SlideShare una empresa de Scribd logo
1 de 38
Introduction to Cyber Crime, Computer Forensics, & Digital Evidence Collection By: Levi White, MS, CEECS, CFCE
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Background
Background Continued ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CyberCrime Defined ,[object Object],[object Object],[object Object],[object Object]
Crimes Against a Computer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Crimes Committed with  the Aid of a Computer ,[object Object],[object Object],[object Object],[object Object],[object Object]
The New Wild West ,[object Object],[object Object],[object Object],[object Object],[object Object]
Who are Cyber Criminals? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Digital Evidence Uses from Vacca’s “Computer Forensics Computer Crime Scene Investigation” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Overlooked: Cold Case Homicide
Cyber Investigator Tasks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
“ Geek with a Gun” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Major Players in Cyber Crime ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
3 A’s of Computer Forensics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common Mistakes ,[object Object],[object Object],[object Object],[object Object],[object Object]
Evidence Acquisition (A#1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What to look for?
Expectation of Privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Evidence Authentication (A#2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protecting the Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hash Functions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Analyze the Evidence (A#3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Levels of Destruction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Carving ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Part Two: Digital Crime Scene  Processing Overview
Number One Priority ,[object Object],[object Object],[object Object],[object Object]
Secure the Suspect ,[object Object],[object Object],[object Object]
How to Collect the  Personal Computer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How to Collect the  Personal Computer Continued ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How to Collect the  Personal Computer Continued ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Collection of Servers/Business Computers and Peripherals  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PDA, Cell Phones,  & Digital Cameras ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bag & Tag ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Packaging & Transportation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authority for Seizing Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary Checklist (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary Checklist (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Any Questions ? ? ?

Más contenido relacionado

La actualidad más candente

A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital ForensicsManik Bhola
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptxAmbuj Kumar
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Forensic investigation
Forensic investigationForensic investigation
Forensic investigationAsadMalik120
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics OverviewYansi Keim
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDr Raghu Khimani
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Sagar Rahurkar
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensicsLalit Garg
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidenceOnline
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital ForensicsOldsun
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensicsnoorashams
 
Computer forensic
Computer forensicComputer forensic
Computer forensicbhavithd
 
Audio and Video Forensics
Audio and Video ForensicsAudio and Video Forensics
Audio and Video ForensicsDipika Sengupta
 

La actualidad más candente (20)

A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Forensic investigation
Forensic investigationForensic investigation
Forensic investigation
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
The Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptxThe Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptx
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Audio and Video Forensics
Audio and Video ForensicsAudio and Video Forensics
Audio and Video Forensics
 

Destacado

Computer Forensics
Computer ForensicsComputer Forensics
Computer ForensicsBense Tony
 
Presentazione sulla computer forensics, dopo la L. 48/2008
Presentazione sulla computer forensics, dopo la L. 48/2008Presentazione sulla computer forensics, dopo la L. 48/2008
Presentazione sulla computer forensics, dopo la L. 48/2008Giovanni Battista Gallus
 
iStart - Cybercrime scene investigation
iStart - Cybercrime scene investigationiStart - Cybercrime scene investigation
iStart - Cybercrime scene investigationHayden McCall
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidenceOnline
 
Ask Forensics Cycle Nov 2011 V3
Ask Forensics   Cycle Nov 2011 V3Ask Forensics   Cycle Nov 2011 V3
Ask Forensics Cycle Nov 2011 V3RickReynolds
 
Custody Chain CASI vision to Combat Food Fraud
Custody Chain CASI vision to Combat Food FraudCustody Chain CASI vision to Combat Food Fraud
Custody Chain CASI vision to Combat Food FraudPrimority Ltd
 
Chapter 3 cmp forensic
Chapter 3 cmp forensicChapter 3 cmp forensic
Chapter 3 cmp forensicshahhardik27
 
Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for Firs...
  Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for Firs...  Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for Firs...
Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for Firs...David Sweigert
 
Best Practices For Seizing Electronic Evidence -- DoJ
 Best Practices For Seizing Electronic Evidence  -- DoJ Best Practices For Seizing Electronic Evidence  -- DoJ
Best Practices For Seizing Electronic Evidence -- DoJDavid Sweigert
 
classe sol 2011- 12
classe sol 2011- 12classe sol 2011- 12
classe sol 2011- 12Cucaferatona
 
Sixth Form Success Feedback
Sixth Form Success FeedbackSixth Form Success Feedback
Sixth Form Success Feedbackguest6d3c71
 
Unshackle Upstate Claims Victory on Judgment Day
Unshackle Upstate Claims Victory on Judgment DayUnshackle Upstate Claims Victory on Judgment Day
Unshackle Upstate Claims Victory on Judgment DayUnshackle Upstate
 
Igs Presentation Short
Igs Presentation ShortIgs Presentation Short
Igs Presentation ShortAard Groen
 

Destacado (20)

Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Presentazione sulla computer forensics, dopo la L. 48/2008
Presentazione sulla computer forensics, dopo la L. 48/2008Presentazione sulla computer forensics, dopo la L. 48/2008
Presentazione sulla computer forensics, dopo la L. 48/2008
 
File000176
File000176File000176
File000176
 
iStart - Cybercrime scene investigation
iStart - Cybercrime scene investigationiStart - Cybercrime scene investigation
iStart - Cybercrime scene investigation
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 
Ask Forensics Cycle Nov 2011 V3
Ask Forensics   Cycle Nov 2011 V3Ask Forensics   Cycle Nov 2011 V3
Ask Forensics Cycle Nov 2011 V3
 
Custody Chain CASI vision to Combat Food Fraud
Custody Chain CASI vision to Combat Food FraudCustody Chain CASI vision to Combat Food Fraud
Custody Chain CASI vision to Combat Food Fraud
 
Chapter 3 cmp forensic
Chapter 3 cmp forensicChapter 3 cmp forensic
Chapter 3 cmp forensic
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Chain of custody
Chain of custodyChain of custody
Chain of custody
 
Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for Firs...
  Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for Firs...  Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for Firs...
Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for Firs...
 
Best Practices For Seizing Electronic Evidence -- DoJ
 Best Practices For Seizing Electronic Evidence  -- DoJ Best Practices For Seizing Electronic Evidence  -- DoJ
Best Practices For Seizing Electronic Evidence -- DoJ
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
classe sol 2011- 12
classe sol 2011- 12classe sol 2011- 12
classe sol 2011- 12
 
Sixth Form Success Feedback
Sixth Form Success FeedbackSixth Form Success Feedback
Sixth Form Success Feedback
 
Unshackle Upstate Claims Victory on Judgment Day
Unshackle Upstate Claims Victory on Judgment DayUnshackle Upstate Claims Victory on Judgment Day
Unshackle Upstate Claims Victory on Judgment Day
 
Igs Presentation Short
Igs Presentation ShortIgs Presentation Short
Igs Presentation Short
 

Similar a Cyber Crime Evidence Collection Ifsa 2009

Evidence Seizure Ctin Version Draft Sent To Sandy For Polishing
Evidence Seizure Ctin Version Draft Sent To Sandy For PolishingEvidence Seizure Ctin Version Draft Sent To Sandy For Polishing
Evidence Seizure Ctin Version Draft Sent To Sandy For PolishingCTIN
 
Evidence Seizure Ctin Version Draft
Evidence Seizure Ctin Version DraftEvidence Seizure Ctin Version Draft
Evidence Seizure Ctin Version DraftCTIN
 
Evidence Seizure
Evidence SeizureEvidence Seizure
Evidence SeizureCTIN
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygieneEricK Gasana
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsZyxware Technologies
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics SlidesVarun Sehgal
 
computer forensics
computer forensicscomputer forensics
computer forensicsshivi123456
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtCell Site Analysis (CSA)
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfGnanavi2
 
Evidence Seizure Level One
Evidence Seizure Level OneEvidence Seizure Level One
Evidence Seizure Level OneCTIN
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer CrimeMISY
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And PrivacyMISY
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologiesurjarathi
 
Evidence Seizure Sandyb
Evidence Seizure SandybEvidence Seizure Sandyb
Evidence Seizure SandybCTIN
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
 
Bag and Tag
Bag and TagBag and Tag
Bag and TagCTIN
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyJan Wong
 

Similar a Cyber Crime Evidence Collection Ifsa 2009 (20)

Evidence Seizure Ctin Version Draft Sent To Sandy For Polishing
Evidence Seizure Ctin Version Draft Sent To Sandy For PolishingEvidence Seizure Ctin Version Draft Sent To Sandy For Polishing
Evidence Seizure Ctin Version Draft Sent To Sandy For Polishing
 
Evidence Seizure Ctin Version Draft
Evidence Seizure Ctin Version DraftEvidence Seizure Ctin Version Draft
Evidence Seizure Ctin Version Draft
 
Evidence Seizure
Evidence SeizureEvidence Seizure
Evidence Seizure
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Evidence Seizure Level One
Evidence Seizure Level OneEvidence Seizure Level One
Evidence Seizure Level One
 
Codebits 2010
Codebits 2010Codebits 2010
Codebits 2010
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologies
 
Evidence Seizure Sandyb
Evidence Seizure SandybEvidence Seizure Sandyb
Evidence Seizure Sandyb
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Bag and Tag
Bag and TagBag and Tag
Bag and Tag
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
 

Cyber Crime Evidence Collection Ifsa 2009

  • 1. Introduction to Cyber Crime, Computer Forensics, & Digital Evidence Collection By: Levi White, MS, CEECS, CFCE
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Part Two: Digital Crime Scene Processing Overview
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.

Notas del editor

  1. Example: Word Document with CP Inside. Argument that there was no right to search word documents according to the limitations of the search warrant’s wording to search only for images.