Professional Documents
Culture Documents
• Module Leader
– Benham Bazli
Mylonas Alexios
• Lecturer in Computer Security and Digital
Forensics
• BSc (Hons), MSc, PhD, FHEA
• T: +44 (0) 1785 353647
• O: K224
• E: alexios.mylonas@staffs.ac.uk
Students?
• You?
Module Structure
• 12 weeks
• One hour lecture (Every Friday)
– C328
– Theory and literature review
– Rules, regulations, guidelines and proceses
• One 2 hour tutorial (After Lecture)
– Lab (k113)
– Research & Practical
• Book: Bill Nelson et al (Guide toComputer Forensics& Investigations), 5th Ed, 2015, CENGAGE
Publishers
What am I going to learn?
How can I pass?
• Study hard!
– Practical in the lab
– Material per week
– Your own research
• Blackboard
– Assignment(s)
– Discussion forum
• Start the assignment early
Coursework
• 50% coursework (~300 word) – do not write a
book
• 50% written exam (please check with your
module leader!)
• Deadline 18/12/2015
• You need to shows good skills in your
coursework;
– Report writing
– Research skills
– Problem solving
– Presentation skills
– And………Time Management
What is Computer Crime?
• Breaches of Physical Security
• Industrial Espionage
• Software Attacks
• Cyber-bulleying
Computer Forensics
A computer can be either:
• The target of an attack
• A repository of information
• A tool in the committing of a crime
Computer as a target of an Attack
• Release a virus
• Hack a computer
• Download illegal material
• Collect sensitive information
Digital Forensics
Definition: Investigative technique to identify, collect,
examine, preserve and present digital information
– A Forensic investigator may provide expert
analysis & testimony in court of justice
– May work with /as law enforcement or
Cybersecurity companies
– May work in corporate investigations
– Civil litigation
– …or just re-track lost information
Computer Forensics Challenges
They were temporarily living apart for genuine reasons and April’s house had been recently
broken into.
April’s family had suspicions that Justin was responsible, citing affairs and financial difficulties,
and the police decided to search Justin’s computer.
What they found was a number of Google searches made by Justin a few months before the
shooting, including “Florida & divorce” and “trauma, cases, gunshot, right chest”. In addition, a
Guns n Roses track named Used To Love Her was downloaded around the same time and deleted
after his wife’s death. It includes the lyrics “I used to love her, but I had to kill her. I had to put her
six feet under and I can still hear her complain.”
Justin Barber was convicted of first-degree murder and sentenced to life in prison.
He later made an unsuccessful appeal against his life sentence citing that the evidence was purely
circumstantial.
Triage Vs. Traditional Forensics
• There is a trend within UK law enforcement
agencies towards triaging of devices at at
crime scene or prior to transfer of the device
Q/A