cb7f314a69e83d005acb46273f20d7ad.ppt
- Количество слайдов: 114
1
2
Use of Computer Forensics
Types of Computer Abuse
Accountants Role in Computer Forensics 5
Investigative Options 6
7
8
9
Cyber. Crime
Types of Computer Crime
Email Image Spams
Cyberstalking Kay Scarpetta
The Italian Job
Cell Phone Evidence 101
Cell Phone Seizures
SIM and SD Cards SD holds photos – can be upgraded SIM identifies phone and owner and can be changed
Blackberry and i. Phone Remote Protection 21
22
Tools of the Trade 23
Surveillance Tools
Surveillance Tools
Surveillance Tools
Anti-Surveillance Tools
Private Eye and Chameleon 29
30
31
32
Keyword Search and E-Discovery 33
34
ipconfig/all 35
NSLookup 36
Sedona Conference and ESI Framework 37
38
ESI Retention Policy 39
E-Mail Retention Policy
Encryption 41
Encryption
Asymmetric or Public Key Encryption – Two Keys
Session Key (Symmetric)
Session Key is Protected
Data in Transit and at Rest
True. Crypt 49
50
51
Cost of Poor Retention Policy 52
Redacted E-mail and Privacy 53
IT Technologies Important to Accountants 54
55
56
AICPA Top 10 Technology Initiatives 57
Federal Rules of Evidence and Digital Data
Reinterpretation of FRE
Daubert Standards 61
New Federal Rules of Civil Procedure 62
Audit Command Language ACL 63
64
65 65
66
67 67
Cleansing Data
71 71
72 72
73 73
74 74
75 75
76
Small Business Owner Example
83 83
85
86
87
Rainbow Tables www. accessdata. com Rainbow Tables are precomputed, brute-force attacks. A brute-force attack is an attempt to recover a cryptographic key or password by trying every possible combination until the correct one is found. With a Rainbow Table, you can decrypt 40 bit encrypted files in seconds or minutes rather than days or weeks.
Beware the Unmanaged IM and Email 90
Beware the Unmanaged IM and Email Over 10, 000 U. S. laws and regulations apply to Instant Messaging and Email Retention!
92
93
94
www. crackpassword. com 95
Your Documents May Give Away Your Identity Right-click on the file (Word, Excel, Access, etc. ) and select Properties. You may find the name of the author. 96
Right-click your MS Word file document. Select Properties. If you have named your computer name as your own, you may wish to change it to an anonymous name. This person used his name for his computer. 97
Virtual Credit Cards
102
105
106
MD 5 Using Hash. Calc Note that three different algorithms were used to produce checksums or message digests. This ensures acceptance for legal or regulatory purposes and guarantees file integrity. 107
108
109
110
111
112
113
114