Course Security Services. Unit VIII Risk Management Technologies

Size: px
Start display at page:

Download "Course Security Services. Unit VIII Risk Management Technologies"

Transcription

1 Course Security Services Unit VIII Risk Management Technologies Essential Question How do forensic specialists investigate and analyze computers and computer-related crimes? TEKS (c) (5)(A)(B) Prior Student Learning -Prevention Analysis -Role of Analysis -Overall Roles of Security Systems Estimated Time 4 to 5 hours Computer Forensics Rationale Computers have permeated society and are used in countless ways with innumerable applications. Similarly, the role of electronic data in investigative work has realized exponential growth in the last decade. The usage of computers and other electronic data storage devices leaves the footprints and data trails of their users. Objectives The students will be able to: 1. Summarize the role of computer applications relating to forensics investigations. 2. Investigate criminal activity in areas such as cybercrime, the Internet, and Internet trafficking. Engage Divide the class into several small groups and have them brainstorm/discuss the following questions: What are the components of a computer? What is your own knowledge of computers? What data might be of evidentiary value? Where it might be found? How would you preserve computer evidence at a crime scene? Why is the Internet referred to as a network of networks or the information superhighway? Key Points I. Computer Forensics Introduction A. Computer forensics 1. The acquisition, extraction, preservation, and interpretation of computer data 2. Includes many devices that are capable of storing data B. Hardware is the physical material that creates a computer C. Software are the programs and applications that carry out a set of instructions on the hardware II. Elements of Hardware A. Computer Case/Chassis the box that typically rests besides the computer monitor and houses the internal components for the computer B. Power Supply converts the power from the wall outlet to a usable form for the computer and its components C. Motherboard the primary board that contains the main circuitry for the computer D. System Bus a vast complex network of wires that carries data from one hardware device to another and is located on the 1

2 motherboard E. Read Only Memory (ROM) chips that store programs called firmware and are used to start the boot process and configure a computer s components F. Random Access Memory (RAM) the location in a computer where the operating system that is in use can be stored and retrieved for quick reference by the CPU G. Central Processing Unit (CPU) the central component of a computer where all of the data is processed H. Input Devices used to get data into the computer 1. Keyboard 2. Mouse 3. Joy Stick 4. Scanner I. Output Devices used to get data from the computer 1. Monitor 2. Printer 3. Speakers J. Hard Disk Drive (HDD) the location in a computer where data is stored and retrieved III. Data Storage and Retrieval A. Examiners must be familiar with the file system they are examining B. Evidence may be found in various computer locations and formats C. There are two categories for data-related evidence: 1. Visible data 2. Latent data D. The formatting process initializes portions of the hard drive so that it can store data, and it creates the structure of the file system E. Different operating systems map out (partition) HDDs in different manners F. RAM G. Sector the smallest unit of data addressable by a hard disk drive, generally consisting of 512 bytes (Saferstein, 2009) H. Cluster a group of sectors in multiples of two, typically the minimum space allocated in a file (Saferstein, 2009) IV. Processing the Computerized Crime Scene A. Similar to processing a traditional crime scene (i.e. warrants, documentation, investigation techniques) B. Documentation is a significant component in the computerized crime scene 1. The scene should be initially documented in as much detail as possible before any evidence is moved and examined 2. Crime scene documentation is accomplished through two actions: a) Sketching the crime scene must be thoroughly diagramed and sketched in a floor plan format b) Photographing from all locations and all possible 2

3 angles, and include wide and close-up images C. After documentation is complete, a label should be placed on the cord of each peripheral, with a corresponding label placed on the port to which it is connected D. At a computerized crime scene most, if not all of the equipment will be seized, but before the peripherals are disconnected from the computer, a decision must be made about whether or not a live acquisition of the data is necessary (i.e. shutdown or unplug the computer) 1. Example: unplugging the computer is imprudent a) If it will initiate data encryption, rendering it unreadable without a password or key b) If crucial evidentiary data exists in RAM that is not saved to the HDD will be lost with discontinuation of power to the system V. Forensic Image Acquisition A. After the crime scene has been processed, the computer needs to be analyzed B. All electronic devices will be processed in the same manner C. The examination process that the forensic investigator uses on the computer must be intrusive D. All evidence (data) must be obtained without altering or destroying it E. Because booting a HDD to its operating system changes many files and could destroy evidentiary data, the data is generally obtained by removing the HDD from the system and placing it in a laboratory forensic computer so that a forensic image can be created F. Occasionally, in cases with specialized or unique equipment/systems the image of the HDD must be obtained by using the seized computer G. The examiner must be able to extract all forensic data/images and cause no changes to the HDD H. A signature or fingerprint of the drive is taken before and after imaging 1. This fingerprint is created by using a Message Digest 5 (MD5), a Secure Hash Algorithm (SHA) or a similarly validated algorithm 2. Before imaging the drive the algorithm is run and a 32- character alphanumeric string is produced based on the drive s contents 3. The same algorithm is then run against the created forensic image which will result in the same alphanumeric string if none of the original content is changed VI. Visible Data A. Data from a computer that is openly visible and easily available to users B. Can encompass (from an evidentiary standpoint) any type of user- 3

4 created data like 1. Word processing documents 2. Spreadsheets 3. Accounting records 4. Databases 5. Pictures C. Most criminal cases involving computers relate to financial investigations (or white collar crimes) which require any data related to personal and business finance D. Advances in printer technology have made high quality color printing affordable and common, which creates criminal opportunities 1. Counterfeiting 2. Check Fraud 3. Document Fraud E. Investigators must become familiar with the various computer applications that are used for criminal activities F. The ability to recognize the data produced by these applications and to display the images is essential to identifying the evidence VII. Temporary Files A. Can be valuable as evidence B. Can sometimes be recovered during a forensic examination including some of the data that may have been altered from a previous version C. Can be recovered when created through unsaved means (such as a computer being shut off manually) D. Most programs automatically save a temporary copy of the file in progress E. After working on a file or document, the user can save the changes, which promotes the temporary copy to a saved (or actual) file F. Another type of temporary file valuable to the computer investigator is the printer spool 1. When a print job is sent to the printer a spooling process delays the sending of the data so the application can continue to work while the printing takes place in the background 2. When the print job occurs, a temporary print spool file is created 3. This file contains a copy of all of the data from the printer VIII. Latent Data A. The areas of files and disks that are typically not apparent to the computer user (and often not to the operating system), but contain data nonetheless (Saferstein, 2009); the data which the operating system has hidden B. One of the reasons a forensic image of the media is created is because a standard copy only captures the logical data (that which the operating system is aware) C. Can be evidentiary data 4

