Preview

Inform speech Autosaved

Satisfactory Essays
Open Document
Open Document
490 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Inform speech Autosaved
Age of Digital Information
Cyber Forensics
October 11, 2014

I. Introduction
A. What would you do if you receive a notice from your Credit Card Company or bank informing you a store or restaurant where you just recently used your card had a breach which involves the credit and debit card data being stolen? Unfortunately this incident became a reality to several patrons that shop at Home Depot, Target, P.F. Chang’s, and other locations
B. The situation I just informed you about is just one of many examples of Cybercrime. As of 2013 Symantec reported on their website the global cost of cybercrime is accountable for 113 billion dollars in loss. In an attempt to stop these malicious attacks, government agencies along numerous companies are implementing a Cyber Forensics department
C. To inform my audience about
1. History of Cyber Forensics
2. Methods and Techniques of Cyber Forensics
3. Importance of having Cyber Forensics
II. Cyber Forensics can be traced back to as early as 1984 when technical crimes where on a rise.
A. The F.B.I laboratory along with other law agencies started to create programs to assist with computer evidence.
1. C.A.R.T was the answer to investigators and prosecutor’s increased demand for examining computer evidence.
2. As computers continue to become more widespread the risk of computer related crimes is inevitable. As a result requiring a large number of Cyber Forensics. The areas in critical need of these services are Federal, State, Local, and military Law Enforcement agencies.
III. Cyber Forensics uses several methods and techniques to extract evidence.
A. Incriminating evidence can be gathered by a method called File Analysis.
B. Volatile Data Analysis is used to extract evidence that is time sensitive.
IV. The importance of Cyber Forensics is not limited to only protecting major corporations, but it also is used to serve the average person such as you and me.

A. By the use of Cyber Forensics law enforcement is able to

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Iscs 451 Assignment 6

    • 576 Words
    • 3 Pages

    The factors that have limited local law enforcement’s efforts against digital crime are lack of training, lack of diagnostic equipment, lack of management level recognition and support, and a lack of specialized personnel. First off, training is a paramount need for local law enforcement. Many of the officers appointed to computer crimes at the local level do not have the requisite knowledge to deal with these types of crimes. Some of these officers are even put into these roles when they don’t even want to. Also, the lack of training to patrol officers could lead to valuable evidence being inadvertently destroyed. Most local agencies lack the equipment necessary to conduct digital forensics. Many local experts have even been reported to have purchased their own equipment to do their job (Taylor, et. al., 2011). The lack of management support and recognition of computer crime analysis has led to the lack of funding for these local cyber units. With a lack of funding comes a lack of equipment, training, and the ability for personnel to specialize in digital forensics.…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    In this lab, you acted as a forensic specialist assisting the lead forensics investigator at the Cyber…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 946 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Fcs 006

    • 856 Words
    • 4 Pages

    2. ____ occurs whenever an individual gains access to a computer, network, file, or other resource without permission. a. Spoofing c. Phishing b. Unauthorized access d. Vandalizing 3. ____ refers to the act of breaking into a computer or network. a. Spamming c. Hacking b. Phishing d. Spoofing 4. Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them. a. spoofing c. spamming b. phishing d. war driving 5. ____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems. a. Touch object c. Two-factor b. Possessed object d. Biometric 6. A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access. a. Trojan horse c. hub b. firewall d. bridge 7. ____ uses a single secret key to both encrypt and decrypt the file or message. a. Private key encryption c. Public key encryption b. Asymmetric key encryption d. Synchronous key encryption 8. Some Web-based encrypted e-mail system, such as the popular free ____ service梤 equire both the sender and recipient to have accounts through that system. a. CryptMail c. HushMail b. QuietMail d. PrivateMail…

    • 856 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Many times, computer forensics practitioners work with traditional forensics experts in criminal investigations to reveal evidence. With frequent work experiences with forensics experts and lawyers, having a general knowledge of relevant laws and ethics is a nice complement to any computer forensics practitioner’s skill set. Furthermore, as many audits are conducted on businesses and illegal organizations are done electronically, computer forensics experts may want to have working knowledge in accounting and/or finance in order to prepare for such jobs.…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    2. Which items within WinAudit’s initial report would you consider to be of critical importance in a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    **Collection**Any and all investigating officers should keep this in mind as well as have a warrant baring the proper wording and language that adheres to search and seizure of a personal computer in order to avoid violating any privacy rights. First the officer should check to see if the computer is on or off. If an officer finds that the computer is not on, he or she should not turn it on the evidence must not be altered; however if the officer finds the computer on then the officer should photograph the screen even if the screen is in sleep mode. Once the computer is photographed the power should be disconnected. In other words the modem should be drained of power by unplugging it. Next the officer should be sure to insert a police disc into the CD or DVD drive; bear in mind the disc should be blank and after inserting it the drive should be sealed. All other hardware connected to the system should be photographed in order to have a record of how the system was…

    • 1674 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    The criminal justice system is in a great need of information technology (IT) because the criminal justice system runs on information. There are too many information about criminal incidents, information about people who are serving their sentences or waiting for trial. There are also information about the court process including the past or upcoming trials. Those information would affects the way people are treated in the system and perhaps impacts the final outcome of any individual case.…

    • 318 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Digital Evidence

    • 799 Words
    • 4 Pages

    This paper will help explain the basic understanding of computer forensics. I will also identify five areas in computers and computer application a forensic investigator can look for digital evidence. I will identify three types of criminal investigations that can utilize the services of computer forensic investigators. This paper will help with the understanding of computer forensics.…

    • 799 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Investigations in digital criminology also involve capturing of the devices for their analysis to extract the relevant information. Electronic evidence is useful in proving the violation of the criminal statute codes to help in applying punishment based on the established law.in the case involving terror suspect Lusha, electronic evidence was used in sentencing him to jail and later deportation to Albania. For instance, Lusha was imprisoned based on the established law after having been charged in court. Moreover, to prevent him from accomplishing his plans upon release from jail, Lusha was to be deported back to his country. Analysis of electronic evidence involves examining the computer systems and synthesizing of the information to make informed…

    • 1025 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Let’s understand first what sorts of Windows stations there are. Various windows station in Windows, and they could be categorized into two categories. While there are those interactive stations needing a user input, there also exists those non-interactive stations running in the background.…

    • 993 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Bay Raif Sarıca

    • 7918 Words
    • 41 Pages

    well as loss of proprietary information costing millions of dollars. All of this has led to an…

    • 7918 Words
    • 41 Pages
    Good Essays