Computer Forensics. An Introduction. Seamus E. Byrne Director, Forensics, KordaMentha. For Bond University. 29 March 2011
|
|
|
- Mavis Simpson
- 10 years ago
- Views:
Transcription
1 1 Computer Forensics An Introduction Seamus E. Byrne Director, Forensics, KordaMentha For Bond University 29 March 2011
2 2 Disclaimer This presentation is made available by Seamus E. Byrne, an Australian legal practitioner, for educational purposes only. Content is not to be used as legal opinion or as a substitute to qualified matter-specific legal advice within your jurisdiction. All endeavours have been made to ensure content accuracy as at February 2011.
3 3 Your Presenter Seamus E. Byrne Bond Law Graduate, 2005 Director, Forensics, KordaMentha Australian Lawyer and Computer Forensics Expert (CISSP, CCE, EnCE) E-Discovery Advisor to S&P/ASX 200 and Fortune 500 companies Co-Author, LexisNexis Australia Federal Civil Litigation Precedents and Electronic Evidence (Second Edition)
4 4 Today Electronic Evidence Computer Forensics Definition Key Applications Personnel Tool Evolution Environments Stages
5 5 98% Documents stored in electronic form only
6 6 Electronic Documents Historical Perspective Industrial Revolution!! Typewriter Carbon paper Filing cabinet Information Revolution c. 1960! Mainframe computer Xerox photocopier Magnetic storage Information Revolution c.1985! Personal computer Computer networks Optical storage Information Revolution c ! Portable computing The Internet Solid-state storage
7 7 Electronic Documents Key Features Metadata or data about the data Easily copied to defy the physical concept of an authentic original Easily altered, even without human intervention, to blur integrity Easily deleted, and often, recovery may present an onerous task Easily mismanaged, particularly when the same electronic document is stored in, or synchronised to, many distributed locations The volume of electronic documents continues to increase
8 8 Understanding Data Storage - Hard Drives Hard Disk Drives (HDDs) are the most common primary data storage device for modern personal computers Spindle Platters Actuator (axis, arm and head) SATA Data Connector SATA Power Connector
9 9 Understanding Data Storage - Solid State Drives Solid State Drives (SSDs) are increasingly popular - no moving parts, greater reliability! Controller Flash Memory
10 10 Understanding Data Storage - Interface Connectors Internal SATA (Pictured) PATA/IDE SCSI SAS External USB Firewire esata
11 11 Understanding Data Storage Bytes are grouped into sectors Sectors are grouped into clusters A file system is used to store, organise and retrieve data in clusters A file system is located within a volume on a hard drive Multiple volumes can be stored on one hard drive using partitions
12 12 Understanding Data Storage Drive Partition Volume File System Cluster File
13 13 Understanding Data Storage - Common File Systems File Allocation Table (FAT) - Microsoft Windows (Legacy), Portable Storage New Technology File System (NTFS) - Microsoft Windows (Modern) Hierarchical File System (HFS) - Apple Macintosh Third Extended File System (ext3) - Linux Universal Disc Format (UDF) - Optical Storage Media (CD, DVD)
14 14 Understanding Data File Storage File A File B Index Table A A A B B B B B
15 15 Understanding Data File Deletion File A File B Index Table A A A B B B B B
16 16 Understanding Data Overwriting File A File B File C Index Table A A A C C B B B
17 17 Understanding Data Slack and Unallocated Space File A File B File C File D Index Table A A A Slack Unallocated C C D D B B
18 18 Understanding Data Formatting Index Table A A A B B B B B
19 19 Understanding Data Bits and Bytes Bit(s) Name Binary 1 Bit 0 or 1 4 Nibble Byte Word 32 Double Word (Dword) 64 Quad Word (Qword)
20 20 Understanding Data Bits and Bytes Volume Name Acronym 1000 B Kilobyte kb 1000 kb Megabyte MB 1000 MB Gigabyte GB 1000 GB Terabyte TB 1000 TB Petabyte PB 1000 PB Exabyte EB 1000 EB Zettabyte ZB 1000 ZB Yottabyte YB