5 D. Includes the data in the 1. Swap space (used to conserve the valuable RAM within the computer system) 2. RAM slack the area from the end of the logical file to the end of the sector 3. File slack the remaining area from the end of the final sector containing data to the end of the cluster 4. Unallocated space the space on a hard drive that contains available space; the space may also contain temporary and deleted files IX. Defragmenting/Swap File/Swap Space A. Defragmenting a HDD involves reconnecting noncontiguous data B. The HDD has minimum space reservation requirements (i.e. a file might require 100 bytes of space, but the operating system allocates much more) C. If a file grows past the allocated amount, another cluster is required D. If a different file occupies the next cluster, the operating system must find another place for the first file on the drive E. The file is said to be fragmented because data for the same file is contained in noncontiguous clusters F. The constant shuffling of data through deletion, defragmentation, swapping, etc., is one of the ways data is orphaned in latent areas G. Fragmentation of numerous files can degrade the performance of a HDD, causing the read/write heads to have to traverse the platters to locate the data H. The constant read and write operations of RAM cause a constant change in the swap file or swap space X. Deleted Files A. Another source of latent data to be examined by forensic investigators B. The actions that occur when a file is deleted vary among file systems C. When a user deletes files, the data typically remains behind 1. The first character in the files directory entry (its name) is replaced with the Greek letter sigma 2. When the sigma replaces the first character, the file is no longer viewable through conventional methods and the operating system views the space previously occupied by the file as available D. Data will remain in the computer even though attempts are made to delete it E. When files in a Recycle Bin are deleted, the data remains there as well, until it is overwritten XI. The Internet A. A computer network that provides information globally (also called the information superhighway ) 5

6 B. Affects all subjects and professions including law enforcement and security services C. Can be considered a series of networks 1. A single network consists of two or more computers that are connected to share information 2. The Internet connects thousands of these networks so all of the information can be exchanged worldwide D. Includes various methods of connection 1. Wire a) Modem a device that allows computers to exchange and transmit information through telephone lines b) Cable lines or DSL telephone lines provide higher speed broadband connections 2. Wireless (Wi-Fi) E. Each computer that connects to the Internet has a unique numerical Internet Provider (IP) address and usually a name XII. The World Wide Web and A. The World Wide Web 1. The most popular area of the Internet 2. Considered a depository of information stored in the computers connected to the Internet across the world 3. Web browsers allow the user to search all the information available on the web and retrieve any web pages the viewer wishes to explore 4. Several directories and indexes on the Internet, known as search engines, are available to assist the user in locating a particular topic from the hundreds of thousands of web sites located on the Internet 5. Keywords or phrases entered into a search engine will locate sites on the Internet that are relevant to that subject 6. Commercial Internet service providers connect computers to the Internet while offering the user an array of options B. Electronic mail ( ) 1. The service most commonly used in conjunction with the Internet 2. Carries messages across the world in a matter of seconds XIII. Internet Crimes A. There are more cybercriminals than available law enforcement agents B. Cybercriminals feel safe committing crimes in a comfort zone and often from the privacy of their own homes C. Law enforcement faces new challenges with Internet crimes 1. Most law enforcement officers are not trained in the technologies 2. Internet crimes span multiple jurisdictions 3. There is a need to retrofit new crimes to existing laws D. Computers are used to commit a variety of crimes 6

7 1. Identity theft 2. Fraud 3. Industrial espionage 4. Child pornography 5. Harassment 6. Gambling 7. Piracy 8. Computer viruses and spam E. There are numerous methods and techniques criminals use to hide their crimes and evidence, which include 1. Deleting files and s 2. Hiding files with encryption 3. Password protection 4. Embedding information in unrelated files 5. Using WI-FI networks and cyber cafes to cover tracks F. The task of forensic investigators includes 1. Restoring deleted files and s 2. Finding the hidden files through complex password encryption programs and searching techniques 3. Tracking criminals through the digital trail IP addresses, to ISPs, to the offender Activities 1. Have the students process an electronic crime scene by creating a sketch complete with the appropriate measurements (see the Electronic Crime Scene Sketch Sample). The activity can best be conducted in the school library or computer lab with students taking measurements, obtaining photographs, and illustrating a diagram of the computer room. Students will identify and label all items located, including modems, ports, printers, and connecting wires. This activity can be completed either individually or in small work groups. Use the Individual Work Rubric, the Group Evaluation Rubric and the Peer Evaluation Rubric as needed for assessment. 2. Have the students write a research paper and/or a computer-based presentation regarding a cybercrime of their choice (identity theft, harassment, piracy, etc). Use the Research Rubric and/or the Presentation Rubric for assessment. Assessments Computer Forensics Exam and Key Discussion Rubric Group Evaluation Rubric Individual Work Rubric Peer Evaluation Rubric Presentation Rubric Research Rubric Materials 7

8 Computer Forensics computer-based presentation Computer Forensics Key Terms Electronic Crime Scene Sketch Sample White board/chalk board Computer with Internet Access Resources , Forensic Science: From the Crime Scene to the Crime Lab, Richard Saferstein, Prentice Hall, , Introduction to Private Security: Theory Meets Practice, Cliff Roberson and Michael L. Birzer, Prentice Hall, , Introduction to Security, Robert J. Fischer and Gion Green, Butterworth-Heinemann, 2008 Investigator/Officer s Personal Experience Accommodations for Learning Differences For reinforcement, the students will research and explain the difference between hardware and software. Use the Individual Work Rubric for assessment. For enrichment, the students will write a research paper about the instruments that cybercriminals use to commit their crimes. Use the Research Rubric for assessment. State Education Standards Texas Essential Knowledge and Skills for Career and Technical Education Security Services (One to Two Credits). (5) The student analyzes the role of computer forensics in security operations. The student is expected to: (A) summarize the role of computer applications relating to forensics investigations; and (B) investigate criminal activity in areas such as cyber crime, the Internet, and Internet trafficking. College and Career Readiness Standards Mathematics Standards III. Geometric Reasoning A. Figures and their properties 1. Identify and represent the features of plane and space figures. IV. Measurement Reasoning A. Measurement involving physical and natural attributes 1. Select or use the appropriate type of unit for the attribute being measured. 8

9 Computer Forensics Key Terms Bit short for binary digit; takes the form of either a one or a zero; the smallest unit of information on a machine (Saferstein, 2009) Byte a group of eight bits (Saferstein, 2009) Central Processing Unit (CPU) the central component of a computer where all of the data is processed Cluster a group of sectors in multiples of two, typically the minimum space allocated in a file (Saferstein, 2009) Computer Case/Chassis the box that typically rests besides the computer monitor and houses the internal components of the computer File Slack the area that begins at the end of the last sector that contains logical data and terminates at the end of the cluster (Saferstein, 2009) Hard Disk Drive (HDD) the location in a computer where data is stored and retrieved Hardware the physical material that comprises a computer Input Devices used to get data into the computer Internet (a.k.a. information superhighway) a computer network that provides information globally Latent Data areas of files and disks that are typically not apparent to the computer user (and often not to the operating system), but contain data nonetheless (Saferstein, 2009) Message Digest 5 (MD5) Secure Hash Algorithm a software algorithm used to fingerprint a file or the contents of a disk; used to verify the integrity of data (Saferstein, 2009) Motherboard the primary board that contains the main circuitry for the computer Operating System (OS) essentially, the software that directs basic functions and operations within a computer Output Devices used to get data from the computer Partition the process of dividing a hard disc drive into different independent sections Power Supply converts the power from the wall outlet to a usable form for the computer and its components RAM Slack the area beginning at the end of the logical file and terminating at the end of that sector; in some older operating systems this area is padded with information in RAM (Saferstein, 2009) Random Access Memory (RAM) the location in a computer where the operating system that is in use can be stored and retrieved for quick reference by the CPU Read Only Memory (ROM) chips that store programs called firmware and are used to start the boot process and configure a computer s components Sector the smallest unit of data addressable by a hard disk drive, generally consisting of 512 bytes (Saferstein, 2009) Software programs and operations that are used by a computer System Bus a vast complex network of wires that carries data from one hardware device to another and is located on the motherboard Swap File a file or defined space on the HDD to which data is written or swapped to free RAM for applications that are in use (Saferstein, 2009) Temporary Files files temporarily written by an application to perform a function (Saferstein, 2009) Unallocated Space the space on a hard drive that contains available space; the space may also contain temporary and deleted files Visible Data data from a computer that is openly visible and available to users 9

