Introduction to Computer Forensics - CSu2104 - Shoolini U

INTRODUCTION TO COMPUTER FORENSICS

View Summary

INTRODUCTION TO COMPUTER FORENSICS

Introduction to Traditional Computer Crime, traditional problems associated with Computer Crime. Introduction to Identity Theft & Identity Fraud. Types of CF techniques – Incident and incident response methodology – Forensic duplication and investigation. Preparation for IR: Creating response tool kit and IR team. – Forensics Technology and Systems – Understanding Computer Investigation – Data Acquisition.

Computer Forensics and Investigation

Introduction to Computer Forensics and Investigations (Based on Chapter 1)

Objectives

What is Forensic Science?

What is Computer Forensics?

Why Computer Forensics?

Related Fields

The Investigation Triad

The computer investigations function is one of three in a triad that makes up computing security in an enterprise network environment. The triad consists of the following parts:

1) Vulnerability Assessment & Risk Management

2) Network Intrusion Detection & Incident Response

3) Computer Investigations

Challenges of Computer Forensics

Computer Forensics Terminology

Computer Forensics Methodology

Computer Forensics Methodologies

Types of Computer Investigations

Public – Legal Case Flow

The Forensic Investigator

Computer Forensics Expertise

Computer Forensics Investigator

Professional Conduct

Computer Forensics Certifications

Laws of the Land

Related Resources