Synthesis - Lesson 3
Synthesis - Lesson 3
Lesson 6
Incident
Response
Must Know…
Components to be
processed for digital
ForensicData
Offenses under RA
Ca waw 10175
● CIA Offenses
● Computer related
Offenses
● Content related
Offenses
• Illegal Access
• Illegal Interception
fi d e n ti a l i ty
C - on • Data Interference
I - ntegrity
- v a i l a b i lity • System
A
Offenses Interference
• Misuse of Device
• Cybersquatting
C om p u t
er Computer related Forgery
Computer related Fraud
Related Computer related to
Offense Identity Theft
s
Cybersex
Content Child
related
Pornography
offenses Cyber libel
Lesson 4:
Preservation Orders
and Processes of
Cybercrime Warrants
and Duties of Law
Enforcent Agency
Types of Cybercrime
Must Know… Warrants
WDCD
Types of Computer WICD
Data WSSECD
Subscriber WECD
Contents of
I – Individual or entity names
D – Description in particular
application
M – Manner or Method by which
computer data will be
disclosed
O – Other relevant information
Lesson 5 :
Digital
Investigative
Plan
Digital Forensic Digital Investigative
Planning
Models
● Kruse and Heiser Models Pre search Investigative
● Warrant Preparation
Plan
● Casey Yale Model
and Reservation
● Rodney Mckemmish
Request
Model
● Intelligence Gathering
● PNP – ACG 5 – step
● Assembling a Forensic
Model
Investigation Team
● Planning the Search
Philippine National
Police Anti – 1. Identification
Cybercrime Group 2. Acquisition
3. Examination /