Computer Forensics Chapter 20 PDF
Document Details
Uploaded by OticFrenchHorn
Tags
Related
- Certified Cybersecurity Technician Computer Forensics PDF Exam 212-82
- Chapter 20 - 03 - Identify the Roles and Responsibilities Of a Forensic Investigator PDF
- Fundamentals of Digital Forensics - Theory, Methods, and Applications PDF
- Modules1.pdf
- SEC524 Computer and Network Forensics Lectures 03 and 04 PDF
- King Fahd University Of Petroleum & Minerals Computer Forensics Lectures 05-07 PDF
Summary
This document provides an overview of computer forensics, covering topics such as digital evidence, cybercrime, and the Internet of Things (IoT). It explains the importance of collecting, protecting, and preserving digital evidence in its original form, and the use of various procedures such as imaging and hashing. It details different types of cybercrimes and explores the role of cell phones and GPS in digital investigations.
Full Transcript
COMPUTER FORENSICS Chapter 20 CHAPTER 1: COMPUTER FORENSICS 20.1 A New Type of Evidence 20.2 Cybercrime 20.3 Procedures for Digital Evidence and Storage Devices 20.4 Cell Phones and GPS 20.5 Cybercrime and the Internet of Things DIGITAL EVIDENCE Covers a wide range of information stored...
COMPUTER FORENSICS Chapter 20 CHAPTER 1: COMPUTER FORENSICS 20.1 A New Type of Evidence 20.2 Cybercrime 20.3 Procedures for Digital Evidence and Storage Devices 20.4 Cell Phones and GPS 20.5 Cybercrime and the Internet of Things DIGITAL EVIDENCE Covers a wide range of information stored electronically. Digital images, videos, audio recordings, digital files, software on computers, mobile phones, and smart devices Internet of Things (IoT) Ex. – home assistant systems, refrigerators keeping track of inventory, voice commands DIGITAL EVIDENCE Critical to collect, protect, and preserve digital evidence in original condition. Physical Evidence: Hard drive, digital image on phone Document and assure chain of custody. Copies: Must be identical to original Stored or recorded on several types of media. CYBERCRIME Crimes committed using computers and the internet. Challenges: When there is no contact between perpetrator and victim. Borderless Technology always evolving. TYPES OF CYBERCRIME Hacking – when the perpetrator breaks into a secure computer or network to commit a crime. Trespassing Theft of personal data and extortion Malware Phishing Extortion via ransom ware TYPES OF CYBERCRIME Piracy – the theft of creative works such as books, music, and movies. Intellectual property in digital format Royalties International Organization for Standardization Peer-to-peer (P2P) file sharing PROCEDURES FOR DIGITAL EVIDENCE Imaging Copying process that does not alter the original. How do storage media devices store data? PROCEDURES FOR DIGITAL EVIDENCE Hashing algorithm Uses the original information as input and uses an algorithm to create an output string that is unique to the original at the bit level of detail. Verifies that a copy is an exact in order to be admissible in court. Write blocker CELL PHONES AND GPS Cell phones – common form of physical and digital evidence. Photos, videos, voice recordings, and where the phone has been Cellular network Triangulation – can reconstruct the route of the phone CYBERCRIME AND THE INTERNET OF THINGS CHAPTER 20 SUMMARY Digital Evidence Cybercrime and the Internet of Things Hacking Piracy Imaging and Hashing Cell phones Triangulation