SlideShare uma empresa Scribd logo
1 de 12
Concepts on Forensics for Information Technology ACC 626 Slidecast
What is Forensics for IT? Computer forensics and Digital Forensics Computer Forensics – 80s-90s  Unformat, undelete, diagnose and remedy Essentially data retrieval from computers to obtain evidence Digital Forensics Scientific methods to reconstruct events or anticipate unauthorized actions (DFRWS) preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence(DFRWS) Applies to all digital sources, i.e not limited to computers
What is Forensics for IT? Forensics for IT? Many other IT devices capable of processing and storing data Computer forensics does is no longer an appropriate term It is the “process of acquiring, analyzing and reporting digital evidence” from information technology devices, this such as: computers, cellular phones, storage devices, networks, etc..(Lewis 2008)
What is Forensics for IT? Role and Application Applicable and necessary in 3 types of cases Crimes where IT is incidentally involved Crimes where IT is the enabler Crimes against IT systems to support crime investigations which involve the complexity of information systems (Gottschalk) Presented in “e-discovery”
What is Forensics for IT? Process and Steps
Techniques and Tools IT Forensic Techniques Search Techniques Manual vs. automated Search customization Reconstructive Techniques Log files analysis System files analysis
Techniques and Tools IT Forensic Tools and Software Industry standard tools – Encase Specialist tools – FATkit Open source designed tools Software developed to react rather than anticipate Forensics tools for mobile devices and tablets
Key Issues The Digital Evidence and the Legal Environment Laws not written with digital evidence and IT crime scene in mind Criminals are creating new ways to conduct IT enabled crime and to attack IT systems Legal rights and privacy laws are sensitive in IT investigations
Key Issues Research and Development Rapid development of technology  Data and file formats VOIP, P2P, Outsourcing, portable storage, the cloud Lack of direction in development of IT Forensics No guidelines and strategy Need taxonomy, best practices and clear standards
Key Issues Anti-forensics and Tools Traditional techniques Artefact wiping Data overwriting Data hiding Advanced techniques Footprint minimization Exploitation of bugs in forensic software Detection of IT forensic tools
Forensics for IT and Auditing Integration between the two Audit information can lead to investigation efficiency  “IT audit procedures can help facilitate an understanding of both the computing environment and corresponding controls” (Lombe) Ex. Terminated employee, existence of backups
Thank You

Mais conteúdo relacionado

Mais procurados

Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Damir Delija
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemsMayank Diwakar
 
Digital Forensic
Digital Forensic Digital Forensic
Digital Forensic Ravi Nayak
 
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Damir Delija
 
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...AngelinaJacobs2
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensicsMarco Alamanni
 
(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1maranan_alexa
 

Mais procurados (14)

CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science
 
Digital Forensic Case Study
Digital Forensic Case StudyDigital Forensic Case Study
Digital Forensic Case Study
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
 
Digital Forensic
Digital Forensic Digital Forensic
Digital Forensic
 
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
 
Database forensics
Database forensicsDatabase forensics
Database forensics
 
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...
 
Mjtanasas2
Mjtanasas2Mjtanasas2
Mjtanasas2
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensics
 
(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Hankins by {bryan23}
Hankins by {bryan23}Hankins by {bryan23}
Hankins by {bryan23}
 

Destaque

Manifesto do Congresso Internacional realizado na Unesp Bauru
Manifesto do Congresso Internacional realizado na Unesp BauruManifesto do Congresso Internacional realizado na Unesp Bauru
Manifesto do Congresso Internacional realizado na Unesp BauruMiguel Rosario
 
Chuong 4 thach thuc tham hut thuong mai
Chuong 4   thach thuc tham hut thuong maiChuong 4   thach thuc tham hut thuong mai
Chuong 4 thach thuc tham hut thuong maiDat Nguyen
 
Decisão de Celso de Mello de manter Moreira Franco
Decisão de Celso de Mello de manter Moreira FrancoDecisão de Celso de Mello de manter Moreira Franco
Decisão de Celso de Mello de manter Moreira FrancoMiguel Rosario
 
IM Club: Do You Trust Social Media Automation?
IM Club: Do You Trust Social Media Automation?IM Club: Do You Trust Social Media Automation?
IM Club: Do You Trust Social Media Automation?Rather Inventive
 
Inanimate Alice Episode 5 by Ben & George
Inanimate Alice Episode 5 by Ben & GeorgeInanimate Alice Episode 5 by Ben & George
Inanimate Alice Episode 5 by Ben & GeorgeMrsPrentice
 
PHP Sessions and Non-Sessions
PHP Sessions and Non-SessionsPHP Sessions and Non-Sessions
PHP Sessions and Non-SessionsSven Rautenberg
 
