Digital Forensics as a Big Data Challenge
|
|
- Dustin Franklin
- 6 years ago
- Views:
Transcription
1 Digital Forensics as a Big Data Challenge Bruxelles, October 23rd 2013 Alessandro Guarino CEO, StudioAG Slide 1 of 20
2 Digital Forensics 1 DFRWS definition 2001 Digital Forensics is the use of scientifically derived [ ] methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence [ ] for the purpose [of reconstructing events] found to be criminal [ ] or disruptive to planned operations Slide 2 of 20
3 Digital Forensics 2 Points: Scientific nature and methods Corporate vs criminal environments Deals with DIGITAL EVIDENCE Academic vs practice The transition from craft to science Slide 3 of 20
4 Digital Forensics 3 So, digital evidence (& the ISO debate)... Potential digital evidence Digital evidence Legal (digital) evidence Slide 4 of 20
5 Digital Forensics 4 Principles Validation Reliability Repeatability Documentation Preservation Slide 5 of 20
6 Digital Forensics 5 (Typical) Workrflow Identification Collection Acquisition Preservation Analysis Presentation / Reporting Slide 6 of 20
7 Data Science 1 Statistics & and Machine Learning (as of now...) Domain knowledge needed: add to forensics panoplia (tech, legal...) DS tools Even more interdisciplinary A.k.a. big data analytics Slide 7 of 20
8 Data Science 2 Powered by big datasets Big data? Trend & figures Installed storage capacity 2.5 Zettabytes in 2012 (1ZB = 1 billion TB) Slide 8 of 20 Source: Latitude magazine #29
9 Challenges Variety of data sources Complexity of investigation Need to correlate these disparate data sources in an investigation Slide 9 of 20
10 Data Science 3 Big datasets? Not only that... Volume, Variety, Velocity Variety mix of structured & unstructured data Lots of different sources Velocity online activities always refreshed Slide 10 of 20
11 Data Science 3 Visualization Necessary to interpret results Slide 11 of 20
12 Challenges The golden age has ended Now investigation has to contend with big data Cost fall Diffusion of solid state media in a variety of devices Mobile revolution Cloud Virtualization Internet of things & ubiquitous connectivity Slide 12 of 20
13 Challenges Velocity Pre-forensics activities needed (for instance in corporate environments) Rapid response times Sometimes encumbered by legal issues Non-consistency See Facebook, Twitter use of nosql Slide 13 of 20
14 Rethinking digital forensics The principles: remodeling the postulates? The challenges of validation Accuracy Repeatability: leaving the holy Graal? Documentation Accurate logs and descriptions Slide 14 of 20
15 Rethinking digital forensics A new workflow? Identification and collection Complete collection could be impossible Prioritization (triage) right at the start Acquisition From copy-all, analyse later To acquire what is necessary, evaluate on the scene Slide 15 of 20
16 Rethinking digital forensics Rethinking the workflow Preservation Big data storage Reporting Log details of examinations, precise algorithms applied Explain validity of machine learning techniques Slide 16 of 20
17 Rethinking digital forensics Tools (to cope) Hadoop Sleuth Kit Hadoop Framework... Slide 17 of 20
18 Conclusions Forensics models challenges Forensic analysts need to Adapt methods to the new scenery Relax some requirements Add some new tools to the arsenal Slide 18 of 20
19 Thank you! Any questions? StudioAG ICT Consulting & Engineering Blog Information Security & ICT law Slide 19 of 20
20 References Barreno, M. et al.: Open Problems in the Security of Learning. In: D. Balfanz and J. Staddon, eds., AISec, ACM, 2008, p FBI: RCFL Program Annual Report fir Fiscal Year 2008, FBI FBI: RCFL Program Annual Report fir Fiscal Year 2010, FBI ISACA: What Is Big Data and What Does It Have to Do with IT Audit? ISO/IEC International Standard Khan, M. and Chatwin, C. and Young, R.: A framework for post-event timeline reconstruction using neural networks Digital Investigation 4, 2007 Yiu, C: The Big Data Opportunity: Making Government Faster, Smarter and More Personal - London: Policy Exchange 2012 Slide 20 of 20
DIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING
17.09.24 DIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING FORENSICS FRAMEWORK FOR CLOUD COMPUTING OUTLINE Abstract Introduction Challenges in cloud forensics Proposed solution Conclusion Opinion
More informationRapid Forensic Imaging of Large Disks with Sifting Collectors
DIGITAL FORENSIC RESEARCH CONFERENCE Rapid Forensic Imaging of Large Disks with Sifting Collectors By Jonathan Grier and Golden Richard Presented At The Digital Forensic Research Conference DFRWS 2015
More informationDigital Single Market Strategy for Europe
Supporting European Union and Southeast Asia ICT strategic partnership and policy dialogue: Connecting ICT EU-SEA Research, Development and Innovation Knowledge Networks Digital Single Market Strategy
More informationData Management Glossary
Data Management Glossary A Access path: The route through a system by which data is found, accessed and retrieved Agile methodology: An approach to software development which takes incremental, iterative
More informationWhen Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.
