Lecture1-Introduction to Digital Forensics 2013

download Lecture1-Introduction to Digital Forensics 2013

of 44

Transcript of Lecture1-Introduction to Digital Forensics 2013

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    1/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    2/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    3/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    4/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    5/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    6/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    7/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    8/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    9/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    10/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    11/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    12/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    13/44

    http://www.espiongroup.com/content/resources/Electronic_Discovery_Reference_Model_EDRM.pdf
  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    14/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    15/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    16/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    17/44

    https://www.owasp.org/index.php/Top_10_2013-Top_10http://www.cybercrime.gov/
  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    18/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    19/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    20/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    21/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    22/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    23/44

    http://www.pi-spy4u.com/services.html
  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    24/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    25/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    26/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    27/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    28/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    29/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    30/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    31/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    32/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    33/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    34/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    35/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    36/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    37/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    38/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    39/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    40/44

    http://www.asisonline.org/http://www.iisfa.org/http://iacis.com/http://www.htcn.org/http://www.certified-computer-examiner.com/
  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    41/44

    http://www.computerforensics1.com/computer-forensic-professional.html
  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    42/44

  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    43/44

    http://www.ssddfj.org/http://www.tandf.co.uk/journals/titles/01611194.asphttp://www.tandf.co.uk/journals/titles/15567281.asphttp://www.ijofcs.org/http://www.utica.edu/academic/institutes/ecii/ijde/http://www.elsevier.com/wps/find/journaldescription.cws_home/702130/description#descriptionhttp://www.dcs.warwick.ac.uk/~ctli/IJDCF.htmlhttp://www.jdfsl.org/http://en.wikipedia.org/wiki/Computer_crimehttp://www.tjmcintyre.com/http://dataprotection.ie/http://www.antiphishing.org/crimeware.htmlhttp://www.symantec.com/norton/cybercrime/index.jsphttp://www.ccmostwanted.com/http://krebsonsecurity.com/2010/03/researchers-map-multi-network-cybercrime-infrastructure/http://www.fbi.gov/cyberinvest/cyberhome.htmhttp://www.digital-evidence.org/http://www.forensicfocus.com/
  • 8/12/2019 Lecture1-Introduction to Digital Forensics 2013

    44/44