corrupt files_prof c
TRANSCRIPT
-
8/13/2019 Corrupt Files_Prof C
1/10
W E L L , I F I E A T I T , A N D I F I T M A K E S M E
G R O W L A R G E R , I C A N R E A C H T H E K E Y ; A N DI F M A K E S M E G R O W S M A L L E R , I C A N C R E E PU N D E R T H E D O O R : S O E I T H E R W A Y I ' L L G E T
I N T O T H E G A R D E N , A N D I D O N ' T C A R EW H I C H H A P P E N S ! - A L I C E ' S A D V E N T U R E S
I N W O N D E R L A N D ( 1 8 6 5 )
Computer Forensics CJ 317Dr. Joe Ciccone Week 6
RIP Dep. Chief Maxwell (photo below the Lead Inv. For the Rape Case)
-
8/13/2019 Corrupt Files_Prof C
2/10
Last Week & Grade Review
Midterm Comments Time line
Practical Application (This Week)
PLEASE BE ON TIME with your Project this week!
-
8/13/2019 Corrupt Files_Prof C
3/10
-
8/13/2019 Corrupt Files_Prof C
4/10
SARA Project Analyzing Privacy
SARA is a problem-solving model. It stands forScanning, Analysis, Response, and Assessment.
-
8/13/2019 Corrupt Files_Prof C
5/10
Project Week 6 Due Tomorrow
Case Project 9-2: Combine these cases Several graphic files were transmitted via e-mail from an unknown
source to a suspect in an ongoing investigation. The lead investigatorgives you these graphics files and tells you that at least four messages
should be embedded in them. Use your problem solving andbrainstorming skills to determine a procedure to follow.
Case Project 9-3: A drive that you are investigating contains several password-protected
files and other files with headers that do not match the extension. What
procedures would you need to follow to retrieve the evidence? Identifythe mismatched file headers to extensions and discuss techniques youcan apply to recover passwords from the protected files.
3 Pages
-
8/13/2019 Corrupt Files_Prof C
6/10
Unit 7 : Case 10-3 & 10-4
You are investigating a case involving an employeewho is allegedly sending inappropriate photos via e-mail in attachments that have been compressed with azip utility. As you examine the employees hard diskdrive, you will find a file named orkty.zip, which yoususpect is a graphic file. When you try to open the filein an image viewer, a message is displayed indicatingthat the file is corrupt. Write a 2-3 page report
explaining how to recover the file, orkty.zip, forfurther investigation. Case Project 10-4: You work for a mid-sized corporation known for its
inventions that does a lot of copyright and patentwork. You are investigating an employee suspected ofselling and distributing animations created for yourcorporation. During your investigations of the
suspects drive, you find some files with an unfamiliarextension of .cde. The network administratormentions that other .cde files have been sentthrough an FTP server to another site. Describe yourfindings after conducting an Internet search for .cdefiles.
-
8/13/2019 Corrupt Files_Prof C
7/10
For Next Weeks Seminar
Rebuilding File Headers
Complete the exercise to repaira file header found on pages
414 to 417. You will notice how
straightforward it can be butbe aware that this is not always
the case. Check this out before next
weeks seminar let me knowwhat you think.
http://rds.yahoo.com/_ylt=A0WTefishmFMSwoAXqeJzbkF;_ylu=X3oDMTBqY2pzbGhoBHBvcwMxMQRzZWMDc3IEdnRpZAM-/SIG=1g9q92gjs/EXP=1281546284/**http%3a//images.search.yahoo.com/images/view%3fback=http%253A%252F%252Fimages.search.yahoo.com%252Fsearch%252Fimages%253Fp%253DGIS%2526ei%253DUTF-8%2526fr%253Dush-mail%2526fr2%253Dtab-web%26w=458%26h=489%26imgurl=www.worcestershirewildlifeconsultancy.org%252Fimages%252FGIS.jpg%26rurl=http%253A%252F%252Fwww.worcestershirewildlifeconsultancy.org%252FGIS.html%26size=69k%26name=GIS%2bjpg%26p=GIS%26oid=6241f4db681104c4%26fr2=tab-web%26no=11%26tt=2084846%26sigr=11p5qg1sl%26sigi=11oq2brct%26sigb=12jkkjkej -
8/13/2019 Corrupt Files_Prof C
8/10
GIS
GIS (Geographic Information Systems) have apivotal role in assisting law enforcement in thedevelopment of strategic and tactical assessments.The most popular of those systems is ARCVIEW.
Are there Privacy issues with this technology?
How does it effect law enforcement personnel?
Who can see where you are and how?
http://rds.yahoo.com/_ylt=A0WTefishmFMSwoAXqeJzbkF;_ylu=X3oDMTBqY2pzbGhoBHBvcwMxMQRzZWMDc3IEdnRpZAM-/SIG=1g9q92gjs/EXP=1281546284/**http%3a//images.search.yahoo.com/images/view%3fback=http%253A%252F%252Fimages.search.yahoo.com%252Fsearch%252Fimages%253Fp%253DGIS%2526ei%253DUTF-8%2526fr%253Dush-mail%2526fr2%253Dtab-web%26w=458%26h=489%26imgurl=www.worcestershirewildlifeconsultancy.org%252Fimages%252FGIS.jpg%26rurl=http%253A%252F%252Fwww.worcestershirewildlifeconsultancy.org%252FGIS.html%26size=69k%26name=GIS%2bjpg%26p=GIS%26oid=6241f4db681104c4%26fr2=tab-web%26no=11%26tt=2084846%26sigr=11p5qg1sl%26sigi=11oq2brct%26sigb=12jkkjkejhttp://rds.yahoo.com/_ylt=A0WTefishmFMSwoAYKeJzbkF;_ylu=X3oDMTBqaHBscmZmBHBvcwMxMwRzZWMDc3IEdnRpZAM-/SIG=1g9ch655d/EXP=1281546284/**http%3a//images.search.yahoo.com/images/view%3fback=http%253A%252F%252Fimages.search.yahoo.com%252Fsearch%252Fimages%253Fp%253DGIS%2526ei%253DUTF-8%2526fr%253Dush-mail%2526fr2%253Dtab-web%26w=497%26h=341%26imgurl=www.kts.co.jp%252Fseijyou%252Ftrust_sys%252Fimg%252Fs_awase_gis.gif%26rurl=http%253A%252F%252Fwww.kts.co.jp%252Fseijyou%252Ftrust_sys%26size=34k%26name=s%2bawase%2bgis%2bgif%26p=GIS%26oid=37c0c619f758cc04%26fr2=tab-web%26no=13%26tt=2084846%26sigr=116ipqmgr%26sigi=11j6k3hma%26sigb=12jkkjkej -
8/13/2019 Corrupt Files_Prof C
9/10
CompStat NYPD Bernie Kerik
CompStat involves the use of computer-generated statistics to analyze crime problemsand develop appropriate responses. COMPSTATis a process.
The success of COMPSTAT as a process isprimarily because of the six core components.
Mission Clarification: Internal Accountability: Geographic Organization of Operational
Command: Organizational Flexibility: Data-Driven Problem Identification and
Assessment: Innovative Problem-Solving Tactics
-
8/13/2019 Corrupt Files_Prof C
10/10
Comments & Questions
We are almost done check grades
KEEP PROJECTS ON TIME how have I changed?
Your ~ Questions & Concerns