When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the
More informationDigital Forensic Science: Ideas, Gaps and the Future. Dr. Joshua I. James
Digital Forensic Science: Ideas, Gaps and the Future Dr. Joshua I. James Joshua@cybercrimetech.com 2015-08-09 Overview Digital Forensic Science where are we now? Past Present Where are we going? Future
More informationThe Mathematics of Big Data
The Mathematics of Big Data Philippe B. Laval KSU Fall 2017 Philippe B. Laval (KSU) Math & Big Data Fall 2017 1 / 10 Introduction We briefly present Big Data and the issues associated with Big Data. Philippe
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationForensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud
Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud Ezz El-Din Hemdan 1, Manjaiah D.H 2 Research Scholar, Department of Computer Science, Mangalore University,
More informationFinancial Forensic Accounting
Financial Forensic Accounting Qualification Scope of Content Version: as at 02 March 2018 6. SCOPE OF CONTENT 1. Digital forensics overview 1.1. History of digital forensics 1.2. Sources of electronic
More informationA Road Map for Digital Forensic Research
1 Outline of Today s Lecture! A Road Map for Digital Forensic Research o Report from the 1 st Digital Forensic Research Workshop (DFRWS) 2001! Defining Digital Forensic Examination and Analysis Tools o
More informationGina L. Bianchi, Deputy Commissioner and Counsel Acting Director, Office of Forensic Services Kimberly A. Schiavone, Forensic Services Program
Gina L. Bianchi, Deputy Commissioner and Counsel Acting Director, Office of Forensic Services Kimberly A. Schiavone, Forensic Services Program Manager New York State Forensic Overview Office of Forensic
More informationOrganization of Scientific Area Committees for Forensic Science (OSAC)
Stetson University College of Law Essentials in Forensic Science and the Law Webinar Series Organization of Scientific Area Committees for Forensic Science (OSAC) Mark D. Stolorow Director for OSAC Affairs
More informationDIGITAL FORENSICS. We Place Digital Evidence at Your Fingertips. Cyanre is South Africa's leading provider of computer and digital forensic services
DIGITAL FORENSICS We Place Digital Evidence at Your Fingertips Cyanre is South Africa's leading provider of computer and digital forensic services Cyber Crime taking a Byte out of corporate SA Total Legal
More informationBIG DATA ANALYTICS IN FORENSIC AUDIT. Presented in Mombasa. Uphold public interest
BIG DATA ANALYTICS IN FORENSIC AUDIT Presented in Mombasa Uphold public interest Nasumba Kwatukha Kizito CPA,CIA,CISA,CISI,CRMA,CISM,CISSP,CFE,IIK Internal Audit, Risk and Compliance Strathmore University
More informationProgram Approval Form
For approval of new programs and deletions or X Program Approval Form modifications to an existing program. Action Requested: Type (Check one): Create New (SCHEV approval required except for minors) B.A.
More informationIntroduction to the Mathematics of Big Data. Philippe B. Laval
Introduction to the Mathematics of Big Data Philippe B. Laval Fall 2017 Introduction In recent years, Big Data has become more than just a buzz word. Every major field of science, engineering, business,
More informationTrends in Mobile Forensics from Cellebrite
Trends in Mobile Forensics from Cellebrite EBOOK 1 Cellebrite Survey Cellebrite is a well-known name in the field of computer forensics, and they recently conducted a survey as well as interviews with
More informationNowcasting. D B M G Data Base and Data Mining Group of Politecnico di Torino. Big Data: Hype or Hallelujah? Big data hype?
