1 / 19

ITIS 4250 Computer Forensics

ITIS 4250 Computer Forensics. Chapter 3 The Investigator’s Office and Laboratory. Understanding Forensic Lab Certification Requirements . American Society of Crime Laboratory Directors (ASCLD) Guidelines for: Managing a lab Acquiring an official certification

johana
Download Presentation

ITIS 4250 Computer Forensics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ITIS 4250Computer Forensics Chapter 3 The Investigator’s Office and Laboratory

  2. Understanding Forensic Lab Certification Requirements • American Society of Crime Laboratory Directors (ASCLD) • Guidelines for: • Managing a lab • Acquiring an official certification • Auditing lab functions and procedures • www.ascld.org Guide to Computer Forensics and Investigations, 2e

  3. Lab Budget Planning • Check statistics from the Uniform Crime Report • For federal reports, see www.fbi.gov/ucr/ucr.htm Guide to Computer Forensics and Investigations, 2e

  4. Lab Budget Planning Numbers of Hard Drives used to Commit Crimes Guide to Computer Forensics and Investigations, 2e

  5. Lab Budget Planning Numbers of Hard Drives used to Commit Crimes Guide to Computer Forensics and Investigations, 2e

  6. Acquiring Certification and Training • Update your skills through appropriate certification & training • International Association of Computer Investigative Specialists (IACIS) www.cops.org Guide to Computer Forensics and Investigations, 2e

  7. Acquiring Certification and Training • High-Tech Crime Network (HTCN) • Certified Computer Crime Investigator • Basic and Advanced Level • Certified Computer Forensic Technician • Basic and Advanced Level • http://www.htcn.org/ Guide to Computer Forensics and Investigations, 2e

  8. Acquiring Certification and Training • Providers have their own certifications • EnCase • Certified Examiner Certification (EnCE) • http://www.guidancesoftware.com/ • Access Data • Access Data Certified Examiner (ACE) • http://www.accessdata.com • Paraben • http://www.paraben.com/ Guide to Computer Forensics and Investigations, 2e

  9. Conducting High-risk Investigations • TEMPEST facilities • Electromagnetic Radiation (EMR) proofed • http://nsi.org/Library/Govt/Nispom.html • Special rooms lined with conductive sheeting • Ventilation ducts baffled • Data lines filtered • Are very expensive; can use low-emanation workstations instead Guide to Computer Forensics and Investigations, 2e

  10. Considering Office Ergonomics Guide to Computer Forensics and Investigations, 2e

  11. EDR Solutions

  12. Determining Floor Plans for Computer Forensics Labs Guide to Computer Forensics and Investigations, 2e

  13. Determining Floor Plans for Computer Forensics Labs Guide to Computer Forensics and Investigations, 2e

  14. Determining Floor Plans for Computer Forensics Labs Guide to Computer Forensics and Investigations, 2e

More Related