10 Name: Date: Computer Forensics Exam Matching a. Bit l. Operating System b. Byte m. Partition c. Central Processing Unit n. RAM Slack d. Cluster o. Random Access Memory e. File Slack p. Sector f. Hard Disk Drive q. Software g. Hardware r. Swap File h. Internet s. Temporary Files i. Latent Data t. Unallocated Space j. Message Digest 5 Secure Hash Algorithm u. Visible Data k. Motherboard 1. The smallest unit of data addressable by a hard disk drive, generally consisting of 512 bytes 2. The location in a computer where the operating system that is in use can be stored and retrieved for quick reference by the CPU 3. A file or defined space on the HDD to which data is written, or swapped, to free RAM for applications that are in use 4. The software that directs basic functions and operations within a computer 5. The space on a hard drive that contains available space; the space may also contain temporary and deleted files 6. Data from a computer that is openly visible and available to users 7. The area beginning at the end of the logical file and terminating at the end of that sector; in some older operating systems this area is padded with information in RAM 8. Programs and operations that are used by a computer 9. Files temporarily written by an application to perform a function 10. A group of eight bits 11. Short for binary digit; takes the form of either a one or a zero, and is the smallest unit of information on a machine 12. The central component of a computer where all of the data is processed 13. The area that begins at the end of the last sector that contains logical data and terminates at the end of the cluster 10

11 14. A group of sectors in multiples of two, typically the minimum space allocated in a file 15. A computer network that provides information globally 16. A software algorithm used to fingerprint a file or contents of a disk; used to verify the integrity of data 17. Consists of the physical material that comprises a computer 18. The location in a computer where data is stored and retrieved 19. Areas of files and disks that are typically not apparent to the computer user (and often not to the operating system), but contain data nonetheless 20. The process of dividing a hard disc drive into different independent sections 21. The primary board that contains the circuitry for the computer Answer the following multiple choice questions 22. Which of the following is not considered a hardware device? A. The hard disk drive B. The mouse C. The Random Access Memory D. The monitor E. The operating system 23. Which of the following describes a motherboard? A. Connects to every device used by the system B. Has a socket to accept ram C. Is the main circuit board within a computer D. All of the above E. ne of the above 24. The term bit is short for which of the following? A. Byte B. Tidbit C. Binary digit D. Database E. Beneath image threshold 11

12 25. The primary form of data storage within a personnel computer is which of the following? A. The hard disk drive B. The CD-ROM C. A thumb drive D. The recycle bin E. A zip drive 26. The first thing a crime scene investigator should do when encountering computer forensic evidence is which of the following? A. Unplug every device from the CPU to preserve the hard disk drive B. Take the system to the laboratory for processing C. Procure a warrant to search D. Tape each cable to its adjoining component in an effort to preserve the integrity of the physical connections E. Document the scene 27. The ultimate goal of obtaining an image of a hard disk drive is to do which of the following? A. Locate as much incriminating information as possible B. Obtain information without altering the drive in any way C. Preserve the photographs and video stored on the drive D. Attempt to determine the owner of the computer in question E. Give priority to the text files on the drive 28. Which of the following is one of the most common places to begin to look for evidential data? A. A CAD package B. The word processing or text based document files C. Any learn to type tutorial D. The spreadsheet files E. A photograph editing program 29. Which of the following is the best definition of latent data? A. Unallocated space B. Anything readily available to the use, also known as visible data C. An automatically saved copy of a file that was recently modified D. Those data which are typically of little use to forensic investigators E. Those data that are hidden from view 30. Which of the following describes what happens once a file is deleted by a user? A. It is obliterated from the system and cannot be recovered B. It is retained until the disk space it occupies is allocated for another use C. It may be identified using forensic image acquisition software D. A and B E. B and C 12

13 31. Evidentiary data may be recovered from which of the following? A. Unallocated space on the HDD B. Slack space on the HDD C. Ram swap files D. All of the above E. ne of the above 32. A cluster is a group of in multiples of? A. Sectors, two B. Partitions, two C. Disks, four D. Cylinders, three E. Tracks, three 33. Which of the following is not considered software? A. Accounting applications B. Operating systems C. Web browsers D. Word processors E. Floppy discs 34. Sectors are typically bytes in size. A B. 126 C. 256 D. 512 E One should not search for visible data in which of the following? A. Quicken B. Temporary files C. Swab files D. Windows E. Unallocated spaces 13

14 Computer Forensics Exam Key 1. P 2. O 3. R 4. L 5. T 6. U 7. N 8. Q 9. S 10. B 11. A 12. C 13. E 14. D 15. H 16. J 17. G 18. F 19. I 20. M 21. K 22. E 23. D 24. C 25. A 26. C 27. B 28. B 29. E 30. E 31. D 32. A 33. E 34. D 35. E 14

15 Name Date Group 1 Group Evaluation Did the group take the assignment seriously? Could you tell what the group was trying to portray? Was the group portrayal creative? Did the group include the correct elements? Would you like to see this group demonstrate their talent for you in the future? Total Score Group 2 Did the group take the assignment seriously? Could you tell what the group was trying to portray? Was the group portrayal creative? Did the group include the correct elements? Would you like to see this group demonstrate their talent for you in the future? Total Score 15

16 Group 3 Did the group take the assignment seriously? Could you tell what the group was trying to portray? Was the group portrayal creative? Did the group include the correct elements? Would you like to see this group demonstrate their talent for you in the future? Total Score Group 4 Did the group take the assignment seriously? Could you tell what the group was trying to portray? Was the group portrayal creative? Did the group include the correct elements? Would you like to see this group demonstrate their talent for you in the future? Total Score 16

17 Group 5 Did the group take the assignment seriously? Could you tell what the group was trying to portray? Was the group portrayal creative? Did the group include the correct elements? Would you like to see this group demonstrate their talent for you in the future? Total Score Group 6 Did the group take the assignment seriously? Could you tell what the group was trying to portray? Was the group portrayal creative? Did the group include the correct elements? Would you like to see this group demonstrate their talent for you in the future? Total Score 17