Big data hype? Big Data: Hype or Hallelujah? Data Base and Data Mining Group of 2 Google Flu trends On the Internet February 2010 detected flu outbreak two weeks ahead of CDC data Nowcasting http://www.internetlivestats.com/
More information1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7
1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7 ORACLE PRODUCT LOGO 20. oktober 2011 Hotel Europa Sarajevo Platform
More informationGetting more from your Engineering Data. John Chapman Regional Technical Manager
Getting more from your Engineering Data John Chapman Regional Technical Manager 2012 HALLIBURTON. ALL RIGHTS RESERVED. Getting more from your Engineering Data? extracting information from data to make
More informationCourse 832 EC-Council Computer Hacking Forensic Investigator (CHFI)
Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming
More informationThe New Era of Cognitive Security
The New Era of Cognitive Security IBM WATSON SUMMIT KANOKSAK RATCHAPAT Senior Technical Sales 1 Today s security challenges ACTORS TARGETS VECTORS REALITY Organized Crime Healthcare Ransomware Cloud, mobile,
More informationIntroduction to Data Mining and Data Analytics
1/28/2016 MIST.7060 Data Analytics 1 Introduction to Data Mining and Data Analytics What Are Data Mining and Data Analytics? Data mining is the process of discovering hidden patterns in data, where Patterns
More informationstandards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in
ISO/IEC JTC 1/SC 27/WG 4 IT Security Controls and Services M. De Soete, ISO/IEC JTC 1 SC27 Vice Chair copyright ISO/IEC JTC 1/SC 27, 2014. This is an SC27 public document and is distributed as is for the
More informationCybersecurity Auditing in an Unsecure World
About This Course Cybersecurity Auditing in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that cybersecurity
More informationStarting small to go Big: Building a Living Database
Starting small to go Big: Building a Living Database Michael Sabbatino 1,2, Baker, D.V. Vic 3,4, Rose, K. 1, Romeo, L. 1,2, Bauer, J. 1, and Barkhurst, A. 3,4 1 US Department of Energy, National Energy
More informationPredstavenie štandardu ISO/IEC 27005
PERFORMANCE & TECHNOLOGY - IT ADVISORY Predstavenie štandardu ISO/IEC 27005 ISMS Risk Management 16.02.2011 ADVISORY KPMG details KPMG is a global network of professional services firms providing audit,
More informationIntroduction to Volume Analysis, Part I: Foundations, The Sleuth Kit and Autopsy. Digital Forensics Course* Leonardo A. Martucci *based on the book:
Part I: Foundations, Introduction to Volume Analysis, The Sleuth Kit and Autopsy Course* Leonardo A. Martucci *based on the book: File System Forensic Analysis by Brian Carrier LAM 2007 1/12h Outline Part
More informationConsumerization. Copyright 2014 Trend Micro Inc. IT Work Load
Complete User Protection Consumerization IT Work Load 2 Then... File/Folder & Removable Media Email & Messaging Web Access Employees IT Admin 3 Now! File/Folder & Removable Media Email & Messaging Web
More informationMatt Danner Flashback Data
Preservation Strategies and Data Collection from a Forensic Expert's Point of View Best practices on executing preservation and administering collection protocols with emphasis on forensically sound methods
More informationDigital Forensics, from floppies to the Cloud. Can Darwin win the game of digital evolution?
@kerouanton #ISC2CongressEMEA Digital Forensics, from floppies to the Cloud Can Darwin win the game of digital evolution? Digital Sherlock in a nutshell SOME BASICS Types of digital forensics Investigations
More informationFOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY
FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide
More informationOpenText Buys Guidance Software
OpenText Buys Guidance Software September 14, 2017 NASDAQ: OTEX TSX: OTEX Safe Harbor Statement Certain statements in this presentation, including statements regarding OpenText's plans, objectives, expectations
More informationCyberSecurity Internships The Path to Meeting Industry Need
CyberSecurity Internships The Path to Meeting Industry Need Room Seacliff A Tuesday October 17 Bruce Maas Emeritus Vice Provost for IT and CIO University of Wisconsin-Madison Innovation Fellow Internet2
More informationChandrakant Mallick Department of Comp. Sc. & Engg, CEB, Bhubaneswar.