21 21 Understanding Data Binary and Hex Computers understand numbers! Binary Represents 1 bit (0 or 1) Underpins our interaction with computer data Hexadecimal (Base16) Each hexadecimal character represents 4 bits or 1 nibble Uses A-F, 0-9
22 22 Understanding Data Converting Bin to Dec/Hex Second Nibble Byte First Nibble Calculate the decimal value - (1x8)+(1x2) = 10 Identify the hexadecimal character using the Lookup Table = A
23 23 Understanding Data Converting Bin to Dec/Hex Second Nibble Byte First Nibble Calculate the decimal value - (1x128)+(1x32)+(1x8)+(1x2)= 168 Identify the hexadecimal character using the Lookup Table = A2
24 24 Understanding Data ASCII American Standard Code for Information Interchange (ASCII) Traditional character encoding table for English language First released in 1963 Standard table consists of 128 characters (1-9, A-Z, etc.) - 7 bits Extended table consists of 256 characters - 8 bits = 1 byte
25 25 Understanding Data Converting Hex to ASCII Byte Hex d e e ASCII M a r i n e P d e. Use the hexadecimal to ASCII Lookup Table
26 26 Electronic Documents Metadata Metadata comes in two types System metadata is stored independently by the file system and managed by the computer s operating system Application metadata is typically embedded as part of the electronic document and managed by a specific software application Metadata is the primary difference between an electronic document in its native, electronic form and the same electronic document printed to paper
27 27 Electronic Documents Metadata
28 28 Electronic Documents Application Metadata System Metadata System and Application Metadata
29 29 Electronic Documents Application Metadata
30 30 Electronic Documents Application Metadata Received: from mail96.messagelabs.com ( ) by MEL-EX07-01.KordaMentha.local ( ) with Microsoft SMTP Server id ; Sat, 24 Jul :44: ! X-VirusChecked: Checked! X-Env-Sender: X-Msg-Ref: server-13.tower-96.messagelabs.com! ! !1! X-StarScan-Version: 6.2.4; banners=-,-,-! X-Originating-IP: [ ]! X-SpamReason: No, hits=0.0 required=7.0 tests=mail larger than max spam size! Received: (qmail invoked from network); 23 Jul :44: ! Received: from iconect-08.user.start.ca (HELO mail.iconect.com) ( ) by server-13.tower-96.messagelabs.com with SMTP; 23 Jul :44: ! Received: from mail.iconect.com ([ ]) by mail.iconect.com with Microsoft SMTPSVC( ); Fri, 23 Jul :44: ! X-MimeOLE: Produced By Microsoft Exchange V6.5! Content-Class: urn:content-classes:message! MIME-Version: 1.0! Content-Type: multipart/mixed; boundary="----_=_nextpart_001_01cb2a75.7f913340"! Subject: ALSP Webinar - Data Mapping! Date: Fri, 23 Jul :43: ! Message-ID: <2CDC05C [email protected]>! X-MS-Has-Attach:! X-MS-TNEF-Correlator:! Thread-Topic: ALSP Webinar - Data Mapping! Thread-Index: AcsqdXs7cAYPZBLVSfSF4VOg5xqtBA==! From: Victoria Edelman <[email protected]>! To: "Ahearn, Matthew J." <[email protected]>, "Fletcher, Courtney" <[email protected]>! Return-Path: [email protected]! X-OriginalArrivalTime: 23 Jul :44: (UTC) FILETIME=[7FB4D9D0:01CB2A75]
31 31 Electronic Documents Application Metadata
32 32 Electronic Documents Application Metadata
33 33 Electronic Evidence Evidentiary Considerations Documentation - Maintain detailed notes for all observations and tasks undertaken, including any errors encountered and mistakes made Chain of Custody - Maintain detailed custody logs, documenting all custody transfers, from collection to Court to destruction Evidence Copies - Remember Locard s exchange principle - Collect and analyse without (or with minimal) alteration Best Practice - Guidelines for the Management of IT Evidence (HB ), Standards Australia
34 34 Electronic Evidence Expert Opinion and Testimony How contentious is this matter? Do I require specialist expertise not readily possessed by the everyday information technology practitioner? Do I need to mitigate the risk of being unable to clearly explain the potential significance of electronic evidence?