18 Your Name Your Group Number Peer Evaluation 1) Name of Student At what level of seriousness did they take this activity? t Very Serious Very Serious Did they make a significant contribution to the brainstorming process? Did they make a significant contribution to preparing for the activity? What was the level of their participation in the activity(s)? ne A Lot Would you want to work with this person in a group again based on their level of productivity? Total Score 2) Name of Student At what level of seriousness did they take this activity? t Very Serious Very Serious Did they make a significant contribution to the brainstorming process? Did they make a significant contribution to preparing for the activity? What was the level of their participation in the activity(s)? ne A Lot Would you want to work with this person in a group again based on their level of productivity? Total Score 18

19 3) Name of Student At what level of seriousness did they take this activity? t Very Serious Very Serious Did they make a significant contribution to the brainstorming process? Did they make a significant contribution to preparing for the activity? What was the level of their participation in the activity(s)? ne A Lot Would you want to work with this person in a group again based on their level of productivity? Total Score 4) Name of Student At what level of seriousness did they take this activity? t Very Serious Very Serious Did they make a significant contribution to the brainstorming process? Did they make a significant contribution to preparing for the activity? What was the level of their participation in the activity(s)? ne A Lot Would you want to work with this person in a group again based on their level of productivity? Total Score 19

20 5) Name of Student At what level of seriousness did they take this activity? t Very Serious Very Serious Did they make a significant contribution to the brainstorming process? Did they make a significant contribution to preparing for the activity? What was the level of their participation in the activity(s)? ne A Lot Would you want to work with this person in a group again based on their level of productivity? Total Score 6) Name of Student At what level of seriousness did they take this activity? t Very Serious Very Serious Did they make a significant contribution to the brainstorming process? Did they make a significant contribution to preparing for the activity? What was the level of their participation in the activity(s)? ne A Lot Would you want to work with this person in a group again based on their level of productivity? Total Score 20

21 Name Date Objectives 4 pts. Excellent Discussion Rubric 3 pts. Good 2 pts. Needs Some Improvement 1 pt. Needs Much Improvement N/A Pts. Participates in group discussion Encourages others to join the conversation Keeps the discussion progressing to achieve goals Shares thoughts actively while offering helpful recommendations to others Gives credit to others for their ideas Respects the opinions of others Involves others by asking questions or requesting input Expresses thoughts and ideas clearly and effectively Total Points (32 pts.) Comments: 21

22 Name Date Objectives Follows directions Student completed the work as directed, following the directions given, in order and to the level of quality indicated 4 pts. Excellent Individual Work Rubric 3 pts. Good 2 pts. Needs Some Improvement 1 pt. Needs Much Improvement N/A Pts. Time management Student used time wisely and remained on task 100% of the time Organization Student kept notes and materials in a neat, legible, and organized manner. Information was readily retrieved Evidence of learning Student documented information in his or her own words and can accurately answer questions related to the information retrieved *Research/Gathering information (if relevant) Student used a variety of methods and sources to gather information. Student took notes while gathering information Total Points (20 pts.) Comments: 22

23 Name: Date: Presentation Rubric Objectives Topic/Content Topic discussed completely and in-depth Includes properly cited sources (if used) Creativity/Neatness Integrates a variety of multimedia effects to create a professional presentation (transition and graphics) or appropriate visual aid used Title slide, table of contents, bibliography are included, using acceptable format Mechanics Grammar, spelling, punctuation, and capitalization are correct Image and font size are legible to the entire audience Oral Presentation Communicates with enthusiasm and eye contact Voice delivery and projection are dynamic and audible Audience Interaction Presentation holds audience s attention and relates a clear message Clearly and effectively communicates the content throughout the presentation 4 pts. Excellent 3 pts. Good 2 pts. Needs Some Improvement 1 pt. Needs Much Improvement N/A Pts. Total Points (20 pts.) Comments: 23

24 Name Date Objectives Question/goal Student identified and communicated a question or goal of the research 4 pts. Excellent Research Rubric 3 pts. Good 2 pts. Needs Some Improvement 1 pt. Needs Much Improvement N/A Pts. Research/Gathering information (if relevant) Student used a variety of methods and sources to gather information. Student took notes while gathering information Conclusion/Summary Student drew insightful conclusions and observations from the information gathered. Information is organized in a logical manner Communication Student communicated the information gathered and summary or conclusions persuasively. Student demonstrated skill in the use of media used to communicate the results of research Reflection Student reflected on the importance of the research and its potential application Total Points (20 pts.) Comments: 24

25

and the Forensic Science CC Spring 2007 Prof. Nehru

and the Forensic Science CC Spring 2007 Prof. Nehru and the Introduction The Internet, (Information superhighway), has opened a medium for people to communicate and to access millions of pieces of information from computers located anywhere on the globe.

More information

Operate a Personal Computer

Operate a Personal Computer ICA10105 Certificate I in Information Technology ICAU1128B Operate a Personal Computer (20hrs) ICAU1128B: Operate a Personal Computer Description This unit defines the competency required to operate a

More information

1. All of the following are examples of real security and privacy risks EXCEPT: A. hackers. B. spam. C. viruses. D. identity theft. 2.

1. All of the following are examples of real security and privacy risks EXCEPT: A. hackers. B. spam. C. viruses. D. identity theft. 2. COMPUTER-BASED-OBJECTIVE-QUESTIONS www.mission2win.in 1. All of the following are examples of real security and privacy risks EXCEPT: A. hackers. B. spam. C. viruses. D. identity theft. 2. A process known

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER. When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the

More information

8. A is approximately one billion bytes a. Kilobyte b. Bit c. Gigabyte d. Megabyte 9. SMPT, FTP and DNS are applications of the layer a. Data link b.

8. A is approximately one billion bytes a. Kilobyte b. Bit c. Gigabyte d. Megabyte 9. SMPT, FTP and DNS are applications of the layer a. Data link b. SET 19 1. All of the following are examples of real security and privacy risks except a. Hackers b. Spam c. Viruses d. Identity theft 2. A(n) --- system is a small, wireless handheld computer that scans

More information

J. A. Drew Hamilton, Jr., Ph.D. Director, Center for Cyber Innovation Professor, Computer Science & Engineering

J. A. Drew Hamilton, Jr., Ph.D. Director, Center for Cyber Innovation Professor, Computer Science & Engineering J. A. Drew Hamilton, Jr., Ph.D. Director, Center for Cyber Innovation Professor, Computer Science & Engineering CCI Post Office Box 9627 Mississippi State, MS 39762 Voice: (662) 325-2294 Fax: (662) 325-7692

More information

Birdville ISD_Third Grade Technology TEKS Checklist Teacher School

Birdville ISD_Third Grade Technology TEKS Checklist Teacher School Technology Application TEKS Checklist Suggested Learning Activities Foundations-Demonstrates knowledge and appropriate use of hardware components 3.1A Use technology terminology appropriate to the task

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 6 Working with Windows and DOS Systems

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 6 Working with Windows and DOS Systems Guide to Computer Forensics and Investigations Fourth Edition Chapter 6 Working with Windows and DOS Systems Understanding Disk Drives Disk drives are made up of one or more platters coated with magnetic

More information

Windows Forensics Advanced

Windows Forensics Advanced Windows Forensics Advanced Index: CF102 Description Windows Forensics - Advanced is the next step for forensics specialists, diving deeper into diverse processes on Windows OS serving computer investigators.