Big Data Computing Application in Digital Forensics Investigation and Cyber Security Suneeta Satpathy P.G Department of Comp. Sc. &, Application CEB, Bhubaneswar Chandrakant Mallick Department of Comp.
More informationTech Data s Acquisition of Avnet Technology Solutions
Tech Data s Acquisition of Avnet Technology Solutions Creating a Premier Global IT Distributor: From the Data Center to the Living Room September 19, 2016 techdata.com 1 Forward-Looking Statements Safe
More informationIBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT
IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT NOTICE Clients are responsible for ensuring their own compliance with various laws and regulations, including the
More informationBlockers to IPv6 Adoption
Blockers to IPv6 Adoption Lessons from over 19 years of providing IPv6 services UK IPv6 Council 2017 Dr David Holder CEng FIET MIEEE david.holder@erion.co.uk The Problem Persuading enterprises to adopt
More informationSpeakers. Shellie Zavatsky Director of Internal Audit at Hurley Medical Center. Trent Long Director of Managed Privacy Services at FairWarning, Inc
View the Replay Speakers Shellie Zavatsky Director of Internal Audit at Hurley Medical Center Trent Long Director of Managed Privacy Services at FairWarning, Inc Agenda What are the new advanced threats
More informationIncident Response & Forensic Best Practice. Cyber Attack!
Incident Response & Forensic Best Practice Cyber Attack! Overview Incident Response Forensic Requirement / Evidence Handling Investigative Steps Log Interpretation Advanced Correlation For Traceability
More informationIncident Response. Is Your CSIRT Program Ready for the 21 st Century?
Incident Response Is Your CSIRT Program Ready for the 21 st Century? Speaker Bio Traditional Response Concepts Technical Incidents Requiring Technical Responses Virus/ Malware Network Intrusion Disaster
More informationExamples of Big Data analytics in ENEA: data sources and information extraction strategies
Examples of Big Data analytics in ENEA: data sources and information extraction strategies Ing. Giovanni Ponti, PhD ENEA DTE-ICT-HPC giovanni.ponti@enea.it DISRUPTIVE DATA 2017 5 Maggio, 2017, Via Santa
More informationBUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE
BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not
More informationThe YAKSHA Cybersecurity Solution and the Ambassadors Programme. Alessandro Guarino YAKSHA Innovation Manager CEO, StudioAG
The YAKSHA Cybersecurity Solution and the Ambassadors Programme Alessandro Guarino YAKSHA Innovation Manager CEO, StudioAG 1st Webinar December 17, 2018 1 Agenda I. Introduction to the YAKSHA project III.
More informationWHITE PAPER. The General Data Protection Regulation: What Title It Means and How SAS Data Management Can Help
WHITE PAPER The General Data Protection Regulation: What Title It Means and How SAS Data Management Can Help ii Contents Personal Data Defined... 1 Why the GDPR Is Such a Big Deal... 2 Are You Ready?...
More informationMEETING ISO STANDARDS
WHITE PAPER MEETING ISO 27002 STANDARDS September 2018 SECURITY GUIDELINE COMPLIANCE Organizations have seen a rapid increase in malicious insider threats, sensitive data exfiltration, and other advanced
More informationAnalytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS
Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS Overview Cyberattacks are increasingly getting more frequent, more sophisticated and more widespread than ever
More informationPrescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC
Prescriptive Security Operations Centers Leveraging big data capabilities to build next generation SOC Cyber Security Industry in constant renewal in 2016 and 2017 1 Tbps Mirai IoT Botnet broke the Internet
More informationOur Turbine got Hacked! Performing Forensic Investigations of Industrial Control Systems
Siemens Our Turbine got Hacked! Performing Forensic Investigations of Industrial Control Systems Heiko Patzlaff Restricted Siemens AG 2013. All rights reserved Page 2 The traditional approach to host forensics
More informationBased on Big Data: Hype or Hallelujah? by Elena Baralis
Based on Big Data: Hype or Hallelujah? by Elena Baralis http://dbdmg.polito.it/wordpress/wp-content/uploads/2010/12/bigdata_2015_2x.pdf 1 3 February 2010 Google detected flu outbreak two weeks ahead of
