The staggering financial losses caused by cybercrimes have also contributed to renewed interest in computer forensics. Computer forensics plays an important role in tracking cybercriminals. The main role of computer forensics is as follows:
Why and When Do You Use Computer Forensics?
Computer forensics is required when a computer-based crime occurs, and as mentioned earlier, such crimes are increasing worldwide. Organizations need to employ the services of a computer forensics agency or hire a computer forensics expert to solve crimes that involve computers and related technologies. The staggering financial losses caused by cybercrimes have also contributed to a renewed interest in computer forensics.
Understand Cybercrimes and their Investigation Procedures
Understand Cybercrimes and their Investigation Procedures
Types of Cybercrimes
Examples of Cybercrimes
Impact of Cybercrimes at the Organizational Level
Cybercrime Investigation
Civil vs. Criminal Investigation
Administrative Investigation
Types of Cybercrimes
example of Cybercrimes
Types of Cybercrimes
example of Cybercrimes
Impact of Cybercrimes at the Organizational Level
Civil vs. Criminal Investigation
Administrative Investigation
Understand Digital Evidence
Introduction to Digital Evidence
Types of Digital Evidence
Roles of Digital Evidence
Sources of Potential Evidence
Sources of Potential Evidence (Cont’d)
Sources of Potential Evidence (Cont’d)
Sources of Potential Evidence (Cont’d)
Federal Rules of Evidence (United States)
Federal Rules of Evidence (US) (Cont’d)
Federal Rules of Evidence (US) (Cont’d)
Federal Rules of Evidence (US) (Cont’d)
Federal Rules of Evidence (US) (Cont’d)
Federal Rules of Evidence (US) (Cont’d)
Federal Rules of Evidence (US) (Cont’d)
Scientific Working Group on Digital Evidence (SWGDE)
Scientific Working Group on Digital Evidence (Cont’d)
The Association of Chief Police Officers (ACPO) Principles of Digital Evidence
Forensic Readiness
Understand Forensic Readiness, Incident Response, and the Role of SOC (Security Operations Center) in Computer Forensics
Forensic Readiness and Business Continuity
Title
Forensics Readiness Planning
Title
Computer Forensics as a Part of Incident Response Plan
Title
Overview of Incident Response Process Flow
Title
Role of SOC in Computer Forensics
Title
Need for a Forensic Investigator
Identify the Roles and Responsibilities of a Forensic Investigator
Roles and Responsibilities of a Forensics Investigator
Title
What Makes a Good Computer Forensics Investigator?
Title
Accessing Computer Forensics Resources
Title
Understand the Challenges Faced in Investigating Cybercrimes
Challenges Cybercrimes Pose to Investigators
Other Factors That Influence Forensic Investigations
Computer Forensics: Legal Issues
Computer Forensics: Privacy Issues
Understand Legal Compliance in Computer Forensics
Computer Forensics and Legal Compliance
Other Laws Relevant to Computer Forensics