Computer Forensics. An Introduction. Seamus E. Byrne Director, Forensics, KordaMentha. For Bond University. 29 March 2011

Size: px
Start display at page:

Download "Computer Forensics. An Introduction. Seamus E. Byrne Director, Forensics, KordaMentha. For Bond University. 29 March 2011"

Transcription

1 1 Computer Forensics An Introduction Seamus E. Byrne Director, Forensics, KordaMentha For Bond University 29 March 2011

2 2 Disclaimer This presentation is made available by Seamus E. Byrne, an Australian legal practitioner, for educational purposes only. Content is not to be used as legal opinion or as a substitute to qualified matter-specific legal advice within your jurisdiction. All endeavours have been made to ensure content accuracy as at February 2011.

3 3 Your Presenter Seamus E. Byrne Bond Law Graduate, 2005 Director, Forensics, KordaMentha Australian Lawyer and Computer Forensics Expert (CISSP, CCE, EnCE) E-Discovery Advisor to S&P/ASX 200 and Fortune 500 companies Co-Author, LexisNexis Australia Federal Civil Litigation Precedents and Electronic Evidence (Second Edition)

4 4 Today Electronic Evidence Computer Forensics Definition Key Applications Personnel Tool Evolution Environments Stages

5 5 98% Documents stored in electronic form only

6 6 Electronic Documents Historical Perspective Industrial Revolution!! Typewriter Carbon paper Filing cabinet Information Revolution c. 1960! Mainframe computer Xerox photocopier Magnetic storage Information Revolution c.1985! Personal computer Computer networks Optical storage Information Revolution c ! Portable computing The Internet Solid-state storage

7 7 Electronic Documents Key Features Metadata or data about the data Easily copied to defy the physical concept of an authentic original Easily altered, even without human intervention, to blur integrity Easily deleted, and often, recovery may present an onerous task Easily mismanaged, particularly when the same electronic document is stored in, or synchronised to, many distributed locations The volume of electronic documents continues to increase

8 8 Understanding Data Storage - Hard Drives Hard Disk Drives (HDDs) are the most common primary data storage device for modern personal computers Spindle Platters Actuator (axis, arm and head) SATA Data Connector SATA Power Connector

9 9 Understanding Data Storage - Solid State Drives Solid State Drives (SSDs) are increasingly popular - no moving parts, greater reliability! Controller Flash Memory

10 10 Understanding Data Storage - Interface Connectors Internal SATA (Pictured) PATA/IDE SCSI SAS External USB Firewire esata

11 11 Understanding Data Storage Bytes are grouped into sectors Sectors are grouped into clusters A file system is used to store, organise and retrieve data in clusters A file system is located within a volume on a hard drive Multiple volumes can be stored on one hard drive using partitions

12 12 Understanding Data Storage Drive Partition Volume File System Cluster File

13 13 Understanding Data Storage - Common File Systems File Allocation Table (FAT) - Microsoft Windows (Legacy), Portable Storage New Technology File System (NTFS) - Microsoft Windows (Modern) Hierarchical File System (HFS) - Apple Macintosh Third Extended File System (ext3) - Linux Universal Disc Format (UDF) - Optical Storage Media (CD, DVD)

14 14 Understanding Data File Storage File A File B Index Table A A A B B B B B

15 15 Understanding Data File Deletion File A File B Index Table A A A B B B B B

16 16 Understanding Data Overwriting File A File B File C Index Table A A A C C B B B

17 17 Understanding Data Slack and Unallocated Space File A File B File C File D Index Table A A A Slack Unallocated C C D D B B

18 18 Understanding Data Formatting Index Table A A A B B B B B

19 19 Understanding Data Bits and Bytes Bit(s) Name Binary 1 Bit 0 or 1 4 Nibble Byte Word 32 Double Word (Dword) 64 Quad Word (Qword)

20 20 Understanding Data Bits and Bytes Volume Name Acronym 1000 B Kilobyte kb 1000 kb Megabyte MB 1000 MB Gigabyte GB 1000 GB Terabyte TB 1000 TB Petabyte PB 1000 PB Exabyte EB 1000 EB Zettabyte ZB 1000 ZB Yottabyte YB

21 21 Understanding Data Binary and Hex Computers understand numbers! Binary Represents 1 bit (0 or 1) Underpins our interaction with computer data Hexadecimal (Base16) Each hexadecimal character represents 4 bits or 1 nibble Uses A-F, 0-9

22 22 Understanding Data Converting Bin to Dec/Hex Second Nibble Byte First Nibble Calculate the decimal value - (1x8)+(1x2) = 10 Identify the hexadecimal character using the Lookup Table = A

23 23 Understanding Data Converting Bin to Dec/Hex Second Nibble Byte First Nibble Calculate the decimal value - (1x128)+(1x32)+(1x8)+(1x2)= 168 Identify the hexadecimal character using the Lookup Table = A2

24 24 Understanding Data ASCII American Standard Code for Information Interchange (ASCII) Traditional character encoding table for English language First released in 1963 Standard table consists of 128 characters (1-9, A-Z, etc.) - 7 bits Extended table consists of 256 characters - 8 bits = 1 byte

25 25 Understanding Data Converting Hex to ASCII Byte Hex d e e ASCII M a r i n e P d e. Use the hexadecimal to ASCII Lookup Table

26 26 Electronic Documents Metadata Metadata comes in two types System metadata is stored independently by the file system and managed by the computer s operating system Application metadata is typically embedded as part of the electronic document and managed by a specific software application Metadata is the primary difference between an electronic document in its native, electronic form and the same electronic document printed to paper

27 27 Electronic Documents Metadata

28 28 Electronic Documents Application Metadata System Metadata System and Application Metadata

29 29 Electronic Documents Application Metadata

30 30 Electronic Documents Application Metadata Received: from mail96.messagelabs.com ( ) by MEL-EX07-01.KordaMentha.local ( ) with Microsoft SMTP Server id ; Sat, 24 Jul :44: ! X-VirusChecked: Checked! X-Env-Sender: X-Msg-Ref: server-13.tower-96.messagelabs.com! ! !1! X-StarScan-Version: 6.2.4; banners=-,-,-! X-Originating-IP: [ ]! X-SpamReason: No, hits=0.0 required=7.0 tests=mail larger than max spam size! Received: (qmail invoked from network); 23 Jul :44: ! Received: from iconect-08.user.start.ca (HELO mail.iconect.com) ( ) by server-13.tower-96.messagelabs.com with SMTP; 23 Jul :44: ! Received: from mail.iconect.com ([ ]) by mail.iconect.com with Microsoft SMTPSVC( ); Fri, 23 Jul :44: ! X-MimeOLE: Produced By Microsoft Exchange V6.5! Content-Class: urn:content-classes:message! MIME-Version: 1.0! Content-Type: multipart/mixed; boundary="----_=_nextpart_001_01cb2a75.7f913340"! Subject: ALSP Webinar - Data Mapping! Date: Fri, 23 Jul :43: ! Message-ID: <2CDC05C [email protected]>! X-MS-Has-Attach:! X-MS-TNEF-Correlator:! Thread-Topic: ALSP Webinar - Data Mapping! Thread-Index: AcsqdXs7cAYPZBLVSfSF4VOg5xqtBA==! From: Victoria Edelman <[email protected]>! To: "Ahearn, Matthew J." <[email protected]>, "Fletcher, Courtney" <[email protected]>! Return-Path: [email protected]! X-OriginalArrivalTime: 23 Jul :44: (UTC) FILETIME=[7FB4D9D0:01CB2A75]

31 31 Electronic Documents Application Metadata

32 32 Electronic Documents Application Metadata

33 33 Electronic Evidence Evidentiary Considerations Documentation - Maintain detailed notes for all observations and tasks undertaken, including any errors encountered and mistakes made Chain of Custody - Maintain detailed custody logs, documenting all custody transfers, from collection to Court to destruction Evidence Copies - Remember Locard s exchange principle - Collect and analyse without (or with minimal) alteration Best Practice - Guidelines for the Management of IT Evidence (HB ), Standards Australia

34 34 Electronic Evidence Expert Opinion and Testimony How contentious is this matter? Do I require specialist expertise not readily possessed by the everyday information technology practitioner? Do I need to mitigate the risk of being unable to clearly explain the potential significance of electronic evidence?

35 35 Today Electronic Evidence Computer Forensics Definition Key Applications Personnel Tool Evolution Environments Stages Identification Preservation Analysis Reporting

36 36 Computer Forensics Definition The process of identifying, preserving, analysing and presenting electronic evidence in a manner that is legally acceptable in any judicial or administrative hearing (McKemmish, 1999) Also commonly referred to as digital forensics, e-forensics, forensic computing or forensic technology Applied to resolve uncertainty in relation to a digital event

37 37 Computer Forensics Why? Investigations Corporate Regulatory Insolvency Litigation Civil Criminal

38 38 Key Applications Civil Litigation Intellectual property (IP) infringement and theft Fraud and financial crime Contractual disputes Defamation and harassment Identity theft Misuse or unauthorised access to computing or Internet resources Electronic discovery (E-Discovery)

39 39 Key Applications Criminal Litigation Child pornography Serious fraud Drug trafficking Anti-terrorism

40 40 Key Applications Criminal Litigation s.3e Crimes Act 1914 (Cth) - Search and Seizure Three (3) conditions, seizure and removal s.3l(1a) - Permits Forensic Imaging Introduced per Cybercrime Act 2001 (Cth) Can secure for up to 24 hours to allow computer forensic experts to make copy Additional 72 hours can be requested s.3la - Assistance Orders R v ADJ [2005] VSCA 102 International Criminal Investigations May be facilitated by AFP or Interpol Subject to the Mutual Assistance in Criminal Matters Act 1987 (Cth)

41 41 Computer Forensics Standards and Guidelines ISO/IEC 17025:2005 Standard Forensic Laboratory (Electronic Evidence) Certification (NATA Technical Circular 9, 2008) - AFP now accredited! Guidelines for the Management of IT Evidence (HB )

42 42 Computer Forensics Personnel Little clarity as to roles largely driven by lack of resources and expertise First Responders (Digital Crime Scene) Identification Preservation Fact Witness Computer Forensic Practitioners Analysis and Presentation Expert Opinion

43 43 Computer Forensics Personnel - The Ideal Candidate Traditionally, on the job experience was considered sufficient Should possess multi-disciplinary background May possess tertiary qualifications May possess industry certifications Information Technology - CompTIA, Microsoft, Cisco Information Security - Security+, CISSP Computer Forensics (Neutral) - CCE, CFCE Computer Forensics (Vendor Specific) - EnCE, ACE Must possess demonstrated experience

44 44 Computer Forensics Personnel - Education Industry certifications are generally held in high regard Many Australian and international universities have started to offer tertiary qualifications relevant to computer forensics However, there is a deficiency of quality practical training Education is also required for law enforcement officers and lawyers to better understand the significance of electronic evidence

45 45 Computer Forensics Personnel - Regulation Limited metrics to performance benchmark practitioners Certifications Case law No governing body in Australia or internationally. ANZFSS traditionally hesitant to classify computer forensics as a true forensic discipline

46 46 Computer Forensics Personnel - Licensing Licensing Legislators in the USA and Australia are increasingly confusing private sector computer forensic practitioners for private investigators. This has controversially required many to attain the relevant licenses to be a PI within the jurisdictions they operate. Queensland The Security Providers Act 1993 (Qld) does not state whether those working as consultants or employees in the Internet and computer security industry are required to hold a licence. The Act regulates the manpower and technical sectors of the security industry relating to the protection of people and physical property. This includes the installation and maintenance of physical security equipment.

47 47 Computer Forensics Personnel - The Expert How contentious is this matter? Do you require specialist expertise not readily possessed by the everyday information technology practitioner? Do you need to mitigate the risk of being unable to clearly explain the potential significance of electronic evidence?

48 48 Computer Forensics Personnel - Best Practice Forensic Laboratory Certification (NATA Technical Circular 9, 2008) 5.2 Personnel should hold a Bachelor qualification, or equivalent, in a field of science; must be competent in the preservation and analysis of electronic evidence; must possess a multi-disciplinary appreciation; and must document and satisfy on-going training and continued competency evaluation requirements. Guidelines for the Management of IT Evidence (HB ) [2.2.6] Ensure that personnel involved in the design, production, collection, analysis and presentation of evidence have appropriate training, experience and qualifications to fulfil their role(s). [3.5.2] Persons conducting analysis of IT evidence should be suitably qualified for the role they are performing.

