< All Computer Hacking and Forensics Notes

legandarynoob | Computer and Hacking Forensics | Module 1 - Modern Forensics

By: legandarynoob | Related Course: Computer Hacking and Forensics | Published: April 3, 2018 | Modified: April 3, 2018
Join Cybrary

NotepadChap 1

1822-1911   finger prints (Galton)
1887-1954  blood grouping (Lattes)
1891-1955   firearms (Goddard)
1858-1946  documentation (Osborn)
1847 1915    criminar investigation (Gross)
1932             fbi
1984             Computer analysis/response team
1993             1st international conference
1995             (10CE) INT org computer evidence
1998            forensic science symposium
2000           FBI regional forensic
2015            leo dreg

Types of attack – Internal / External.

Preservation of evidence for courtroom.

Big picture
Identification, identified as evidence
Preservation, chain of custody.
Extraction, take from crimescene
Interpretation, interpretation of evidence
Documentation,
Presentation, court room.

basic steps.
Crime happens,
ID a crime scene,
Get warrants,
First responder,
Seize the evicence,
Transport, same as cloning into drives
2 bit-by-bit copy [ clone ],
Hash MD5/sha, to prove no changes
Chain of custody
Store it,
Analyze, interpretation
Report, documentation
Court, present in court.

Evidence
Whole, hard drives/fingerprints
Admissible, able to get into court/collecting procedures
Accurate, is the evidence trustworthy?
Authentic, best/true/original evidence.
Acceptable, judge accepts it or not to prove/disprove the facts.

Types of crime
click jacking,
extortion,
investment fraud,
software piracy/copyright piracy
DOS, denial of service
Auction fraud
Email bombs/spam/hoax
ID Theft
Virus/worms/trojans
Malware
Cyber Stalking
Financial Fraud
Child porn
Embezzlement, phishing/ farming/ whaling/ spear fishing 

hands on
CSI-FBI study
Cybercrime.gov
Google


< All Computer Hacking and Forensics Notes
Join Cybrary

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel