SlideShare a Scribd company logo
Teaching Computer  Forensics Using Student Developed Evidence Files Anna Carlin Cal Poly Pomona
Agenda What is Computer Forensics Trends in Computer Forensics Structure of a Computer Forensics Course Investigative Mindset Criminal Mindset Legal Aspects of Computer Forensics Ethics Highlights Questions & Answers
What is Computer Forensics? Application of computer investigation and analysis in the interests of determining potential legal evidence Involves the identification, preservation, extraction, documentation, and interpretation of this digital  evidence
Trends in Computer Forensics Computer Information System/Information Technology 95% or world’s information is being generated and stored in a digital form Only about one-third of documentary evidence is printed out
Structure Of Course Prerequisites Textbooks Used Group and Individual Projects Lab Environment/Facility
Quarter System Class Prerequisites Cal Poly – Junior/Senior level in a career track Textbooks Guide to Computer Forensics  from Course Technology Recommended: Hacking Exposed: Computer Forensics Secrets and Solutions
Topics Covered Applicable Laws Processing Crime and Incident Scenes Collecting Evidence Recovering Evidence Computer Forensic Tools Documenting the Investigation Communicating the Results
Cal Poly’s Computer Forensics Lab Allows hands-on experience Evidence lockers 3 separate hard drives Software available: EnCase Enterprise version 5 FTK Open source products Virtual PC
Additional Software HexWorkshop Irfanview Paraben PC-Encrypt WinHex BitPim Stegdetect
Group Project The goals are to: Follow a documented forensics investigation process Identify  relevant  electronic evidence associated with various violations of specific laws Identify probable cause to obtain a search warrant  Recognize the limits of search warrants Locate and recover relevant electronic evidence  Maintain a chain of custody
Group Project Parts Create the evidence Pick a crime and identify the elements Generate evidence to support that crime Write and execute a search warrant Analyzing the evidence seized Maintain chain of custody Analyze the digital medium for evidence Document the process and findings Presentation of findings
Group Projects Created Bioterrorism of 80% of the world’s coconut supply on a fictitious island A Da Vinci Code takeoff where the curator interrupts the robbery of the Mona Lisa and is killed in the process Murder of a faculty member and where they are buried Counterfeit Anaheim Angel playoff tickets
Individual Projects (Labs) Acquiring an image for analysis Recovering deleted data Password and encryption methods Images and steganography Tracing emails Email analysis Cell phones PDA
Investigative Mindset Handling the Crime Scene Ears, Eyes, Hands Computer Evidence Digital Evidence Crime Scene investigation and boundaries Searching and Collecting evidence Do’s and Don’ts
Criminal Mindset Identify Theft Pornography Sexual Harassment Embezzlement Mail - Hate - Gambling across States - Drug Trafficking - Images Understanding anti-forensic techniques to hide evidence
Legal Aspects of Computer Forensics Don’t commit a crime when manufacturing evidence Verify the tools Document everything
Ethics Do your job Remove any personal agendas you may have about the case/investigation Knowing it and proving it are 2 different things State the facts as you see them It is not your job to be Judge and/or Jury Ethical Hacking
Highlights Professor in class challenges: Time available after class for lab work Student Technical Experience is varied Evidence created could be hit or miss Student creativity  Training/Certifications Computer Usage Policy White Hacker Policy
Questions and Answer

More Related Content

PPT
Forensic Lab Development
PDF
Computer Forensic
PPT
Codebits 2010
PPTX
Cyber forensics 02 mit-2014
PDF
CS6004 Cyber Forensics
PDF
Why i hate digital forensics - draft
PDF
Computer forensic
PPTX
Computer Forensic Softwares
Forensic Lab Development
Computer Forensic
Codebits 2010
Cyber forensics 02 mit-2014
CS6004 Cyber Forensics
Why i hate digital forensics - draft
Computer forensic
Computer Forensic Softwares

What's hot (20)

PPTX
cyber Forensics
PDF
Computer Forensics: You can run but you can't hide
PPTX
computer forensics
PPT
Computer forensics
PDF
Ce hv6 module 57 computer forensics and incident handling
PPTX
Cyber forensics ppt
PPTX
computer forensics
DOCX
computer forensics
PDF
An introduction to cyber forensics and open source tools in cyber forensics
PPTX
Computer forensic ppt
PPTX
Computer forensic ppt
PPTX
Cyber Incident Response & Digital Forensics Lecture
PPTX
Digital forensics
PPT
Introduction to computer forensic
PDF
Cyber Forensics Module 2
PPTX
Lect 1 computer forensics
PDF
01 Computer Forensics Fundamentals - Notes
PPT
Computer Forensics
PDF
Chfi V3 Module 01 Computer Forensics In Todays World
PPT
Computer Forensics
cyber Forensics
Computer Forensics: You can run but you can't hide
computer forensics
Computer forensics
Ce hv6 module 57 computer forensics and incident handling
Cyber forensics ppt
computer forensics
computer forensics
An introduction to cyber forensics and open source tools in cyber forensics
Computer forensic ppt
Computer forensic ppt
Cyber Incident Response & Digital Forensics Lecture
Digital forensics
Introduction to computer forensic
Cyber Forensics Module 2
Lect 1 computer forensics
01 Computer Forensics Fundamentals - Notes
Computer Forensics
Chfi V3 Module 01 Computer Forensics In Todays World
Computer Forensics
Ad

Viewers also liked (16)

PPTX
E-Classroom of Differentiated Learning
PPT
1. the subtle differences between humour, satire and making.. by nef
PPT
2. teaching objectives and goals
PPT
Digital evidence
PPT
Evidence Preservation
PPTX
Teaching 2.0 in the One-Computer Classroom
PPT
Child GPS Tracking Device
PPTX
techniques of teaching computer science
PPTX
Digital investigation
PDF
E=Classroom for Interactive and Connected Learning
PPSX
Importance of ICT in the Classroom
PPT
Digital Forensic
PPSX
What is Multimedia?.pptx
PPTX
Access lesson 02 Creating a Database
PDF
Lecture1
PPTX
Monte Carlo Simulation
E-Classroom of Differentiated Learning
1. the subtle differences between humour, satire and making.. by nef
2. teaching objectives and goals
Digital evidence
Evidence Preservation
Teaching 2.0 in the One-Computer Classroom
Child GPS Tracking Device
techniques of teaching computer science
Digital investigation
E=Classroom for Interactive and Connected Learning
Importance of ICT in the Classroom
Digital Forensic
What is Multimedia?.pptx
Access lesson 02 Creating a Database
Lecture1
Monte Carlo Simulation
Ad

Similar to Teaching Computer Forensics Using Student Developed Evidence Files (20)

PPTX
Cyber evidence at crime scene
PPTX
Business Intelligence (BI) Tools For Computer Forensic
PDF
Fundamental digital forensik
PPTX
Lecture Eleven-Cyber Crime Related Evidence (1).pptx
PDF
computerforensicppt-160201192341.pdf
PDF
Introduction to Forensic Research Digital Forensics
PDF
Digital forensic science and its scope manesh t
PPT
Digital Evidence - the defence, prosecution, & the court
PDF
Computer Forensics MethodologiesList them and explain each one.P.pdf
PPTX
N.sai kiran IIITA AP
PPT
Computer forensics and cyber security powerpoint presentation
PPTX
Digital Forensics Workshop
PPTX
3170725_Unit-1.pptx
PPT
Computer_forensics_ppt.ppt
DOCX
What is Digital Forensics.docx
PPT
Computer forensics intro(Pendahuluan Komputer Forensik).ppt
PPT
iConference Popovsky
PPT
sakshi Computer_forensics_ppt.ppt
PPTX
Computer Forensics.pptx
PPTX
Predict Conference: Data Analytics for Digital Forensics and Cybersecurity
Cyber evidence at crime scene
Business Intelligence (BI) Tools For Computer Forensic
Fundamental digital forensik
Lecture Eleven-Cyber Crime Related Evidence (1).pptx
computerforensicppt-160201192341.pdf
Introduction to Forensic Research Digital Forensics
Digital forensic science and its scope manesh t
Digital Evidence - the defence, prosecution, & the court
Computer Forensics MethodologiesList them and explain each one.P.pdf
N.sai kiran IIITA AP
Computer forensics and cyber security powerpoint presentation
Digital Forensics Workshop
3170725_Unit-1.pptx
Computer_forensics_ppt.ppt
What is Digital Forensics.docx
Computer forensics intro(Pendahuluan Komputer Forensik).ppt
iConference Popovsky
sakshi Computer_forensics_ppt.ppt
Computer Forensics.pptx
Predict Conference: Data Analytics for Digital Forensics and Cybersecurity

More from amiable_indian (20)

PDF
Phishing As Tragedy of the Commons
PDF
Cisco IOS Attack & Defense - The State of the Art
PDF
Secrets of Top Pentesters
PPS
Workshop on Wireless Security
PDF
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
PPS
Workshop on BackTrack live CD
PPS
Reverse Engineering for exploit writers
PPS
State of Cyber Law in India
PPS
AntiSpam - Understanding the good, the bad and the ugly
PPS
Reverse Engineering v/s Secure Coding
PPS
Network Vulnerability Assessments: Lessons Learned
PPS
Economic offenses through Credit Card Frauds Dissected
PPS
Immune IT: Moving from Security to Immunity
PPS
Reverse Engineering for exploit writers
PPS
Hacking Client Side Insecurities
PDF
Web Exploit Finder Presentation
PPT
Network Security Data Visualization
PPT
Enhancing Computer Security via End-to-End Communication Visualization
PDF
Top Network Vulnerabilities Over Time
PDF
What are the Business Security Metrics?
Phishing As Tragedy of the Commons
Cisco IOS Attack & Defense - The State of the Art
Secrets of Top Pentesters
Workshop on Wireless Security
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
Workshop on BackTrack live CD
Reverse Engineering for exploit writers
State of Cyber Law in India
AntiSpam - Understanding the good, the bad and the ugly
Reverse Engineering v/s Secure Coding
Network Vulnerability Assessments: Lessons Learned
Economic offenses through Credit Card Frauds Dissected
Immune IT: Moving from Security to Immunity
Reverse Engineering for exploit writers
Hacking Client Side Insecurities
Web Exploit Finder Presentation
Network Security Data Visualization
Enhancing Computer Security via End-to-End Communication Visualization
Top Network Vulnerabilities Over Time
What are the Business Security Metrics?