49 49 Computer Forensics Tool Evolution Reliant on hardware and software tools to expedite and automate tasks Due to human element, potential for both inherent failure and user error Standard Disclaimer - This assignment has been performed with the assistance of computer hardware and software tools available to me as at the date of preparation of this report

50 50 Computer Forensics Tool Evolution First Evolution Tools were command-line driven and required substantial technical expertise Second Evolution Tools with a graphical user interface (GUI) Often criticised as Nintendo forensics by First Evolution practitioners Third Evolution (Today) Tools with distributed processing to better manage large volumes of data Specific tools for specific purposes - Windows Registry, mobile phones, etc. Virtualisation

51 51 Computer Forensics Tool Evolution - EnCase Industry standard tool for computer forensics Automated recovery of deleted files Automated conversion of multiple data sources to a single timezone EnScripts - Facilitates automated case processing Searches, bookmarking and data export to other forensic tools GUI Layout Left pane - Tree Right pane - Table Bottom left - Viewer Bottom right - Filters

52 52

53 53 Computer Forensics Environments - Lab Secure facility for electronic evidence storage and analysis At least one (1) room with audited access Full suite of tools in contrast to Fly-Away Kit Standard Operating Procedure (SOP) ACPO (UK) NIST (USA) IOCE, SWGDE (International)

54 54 Computer Forensics Environments - Fly-Away Large majority of computer forensic work is performed in the field A well-prepared fly-away kit is essential What should your fly-away kit contain?

55 55 Computer Forensics Lab Management - Handling Forensic Laboratory Certification (NATA Technical Circular 9, 2008) 5.8 Handling of test and calibration items must have a documented evidence control system that appropriately caters for both physical and electronic evidence (including receipt, handling, protection and storage); must have procedures to ensure the integrity of evidence under its control; and must have a secure area for overnight and/or long-term storage of physical and electronic evidence. Guidelines for the Management of IT Evidence (HB ) [3.4.2] Contemporaneous notes [3.4.4] Chain of custody [3.2.3] Establishing the authenticity of electronic records

56 56 Computer Forensics Lab Management - Results Forensic Laboratory Certification (NATA Technical Circular 9, 2008) Assuring the quality of test and calibration results must monitor the performance of tests/examinations by using quality control procedures appropriate to the type and frequency of tests/examinations undertaken; and must clearly identify case records that have been reviewed, including reviewer and date of the review. Guidelines for the Management of IT Evidence (HB ) [3.2.5] Establishing the reliability of computer programs [3.3.1] Correct operation

57 57 Computer Forensics Lab Management - Calibration Forensic Laboratory Certification (NATA Technical Circular 9, 2008) Equipment calibration intervals must check write blockers and data acquisition tools for functionality and verify their fitness for use, upon use. Guidelines for the Management of IT Evidence (HB ) [3.2.5] Establishing the reliability of computer programs [3.3.1] Correct operation NIST Computer Forensic Tool Testing (CFTT) Program

58 58 Computer Forensics Lab Management - Environment Forensic Laboratory Certification (NATA Technical Circular 9, 2008) Accommodation and environmental conditions must have documented procedures for the authorisation of access to areas, both physical and electronic, within the laboratory; and must maintain records for time spent in the laboratory by authorised persons. Guidelines for the Management of IT Evidence (HB ) No direct coverage

59 59 Today Electronic Evidence Computer Forensics Definition Key Applications Personnel Tool Evolution Environments Stages

60 60 Computer Forensics Identification Types of electronic evidence required for preservation and analysis Sources of electronic evidence containing the types required Locations of the potential sources of electronic evidence Identify sufficient electronic evidence to support your contentions, but not jeopardise your efforts or exceed legal constraints

61 61 Computer Forensics Identification - Types Business Records Documents, spreadsheets, presentations, databases and transaction logs Communications Web browsing activity, , instant messaging (IM), voic , calendar entries, call logs Multimedia Images, audio and video Artefacts Recently logged-on users - Event Logs Recently accessed data files and folders - Registry, Shortcut (Link) Files Recently connected removable devices - Registry, Shortcut (Link) Files, Event Logs Recently deleted data files - Recycle Bin, INFO2 Files Recently accessed web sites - History, Cookies, Cache

62 62 Computer Forensics Identification - Sources Personal Computers! Desktop and Notebook Removable Devices (Floppy, CD/DVD, USB) Computer Servers! File Internet (Web, ) Database Remote Access Storage (NAS, SAN, Tape) Communication! Mobile Phone Smartphone and PDA GPS Navigation System Multifunction Printer Multimedia! Media Player (ipod) Digital Still/Video Camera Digital Voice Recorder Digital Video Recorder Gaming (PS3, XBox)

63 63 Computer Forensics Identification - Web Sources Social Networking! Facebook Hi5 LinkedIn MySpace Second Life Content Sharing! Google Blogger Google Docs Salesforce CRM YouTube Communication! IM (MSN, QQ) VoIP (Skype) Twitter BlackBerry Messenger Commerce! Share Trading Banking Auctions (ebay) Shopping (Amazon)

64 64 Computer Forensics Identification - Locations Location is both electronic and physical Synchronisation means the same data may be located in multiple locations and you must efficiently prioritise (e.g. BlackBerry = Outlook = Exchange) Virtualisation technology is used to allow multiple computers to transparently operate from one physical computer Physical location may mean a source is difficult or unlawful to access

65 65 Computer Forensics Identification - Real World Location! Commercial Residential Time! Available Day/Night Resources! Personnel Equipment Utilities Distractions! Police Lawyers Disgruntled Employees Emotional Family

66 66 Computer Forensics Identification Case Study

67 67 Computer Forensics Identification Case Study

68 68 Computer Forensics Identification Case Study

69 69 Computer Forensics Identification Case Study

70 70 Computer Forensics Identification Case Study

71 71 Computer Forensics Identification Case Study

72 72 Computer Forensics Preservation Once sources of digital evidence have been identified, steps should be taken to ensure that it is preserved for collection and analysis Preservation also includes understanding that some data may not be preserved Volatile data - Data that is no longer available after a short time or once computer loses power (e.g. temporary system data, RAM memory) Non-volatile data - Data that remains available even when computer loses power (e.g. user-created data stored on a hard drive)

