1 / 6

Computer Forensics

Computer Forensics. CSI CSCI Pattern Matching. Andrew Burns Brian Norton. Forensics: Broad areas of study. Prevention Detection Analysis Steganography. Examples of Pattern Matching:. Steganography/Cryptology Use in everyday End-User computers

venus
Télécharger la présentation

Computer Forensics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Forensics CSI CSCI Pattern Matching Andrew Burns Brian Norton

  2. Forensics:Broad areas of study • Prevention • Detection • Analysis • Steganography

  3. Examples of Pattern Matching: • Steganography/Cryptology • Use in everyday End-User computers • Use in sophisticated projects such as human genome sequencing, law enforcement, journalism • Pattern Matching - our area of study in this project

  4. Iranian News photo(s) released to Agence France-Presse July 2008 Major US news outlets issue retractions days later.

  5. Project Description • Where we hope to go: • To develop a Pattern Matching program • For now: • Use of PX Binary Viewer • Preview of C Program • Later Steps: • MD5 Algorithms • System Baselining similar to a photograph - used as comparison tool.

  6. References • Computer Forensics Laboratory and Tools, G. A. Francia III and K. Clinton: Jacksonville State University - JCSC 20, 6 (June 2005) • Network Forensics, “Surviving Network Attacks” Ben Laurie, AL Digital, Queue, June 2004, pp 50-56 • Criminal Computer Forensics Management Ray Yeager, Kennesaw State University pp 168-174 • Wikipedia • “The role of key loggers in computer-based assessment forensics” • “System Baseling - A Forensic Perspective” K. Monroe, D Bailey • Invitation to Computer Science 3rd Ed. Schneider and Gersting

More Related