Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading content…
Loading…
Transcript

Conducting Computer forensic Investigation

Assessing Evidence (crime scene technician):

  • case assessment
  • processing location assessment
  • evidence assessment
  • acquiring digital evidence from its source
  • examining evidence

Closing the case

Investigating Computer Crime

Roles in an Investigation:

  • First Responder
  • identifies crime scene;
  • protects the crime scene
  • preserving temporary and fragile evidence
  • Investigator
  • establishing the chain of command
  • conducting the crime scene search
  • maintaining integrity of the evidence
  • Crime Scene Technician
  • computer forensics specialist
  • preserving volatile evidence
  • preparation of devices for transportation

Investigating the Computer

Investigation of a machine:

  • common steps to protect the integrity and prevent loss of evidence
  • problem of search warrants
  • Demystifying Computer/Cybercrime
  • Investigating Computer Crime
  • Conducting a Computer Forensic Investigation - the importance of qualified technician on crime scene

prepare a final report and submit the report to investigator, who will make a decision if this is enough to pursue a conviction

Cyberinvestigator

Demystifying Computer/Cybercrime

  • notification of the crime to the appropriate authorities
  • computer may play two roles:

- target of the crime,

- tool used to commit a crime

An investigator who specializes in cybercrime needs a few characteristics additional to generic qualities of a good investigator:

• basic understanding of computer science;

• understanding of computer networking protocols;

• knowledge of computer jargon;

• an understanding of hacker culture;

• knowledge of computer and networking security issues.

Categories of cyberinvestigators by Skill Set:

  • specialize in computer/network crime;
  • computer specialist who conduct investigation;
  • equally skilled in investigation and IT;
  • without real skills in either investigation or IT

Diferentiation of cyber crimes - use/depend on the NET

Categories of Cybercrimes

  • crimes that USE the Net - old kinds of crimes (e. g. illegal gambling) committed through Net. Computer is not a necessary element of the crime
  • crimes that DEPEND ON the Net - the crime is unique and came into existence with the advent of the Internet (e. g. unauthorized access)

Facebook Server Room

Violent or potentially violent:

  • Cyberterrorism;
  • Assault by threat;
  • Cyberstalking;
  • Child pornography;

Nonviolent:

  • Cybertrespass;
  • Cybertheft;
  • Cyberfraud;
  • Destructive Cyber crimes;
  • Other

Prioritizing Cyber Crime enforcement

  • extent of harm;
  • frequency of occurrence;
  • availability of personnel;
  • training of personnel;
  • jurisdiction;
  • difficulty of investigation;
  • political factors

Cyber Crime - Definition

Cyber Crime is typically described as any criminal act dealing with computers or computer networks.

Computers and networks can be involved in crimes in several different ways:

  • as a tool of the crime
  • as the target of the crime ("victim")
  • used for incidental purposes related to the crime (e.g. to keep records of drug sales)

IP Viking live

http://map.ipviking.com/

A map prepared by norse-corp to show real-time visibility into global cyber attacks

Cyber Crime Scene Investigation

by Agnieszka Musiał

Learn more about creating dynamic, engaging presentations with Prezi