73 73 Computer Forensics Preservation - Tools of the Trade Forensic Equipment! Forensic Computers Forensic Write Blockers Adapters, Cables, etc. Boot Disks and Dongles Wiped Storage Technical Equipment! Notebook, Pens, Pencils Computer Toolkit Digital Camera Handheld GPS (Time) Gloves, Torch, Batteries Transport! Evidence Bags Containers and Labels Portable UPS Select Spare Parts Legal Documents Safe Custody! Secure Storage Chain of Custody Logs

74 74 Computer Forensics Preservation - Types Physical Forensic Imaging Logical Forensic Imaging File Copy Purpose Exact copy of all data on a hard drive Includes all active and deleted data Includes all privileged and confidential data Exact copy of specific active data (e.g. all Microsoft Word documents on a hard drive returning search hits for the keyword wages ) Copy of specific active data (e.g. all Microsoft Word documents within a folder) Integrity Stored within an image Able to be verified using cryptographic hash (e.g. MD5, SHA-1, SHA-256) Stored within an image Able to be verified using cryptographic hash Unless a proven copy method is used, data is subject to alteration Notes Relatively slow but provides flexibility for detailed analysis Creation of forensic image for an average hard drive takes minutes (40GB-250GB) Relatively fast but analysis is limited to active data collected Increasingly accepted as the default e-discovery collection type Fast but analysis is limited to active data collected

75 75 Computer Forensics Preservation - Methods Purpose Method Notes Dead Data is collected after the computer is disconnected from standard operation Computer is disconnected by pulling the plug or graceful shutdown Hard drive is connected via a write blocker to a forensic computer Alternatively, forensic boot disk may be used Computer date and time is verified via BIOS Traditionally accepted Does not allow for most encrypted and volatile data Live Data is collected with minimal disruption to the computer s standard operation Connection is made to computer whilst in operation, directly or via network Computer date and time is verified via operating system analysis Efficient for matters involving a large number of computers and limited forensic resources Reduces traditional liability issues with shutting down mission critical computers Allows for collection of most encrypted and volatile data Increasingly accepted as the default e- discovery collection method

76 76 Computer Forensics Preservation - Write Blocker

77 77 Computer Forensics Preservation - Duplicator

78 78 Computer Forensics Preservation - Live Boot CD

79 79 Computer Forensics Preservation - Mobile Phones

80 80 Computer Forensics Analysis Analysis generally involves the reconstruction of past electronic events What is the event? Who caused the event? When did the event occur? How did the event occur?

81 81 Computer Forensics Lab Management - Validation Forensic Laboratory Certification (NATA Technical Circular 9, 2008) Test and calibration methods and method validation is not required, at this stage, to attach an estimation of uncertainty measurement to nonnumeric test results; is encouraged, where possible, to have an understanding of the variability of their results; may need to consider uncertainty measurements attached to the measurement of time using the system clock. Guidelines for the Management of IT Evidence (HB ) [3.5.3] Completeness of evidence [3.2.2] Identifying the author of electronic records [3.2.3] Establishing the authenticity of electronic records [3.2.4] Establishing the time and date a particular computer electronic record was created

82 82 Computer Forensics Analysis - Casey s Certainty Scale Certainty Level Evidence Description Qualification C0 Contradicts known facts Incorrect C1 Highly questionable Highly uncertain C2 One source of evidence that is not protected against tampering Somewhat uncertain C3 One or more sources that are more difficult to tamper with Possible Insufficient evidence to support a firm conclusion C4 One or more sources that are protected against tampering Probable Verified by independent sources C5 One or more sources that are protected against tampering Verified by independent sources that are also protected against tampering Almost certain C6 Tamper proof and unquestionable Certain* Scale Copyright 2004 Eoghan Casey.

83 83 Computer Forensics Analysis - Case Study 1 John s purebred dog, Rex, became ill and was taken to Frank, a veterinarian Frank prescribed Rex some experimental medicine Rex s health deteriorated to the point where he was unable to breed John sues Frank for professional negligence As part of the discovery process, Frank provided a printout of his observation notes recorded in his computerised practice management system

84 84 Computer Forensics Analysis - Case Study 1 The observation notes state Treated Rex with experimental medicine Frank suspects that the observation notes were altered as his invoice only states Treated Rex with medicine You forensically analyse the database associated with the Frank s practice management software You recover and forensically analyse deleted backups of the database stored on Frank s computer server You identify that the practice management software has audit trail features The audit trail illustrates that the observation notes were actually changed after the commencement of legal proceedings

85 85 Computer Forensics Analysis - Case Study 2 John recently purchased Michael s business John has identified an anomaly between reports generated by the business computerised accounting system software and an invoice dated 1 January 2008 provided prior to purchase by Michael, as a paper printout John can find no record of the invoice in the accounting system The invoice also looks slightly different to invoices typically produced by the accounting system John believes that Michael may have forged the invoice

86 86 Computer Forensics Analysis - Case Study 2 You perform a keyword search for the term invoice and manually review the results to identify a folder on the hard drive named Unsorted Invoices The folder contains one (1) deleted Microsoft Excel spreadsheet You recover the deleted spreadsheet and identify that the spreadsheet is password-protected Using a password cracking utility, you identify the spreadsheet s password as secret123 You access the spreadsheet contents and it appears to match the printed invoice previously provided

87 87 Computer Forensics Analysis - Case Study 2 The spreadsheet s file system and document metadata reflects that the spreadsheet containing the invoice was created on 1 November 2008, 11 months after it was purportedly issued Document metadata reflects that the spreadsheet was created by the computer user Michael and was last printed on 1 November 2008 You analyse the Print Spool folder and recover deleted artefacts which support the contention that a copy of the spreadsheet was printed from the computer on 1 November 2008 You perform a timeline analysis of activity on the hard drive and analyse other available artefacts to verify operational reliability of the computer, including the computer clock s date and time

88 88 Computer Forensics Analysis - Case Study 3 Michelle is employed by John in a senior role in his business Michelle receives a lucrative offer from a competitor and resigns Two weeks after Michelle s resignation, John receives a number of phone calls from customers Each customer has received highly discounted offers from Michelle s new employer John calls his lawyer, and you, as a computer forensic practitioner

89 89 Computer Forensics Analysis - Case Study 3 You reconstruct web browsing activity from Michelle s former computer to reveal that she had spent a large part of time in her last fortnight on social networking websites The computer also revealed that Michelle had installed and used Evidence Eliminator software the day before she left. You identify that Michelle had tried to delete a number of personal messages and documents You reconstruct Windows Registry and relevant log files to identify that an Apple ipod (SN: ) was connected via USB to Michelle s computer a number of times in Michelle s last fortnight You analyse link (shortcut) files to identify that a file matching the file name of John s master customer database was accessed in the day before Michelle s departure

90 90 Analysis Searches Key Custodians or Sources Date Ranges File Types Search Queries Keywords Concept Searching Clustering De-Duplication Exact De-duplication (MD5 Hash Values = Digital Fingerprints for a File) Near De-duplication Threading

91 91 bus bus OR buses?