Indigenous Knowledge Transfer: An Exportable Product Preliminary Research ...
Indigenous Knowledge Transfer:  An Exportable Product   Preliminary Research ...Indigenous Knowledge Transfer:  An Exportable Product   Preliminary Research ...
Indigenous Knowledge Transfer: An Exportable Product Preliminary Research ...Wayne Dunn
 
Minimal pairs clothes
Minimal pairs   clothesMinimal pairs   clothes
Minimal pairs clothesLes Davy
 
Conversation01
Conversation01Conversation01
Conversation01Les Davy
 
The Mobile Equation
The Mobile EquationThe Mobile Equation
The Mobile EquationA. Litsa
 
Classification of Matter Overview. Spring. Day 2
Classification of Matter Overview. Spring. Day 2Classification of Matter Overview. Spring. Day 2
Classification of Matter Overview. Spring. Day 2jmori1
 
10 species of dinosaur from Romania
10 species of dinosaur from Romania10 species of dinosaur from Romania
10 species of dinosaur from Romaniabalada65
 
唯一一隻登上時代雜誌封面的狗狗
唯一一隻登上時代雜誌封面的狗狗唯一一隻登上時代雜誌封面的狗狗
唯一一隻登上時代雜誌封面的狗狗Fa Zhou Shi
 
Bonding singapore
Bonding singaporeBonding singapore
Bonding singaporelimmervin24
 
Tensioned Membrane Structures In India
Tensioned Membrane Structures In IndiaTensioned Membrane Structures In India
Tensioned Membrane Structures In IndiaRavindra Mehta
 
Overview of CTG3 and our tools
Overview of CTG3 and our toolsOverview of CTG3 and our tools
Overview of CTG3 and our toolsdlaskowski
 

Destaque (20)

Manifesto do Congresso Internacional realizado na Unesp Bauru
Manifesto do Congresso Internacional realizado na Unesp BauruManifesto do Congresso Internacional realizado na Unesp Bauru
Manifesto do Congresso Internacional realizado na Unesp Bauru
 
Chuong 4 thach thuc tham hut thuong mai
Chuong 4   thach thuc tham hut thuong maiChuong 4   thach thuc tham hut thuong mai
Chuong 4 thach thuc tham hut thuong mai
 
Decisão de Celso de Mello de manter Moreira Franco
Decisão de Celso de Mello de manter Moreira FrancoDecisão de Celso de Mello de manter Moreira Franco
Decisão de Celso de Mello de manter Moreira Franco
 
Клубная встреча 13112016
Клубная встреча 13112016Клубная встреча 13112016
Клубная встреча 13112016
 
Project presentation1
Project presentation1Project presentation1
Project presentation1
 
IM Club: Do You Trust Social Media Automation?
IM Club: Do You Trust Social Media Automation?IM Club: Do You Trust Social Media Automation?
IM Club: Do You Trust Social Media Automation?
 
Inanimate Alice Episode 5 by Ben & George
Inanimate Alice Episode 5 by Ben & GeorgeInanimate Alice Episode 5 by Ben & George
Inanimate Alice Episode 5 by Ben & George
 
PHP Sessions and Non-Sessions
PHP Sessions and Non-SessionsPHP Sessions and Non-Sessions
PHP Sessions and Non-Sessions
 
Indigenous Knowledge Transfer: An Exportable Product Preliminary Research ...
Indigenous Knowledge Transfer:  An Exportable Product   Preliminary Research ...Indigenous Knowledge Transfer:  An Exportable Product   Preliminary Research ...
Indigenous Knowledge Transfer: An Exportable Product Preliminary Research ...
 
Minimal pairs clothes
Minimal pairs   clothesMinimal pairs   clothes
Minimal pairs clothes
 
Conversation01
Conversation01Conversation01
Conversation01
 
The Mobile Equation
The Mobile EquationThe Mobile Equation
The Mobile Equation
 
Classification of Matter Overview. Spring. Day 2
Classification of Matter Overview. Spring. Day 2Classification of Matter Overview. Spring. Day 2
Classification of Matter Overview. Spring. Day 2
 
10 species of dinosaur from Romania
10 species of dinosaur from Romania10 species of dinosaur from Romania
10 species of dinosaur from Romania
 
Band of sounds
Band of soundsBand of sounds
Band of sounds
 
唯一一隻登上時代雜誌封面的狗狗
唯一一隻登上時代雜誌封面的狗狗唯一一隻登上時代雜誌封面的狗狗
唯一一隻登上時代雜誌封面的狗狗
 
Asw feb13 low
Asw feb13 lowAsw feb13 low
Asw feb13 low
 
Bonding singapore
Bonding singaporeBonding singapore
Bonding singapore
 
Tensioned Membrane Structures In India
Tensioned Membrane Structures In IndiaTensioned Membrane Structures In India
Tensioned Membrane Structures In India
 