35 35 Today Electronic Evidence Computer Forensics Definition Key Applications Personnel Tool Evolution Environments Stages Identification Preservation Analysis Reporting
36 36 Computer Forensics Definition The process of identifying, preserving, analysing and presenting electronic evidence in a manner that is legally acceptable in any judicial or administrative hearing (McKemmish, 1999) Also commonly referred to as digital forensics, e-forensics, forensic computing or forensic technology Applied to resolve uncertainty in relation to a digital event
37 37 Computer Forensics Why? Investigations Corporate Regulatory Insolvency Litigation Civil Criminal
38 38 Key Applications Civil Litigation Intellectual property (IP) infringement and theft Fraud and financial crime Contractual disputes Defamation and harassment Identity theft Misuse or unauthorised access to computing or Internet resources Electronic discovery (E-Discovery)
39 39 Key Applications Criminal Litigation Child pornography Serious fraud Drug trafficking Anti-terrorism
40 40 Key Applications Criminal Litigation s.3e Crimes Act 1914 (Cth) - Search and Seizure Three (3) conditions, seizure and removal s.3l(1a) - Permits Forensic Imaging Introduced per Cybercrime Act 2001 (Cth) Can secure for up to 24 hours to allow computer forensic experts to make copy Additional 72 hours can be requested s.3la - Assistance Orders R v ADJ [2005] VSCA 102 International Criminal Investigations May be facilitated by AFP or Interpol Subject to the Mutual Assistance in Criminal Matters Act 1987 (Cth)
41 41 Computer Forensics Standards and Guidelines ISO/IEC 17025:2005 Standard Forensic Laboratory (Electronic Evidence) Certification (NATA Technical Circular 9, 2008) - AFP now accredited! Guidelines for the Management of IT Evidence (HB )
42 42 Computer Forensics Personnel Little clarity as to roles largely driven by lack of resources and expertise First Responders (Digital Crime Scene) Identification Preservation Fact Witness Computer Forensic Practitioners Analysis and Presentation Expert Opinion
43 43 Computer Forensics Personnel - The Ideal Candidate Traditionally, on the job experience was considered sufficient Should possess multi-disciplinary background May possess tertiary qualifications May possess industry certifications Information Technology - CompTIA, Microsoft, Cisco Information Security - Security+, CISSP Computer Forensics (Neutral) - CCE, CFCE Computer Forensics (Vendor Specific) - EnCE, ACE Must possess demonstrated experience
44 44 Computer Forensics Personnel - Education Industry certifications are generally held in high regard Many Australian and international universities have started to offer tertiary qualifications relevant to computer forensics However, there is a deficiency of quality practical training Education is also required for law enforcement officers and lawyers to better understand the significance of electronic evidence
45 45 Computer Forensics Personnel - Regulation Limited metrics to performance benchmark practitioners Certifications Case law No governing body in Australia or internationally. ANZFSS traditionally hesitant to classify computer forensics as a true forensic discipline
46 46 Computer Forensics Personnel - Licensing Licensing Legislators in the USA and Australia are increasingly confusing private sector computer forensic practitioners for private investigators. This has controversially required many to attain the relevant licenses to be a PI within the jurisdictions they operate. Queensland The Security Providers Act 1993 (Qld) does not state whether those working as consultants or employees in the Internet and computer security industry are required to hold a licence. The Act regulates the manpower and technical sectors of the security industry relating to the protection of people and physical property. This includes the installation and maintenance of physical security equipment.
47 47 Computer Forensics Personnel - The Expert How contentious is this matter? Do you require specialist expertise not readily possessed by the everyday information technology practitioner? Do you need to mitigate the risk of being unable to clearly explain the potential significance of electronic evidence?
48 48 Computer Forensics Personnel - Best Practice Forensic Laboratory Certification (NATA Technical Circular 9, 2008) 5.2 Personnel should hold a Bachelor qualification, or equivalent, in a field of science; must be competent in the preservation and analysis of electronic evidence; must possess a multi-disciplinary appreciation; and must document and satisfy on-going training and continued competency evaluation requirements. Guidelines for the Management of IT Evidence (HB ) [2.2.6] Ensure that personnel involved in the design, production, collection, analysis and presentation of evidence have appropriate training, experience and qualifications to fulfil their role(s). [3.5.2] Persons conducting analysis of IT evidence should be suitably qualified for the role they are performing.