92 92 anonymise anonymise OR anonymize? anonym* OR unknown OR hidden?

93 93 toll toll NOT toll-free? toll AND [keyword] NEAR/25 [keyword]?

94 94 virgin (Virgin Blue OR virgin blue OR Bluey OR VBA) NEAR/25 [keyword]?

95 95 Analysis Searches Image Copyright 2009 Clearwell Systems Inc.

96 96 Analysis Data Recovery Images Copyright 2011 evidence-eliminator.com

97 97 Analysis Passwords and Encryption Commonly Passworded Files Microsoft Office Files ( Easy, 2007 Hard) Portable Document Format (PDF) Files ZIP (Compressed) Archives Defeating Passwords and Encryption Social Engineering Dictionary Attack Brute Force Attack Rainbow Tables

98 98 Analysis Windows Artefacts Registry - The configuration of the Windows operating system and installed software applications Recycle Bin - The storage location of deleted files Event Logs - System and user activity logs Restore Points - Automatic backups of the Registry and other key system files Shadow Copies - Previous versions of files stored by Windows Shortcut (Link) Files - A file that is a shortcut to another file. Contains metadata about the target file. Can be created by Windows automatically (e.g. in the Recent Documents folder) or user-created

99 99 Analysis USB Devices Universal Serial Bus (USB) Devices USB Keys USB External Hard Drives RIM BlackBerry Apple ipod, iphone and ipad Recorded each time a USB Device is connected to a computer Last connected Device Manufacturer Device Model Serial Number

100 100 Analysis USB Devices Image Copyright 2011 Nirsoft.

101 101 Analysis Shortcut Files and USB Devices

102 102 Analysis Internet Intelligence WHOIS searches can be performed to identify the registered operator of a Domain Name (e.g. or operator of an Internet Protocol (IP) address (e.g ) DNS Lookup searches identify the IP address(es) associated with a Domain Name

103 103 Analysis Internet Intelligence Image Copyright 2011 dnstools.com

104 104 Analysis Web Browsers History - The History data file or database records a user s web browsing activity Cache - The Cache data file or database stores a temporary copy of web pages that have been recently accessed on the user s computer so that they can be displayed faster in the future Cookies - Text files that are used by web servers to track or manage a user s web browsing activity on a specific web site Private mode browsing - Enables a user to easily undertake a web browsing session without permanently storing History, Cache or Cookies

105 105 Analysis Web Intelligence - Google Image Copyright 2011 google.com

106 106 Analysis Web Intelligence - Spokeo Image Copyright 2011 spokeo.com

107 107 Analysis Web Intelligence - Wayback Image Copyright 2011 archive.org

108 108 Analysis Parts of an Header - The envelope that contains the metadata Body - The message content Attachments Important Notes s sent from Yahoo! Mail and Microsoft Hotmail/Live Mail can generally be traced to a public IP address - Google Mail (Gmail) cannot at this time Even with a public IP address - The may only trace to an organisation (not a specific user) or even an Internet cafe

109 109 Computer Forensics Analysis Image Copyright 2009 Clearwell Systems Inc.

110 110 Analysis Tracing Images Copyright 2011 ip-adress.com

111 111 Analysis Tracking Image Copyright 2011 readnotify.com

112 112 Computer Forensics Presentation Report preparation Prepare in accordance with Court requirements No standard layout Understand the audience Avoid technical terminology overload Use an appendix wisely Court attendance Potentially months or years later

113 113 Computer Forensics Presentation HIS HONOUR: Mr Couper? MR COUPER: I'll call Mr Byrne, if your Honour pleases. HIS HONOUR: Yes. MR COUPER: We'll see if all this technology is what it's cracked up to be. HIS HONOUR: Is that what you're going to ask Mr Byrne? MR COUPER: More or less, your Honour.

114 114 Computer Forensics Further Reading Reference Materials DOJ, Search and Seizure Manual (USA) NIJ, Electronic Crime Scene Investigation: A Guide for First Responders (USA) ACPO, Good Practice Guide for Computer-Based Electronic Evidence (UK) BS 10008, Evidential Weight and Legal Admissibility of Electronic Information AS HB , Guidelines for the Management of IT Evidence NATA, Technical Circular No 9 NIST, Computer Forensic Tool Testing Project (USA) Public Websites The Electronic Evidence Information Center Forensic Focus

115 115 Thank You If you have any questions or feedback regarding this presentation please contact Seamus E. Byrne Director, Forensics, KordaMentha !