More information

ICAU1128B: Operate a Personal Computer Student Handbook

ICAU1128B: Operate a Personal Computer Student Handbook ICA20105 Certificate II in Information Technology ICAU1128B: Operate a Personal Computer Student Handbook Modification History Competency Handbooks ICA20105: Cert II in Information Technology: ICAU1128B

More information

Computer Basics. Hardware. This class is designed to cover the following basics:

Computer Basics. Hardware. This class is designed to cover the following basics: Computer Basics This class is designed to cover the following basics: computer hardware software computer s operating system different kinds of storage devices you can use to save files using a mouse what

More information

Masters of Computer Application (MCA) Entrance 2012 Computer Knowledge Paper I 1. All of the following are examples of real security and privacy

Masters of Computer Application (MCA) Entrance 2012 Computer Knowledge Paper I 1. All of the following are examples of real security and privacy Masters of Computer Application (MCA) Entrance 2012 Computer Knowledge Paper I 1. All of the following are examples of real security and privacy risks EXCEPT: A. hackers. B. spam. C. viruses. D. identity

More information

AccessData Advanced Forensics

AccessData Advanced Forensics This advanced five-day course provides the knowledge and skills necessary to install, configure and effectively use Forensic Toolkit (FTK ), FTK Imager Password Recovery Toolkit (PRTK ) and Registry Viewer.

More information

Total Mark out of 35

Total Mark out of 35 University of Bahrain College of Information Technology Department of Information Systems ITBIS105 Test 1 Version 1 (35 points) 30 Oct 2013 @ 8:00-9:00 AM Student Name: Section: ID Number: Serial Number:

More information

Forensics on the Windows Platform, Part Two by Jamie Morris last updated February 11, 2003

Forensics on the Windows Platform, Part Two by Jamie Morris last updated February 11, 2003 SecurityFocus HOME Infocus: Forensics on the Windows Platform, Part Two 2003-02-17 12:56:05-0900 SFOnline Forensics on the Windows Platform, Part Two by Jamie Morris last updated February 11, 2003 Introduction

More information

CompTIA A+ Accelerated course for & exams

CompTIA A+ Accelerated course for & exams CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is

More information

System Unit Components Chapter2

System Unit Components Chapter2 System Unit Components Chapter2 ITBIS105 IS-IT-UOB 2013 The System Unit What is the system unit? Case that contains electronic components of the computer used to process data Sometimes called the chassis

More information

OPERATING SYSTEMS & UTILITY PROGRAMS

OPERATING SYSTEMS & UTILITY PROGRAMS OPERATING SYSTEMS & UTILITY PROGRAMS System Software System software consists of the programs that control the operations of the computer and its devices. Functions that system software performs include:

More information

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming

More information

Chapter 126 TEKS for Technology Applications

Chapter 126 TEKS for Technology Applications Chapter 126 TEKS for Technology Applications What is Chapter 126? Chapter 126 outlines the skill levels that have to be achieved by all Texas students per year through the 8 th grade. Since many schools

More information

Chapter 2. Prepared By: Humeyra Saracoglu

Chapter 2. Prepared By: Humeyra Saracoglu Chapter 2 The Components of the System Unit Prepared By: Humeyra Saracoglu The System Unit What is the system unit? Case that contains electronic components of the computer used to process data Sometimes

More information

Contents. 1. Hardware Software Networks St Ignatius Girls JL - Form 3

Contents. 1. Hardware Software Networks St Ignatius Girls JL - Form 3 Contents 1. Hardware... 2 2. Software... 4 3. Networks... 5 St Ignatius Girls JL - Form 3 1. Hardware RAM - The RAM (Random Access Memory) within your computer is where the operating system is loaded to

More information

Introduction to Computers. Joslyn A. Smith

Introduction to Computers. Joslyn A. Smith Introduction to Computers Joslyn A. Smith March 9, 2010 5/18/2011 1 What is a Computer? An electronic device that has the capability of performing the following tasks: Responds to input. Processes the

More information

A+ Guide to Managing and Maintaining your PC, 6e. Chapter 8 Hard Drives

A+ Guide to Managing and Maintaining your PC, 6e. Chapter 8 Hard Drives A+ Guide to Managing and Maintaining your PC, 6e Chapter 8 Hard Drives Introduction Hard drive: most important secondary storage device Hard drive technologies have evolved rapidly Hard drive capacities

More information

Condensed Technology Application TEKS K-8. Technology Applications TEKS Foundations 126.2b1A Use appropriate technology terminology

Condensed Technology Application TEKS K-8. Technology Applications TEKS Foundations 126.2b1A Use appropriate technology terminology Complete text of TEKS at http://www.tea.state.tx.us/rules/tac/ch126toc.html Grade K-2 TEK # Foundations 126.2b1 Use of hardware, software, and their connections Technology Applications TEKS Foundations

More information

A+ Guide to Hardware, 4e. Chapter 7 Hard Drives

A+ Guide to Hardware, 4e. Chapter 7 Hard Drives A+ Guide to Hardware, 4e Chapter 7 Hard Drives Objectives Learn how the organization of data on floppy drives and hard drives is similar Learn about hard drive technologies Learn how a computer communicates

More information

CompTIA: A Exam 2 Lab V2.0. Course Outline. CompTIA: A Exam 2 Lab V Feb

CompTIA: A Exam 2 Lab V2.0. Course Outline. CompTIA: A Exam 2 Lab V Feb Course Outline CompTIA: A+ 2012 Exam 2 Lab V2.0 22 Feb 2019 Contents 1. Course Objective 2. Expert Instructor-Led Training 3. ADA Compliant & JAWS Compatible Platform 4. State of the Art Educator Tools

More information

APPENDIX A. Answer: D Reference: Hardware Basics Difficulty: Easy. Answer: A Reference: Hardware Basics Difficulty: Easy

APPENDIX A. Answer: D Reference: Hardware Basics Difficulty: Easy. Answer: A Reference: Hardware Basics Difficulty: Easy APPENDIX A Multiple Choice: 1. A desktop computer is also known as a: A. Palm Pilot. B. laptop. C. mainframe. D. PC. Answer: D Reference: Hardware Basics Difficulty: Easy 2. The physical parts of a computer

More information

PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS A+ COMPUTER HARDWARE CSIT 1710

PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS A+ COMPUTER HARDWARE CSIT 1710 PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS A+ COMPUTER HARDWARE CSIT 1710 Class Hours: 3.0 Credit Hours: 4.0 Laboratory Hours: 3.0 Revised: Spring 2010 NOTE: This course is not intended for transfer