More informationEstablishing a Crime Gun Intelligence Program Within Your Agency/Region
Establishing a Crime Gun Intelligence Program Within Your Agency/Region Participants Ron Nichols, Firearm and Toolmark Examiner, Nichols Forensic Science Consulting Pamela Hofsass, Chief of Forensic Science
More informationGetting the best digital evidence is what matters XRY extracts more data faster, with full integrity
Getting the best digital evidence is what matters XRY extracts more data faster, with full integrity Successful investigations rely on fast, high quality extraction of data from mobile phones. Without
More informationTOMORROW IS HERE: THE FUTURE OF BUILDING THINGS
TOMORROW IS HERE: THE FUTURE OF BUILDING THINGS George White CEO & Co-Founder George White CEO, Co-Founder Dean Bowman, PE Bentley Fellow Kevin Halter Director Of Western U.S TOMORROW IS HERE: THE FUTURE
More informationTaming the Data Deluge With IBM Information Infrastructure The smart movement and management of information capacity growth without complexity
Rick Terry Information Infrastructure Evangelist ricterry@uk.ibm.com Taming the Data Deluge With IBM Information Infrastructure The smart movement and management of information capacity growth without
More informationThe UNIX file system! A gentle introduction"
ISA 785 Research in Digital Forensics The UNIX file system! A gentle introduction" ISA 785! Angelos Stavrou, George Mason University! File System Basics 2! Readings from the Textbook! Unix / EXT3! FAT/NTFS!
More informationIntroduction to Data Science
UNIT I INTRODUCTION TO DATA SCIENCE Syllabus Introduction of Data Science Basic Data Analytics using R R Graphical User Interfaces Data Import and Export Attribute and Data Types Descriptive Statistics
More informationDigital Forensics. Module 1 CS 996
Digital Forensics Module 1 CS 996 Instructors Dr. Frederick Scholl Office Hours: 5-6 PM, Mondays E-mail: freds@monarch-info.com Phone 212-869-4458 I am not a lawyer! Kulesh Shanmugasundaram Professor Nasir
More informationNOT PROTECTIVELY MARKED. Public SPA Board Meeting Date 15 December 2016 Assembly Room, Tulliallan, Alloa
Meeting Public SPA Board Meeting Date 15 December 2016 Location Assembly Room, Tulliallan, Alloa Title of Paper SPA Forensic Services Report Item Number 14 Presented By Tom Nelson, SPA Recommendation to
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationNoam Ikar R&DVP. Complex Event Processing and Situational Awareness in the Digital Age
Noam Ikar R&DVP Complex Event Processing and Situational Awareness in the Digital Age We need to correlate events from inside and outside the organization by a smart layer Cyberint CEO, Dec 2017. Wikipedia
More informationCurrent skills gap for capable CTI analysts: Training for forensics & analysis
Current skills gap for capable CTI analysts: Training for forensics & analysis WORKSHOP CTI EU Bonding EU Cyber Threat Intelligence 30-31 October, Link Campus University, Rome, Italy Ing. Selene Giupponi
More informationOXYGEN SOFTWARE OXYGEN FORENSIC KIT
OXYGEN SOFTWARE OXYGEN FORENSIC KIT Oxygen Forensic Kit complete out-of-the-box solution When to start? Immediately! Oxygen Forensic Kit is a complete set you can quickly use right out of the box. It does
More informationUniversity ICT Security Certification. Francesco Ciclosi, University of Camerino
University ICT Security Certification Francesco Ciclosi, University of Camerino 1 Is secure an organization complies with the standard ISO/IEC 27001? TRUE FALSE Is the standard ISO/IEC 27001 a metric of
More information2017 INVESTMENT MANAGEMENT CONFERENCE NEW YORK Big Data: Risks and Rewards for Investment Management
2017 INVESTMENT MANAGEMENT CONFERENCE NEW YORK Big Data: Risks and Rewards for Investment Management Derek N. Steingarten, New York Julia B. Jacobson, Boston Barbara Bridges, VP of Legal & Compliance,
More informationChallenges and Opportunities with Big Data. By: Rohit Ranjan
Challenges and Opportunities with Big Data By: Rohit Ranjan Introduction What is Big Data? Big data is data sets that are so voluminous and complex that traditional data processing application software
More informationISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002
