Note-2

Note-2 - CSE 494/598 Forensic Computing: Computer and...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
CSE 494/598 Forensic Computing: Computer and Network Forensics Prof. Gail-Joon Ahn Cyber Gazette ! DoD Information Assurance Scholarships ! Eligibility ! Domestic full-time students enrolled in IA concentration programs ! The application (nominations) deadline for the 2009-2010 academic year is February 28, 2009 . ! For more information: http://www.defenselink.mil/cio-nii/sites/iasp/
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Cyber Gazette ! General Dynamics C4 Systems: Software Engineers for both full-time and internship positions ! Requirements ! Extensive knowledge of Java programming ! Experience working in teams ! Must be able to attain United States Department of Defense Security Clearance (US Citizenship required) COURSE TOPICS ! Computing Basics ! File Systems ! Operating Systems ! Network ! Computer Forensic Principles ! AAA ! Rule of Evidence ! Computer Forensic Technologies and Tools ! Data Forensics ! Systems Forensics ! Network Forensics ! Incident Response ! Cybercrime Investigation ! Other Issues
Background image of page 2
IMPORTANT DATES ! First Day of Class: Jan 20, 2009 ! Group Formation Due: Jan 29, 2009 ! Exam #1: Feb 19, 2009 ! Spring Break: Mar 10 & 12, 2009 ! Exam #2: Mar 31, 2009 ! Class Project Due: Apr 23, 2009 ! Paper Report Due: Apr 28, 2009 ! Class Presentation: Apr 28/30, May 5, 2009 ! Exam #3 (Final): May 7, 2009 (12:10PM – 2:00PM) 5 6
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
7 Outline ! Computer Crime ! Computer Forensics ! Basic concept ! Brief history ! Other relevant disciplines ! Type of computer forensics ! Tools and resources 8 What is Computer Crime? ! A crime in which technology plays an important, and often a necessary, part. ! What about computer? ! the tool used in an attack ! the target of an attack ! used to store data related to criminal activity ! 3 generic categories ! Computer assisted ! e.g., fraud, child pornography ! Computer specific or targeted ! e.g., denial of service, sniffers, unauthorized access ! Computer incidental ! e.g., customer lists for traffickers
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 15

Note-2 - CSE 494/598 Forensic Computing: Computer and...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online