More information

Downloaded from various sources on the NET

Downloaded from various sources on the NET Overview Computers. Hardware components of a Computer. Purpose and functions of computer operating systems. Evolution of computer operating systems. Operating systems available today. Downloaded from various

More information

CompTIA IT Fundamentals V5 (Course & Lab) Course Outline. CompTIA IT Fundamentals V5 (Course & Lab) 24 Jan

CompTIA IT Fundamentals V5 (Course & Lab) Course Outline. CompTIA IT Fundamentals V5 (Course & Lab) 24 Jan Course Outline CompTIA IT Fundamentals V5 (Course & Lab) 24 Jan 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

COMPUTER HACKING Forensic Investigator

COMPUTER HACKING Forensic Investigator COMPUTER HACKING Forensic Investigator H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E www.ictd.ae ictd@ictd.ae Course Introduction: CHFIv8 presents a detailed methodological approach

More information

SECTION 2 (Part B) Types And Components Of Computer Systems. Sophia Pratzioti

SECTION 2 (Part B) Types And Components Of Computer Systems. Sophia Pratzioti SECTION 2 (Part B) Types And Components Of Computer Systems 2 Hardware & Software Hardware: is the physical parts of the computer system the part that you can touch and see. Hardware can be either external

More information

SYLLABUS DEPARTMENTAL SYLLABUS. Laptops and Mobile Devices CRTE0108 DEPARTMENTAL SYLLABUS DEPARTMENTAL SYLLABUS DEPARTMENTAL SYLLABUS

SYLLABUS DEPARTMENTAL SYLLABUS. Laptops and Mobile Devices CRTE0108 DEPARTMENTAL SYLLABUS DEPARTMENTAL SYLLABUS DEPARTMENTAL SYLLABUS SYLLABUS DATE OF LAST REVIEW: 02/2015 CIP CODE: 11.1006 SEMESTER: COURSE TITLE: COURSE NUMBER: Laptops and Mobile Devices CRTE0108 CREDIT HOURS: 3 INSTRUCTOR: OFFICE LOCATION: OFFICE HOURS: TELEPHONE:

More information

Getting Started. Explorers Guide. Learning about computer basics. Data file: none Objectives:

Getting Started. Explorers Guide. Learning about computer basics. Data file: none Objectives: Explorers Guide Data file: none Objectives: In this project, you will: learn about computer ergonomics describe computer hardware and software review the Windows desktop and use the mouse work with windows

More information

Form 4 ICT Literacy Modules Methodist Boys School Kuala Lumpur 1.0 PROCESSING DATA

Form 4 ICT Literacy Modules Methodist Boys School Kuala Lumpur 1.0 PROCESSING DATA 1.0 PROCESSING DATA 1. Name of module: 1.1 How computer processes data? 2. Learning outcomes: Students should be able to: a) understand and state how computer process data b) list down processing components

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

CSET 3400 Unix System Administration (3 semester credit hours) IT Elective

CSET 3400 Unix System Administration (3 semester credit hours) IT Elective CSET 3400 Unix System Administration (3 semester credit hours) CSET Elective IT Elective Current Catalog Description: Commands and methods to install and manage a UNIX system. System administration topics

More information

INFORMATION COMUNICATION TECHNOLOGY SKS Lecture Two

INFORMATION COMUNICATION TECHNOLOGY SKS Lecture Two INFORMATION COMUNICATION TECHNOLOGY SKS 1362 Lecture Two Microprocessor CPU: Central Processing Unit Brain of the computer Executes instructions 2 Microprocessor CPU: It has mathematical function Calculates

More information

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE CITA170 - COMPUTER CONCEPTS AND OPERATING SYSTEMS

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE CITA170 - COMPUTER CONCEPTS AND OPERATING SYSTEMS STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE CITA170 - COMPUTER CONCEPTS AND OPERATING SYSTEMS Prepared by: Judith Beider Revised by: Robert House CANINO SCHOOL OF

More information

LO CompTIA A+ : (Exam ) Course Outline. 04 Apr

LO CompTIA A+ : (Exam ) Course Outline. 04 Apr Course Outline LO CompTIA A+ : (Exam 220901) 04 Apr 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training

More information

Cisco IT Essentials v6 Standards Alignment

Cisco IT Essentials v6 Standards Alignment Cisco IT Essentials v6 Standards Alignment Texas Computer Maintenance TEKS ( 130.273) CompTIA A+ (901 & 902) CompTIA IT Fundamentals (FC0-U51) Microsoft Technology Associate (MTA): Windows Operating System

More information

CompTIA A Exam 2 (Course & Labs) Course Outline. CompTIA A Exam 2 (Course & Labs) 05 Oct

CompTIA A Exam 2 (Course & Labs) Course Outline. CompTIA A Exam 2 (Course & Labs) 05 Oct Course Outline CompTIA A+ 220-902 Exam 2 (Course & Labs) 05 Oct 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Syllabus. Course Title: Cyber Forensics Course Number: CIT 435. Course Description: Prerequisite Courses: Course Overview

Syllabus. Course Title: Cyber Forensics Course Number: CIT 435. Course Description: Prerequisite Courses: Course Overview Syllabus Course Title: Cyber Course Number: CIT 435 Course Description: Introduces the principles and practices of digital forensics including digital investigations, data and file recovery methods, and

More information

IB Computer Science Topic.2-

IB Computer Science Topic.2- Topic.2- Computer Organization Designed by: Allan Lawson Sources: Online Materials, thanks for all Topic 2.1.1 Computer Architecture Outline the architecture of a central processing unit (CPU) and the

More information

After the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning

After the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning After the Attack Business Continuity Week 6 Part 2 Staying in Business Disaster Recovery Planning and Testing Steps Business continuity is a organization s ability to maintain operations after a disruptive

More information

Vendor: ECCouncil. Exam Code: EC Exam Name: Computer Hacking Forensic Investigator Exam. Version: Demo

Vendor: ECCouncil. Exam Code: EC Exam Name: Computer Hacking Forensic Investigator Exam. Version: Demo Vendor: ECCouncil Exam Code: EC1-349 Exam Name: Computer Hacking Forensic Investigator Exam Version: Demo QUESTION 1 What is the First Step required in preparing a computer for forensics investigation?

More information

Digital Forensics Lecture 01- Disk Forensics

Digital Forensics Lecture 01- Disk Forensics Digital Forensics Lecture 01- Disk Forensics An Introduction to Akbar S. Namin Texas Tech University Spring 2017 Digital Investigations and Evidence Investigation of some type of digital device that has

More information

CSE 4482 Computer Security Management: Assessment and Forensics. Computer Forensics: Working with Windows and DOS Systems

CSE 4482 Computer Security Management: Assessment and Forensics. Computer Forensics: Working with Windows and DOS Systems CSE 4482 Computer Security Management: Assessment and Forensics Computer Forensics: Working with Windows and DOS Systems Instructor: N. Vlajic,, Fall 2010 Required reading: Guide to Computer Forensics

More information

Practice Test. Guidance Software GD Guidance Software GD0-110 Certification Exam for EnCE Outside North America. Version 1.6

Practice Test. Guidance Software GD Guidance Software GD0-110 Certification Exam for EnCE Outside North America. Version 1.6 Guidance Software GD0-110 Guidance Software GD0-110 Certification Exam for EnCE Outside North America Practice Test Version 1.6 QUESTION NO: 1 A FAT directory has as a logical size of: A. One cluster B.