ISO 27002 COMPLIANCE GUIDE How Rapid7 Can Help You Achieve Compliance with ISO 27002 A CONTENTS Introduction 2 Detailed Controls Mapping 3 About Rapid7 8 rapid7.com ISO 27002 Compliance Guide 1 INTRODUCTION
More informationComputer forensics Aiman Al-Refaei
Computer forensics Aiman Al-Refaei 29.08.2006 Computer forensics 1 Computer forensics Definitions: Forensics - The use of science and technology to investigate and establish facts in criminal or civil
More informationDigital Forensics. Also known as. General definition: Computer forensics or network forensics
TEL2813/IS2621 Security Management James Joshi Associate Professor Lecture 3 Jan 29, 2014 Introduction ti to Digital Forensics Digital Forensics Also known as Computer forensics or network forensics General
More informationGetting the best digital evidence is what matters XRY extracts more data faster, with full integrity
Getting the best digital evidence is what matters XRY extracts more data faster, with full integrity Successful investigations rely on fast, high quality extraction of data from mobile phones. Without
More informationUnit code: D/601/1939 QCF Level 5: BTEC Higher National Credit value: 15
Unit 49: Digital Forensics Unit code: D/601/1939 QCF Level 5: BTEC Higher National Credit value: 15 Aim To provide learners with an understanding of the principles of digital forensics and the impact on
More informationNew Model for Cyber Crime Investigation Procedure
New Model for Cyber Crime Investigation Procedure * *Dept. of IT & Cyber Police, Youngdong University, Rep. of Korea ydshin@youngdong.ac.kr doi:10.4156/jnit.vol2.issue2.1 Abstract In this paper, we presented
More informationCOMPUTER FORENSICS (CFRS)
Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics
More informationEmbedded Technosolutions
Hadoop Big Data An Important technology in IT Sector Hadoop - Big Data Oerie 90% of the worlds data was generated in the last few years. Due to the advent of new technologies, devices, and communication
More informationDigital Forensics Lecture 01- Disk Forensics
Digital Forensics Lecture 01- Disk Forensics An Introduction to Akbar S. Namin Texas Tech University Spring 2017 Digital Investigations and Evidence Investigation of some type of digital device that has
More informationAndroid Forensics: Investigation, Analysis And Mobile Security For Google Android PDF
Android Forensics: Investigation, Analysis And Mobile Security For Google Android PDF Android Forensics: Investigation, Analysis, and Mobile Security for Google Android examines the Android mobile platform
More informationSkills Academy. Forensic Studies Courses
Skills Academy Forensic Studies Courses www.skillsacademy.co.za Forensic Science Programmes Forensic Science Studies is for the person who wants to work in a laboratory or as a crime scene technician and
More informationVideo Forensics: WHAT YOU NEED TO KNOW
An Agency Under MOSTI Video Forensics: WHAT YOU NEED TO KNOW Presented by: MOHD SHARIZUAN B MOHD OMAR Digital Forensics Analyst sharizuan@cybersecurity.my +60389926935 Copyright 2008 CyberSecurity Malaysia
More informationBig Data Issues for Federal Records Managers
Big Data Issues for Federal Records Managers ARMA Metro Conference April 26, 2017 Lisa Haralampus Director, Federal Records Management Policy and Outreach Section Office of the Chief Records Officer for
More informationR318 - Specific Requirements: Forensic. Examination Accreditation Program - Inspection
Page 1 of 6 Examination Accreditation Program - October 2015 2015 by A2LA. All rights reserved. No part of this document may be reproduced in any form or by any means without the prior written permission
More informationLaboratory Accreditation Board
The purpose of this RFQ is to solicit proposals to have the five regional forensic crime laboratories within the New Jersey State Police Office of Forensic Sciences assessed to the ISO/IEC 17025 international
More informationBig data. Professor Dan Ariely, Duke University.
Big data BIG DATA is like teenage sex: everyone talks about it, nobody really knows how to do it, everyone thinks everyone else is doing it, so everyone claims they are doing it... Professor Dan Ariely,
More informationVirtuoso Infotech Pvt. Ltd.