Overview of CTG3 and our tools
Overview of CTG3 and our toolsOverview of CTG3 and our tools
Overview of CTG3 and our tools
 

Semelhante a Acc 626 slidecast

Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
computer forensics
computer forensicscomputer forensics
computer forensicsshivi123456
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics SlidesVarun Sehgal
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20worldAqib Memon
 
IoT implementation and Challenges
IoT implementation and ChallengesIoT implementation and Challenges
IoT implementation and ChallengesAhmed Banafa
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensiknewbie2019
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortressSTO STRATEGY
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh tManesh T
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsZyxware Technologies
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)JIEMS Akkalkuwa
 

Semelhante a Acc 626 slidecast (20)

Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
IoT implementation and Challenges
IoT implementation and ChallengesIoT implementation and Challenges
IoT implementation and Challenges
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortress
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh t
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
180 184
180 184180 184
180 184
 

Mais de j9lai

Forensics for IT, final attempt
Forensics for IT, final attemptForensics for IT, final attempt
Forensics for IT, final attemptj9lai
 
Forensics for IT - ACC 626
Forensics for IT - ACC 626Forensics for IT - ACC 626
Forensics for IT - ACC 626j9lai
 
ACC 626 - Forensics for IT
ACC 626 - Forensics for ITACC 626 - Forensics for IT
ACC 626 - Forensics for ITj9lai
 
ACC 626 - Forensics for IT
ACC 626 - Forensics for ITACC 626 - Forensics for IT
ACC 626 - Forensics for ITj9lai
 
Acc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for ITAcc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for ITj9lai
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecastj9lai
 
Acc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for ITAcc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for ITj9lai
 

Mais de j9lai (7)

Forensics for IT, final attempt
Forensics for IT, final attemptForensics for IT, final attempt
Forensics for IT, final attempt
 
Forensics for IT - ACC 626
Forensics for IT - ACC 626Forensics for IT - ACC 626
Forensics for IT - ACC 626
 
ACC 626 - Forensics for IT
ACC 626 - Forensics for ITACC 626 - Forensics for IT
ACC 626 - Forensics for IT
 
ACC 626 - Forensics for IT
ACC 626 - Forensics for ITACC 626 - Forensics for IT
ACC 626 - Forensics for IT
 
Acc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for ITAcc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for IT
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecast
 
Acc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for ITAcc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for IT
 

Último

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Acc 626 slidecast

  • 1. Concepts on Forensics for Information Technology ACC 626 Slidecast
  • 2. What is Forensics for IT? Computer forensics and Digital Forensics Computer Forensics – 80s-90s Unformat, undelete, diagnose and remedy Essentially data retrieval from computers to obtain evidence Digital Forensics Scientific methods to reconstruct events or anticipate unauthorized actions (DFRWS) preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence(DFRWS) Applies to all digital sources, i.e not limited to computers
  • 3. What is Forensics for IT? Forensics for IT? Many other IT devices capable of processing and storing data Computer forensics does is no longer an appropriate term It is the “process of acquiring, analyzing and reporting digital evidence” from information technology devices, this such as: computers, cellular phones, storage devices, networks, etc..(Lewis 2008)
  • 4. What is Forensics for IT? Role and Application Applicable and necessary in 3 types of cases Crimes where IT is incidentally involved Crimes where IT is the enabler Crimes against IT systems to support crime investigations which involve the complexity of information systems (Gottschalk) Presented in “e-discovery”
  • 5. What is Forensics for IT? Process and Steps
  • 6. Techniques and Tools IT Forensic Techniques Search Techniques Manual vs. automated Search customization Reconstructive Techniques Log files analysis System files analysis
  • 7. Techniques and Tools IT Forensic Tools and Software Industry standard tools – Encase Specialist tools – FATkit Open source designed tools Software developed to react rather than anticipate Forensics tools for mobile devices and tablets
  • 8. Key Issues The Digital Evidence and the Legal Environment Laws not written with digital evidence and IT crime scene in mind Criminals are creating new ways to conduct IT enabled crime and to attack IT systems Legal rights and privacy laws are sensitive in IT investigations
  • 9. Key Issues Research and Development Rapid development of technology Data and file formats VOIP, P2P, Outsourcing, portable storage, the cloud Lack of direction in development of IT Forensics No guidelines and strategy Need taxonomy, best practices and clear standards
  • 10. Key Issues Anti-forensics and Tools Traditional techniques Artefact wiping Data overwriting Data hiding Advanced techniques Footprint minimization Exploitation of bugs in forensic software Detection of IT forensic tools
  • 11. Forensics for IT and Auditing Integration between the two Audit information can lead to investigation efficiency “IT audit procedures can help facilitate an understanding of both the computing environment and corresponding controls” (Lombe) Ex. Terminated employee, existence of backups