More information

Data rate - The data rate is the number of bytes per second that the drive can deliver to the CPU.

Data rate - The data rate is the number of bytes per second that the drive can deliver to the CPU. A+ Guide to Hardware, 4e Chapter 7 Hard Drives Learning from Floppy Drives Floppy drives are an obsolescent technology Replacements: CD drives and USB flash memory Good reasons for studying floppy drive

More information

The Table Privacy Policy Last revised on August 22, 2012

The Table Privacy Policy Last revised on August 22, 2012 The Table Privacy Policy Last revised on August 22, 2012 The Table, an online venue through which your organization and its members/employees can connect to better fulfill its mission respects and is committed

More information

KNOPPIX Bootable CD Validation Study for Live Forensic Preview of Suspects Computer

KNOPPIX Bootable CD Validation Study for Live Forensic Preview of Suspects Computer KNOPPIX Bootable CD Validation Study for Live Forensic Preview of Suspects Computer By: Ernest Baca www.linux-forensics.com ebaca@linux-forensics.com Page 1 of 18 Introduction I have recently become very

More information

Parts of Computer hardware Software

Parts of Computer hardware Software Parts of Computer Parts of Computer If you use a desktop computer, you might already know that there is not any single part called the "computer." A computer is really a system of many parts working together.

More information

Digital Cameras. An evaluation of the collection, preservation and evaluation of data collected from digital

Digital Cameras. An evaluation of the collection, preservation and evaluation of data collected from digital Ronald Prine CSC 589 - Digital Forensics New Mexico Institute of Mining and Technology October 17, 2006 Digital Cameras Executive Summary An evaluation of the collection, preservation and evaluation of

More information

Information Communications Technology (CE-ICT) 6 th Class

Information Communications Technology (CE-ICT) 6 th Class Information Communications Technology (CE-ICT) 6 th Class Lecture 2: Computer Concepts (Part A) Lecturer: Objectives Hardware Concepts Types of Computer Components of a Computer System Computer Performance

More information

2016 P C Basics Page 1

2016 P C Basics Page 1 PC Basics with Windows 10 Introduction to PCs Mercer County Library System Brian M. Hughes, County Executive A. The Equipment: External Hardware & Internal Hardware 1. CD-ROM CD-ROMs are compact discs,

More information

Condensed Technology Application TEKS K-8

Condensed Technology Application TEKS K-8 Complete text of TEKS at http://www.tea.state.tx.us/rules/tac/ch126toc.html Grade K-2 TEK # 126.2b1 Use of hardware, software, and their connections 126.2b1A Use appropriate technology terminology 126.2b1B

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge

More information

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE I. Description of Course: 1. Department/Course: CNET - 174 2. Title: Computer Forensics 3. Cross Reference: 4. Units: 3 Lec Hrs:

More information

Windows Core Forensics Forensic Toolkit / Password Recovery Toolkit /

Windows Core Forensics Forensic Toolkit / Password Recovery Toolkit / The Windows Forensics Core Training follows up the AccessData BootCamp training. This advanced AccessData training class provides the knowledge and skills necessary to use AccessData products to conduct

More information

INITIATE COMPUTER SYSTEM

INITIATE COMPUTER SYSTEM ELEMENT 1: INITIATE COMPUTER SYSTEM LEARNING OUTCOMES As you go through this element you will acquire the knowledge, skills and attitudes necessary to initiate computer system. Your learning facilitator

More information

PELLISSIPPI STATE TECHNICAL COMMUNITY COLLEGE MASTER SYLLABUS A+ CERTIFICATION PREPARATION CST 2730

PELLISSIPPI STATE TECHNICAL COMMUNITY COLLEGE MASTER SYLLABUS A+ CERTIFICATION PREPARATION CST 2730 PELLISSIPPI STATE TECHNICAL COMMUNITY COLLEGE MASTER SYLLABUS A+ CERTIFICATION PREPARATION CST 2730 Class Hours: 3.0 Credit Hours: 4.0 Laboratory Hours: 3.0 Date Revised: Spring 00 NOTE: This course is

More information

DIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING

DIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING 17.09.24 DIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING FORENSICS FRAMEWORK FOR CLOUD COMPUTING OUTLINE Abstract Introduction Challenges in cloud forensics Proposed solution Conclusion Opinion

More information

LO CompTIA A+ : (Exam ) Course Outline Aug 2018

LO CompTIA A+ : (Exam ) Course Outline Aug 2018 Course Outline LO CompTIA A+ : (Exam 220901) 18 Aug 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training

More information

Terminology, Types of Computers & Computer Hardware

Terminology, Types of Computers & Computer Hardware Terminology, Types of Computers & Computer Hardware Basic Terminology 1.Computer A device that accepts input, processes data, stores data, and produces output, all according to a series of stored instructions.

More information

COMPUTER FORENSICS (CFRS)

COMPUTER FORENSICS (CFRS) Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics

More information

Computers Are Your Future

Computers Are Your Future Computers Are Your Future Computers Are Your Future Chapter 1 Computers & You Slide 2 What You Will Learn... Define the word computer and name the four basic operations Describe the main components of

More information

An Overview of the Computer System. Kafui A. Prebbie 24

An Overview of the Computer System. Kafui A. Prebbie 24 An Overview of the Computer System Kafui A. Prebbie -kafui@kafui.com 24 The Parts of a Computer System What is a Computer? Hardware Software Data Users Kafui A. Prebbie -kafui@kafui.com 25 The Parts of

More information

Higher National Unit specification: general information

Higher National Unit specification: general information Higher National Unit specification: general information Unit code: H1EM 34 Superclass: CD Publication date: June 2013 Source: Scottish Qualifications Authority Version: 03 Unit purpose This Unit is designed

More information

SYLLABUS. Departmental Syllabus CIST0145. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus CIST0145. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus SYLLABUS DATE OF LAST REVIEW: 11/6/2018 CIP CODE: 52.0104 SEMESTER: COURSE TITLE: COURSE NUMBER: Computer Operating Systems: (Windows Vista) CIST0145 CREDIT HOURS: 4 INSTRUCTOR: OFFICE LOCATION: OFFICE

More information

System Unit Components. Chapter2

System Unit Components. Chapter2 System Unit Components Chapter2 ITBIS105 IS-IT-UOB 2016 The System Unit What is the system Case that contains electronic components of the computer use d to process data Sometimes called the chassis unit?