Virtuoso Infotech Pvt. Ltd. About Virtuoso Infotech Fastest growing IT firm; Offers the flexibility of a small firm and robustness of over 30 years experience collectively within the leadership team Technology
More informationData Governance Industrial Internet & Big Data
Data Governance Kari Hiekkanen 29.3.2018 CS-E5340 Introduction to Industrial Internet Industrial Internet & Big Data (IDC Data Age 2025, April 2017) 1 Industrial Internet & Big Data (Statista, 2017) Data
More informationJohn Snare Chair Standards Australia Committee IT/12/4
John Snare Chair Standards Australia Committee IT/12/4 ISO/IEC 27001 ISMS Management perspective Risk Management (ISO 31000) Industry Specific Standards Banking, Health, Transport, Telecommunications ISO/IEC
More informationGPU Accelerated Data Processing Speed of Thought Analytics at Scale
GPU Accelerated Data Processing Speed of Thought Analytics at Scale The benefits of Brytlyt s GPU Accelerated Database Brytlyt is an ultra-high performance database that combines patent pending intellectual
More informationABSTRACT. different digital devices to obtain evidence. In order to describe the circumstances of the
ABSTRACT Computer forensics is the collection and analysis of data from the computers and different digital devices to obtain evidence. In order to describe the circumstances of the particular incident
More information2013 AWS Worldwide Public Sector Summit Washington, D.C.
2013 AWS Worldwide Public Sector Summit Washington, D.C. EMR for Fun and for Profit Ben Butler Sr. Manager, Big Data butlerb@amazon.com @bensbutler Overview 1. What is big data? 2. What is AWS Elastic
More informationAnonymized Social Media Datasets, Dark Networks, and Strategic Simulation
Anonymized Social Media Datasets, Dark Networks, and Strategic Simulation Corey Lofdahl Frank Witmer Prepared for the conference on, Human Security in The New Information Age: How Social Media Impacts
More informationNORTH CAROLINA STATE CRIME LABORATORY FY2015/2016 Annual Report
NORTH CAROLINA STATE CRIME LABORATORY FY2015/2016 Annual Report Justice and Public Safety Appropriations Committees Thursday, March 23, 2017 Raleigh, NC 1 Agenda Quality & Transparency Case Submissions
More informationConvergence and Collaboration: Transforming Business Process and Workflows
Convergence and Collaboration: Transforming Business Process and Workflows Steven Hagan, Vice President, Server Technologies 1 Copyright 2011, Oracle and/or its affiliates. All rights Convergence & Collaboration:
More informationWHITE PAPER. Distribution Substation Outage Investigations. Overview. Introduction. By Ahmad Shahsiah, Ph.D., P.E. March 2018
WHITE PAPER Distribution Substation Outage Investigations By Ahmad Shahsiah, Ph.D., P.E. March 2018 Overview Electrical distribution systems in the United States served approximately 152 million customers
More informationQuick Wins with Data Loss Prevention How to Make DLP Work for You
Quick Wins with Data Loss Prevention How to Make DLP Work for You Rich Mogull, CEO & Analyst Securosis, L.L.C. Mark Moroses, Assistant CIO, Continuum Health Partners John Dasher, Senior Director, Data
More informationBIG DATA & HADOOP: A Survey
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationCertification. Forensic Certification Management Board. Robert J. Garrett, Director
Certification Forensic Certification Management Board Robert J. Garrett, Director Crime Lab Accreditation and Certification Essentials National Clearinghouse for Science, Technology, and the Law What is
More informationAccessData offers a broad array of training options.
Forensics Training AccessData offers a broad array of training options. Our trainers have more than two centuries of cumulative experience in their respective fields. Take Advantage of the All Access Pass
More informationCOMPUTER FORENSICS THIS IS NOT CSI COLORADO SPRINGS. Frank Gearhart, ISSA Colorado Springs
COMPUTER FORENSICS THIS IS NOT CSI COLORADO SPRINGS Frank Gearhart, ISSA Colorado Springs TECHNOLOGY + INVESTIGATION + STORYTELLING Know the case Find the evidence Follow the facts Create the timeline
More informationGlobal Cybercrime Certification
Global Cybercrime Certification Yves Vandermeer ECTEG chair yves.vandermeer@ Way to a new IT crime ecosystem Standard Operation Procedures and Education docs ACPO - Good Practice Guide For Digital Evidence
More informationDIGITAL EVIDENCE TOOL BOX
DIGITAL EVIDENCE TOOL BOX Toolbox Page 1 of 23 Introduction This guide is meant to provide a basic understanding of the industry standards, best practices and practical applications for the use of digital
More information