Hands-On How-To Computer Forensics Training

Hands-On How-To Computer Forensics Training j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE

More information

MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1

MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1 MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:

More information

Incident Response and Computer Forensics

Incident Response and Computer Forensics Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident

More information

Digital Forensics, ediscovery and Electronic Evidence

Digital Forensics, ediscovery and Electronic Evidence Digital Forensics, ediscovery and Electronic Evidence By Digital Forensics What Is It? Forensics is the use of science and technology to investigate and establish facts in a court of law. Digital forensics

More information

E-Discovery. Disclaimer. Where Information Management and Litigation Meet

E-Discovery. Disclaimer. Where Information Management and Litigation Meet 1 Where Information Management and Litigation Meet Seamus E. Byrne For the Institute for Information Management Melbourne, Australia 27 April 2010 2 Disclaimer This presentation is made available by Seamus

More information

COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL)

COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL) COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL) COURSE DESCRIPTION: Computer Forensics is focused on teaching

More information

The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices

The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices Introduction As organizations rely more heavily on technology-based methods of communication, many corporations

More information

Digital Forensics. Larry Daniel

Digital Forensics. Larry Daniel Digital Forensics Larry Daniel Introduction A recent research report from The Yankee Group found that 67.6 percent of US households in 2002 contained at least one PC The investigators foresee three-quarters

More information

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 Just EnCase Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 What is e-discovery Electronically Stored Information (ESI) Discover or Monitor for Fraudulent Activity Tools used

More information

Overview of Computer Forensics

Overview of Computer Forensics Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National

More information

CDFE Certified Digital Forensics Examiner (CFED Replacement)

CDFE Certified Digital Forensics Examiner (CFED Replacement) Course: CDFE Certified Digital Forensics Examiner (CFED Replacement) Description: Price: $3,450.00 Category: Popular Courses Duration: 5 days Schedule: Request Dates Outline: COURSE OVERVIEW Computer Forensics

More information

DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,

DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević, DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE Vahidin Đaltur, Kemal Hajdarević, Internacional Burch University, Faculty of Information Technlogy 71000 Sarajevo, Bosnia

More information

Electronic documents questionnaire

Electronic documents questionnaire Electronic documents questionnaire (Civil Procedure Rules Practice Direction 31B) WARNING: Unless the court makes some other order, the answers given in this document may only be used for the purposes

More information

On the Trail of the Craigslist Killer: A Case Study in Digital Forensics

On the Trail of the Craigslist Killer: A Case Study in Digital Forensics On the Trail of the Craigslist Killer: A Case Study in Digital Forensics Presenters: Sharon Nelson and John Simek President and Vice President, Sensei Enterprises www.senseient.com [email protected];

More information

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene

More information

Digital Forensic Techniques

Digital Forensic Techniques Digital Forensic Techniques Namrata Choudhury, Sr. Principal Information Security Analyst, Symantec Corporation Professional Techniques T23 CRISC CGEIT CISM CISA AGENDA Computer Forensics vs. Digital Forensics

More information

Information Technologies and Fraud

Information Technologies and Fraud Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting Information Technologies for Fraud investigation A.

More information

Chapter 7 Securing Information Systems

Chapter 7 Securing Information Systems 1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,

More information

Digital Forensics Tutorials Acquiring an Image with FTK Imager

Digital Forensics Tutorials Acquiring an Image with FTK Imager Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,

More information

National District Attorneys Association National Center for Prosecution of Child Abuse. Computer Forensics for Prosecutors

National District Attorneys Association National Center for Prosecution of Child Abuse. Computer Forensics for Prosecutors National District Attorneys Association National Center for Prosecution of Child Abuse Computer Forensics for Prosecutors February 18-19, 2013 Portland, Oregon Detective Michael Smith Computer Crimes &

More information

C. All responses should reflect an inquiry into actual employee practices, and not just the organization s policies.

C. All responses should reflect an inquiry into actual employee practices, and not just the organization s policies. Questionnaire on Electronically Stored Information (May 2014) Comment The Questionnaire is intended to be a comprehensive set of questions about a company s computer systems. The extent to which you should

More information

Digital Forensics & e-discovery Services

Digital Forensics & e-discovery Services Digital Forensics & e-discovery Services U.S. Security Associates Digital Forensics & e-discovery Services 21st century fraud investigations require expert digital forensics skills to deal with the complexities

More information

Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065

Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation

More information

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis

More information

Scientific Working Group on Digital Evidence

Scientific Working Group on Digital Evidence Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification by e-mail before or contemporaneous to the introduction of this document, or

More information

Best Practices for Computer Forensics

Best Practices for Computer Forensics Scientific Working Group on Digital Evidence Best Practices for Computer Forensics Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification

More information

Discovery of Electronically Stored Information ECBA conference Tallinn October 2012

Discovery of Electronically Stored Information ECBA conference Tallinn October 2012 Discovery of Electronically Stored Information ECBA conference Tallinn October 2012 Jan Balatka, Deloitte Czech Republic, Analytic & Forensic Technology unit Agenda Introduction ediscovery investigation

More information

How To Answer A Question About Your Organization'S History Of Esi

How To Answer A Question About Your Organization'S History Of Esi Questionnaire on Electronically Stored Information (March 17, 2011) I. Definitions and Instructions A. ESI means electronically stored information as the term is used in the Federal Rules of Civil Procedure.

More information

BDO CONSULTING FORENSIC TECHNOLOGY SERVICES

BDO CONSULTING FORENSIC TECHNOLOGY SERVICES BDO CONSULTING FORENSIC TECHNOLOGY SERVICES MARCH 2013 AGENDA Introduction About BDO Consulting Computer Forensics & E-Discovery Practice Current Trends Case Studies Q&A Page 2 Michael Barba Managing Director,

More information

e-discovery Forensics Incident Response

e-discovery Forensics Incident Response e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:

More information

ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT

ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT ITU Session Four: Device Imaging And Analysis Mounir Kamal Q-CERT 2 Applying Forensic Science to Computer Systems Like a Detective, the archaeologist searches for clues in order to discover and reconstruct

More information

EnCase 7 - Basic + Intermediate Topics

EnCase 7 - Basic + Intermediate Topics EnCase 7 - Basic + Intermediate Topics Course Objectives This 4 day class is designed to familiarize the student with the many artifacts left behind on Windows based media and how to conduct a forensic

More information

Electronic evidence: More than just a hard drive. March 2015 Publication No. 15-02

Electronic evidence: More than just a hard drive. March 2015 Publication No. 15-02 Electronic evidence: More than just a hard drive March 2015 Publication No. 15-02 1 Introduction 2 Over the last decade, the computer hard drive has been the main point of data storage and therefore the

More information

Life Cycle of Records

Life Cycle of Records Discard Create Inactive Life Cycle of Records Current Retain Use Semi-current Records Management Policy April 2014 Document title Records Management Policy April 2014 Document author and department Responsible

More information

E-Discovery Technology Considerations

E-Discovery Technology Considerations E-Discovery Technology Considerations Presented by: Dave Howard Oregon Department of Justice Deputy CIO Topics E-Discovery Process Overview Sources of Electronically Stored Information (ESI) Data Maps

More information

Design and Implementation of a Live-analysis Digital Forensic System

Design and Implementation of a Live-analysis Digital Forensic System Design and Implementation of a Live-analysis Digital Forensic System Pei-Hua Yen Graduate Institute of Information and Computer Education, National Kaohsiung Normal University, Taiwan [email protected]

More information

Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI)

Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI) University of California, Merced Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI) Responsible Officials: Executive Vice Chancellor and Provost Vice Chancellor

More information

Digital Forensics for Attorneys Overview of Digital Forensics

Digital Forensics for Attorneys Overview of Digital Forensics Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence

More information

CAPABILITY STATEMENT. > Forensic Technology Team < Daniel Hains, Director t (07) 3228 4028 e [email protected] w www.vincents.com.

CAPABILITY STATEMENT. > Forensic Technology Team < Daniel Hains, Director t (07) 3228 4028 e dhains@vincents.com.au w www.vincents.com. CAPABILITY STATEMENT > Forensic Technology Team < Daniel Hains, Director t (07) 3228 4028 e [email protected] w www.vincents.com.au CAPABILITY FORENSIC TECHNOLOGY INDEX Page No. Introduction... 3

More information

Guide to Computer Forensics and Investigations, Second Edition

Guide to Computer Forensics and Investigations, Second Edition Guide to Computer Forensics and Investigations, Second Edition Chapter 4 Current Computer Forensics Tools Objectives Understand how to identify needs for computer forensics tools Evaluate the requirements

More information

Ten Deadly Sins of Computer Forensics

Ten Deadly Sins of Computer Forensics Ten Deadly Sins of Computer Forensics Cyber criminals take advantage of the anonymity of the Internet to escape punishment. Computer Forensics has emerged as a new discipline to counter cyber crime. This

More information

Digital Evidence and Computer Forensics

Digital Evidence and Computer Forensics Digital Evidence and Computer Forensics Don Mason Associate Director Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Objectives After this session, you will be able to:

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Cyber Security Training & Consulting Certified Digital COURSE OVERVIEW 5 Days 40 CPE Credits $3,000 Digital is the investigation and recovery of data contained in digital devices. This data is often the

More information

Guidelines on Digital Forensic Procedures for OLAF Staff

Guidelines on Digital Forensic Procedures for OLAF Staff Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to

More information

winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR

winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR Supervised by : Dr. Lo'ai Tawalbeh New York Institute of Technology (NYIT)-Jordan X-Ways Software Technology AG is a stock corporation

More information

EC-Council Ethical Hacking and Countermeasures

EC-Council Ethical Hacking and Countermeasures EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student

More information

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

Information Technology Audit & Forensic Techniques. CMA Amit Kumar Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student

More information

EnCase Portable. Extend Your Forensic Reach with Powerful Triage & Data Collection

EnCase Portable. Extend Your Forensic Reach with Powerful Triage & Data Collection GUIDANCE SOFTWARE EnCase Portable EnCase Portable Extend Your Forensic Reach with Powerful Triage & Data Collection GUIDANCE SOFTWARE EnCase Portable EnCase Portable Triage and Collect with EnCase Portable

More information

Computer Forensics as an Integral Component of the Information Security Enterprise

Computer Forensics as an Integral Component of the Information Security Enterprise Computer Forensics as an Integral Component of the Information Security Enterprise By John Patzakis 10/28/03 I. EXECUTIVE SUMMARY In addition to fending off network intrusions and denial of service attacks,

More information

Computer Forensics. Securing and Analysing Digital Information

Computer Forensics. Securing and Analysing Digital Information Computer Forensics Securing and Analysing Digital Information Aims What is a computer? Where is the evidence? Why is digital forensics important? Seizing evidence Encryption Hidden files and folders Live

More information

CITY UNIVERSITY OF HONG KONG. Information Classification and

CITY UNIVERSITY OF HONG KONG. Information Classification and CITY UNIVERSITY OF HONG KONG Handling Standard (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification

More information

Modern Digital Forensics!!

Modern Digital Forensics!! ISA 785 Research in Digital Forensics Modern Digital Forensics!! ISA 785! Angelos Stavrou, George Mason University! Modern Digital Forensics What s New 2! New Intellectual property concerns! IP/Brand related

More information

How To Store Data On A Computer (For A Computer)

How To Store Data On A Computer (For A Computer) TH3. Data storage http://www.bbc.co.uk/schools/gcsebitesize/ict/ A computer uses two types of storage. A main store consisting of ROM and RAM, and backing stores which can be internal, eg hard disk, or

More information

Technical Procedure for Evidence Search

Technical Procedure for Evidence Search Technical Procedure for Evidence Search 1.0 Purpose - The purpose of this procedure is to provide a systematic means of searching digital evidence in order to find data sought by the search authorization.

More information

What is Digital Forensics?

What is Digital Forensics? DEVELOPING AN UNDERGRADUATE COURSE IN DIGITAL FORENSICS Warren Harrison PSU Center for Information Assurance Portland State University Portland, Oregon 97207 [email protected] What is Digital Forensics?

More information

Updates Click to check for a newer version of the CD Press next and confirm the disc burner selection before pressing finish.

Updates Click to check for a newer version of the CD Press next and confirm the disc burner selection before pressing finish. Backup. If your computer refuses to boot or load Windows or if you are trying to restore an image to a partition the Reflect cannot lock (See here), and then you will have to start your PC using a rescue

More information

COURCE TITLE DURATION CompTIA A+ Certification 40 H.

COURCE TITLE DURATION CompTIA A+ Certification 40 H. COURCE TITLE DURATION CompTIA A+ Certification 40 H. Overview: The target student is anyone with basic computer user skills who is interested in: obtaining a job as an IT professional or PC technician.

