9
THE WILD WILD WEST – WEEK 8 AND ONLY ONE MORE TO GO! Unit 8 – E-Mail & Cell Phones Dr. Joe Ciccone – CJ 317

THE WILD WILD WEST – WEEK 8 AND ONLY ONE MORE TO GO! Unit 8 – E-Mail & Cell Phones Dr. Joe Ciccone – CJ 317

Embed Size (px)

Citation preview

THE WILD WILD WEST – WEEK 8 AND ONLY ONE MORE TO GO!

Unit 8 – E-Mail & Cell Phones

Dr. Joe Ciccone – CJ 317

Last Week

Data Recovery and Investigations – How this could have been avoided? Who am I?

Sharing Information vs.ConfidentialityAny Last Minute IssueOne More Seminar to Go

Cell Phone & Mobile Device Forensics

Communication risks and issues for police officer

What challenges to official communications have in the world of forensics?

How can our own tools be used again us (police)?

Key Terms – Unit 8

Enhanced Simple Mail Transport Protocol (ESMTP): An enhancement of SMTP for sending and receiving e-mail messages. ESMTP generates a unique, nonrepeatable number that’s added to a transmitted e-mail. No two messages transmitted from an e-mail server have the same ESMTP value. See also Simple Mail Transfer Protocol (SMTP).

Phishing: A type of e-mail scam that’s typically sent as spam soliciting personal identity information that fraudsters can use for identity theft.

Spoofing: Transmitting an e-mail message with its header information altered so that its point of origin appears to be from a different sender. Spoofed e-mails are also referred to as forged e-mail. Spoofing is typically used in phishing and spamming to hide the sender’s identity.

Global System for Mobile Communications (GSM): A second-generation cellular network standard; currently the most popular cellular network type in the world.

Subscriber Identity Module (SIM) card: A removable card in GSM phones that contains information for identifying the phone’s subscriber. It might also store other information, such as messages and call history.

Cybercrime – how dangerous is it?

E-mail tampering is a serious offense and can result in court battles and much more.

Munshani v. Signal Lake Venture Capital Fund

Terrorizing as this one Where is this?What happened here?

What would we do with their cell-phones?

Issues with cell phones Criminal Use Victim Use Witnesses to crimes

Who are the Victims?Type of PC Crime?Can we take a life?How can we stop it?Who are we

Project – Case 12-1 (2 page Report)

You receive a call from a high school student named Marco, who claims he has just received an e-mail from another student threatening to commit suicide. Marco is not sure where the student sent the e-mail from. Write a brief report on how you would proceed, including what you should do first in this situation.

Project Part II – COMBINE both

A mother calls you to report that her 15 year-old daughter has run away from home. She has access to her daughters’ e-mail account and says that her daughter has several e-mails in her inbox suggesting that she has run away to be with a 35 year old woman. Write a brief report on how you should proceed.

Almost done - YOUR Questions

ALL LATE WORK DUE THIS WEEK!Questions and CommentsGrade book reviewSuggestions for the FINAL SeminarNext Week LAST seminarWeek 10 – NO seminar