49 49 Computer Forensics Tool Evolution Reliant on hardware and software tools to expedite and automate tasks Due to human element, potential for both inherent failure and user error Standard Disclaimer - This assignment has been performed with the assistance of computer hardware and software tools available to me as at the date of preparation of this report
50 50 Computer Forensics Tool Evolution First Evolution Tools were command-line driven and required substantial technical expertise Second Evolution Tools with a graphical user interface (GUI) Often criticised as Nintendo forensics by First Evolution practitioners Third Evolution (Today) Tools with distributed processing to better manage large volumes of data Specific tools for specific purposes - Windows Registry, mobile phones, etc. Virtualisation
51 51 Computer Forensics Tool Evolution - EnCase Industry standard tool for computer forensics Automated recovery of deleted files Automated conversion of multiple data sources to a single timezone EnScripts - Facilitates automated case processing Searches, bookmarking and data export to other forensic tools GUI Layout Left pane - Tree Right pane - Table Bottom left - Viewer Bottom right - Filters
52 52
53 53 Computer Forensics Environments - Lab Secure facility for electronic evidence storage and analysis At least one (1) room with audited access Full suite of tools in contrast to Fly-Away Kit Standard Operating Procedure (SOP) ACPO (UK) NIST (USA) IOCE, SWGDE (International)
54 54 Computer Forensics Environments - Fly-Away Large majority of computer forensic work is performed in the field A well-prepared fly-away kit is essential What should your fly-away kit contain?
55 55 Computer Forensics Lab Management - Handling Forensic Laboratory Certification (NATA Technical Circular 9, 2008) 5.8 Handling of test and calibration items must have a documented evidence control system that appropriately caters for both physical and electronic evidence (including receipt, handling, protection and storage); must have procedures to ensure the integrity of evidence under its control; and must have a secure area for overnight and/or long-term storage of physical and electronic evidence. Guidelines for the Management of IT Evidence (HB ) [3.4.2] Contemporaneous notes [3.4.4] Chain of custody [3.2.3] Establishing the authenticity of electronic records
56 56 Computer Forensics Lab Management - Results Forensic Laboratory Certification (NATA Technical Circular 9, 2008) Assuring the quality of test and calibration results must monitor the performance of tests/examinations by using quality control procedures appropriate to the type and frequency of tests/examinations undertaken; and must clearly identify case records that have been reviewed, including reviewer and date of the review. Guidelines for the Management of IT Evidence (HB ) [3.2.5] Establishing the reliability of computer programs [3.3.1] Correct operation
57 57 Computer Forensics Lab Management - Calibration Forensic Laboratory Certification (NATA Technical Circular 9, 2008) Equipment calibration intervals must check write blockers and data acquisition tools for functionality and verify their fitness for use, upon use. Guidelines for the Management of IT Evidence (HB ) [3.2.5] Establishing the reliability of computer programs [3.3.1] Correct operation NIST Computer Forensic Tool Testing (CFTT) Program
58 58 Computer Forensics Lab Management - Environment Forensic Laboratory Certification (NATA Technical Circular 9, 2008) Accommodation and environmental conditions must have documented procedures for the authorisation of access to areas, both physical and electronic, within the laboratory; and must maintain records for time spent in the laboratory by authorised persons. Guidelines for the Management of IT Evidence (HB ) No direct coverage
59 59 Today Electronic Evidence Computer Forensics Definition Key Applications Personnel Tool Evolution Environments Stages
60 60 Computer Forensics Identification Types of electronic evidence required for preservation and analysis Sources of electronic evidence containing the types required Locations of the potential sources of electronic evidence Identify sufficient electronic evidence to support your contentions, but not jeopardise your efforts or exceed legal constraints
61 61 Computer Forensics Identification - Types Business Records Documents, spreadsheets, presentations, databases and transaction logs Communications Web browsing activity, , instant messaging (IM), voic , calendar entries, call logs Multimedia Images, audio and video Artefacts Recently logged-on users - Event Logs Recently accessed data files and folders - Registry, Shortcut (Link) Files Recently connected removable devices - Registry, Shortcut (Link) Files, Event Logs Recently deleted data files - Recycle Bin, INFO2 Files Recently accessed web sites - History, Cookies, Cache
62 62 Computer Forensics Identification - Sources Personal Computers! Desktop and Notebook Removable Devices (Floppy, CD/DVD, USB) Computer Servers! File Internet (Web, ) Database Remote Access Storage (NAS, SAN, Tape) Communication! Mobile Phone Smartphone and PDA GPS Navigation System Multifunction Printer Multimedia! Media Player (ipod) Digital Still/Video Camera Digital Voice Recorder Digital Video Recorder Gaming (PS3, XBox)
63 63 Computer Forensics Identification - Web Sources Social Networking! Facebook Hi5 LinkedIn MySpace Second Life Content Sharing! Google Blogger Google Docs Salesforce CRM YouTube Communication! IM (MSN, QQ) VoIP (Skype) Twitter BlackBerry Messenger Commerce! Share Trading Banking Auctions (ebay) Shopping (Amazon)