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

Data storage, collaboration, backup, transfer and encryption

Data storage, collaboration, backup, transfer and encryption Data storage, collaboration, backup, transfer and encryption Scott Summers UK Data Archive Practical research data management 19 April 2016 Overview Looking after research data for the longer-term and

More information

CCE Certification Competencies

CCE Certification Competencies CCE Certification Competencies May 10, 2012 Page 1 The Certified Computer Examiner (CCE) has evolved into one of the most desired certifications in the computer forensics industry. The certification is

More information

Presentation Title Presentation Subtitle. The Unique Alternative to the Big Four

Presentation Title Presentation Subtitle. The Unique Alternative to the Big Four Presentation Title Presentation Subtitle The Unique Alternative to the Big Four Speaker Biography Tim L. Bryan, CPA/CFF/CITP, CISA, EnCE Senior Manager, Crowe Horwath LLP Forensic Technology Services Leader

More information

CAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. www.controlrisks.com DECEMBER 2013

CAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. www.controlrisks.com DECEMBER 2013 LEGAL TECHNOLOGIES AND COMPUTER FORENSICS DECEMBER 2013 Copyright Control Risks. All rights reserved. This document cannot be reproduced without the express written permission of Control Risks. Any reproduction

More information

NetWrix Server Configuration Monitor

NetWrix Server Configuration Monitor NetWrix Server Configuration Monitor Version 2.2 Quick Start Guide Contents NetWrix Server Configuration Monitor Quick Start Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW

More information

Successful ediscovery in a Bring Your Own Device Environment

Successful ediscovery in a Bring Your Own Device Environment IT@Intel White Paper Intel IT IT Best Practices IT Governance and IT Consumerization June 2012 Successful ediscovery in a Bring Your Own Device Environment Executive Overview Close collaboration between

More information

How to Avoid The Biggest Electronic Evidence Mistakes. Ken Jones Senior Technology Architect Pileum Corporation

How to Avoid The Biggest Electronic Evidence Mistakes. Ken Jones Senior Technology Architect Pileum Corporation How to Avoid The Biggest Electronic Evidence Mistakes Ken Jones Senior Technology Architect Pileum Corporation Why is Proper Handling of Electronic Data Important? Most of the evidence in your case isn

More information

Using Computer Forensics in your Investigations

Using Computer Forensics in your Investigations Deloitte Financial Advisory Services LLP Using Computer Forensics in your Investigations Presented to: ISACA Los Angeles Chapter Dave Nardoni January 12 th, 2010 Agenda Introduction Analytic & Forensic

More information

Overview. Timeline Cloud Features and Technology

Overview. Timeline Cloud Features and Technology Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers

More information

Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition

Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition APR. 08 Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition Cover photographs copyright 2001 PhotoDisc, Inc. NCJ 219941 Chapter 1. Electronic Devices: Types, Description,

More information

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced

More information

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING MODULE A INTRODUCTION TO COMPUTER FORENSICS AND NVESTIGATIONS A1.0 Explain concepts related to computer forensics. A1.1 This module is measured

More information

Forensics on the Windows Platform, Part Two

Forensics on the Windows Platform, Part Two 1 of 5 9/27/2006 3:52 PM Forensics on the Windows Platform, Part Two Jamie Morris 2003-02-11 Introduction This is the second of a two-part series of articles discussing the use of computer forensics in

More information

CYBER FORENSICS (W/LAB) Course Syllabus

CYBER FORENSICS (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 CYBER FORENSICS (W/LAB) Course Syllabus Course Number: CSFS-0020 OHLAP Credit: Yes OCAS Code: 8134 Course Length: 130 Hours Career Cluster: Information

More information

What You Should Know About ediscovery

What You Should Know About ediscovery KPMG FORENSIC What You Should Know About ediscovery By Pamela Quintero February 18, 2009 What Guidelines Are Available? The Sedona Canada Principles Working Group 7 (WG7) The purpose and intent of the

More information

The legal admissibility of information stored on electronic document management systems

The legal admissibility of information stored on electronic document management systems Softology Ltd. The legal admissibility of information stored on electronic document management systems July 2014 SOFTOLOGY LIMITED www.softology.co.uk Specialist Expertise in Document Management and Workflow

More information

VMware vsphere Data Protection 6.0

VMware vsphere Data Protection 6.0 VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application

More information

Email Archiving E-mail Compliance Storage Management Electronic Discovery

Email Archiving E-mail Compliance Storage Management Electronic Discovery Email Archiving E-mail Compliance Storage Management Electronic Discovery archiver Athena www.athenaarchiver.com Athena Archiver is a next-generation email and instant message archiving system which enables

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet

More information

ELEN 115 Computer Components and Peripherals

ELEN 115 Computer Components and Peripherals Course Outline Professor: Philip Ashman, M.Sc., P.Eng., CCAI Prerequisite: None Office: C330 Co-requisite: None Phone: (250) 762-5445 ext 4364 Lecture: 3 hrs/wk, Lab: 2.5 hrs/wk E-mail: [email protected]

More information

2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.

2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd. Acquisition and Tools COMP 2555: Principles of Computer Forensics Autumn 2014 http://www.cs.du.edu/2555 1 Planning Your Investigation! A basic investigation plan should include the following activities:!

More information

Operating Systems Forensics

Operating Systems Forensics Operating Systems Forensics Section II. Basic Forensic Techniques and Tools CSF: Forensics Cyber-Security MSIDC, Spring 2015 Nuno Santos Summary! Windows boot sequence! Relevant Windows data structures!

More information

Scene of the Cybercrime Second Edition. Michael Cross

Scene of the Cybercrime Second Edition. Michael Cross Scene of the Cybercrime Second Edition Michael Cross Chapter 1 Facing the Cybercrime Problem Head-On 1 Introduction 2 Defining Cybercrime 2 Understanding the Importance of Jurisdictional Issues 3 Quantifying

More information

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of

More information

Getting Physical with the Digital Investigation Process

Getting Physical with the Digital Investigation Process Getting Physical with the Digital Investigation Process Brian Carrier Eugene H. Spafford Center for Education and Research in Information Assurance and Security CERIAS Purdue University Abstract In this

More information

Computer Forensics Discipline

Computer Forensics Discipline Computer Forensics Discipline Technical Procedure Manual Computer Forensics Discipline Technical Procedure Manual Approved By: Date: Reviewed By: Date: Reviewed By: Date: Table of Contents General Flow

More information

Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014

Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014 Chapter Contents Operating Systems and File Management Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup Security

More information

Fall 2009. Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. [email protected].

Fall 2009. Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. mzali@just.edu. Fall 2009 Lecture 1 Operating Systems: Configuration & Use CIS345 Introduction to Operating Systems Mostafa Z. Ali [email protected] 1-1 Chapter 1 Introduction to Operating Systems An Overview of Microcomputers

More information