More information

Vocabulary Bank organized by module

Vocabulary Bank organized by module Vocabulary Bank organized by module Module 1: Choosing a Computer Application: also called an "app," it is computer software created for a particular task or tasks; it is increasingly used to mean software

More information

Course Outline. CompTIA A+: A Comprehensive Approach (Exams and )

Course Outline. CompTIA A+: A Comprehensive Approach (Exams and ) Course Outline CompTIA A+: A Comprehensive Approach (Exams 220-901 and 220902) 11 Nov 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions

More information

CompTIA A+ 901 & 902 Labs. Course Outline. CompTIA A+ 901 & 902 Labs. 11 Mar

CompTIA A+ 901 & 902 Labs. Course Outline. CompTIA A+ 901 & 902 Labs. 11 Mar Course Outline 11 Mar 2019 Contents 1. Course Objective 2. Expert Instructor-Led Training 3. ADA Compliant & JAWS Compatible Platform 4. State of the Art Educator Tools 5. Award Winning Learning Platform

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

Chapter 6 Network and Internet Security and Privacy

Chapter 6 Network and Internet Security and Privacy Chapter 6 Network and Internet Security and Privacy Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify online threats LO6.3: Describe cyberstalking and other personal

More information

COWLEY COLLEGE & Area Vocational Technical School

COWLEY COLLEGE & Area Vocational Technical School COWLEY COLLEGE & Area Vocational Technical School COURSE PROCEDURE FOR Student Level: This course is open to students on the college level in either the freshman or sophomore year. Catalog Description:

More information

Computers Are Your Future

Computers Are Your Future Computers Are Your Future 2008 Prentice-Hall, Inc. Computers Are Your Future Chapter 6 Inside the System Unit 2008 Prentice-Hall, Inc. Slide 2 What You Will Learn... Understand how computers represent

More information

This lesson was made possible with the assistance of the following organisations:

This lesson was made possible with the assistance of the following organisations: 16 MODULE 4: ICT in Support of Farming LESSON 1: Introduction to Computers TIME: 1 hour 36 minutes AUTHOR: Dalton Ndirangu This lesson was made possible with the assistance of the following organisations:

More information

ICT A BRIEF INTRODUCTION

ICT A BRIEF INTRODUCTION ICT A BRIEF INTRODUCTION TOPICS: What is ICT? Where does ICT literacy begin What skills makes one an ICT literate Why is ICT so important What are the fundamental elements of ICT How do you create information

More information

OVERVIEW OF SUBJECT REQUIREMENTS

OVERVIEW OF SUBJECT REQUIREMENTS Course Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document is intended as a guide only. Enrolling students

More information

Undergraduate Course Syllabus

Undergraduate Course Syllabus College of Software Engineering Undergraduate Course Syllabus Course ID 311016040 Course Name Introduction to Computer System Course Attribute Compulsory Selective Course Language English Chinese Credit

More information

IBPS Practice Exam 1. One megabyte equals approximately 1) 1,000 bits 2) 1,000 bytes 3) 1 million bytes 4) 1 million bits 5) 2,000 bytes 2.

IBPS Practice Exam 1. One megabyte equals approximately 1) 1,000 bits 2) 1,000 bytes 3) 1 million bytes 4) 1 million bits 5) 2,000 bytes 2. IBPS Practice Exam 1. One megabyte equals approximately 1) 1,000 bits 2) 1,000 bytes 3) 1 million bytes 4) 1 million bits 5) 2,000 bytes 2. Data going into the computer is called? 1) Output 2) Algorithm

More information

Main Parts of Personal Computer

Main Parts of Personal Computer Main Parts of Personal Computer System Unit The System Unit: This is simply the box like case called the tower, which houses the motherboard, which houses the CPU. It also houses all the drives, such as

More information

PC Basics Introduction to PCs

PC Basics Introduction to PCs PC Basics Introduction to PCs A. The Equipment: External Hardware & Internal Hardware 1. CD-ROM CD-ROMs are Compact Discs, read-only, removable data storage media. CD Drives read the data encoded on the

More information

Course overview CompTIA A Official Study Guide

Course overview CompTIA A Official Study Guide Course overview CompTIA A+ 220-801 Official Study Guide (G183eng ver092) Overview CompTIA A+ courses are intended for students wishing to qualify with CompTIA A+ Certification. A+ certification is designed

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Title: Certified Digital Forensics Examiner Duration: 5 days Class Format Options: Instructor-led classroom Live Online Training Prerequisites: A minimum of

More information

PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS LINUX SYSTEM ADMINISTRATION CSIT 2411

PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS LINUX SYSTEM ADMINISTRATION CSIT 2411 PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS LINUX SYSTEM ADMINISTRATION CSIT 2411 Class Hours: 3.0 Credit Hours: 4.0 Laboratory Hours: 3.0 Revised: Spring 2010 Catalog Course Description: A study

More information

Computer Programming IA

Computer Programming IA EXAM INFORMATION Items 42 Points 51 Prerequisites NONE Course Length ONE SEMESTER DESCRIPTION introduces students to the fundamentals of computer programming. Students will learn to design, code, and test

More information

The City School PECHS Junior Boys 1 st Term

The City School PECHS Junior Boys 1 st Term Q1) ill in the blanks with appropriate answers. Reinforcement Worksheet (Learning the Basic) a) he Operating System creates the proper environment for the user to interact with the computer. b) he main

More information

SQA Advanced Unit specification: general information for centres

SQA Advanced Unit specification: general information for centres SQA Advanced Unit specification: general information for centres Unit title: Computer Systems Fundamentals Unit code: HP1T 47 Superclass: CB Publication date: August 2017 Source: Scottish Qualifications

More information

Computer Technology Flash Card 2

Computer Technology Flash Card 2 Computer Technology Flash Card 2 Mouse An input device that allows the user to manipulate objects on the screen by moving the mouse along the surface of a desk. Data Refers to the symbols that represent

More information

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 2 Understanding Computer Investigations

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition Chapter 2 Understanding Computer Investigations Objectives Explain how to prepare a computer investigation Apply a systematic approach to an

More information

Chapter 13: The IT Professional

Chapter 13: The IT Professional Chapter 13: The IT Professional IT Essentials v6.0 ITE v6.0 1 Chapter 13 - Sections & Objectives 13.1 Communication Skills and the IT Professional Explain why good communication skills are a critical part

More information

THINGS TO REMEMBER INTRODUCTION TO COMPUTERS

THINGS TO REMEMBER INTRODUCTION TO COMPUTERS PREMIER CURRICULUM SERIES Based on the Sunshine State Standards for Secondary Education, established by the State of Florida, Department of Education THINGS TO REMEMBER INTRODUCTION TO COMPUTERS Copyright

More information

Chapter 8 Operating Systems and Utility Programs أ.أمل زهران

Chapter 8 Operating Systems and Utility Programs أ.أمل زهران Chapter 8 Operating Systems and Utility Programs Chapter 8 Objectives Identify the types of system software Summarize the startup process on a personal computer Summarize the features of several stand-alone

More information

Information Technology, the Internet, and You. Information Technology, the Internet, and You 1-2

Information Technology, the Internet, and You. Information Technology, the Internet, and You 1-2 Explain the five parts of an information system: people, procedures, software, hardware, and data. Distinguish between system software and application software. Discuss the three kinds of system software

More information