Recently uploaded (20)

PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
A Presentation on Artificial Intelligence
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Encapsulation theory and applications.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
project resource management chapter-09.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Chapter 5: Probability Theory and Statistics
TLE Review Electricity (Electricity).pptx
A Presentation on Artificial Intelligence
A comparative study of natural language inference in Swahili using monolingua...
Encapsulation theory and applications.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Programs and apps: productivity, graphics, security and other tools
Unlocking AI with Model Context Protocol (MCP)
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Heart disease approach using modified random forest and particle swarm optimi...
Zenith AI: Advanced Artificial Intelligence
Assigned Numbers - 2025 - Bluetooth® Document
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Digital-Transformation-Roadmap-for-Companies.pptx
project resource management chapter-09.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf

Teaching Computer Forensics Using Student Developed Evidence Files

  • 1. Teaching Computer Forensics Using Student Developed Evidence Files Anna Carlin Cal Poly Pomona
  • 2. Agenda What is Computer Forensics Trends in Computer Forensics Structure of a Computer Forensics Course Investigative Mindset Criminal Mindset Legal Aspects of Computer Forensics Ethics Highlights Questions & Answers
  • 3. What is Computer Forensics? Application of computer investigation and analysis in the interests of determining potential legal evidence Involves the identification, preservation, extraction, documentation, and interpretation of this digital evidence
  • 4. Trends in Computer Forensics Computer Information System/Information Technology 95% or world’s information is being generated and stored in a digital form Only about one-third of documentary evidence is printed out
  • 5. Structure Of Course Prerequisites Textbooks Used Group and Individual Projects Lab Environment/Facility
  • 6. Quarter System Class Prerequisites Cal Poly – Junior/Senior level in a career track Textbooks Guide to Computer Forensics from Course Technology Recommended: Hacking Exposed: Computer Forensics Secrets and Solutions
  • 7. Topics Covered Applicable Laws Processing Crime and Incident Scenes Collecting Evidence Recovering Evidence Computer Forensic Tools Documenting the Investigation Communicating the Results
  • 8. Cal Poly’s Computer Forensics Lab Allows hands-on experience Evidence lockers 3 separate hard drives Software available: EnCase Enterprise version 5 FTK Open source products Virtual PC
  • 9. Additional Software HexWorkshop Irfanview Paraben PC-Encrypt WinHex BitPim Stegdetect
  • 10. Group Project The goals are to: Follow a documented forensics investigation process Identify relevant electronic evidence associated with various violations of specific laws Identify probable cause to obtain a search warrant Recognize the limits of search warrants Locate and recover relevant electronic evidence Maintain a chain of custody
  • 11. Group Project Parts Create the evidence Pick a crime and identify the elements Generate evidence to support that crime Write and execute a search warrant Analyzing the evidence seized Maintain chain of custody Analyze the digital medium for evidence Document the process and findings Presentation of findings
  • 12. Group Projects Created Bioterrorism of 80% of the world’s coconut supply on a fictitious island A Da Vinci Code takeoff where the curator interrupts the robbery of the Mona Lisa and is killed in the process Murder of a faculty member and where they are buried Counterfeit Anaheim Angel playoff tickets
  • 13. Individual Projects (Labs) Acquiring an image for analysis Recovering deleted data Password and encryption methods Images and steganography Tracing emails Email analysis Cell phones PDA
  • 14. Investigative Mindset Handling the Crime Scene Ears, Eyes, Hands Computer Evidence Digital Evidence Crime Scene investigation and boundaries Searching and Collecting evidence Do’s and Don’ts
  • 15. Criminal Mindset Identify Theft Pornography Sexual Harassment Embezzlement Mail - Hate - Gambling across States - Drug Trafficking - Images Understanding anti-forensic techniques to hide evidence
  • 16. Legal Aspects of Computer Forensics Don’t commit a crime when manufacturing evidence Verify the tools Document everything
  • 17. Ethics Do your job Remove any personal agendas you may have about the case/investigation Knowing it and proving it are 2 different things State the facts as you see them It is not your job to be Judge and/or Jury Ethical Hacking
  • 18. Highlights Professor in class challenges: Time available after class for lab work Student Technical Experience is varied Evidence created could be hit or miss Student creativity Training/Certifications Computer Usage Policy White Hacker Policy