7 - Digital Literacy - Digital Forensics

7 - Digital Literacy - Digital Forensics
1 / 15
next
Slide 1: Slide

This lesson contains 15 slides, with interactive quizzes, text slides and 1 video.

Items in this lesson

7 - Digital Literacy - Digital Forensics

Slide 1 - Slide

Digital Forensics

Slide 2 - Mind map

KO: Introduce students to the concept of Digital Forensics.
All: Will be able to recall and understand the concept of digital forensics.
Most: Will be able to explain the importance of digital forensics in our digital age.
Some: Students will be able to use their knowledge of digital forensics to analyse case studies and identify how digital forensics could be used in different scenarios.

Slide 3 - Slide

Slide 4 - Video

What is the main purpose of digital forensics?
Why is this important?

Slide 5 - Open question

What situations can digital forensics be used as part of data recovery?

Slide 6 - Open question

Uses for digital forensics
System Failures: Digital forensics can be used to recover lost data and determine the cause of the failure.
Accidental Deletion: Digital forensics techniques can often recover deleted files.
Cybercrime Investigations: In cases of hacking, malware, or other cybercrimes, digital forensics can help recover compromised data and provide evidence for the investigation.
Disaster Recovery: Digital forensics can be used to recover data from damaged devices.
Insider Threats: If an employee or insider is suspected of misusing data or violating policy, digital forensics can be used to recover data and investigate.
Legal Proceedings: Digital forensics can be used to recover and analyze data that may serve as evidence in court cases.

Slide 7 - Slide

Case Study: The Stolen Painting

Slide 8 - Slide

A valuable painting has been stolen

It was last seen on Friday afternoon.

On Monday morning, it was missing.
The museum has given you:

CCTV logs of the entrances and exits.

Employee digital records.

Keycard system logs.


Slide 9 - Slide

Keycard System Log
| Timestamp                  | Door ID | Activity Type | User ID |
| 2024-04-19 09:00:00 | D1           | Entry                | U1          |
| 2024-04-19 09:05:00 | D2           | Entry               | U1           |
| 2024-04-19 09:30:00 | D1           | Entry                | U2          |
| 2024-04-19 10:00:00 | D2           | Entry               | U2           |
| 2024-04-19 13:00:00 | D2            | Exit                  | U1           |
| 2024-04-19 13:30:00 | D1             | Exit                  | U1           | 
| 2024-04-19 18:00:00 | D2           | Exit                  | U2           |
| 2024-04-19 18:30:00 | D1            | Exit                  | U2           |


Employee Digital Records
| Timestamp                  | Computer ID | Activity Type | User ID |
|----------------------------|-------------------|------------------|-----------|
| 2024-04-19 09:00:00 | PC1                    | Login              | U1           |
| 2024-04-19 09:30:00 | PC2                    | Login              | U2          |
| 2024-04-19 13:00:00 | PC1                      | Logout           | U1          |
| 2024-04-19 18:00:00 | PC2                     | Logout           | U2         |

CCTV Footage
| Timestamp                    | Camera ID | Activity Type | User ID |
|-----------------------------|----------------|------------------|-----------|
| 2024-04-19 09:00:00   | C1                  | Entry               | U1          |
| 2024-04-19 09:05:00   | C2                  | Entry               | U1         |
| 2024-04-19 09:30:00   | C1                   | Entry               | U2        |
| 2024-04-19 10:00:00   | C2                   | Entry               | U2        |
| 2024-04-19 13:00:00   | C2                   | Exit                   | U1        |
| 2024-04-19 13:30:00   | C1                    | Exit                   | U1        |
| 2024-04-19 18:00:00   | C2                   | Exit                   | U2       |
| 2024-04-19 18:30:00   | C1                    | Exit                   | U2       |

  
What information here might help solve the crime?
What can be learned from the sequence of events?
Who had access at the time of the crime?

Slide 10 - Slide

Which user do you think stole the painting, if any?

Slide 11 - Open question

What is the primary goal of digital forensics?
A
To prosecute cyber criminals
B
To recover lost data
C
To understand how and why a digital incident occurred
D
To repair damaged systems

Slide 12 - Quiz

Which of the following is a key aspect of digital forensics crime investigation?
A
Quickly making assumptions about the perpetrator
B
Ignoring the digital evidence if physical evidence is available
C
Following a systematic and documented approach to collect evidence
D
Focusing solely on high-tech crimes, like hacking or malware

Slide 13 - Quiz

Which of the following is a key aspect of data recovery using digital forensics?
A
Repairing broken systems.
B
Reading data from areas it usually can't be read from (RAM)
C
Following a systematic and documented approach to collect evidence.
D
Recovering stolen artworks.

Slide 14 - Quiz

One thing you've learned today that you found interesting

Slide 15 - Open question