64 64 Computer Forensics Identification - Locations Location is both electronic and physical Synchronisation means the same data may be located in multiple locations and you must efficiently prioritise (e.g. BlackBerry = Outlook = Exchange) Virtualisation technology is used to allow multiple computers to transparently operate from one physical computer Physical location may mean a source is difficult or unlawful to access
65 65 Computer Forensics Identification - Real World Location! Commercial Residential Time! Available Day/Night Resources! Personnel Equipment Utilities Distractions! Police Lawyers Disgruntled Employees Emotional Family
66 66 Computer Forensics Identification Case Study
67 67 Computer Forensics Identification Case Study
68 68 Computer Forensics Identification Case Study
69 69 Computer Forensics Identification Case Study
70 70 Computer Forensics Identification Case Study
71 71 Computer Forensics Identification Case Study
72 72 Computer Forensics Preservation Once sources of digital evidence have been identified, steps should be taken to ensure that it is preserved for collection and analysis Preservation also includes understanding that some data may not be preserved Volatile data - Data that is no longer available after a short time or once computer loses power (e.g. temporary system data, RAM memory) Non-volatile data - Data that remains available even when computer loses power (e.g. user-created data stored on a hard drive)
73 73 Computer Forensics Preservation - Tools of the Trade Forensic Equipment! Forensic Computers Forensic Write Blockers Adapters, Cables, etc. Boot Disks and Dongles Wiped Storage Technical Equipment! Notebook, Pens, Pencils Computer Toolkit Digital Camera Handheld GPS (Time) Gloves, Torch, Batteries Transport! Evidence Bags Containers and Labels Portable UPS Select Spare Parts Legal Documents Safe Custody! Secure Storage Chain of Custody Logs
74 74 Computer Forensics Preservation - Types Physical Forensic Imaging Logical Forensic Imaging File Copy Purpose Exact copy of all data on a hard drive Includes all active and deleted data Includes all privileged and confidential data Exact copy of specific active data (e.g. all Microsoft Word documents on a hard drive returning search hits for the keyword wages ) Copy of specific active data (e.g. all Microsoft Word documents within a folder) Integrity Stored within an image Able to be verified using cryptographic hash (e.g. MD5, SHA-1, SHA-256) Stored within an image Able to be verified using cryptographic hash Unless a proven copy method is used, data is subject to alteration Notes Relatively slow but provides flexibility for detailed analysis Creation of forensic image for an average hard drive takes minutes (40GB-250GB) Relatively fast but analysis is limited to active data collected Increasingly accepted as the default e-discovery collection type Fast but analysis is limited to active data collected
75 75 Computer Forensics Preservation - Methods Purpose Method Notes Dead Data is collected after the computer is disconnected from standard operation Computer is disconnected by pulling the plug or graceful shutdown Hard drive is connected via a write blocker to a forensic computer Alternatively, forensic boot disk may be used Computer date and time is verified via BIOS Traditionally accepted Does not allow for most encrypted and volatile data Live Data is collected with minimal disruption to the computer s standard operation Connection is made to computer whilst in operation, directly or via network Computer date and time is verified via operating system analysis Efficient for matters involving a large number of computers and limited forensic resources Reduces traditional liability issues with shutting down mission critical computers Allows for collection of most encrypted and volatile data Increasingly accepted as the default e- discovery collection method
76 76 Computer Forensics Preservation - Write Blocker
77 77 Computer Forensics Preservation - Duplicator
78 78 Computer Forensics Preservation - Live Boot CD
79 79 Computer Forensics Preservation - Mobile Phones
80 80 Computer Forensics Analysis Analysis generally involves the reconstruction of past electronic events What is the event? Who caused the event? When did the event occur? How did the event occur?
81 81 Computer Forensics Lab Management - Validation Forensic Laboratory Certification (NATA Technical Circular 9, 2008) Test and calibration methods and method validation is not required, at this stage, to attach an estimation of uncertainty measurement to nonnumeric test results; is encouraged, where possible, to have an understanding of the variability of their results; may need to consider uncertainty measurements attached to the measurement of time using the system clock. Guidelines for the Management of IT Evidence (HB ) [3.5.3] Completeness of evidence [3.2.2] Identifying the author of electronic records [3.2.3] Establishing the authenticity of electronic records [3.2.4] Establishing the time and date a particular computer electronic record was created
82 82 Computer Forensics Analysis - Casey s Certainty Scale Certainty Level Evidence Description Qualification C0 Contradicts known facts Incorrect C1 Highly questionable Highly uncertain C2 One source of evidence that is not protected against tampering Somewhat uncertain C3 One or more sources that are more difficult to tamper with Possible Insufficient evidence to support a firm conclusion C4 One or more sources that are protected against tampering Probable Verified by independent sources C5 One or more sources that are protected against tampering Verified by independent sources that are also protected against tampering Almost certain C6 Tamper proof and unquestionable Certain* Scale Copyright 2004 Eoghan Casey.
