corrupt files_prof c

Upload: harley-quinn

Post on 04-Jun-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 Corrupt Files_Prof C

    1/10

    W E L L , I F I E A T I T , A N D I F I T M A K E S M E

    G R O W L A R G E R , I C A N R E A C H T H E K E Y ; A N DI F M A K E S M E G R O W S M A L L E R , I C A N C R E E PU N D E R T H E D O O R : S O E I T H E R W A Y I ' L L G E T

    I N T O T H E G A R D E N , A N D I D O N ' T C A R EW H I C H H A P P E N S ! - A L I C E ' S A D V E N T U R E S

    I N W O N D E R L A N D ( 1 8 6 5 )

    Computer Forensics CJ 317Dr. Joe Ciccone Week 6

    RIP Dep. Chief Maxwell (photo below the Lead Inv. For the Rape Case)

  • 8/13/2019 Corrupt Files_Prof C

    2/10

    Last Week & Grade Review

    Midterm Comments Time line

    Practical Application (This Week)

    PLEASE BE ON TIME with your Project this week!

  • 8/13/2019 Corrupt Files_Prof C

    3/10

  • 8/13/2019 Corrupt Files_Prof C

    4/10

    SARA Project Analyzing Privacy

    SARA is a problem-solving model. It stands forScanning, Analysis, Response, and Assessment.

  • 8/13/2019 Corrupt Files_Prof C

    5/10

    Project Week 6 Due Tomorrow

    Case Project 9-2: Combine these cases Several graphic files were transmitted via e-mail from an unknown

    source to a suspect in an ongoing investigation. The lead investigatorgives you these graphics files and tells you that at least four messages

    should be embedded in them. Use your problem solving andbrainstorming skills to determine a procedure to follow.

    Case Project 9-3: A drive that you are investigating contains several password-protected

    files and other files with headers that do not match the extension. What

    procedures would you need to follow to retrieve the evidence? Identifythe mismatched file headers to extensions and discuss techniques youcan apply to recover passwords from the protected files.

    3 Pages

  • 8/13/2019 Corrupt Files_Prof C

    6/10

    Unit 7 : Case 10-3 & 10-4

    You are investigating a case involving an employeewho is allegedly sending inappropriate photos via e-mail in attachments that have been compressed with azip utility. As you examine the employees hard diskdrive, you will find a file named orkty.zip, which yoususpect is a graphic file. When you try to open the filein an image viewer, a message is displayed indicatingthat the file is corrupt. Write a 2-3 page report

    explaining how to recover the file, orkty.zip, forfurther investigation. Case Project 10-4: You work for a mid-sized corporation known for its

    inventions that does a lot of copyright and patentwork. You are investigating an employee suspected ofselling and distributing animations created for yourcorporation. During your investigations of the

    suspects drive, you find some files with an unfamiliarextension of .cde. The network administratormentions that other .cde files have been sentthrough an FTP server to another site. Describe yourfindings after conducting an Internet search for .cdefiles.

  • 8/13/2019 Corrupt Files_Prof C

    7/10

    For Next Weeks Seminar

    Rebuilding File Headers

    Complete the exercise to repaira file header found on pages

    414 to 417. You will notice how

    straightforward it can be butbe aware that this is not always

    the case. Check this out before next

    weeks seminar let me knowwhat you think.

    http://rds.yahoo.com/_ylt=A0WTefishmFMSwoAXqeJzbkF;_ylu=X3oDMTBqY2pzbGhoBHBvcwMxMQRzZWMDc3IEdnRpZAM-/SIG=1g9q92gjs/EXP=1281546284/**http%3a//images.search.yahoo.com/images/view%3fback=http%253A%252F%252Fimages.search.yahoo.com%252Fsearch%252Fimages%253Fp%253DGIS%2526ei%253DUTF-8%2526fr%253Dush-mail%2526fr2%253Dtab-web%26w=458%26h=489%26imgurl=www.worcestershirewildlifeconsultancy.org%252Fimages%252FGIS.jpg%26rurl=http%253A%252F%252Fwww.worcestershirewildlifeconsultancy.org%252FGIS.html%26size=69k%26name=GIS%2bjpg%26p=GIS%26oid=6241f4db681104c4%26fr2=tab-web%26no=11%26tt=2084846%26sigr=11p5qg1sl%26sigi=11oq2brct%26sigb=12jkkjkej
  • 8/13/2019 Corrupt Files_Prof C

    8/10

    GIS

    GIS (Geographic Information Systems) have apivotal role in assisting law enforcement in thedevelopment of strategic and tactical assessments.The most popular of those systems is ARCVIEW.

    Are there Privacy issues with this technology?

    How does it effect law enforcement personnel?

    Who can see where you are and how?

    http://rds.yahoo.com/_ylt=A0WTefishmFMSwoAXqeJzbkF;_ylu=X3oDMTBqY2pzbGhoBHBvcwMxMQRzZWMDc3IEdnRpZAM-/SIG=1g9q92gjs/EXP=1281546284/**http%3a//images.search.yahoo.com/images/view%3fback=http%253A%252F%252Fimages.search.yahoo.com%252Fsearch%252Fimages%253Fp%253DGIS%2526ei%253DUTF-8%2526fr%253Dush-mail%2526fr2%253Dtab-web%26w=458%26h=489%26imgurl=www.worcestershirewildlifeconsultancy.org%252Fimages%252FGIS.jpg%26rurl=http%253A%252F%252Fwww.worcestershirewildlifeconsultancy.org%252FGIS.html%26size=69k%26name=GIS%2bjpg%26p=GIS%26oid=6241f4db681104c4%26fr2=tab-web%26no=11%26tt=2084846%26sigr=11p5qg1sl%26sigi=11oq2brct%26sigb=12jkkjkejhttp://rds.yahoo.com/_ylt=A0WTefishmFMSwoAYKeJzbkF;_ylu=X3oDMTBqaHBscmZmBHBvcwMxMwRzZWMDc3IEdnRpZAM-/SIG=1g9ch655d/EXP=1281546284/**http%3a//images.search.yahoo.com/images/view%3fback=http%253A%252F%252Fimages.search.yahoo.com%252Fsearch%252Fimages%253Fp%253DGIS%2526ei%253DUTF-8%2526fr%253Dush-mail%2526fr2%253Dtab-web%26w=497%26h=341%26imgurl=www.kts.co.jp%252Fseijyou%252Ftrust_sys%252Fimg%252Fs_awase_gis.gif%26rurl=http%253A%252F%252Fwww.kts.co.jp%252Fseijyou%252Ftrust_sys%26size=34k%26name=s%2bawase%2bgis%2bgif%26p=GIS%26oid=37c0c619f758cc04%26fr2=tab-web%26no=13%26tt=2084846%26sigr=116ipqmgr%26sigi=11j6k3hma%26sigb=12jkkjkej
  • 8/13/2019 Corrupt Files_Prof C

    9/10

    CompStat NYPD Bernie Kerik

    CompStat involves the use of computer-generated statistics to analyze crime problemsand develop appropriate responses. COMPSTATis a process.

    The success of COMPSTAT as a process isprimarily because of the six core components.

    Mission Clarification: Internal Accountability: Geographic Organization of Operational

    Command: Organizational Flexibility: Data-Driven Problem Identification and

    Assessment: Innovative Problem-Solving Tactics

  • 8/13/2019 Corrupt Files_Prof C

    10/10

    Comments & Questions

    We are almost done check grades

    KEEP PROJECTS ON TIME how have I changed?

    Your ~ Questions & Concerns