83 83 Computer Forensics Analysis - Case Study 1 John s purebred dog, Rex, became ill and was taken to Frank, a veterinarian Frank prescribed Rex some experimental medicine Rex s health deteriorated to the point where he was unable to breed John sues Frank for professional negligence As part of the discovery process, Frank provided a printout of his observation notes recorded in his computerised practice management system
84 84 Computer Forensics Analysis - Case Study 1 The observation notes state Treated Rex with experimental medicine Frank suspects that the observation notes were altered as his invoice only states Treated Rex with medicine You forensically analyse the database associated with the Frank s practice management software You recover and forensically analyse deleted backups of the database stored on Frank s computer server You identify that the practice management software has audit trail features The audit trail illustrates that the observation notes were actually changed after the commencement of legal proceedings
85 85 Computer Forensics Analysis - Case Study 2 John recently purchased Michael s business John has identified an anomaly between reports generated by the business computerised accounting system software and an invoice dated 1 January 2008 provided prior to purchase by Michael, as a paper printout John can find no record of the invoice in the accounting system The invoice also looks slightly different to invoices typically produced by the accounting system John believes that Michael may have forged the invoice
86 86 Computer Forensics Analysis - Case Study 2 You perform a keyword search for the term invoice and manually review the results to identify a folder on the hard drive named Unsorted Invoices The folder contains one (1) deleted Microsoft Excel spreadsheet You recover the deleted spreadsheet and identify that the spreadsheet is password-protected Using a password cracking utility, you identify the spreadsheet s password as secret123 You access the spreadsheet contents and it appears to match the printed invoice previously provided
87 87 Computer Forensics Analysis - Case Study 2 The spreadsheet s file system and document metadata reflects that the spreadsheet containing the invoice was created on 1 November 2008, 11 months after it was purportedly issued Document metadata reflects that the spreadsheet was created by the computer user Michael and was last printed on 1 November 2008 You analyse the Print Spool folder and recover deleted artefacts which support the contention that a copy of the spreadsheet was printed from the computer on 1 November 2008 You perform a timeline analysis of activity on the hard drive and analyse other available artefacts to verify operational reliability of the computer, including the computer clock s date and time
88 88 Computer Forensics Analysis - Case Study 3 Michelle is employed by John in a senior role in his business Michelle receives a lucrative offer from a competitor and resigns Two weeks after Michelle s resignation, John receives a number of phone calls from customers Each customer has received highly discounted offers from Michelle s new employer John calls his lawyer, and you, as a computer forensic practitioner
89 89 Computer Forensics Analysis - Case Study 3 You reconstruct web browsing activity from Michelle s former computer to reveal that she had spent a large part of time in her last fortnight on social networking websites The computer also revealed that Michelle had installed and used Evidence Eliminator software the day before she left. You identify that Michelle had tried to delete a number of personal messages and documents You reconstruct Windows Registry and relevant log files to identify that an Apple ipod (SN: ) was connected via USB to Michelle s computer a number of times in Michelle s last fortnight You analyse link (shortcut) files to identify that a file matching the file name of John s master customer database was accessed in the day before Michelle s departure
90 90 Analysis Searches Key Custodians or Sources Date Ranges File Types Search Queries Keywords Concept Searching Clustering De-Duplication Exact De-duplication (MD5 Hash Values = Digital Fingerprints for a File) Near De-duplication Threading
91 91 bus bus OR buses?
92 92 anonymise anonymise OR anonymize? anonym* OR unknown OR hidden?
93 93 toll toll NOT toll-free? toll AND [keyword] NEAR/25 [keyword]?
94 94 virgin (Virgin Blue OR virgin blue OR Bluey OR VBA) NEAR/25 [keyword]?
95 95 Analysis Searches Image Copyright 2009 Clearwell Systems Inc.
96 96 Analysis Data Recovery Images Copyright 2011 evidence-eliminator.com
97 97 Analysis Passwords and Encryption Commonly Passworded Files Microsoft Office Files ( Easy, 2007 Hard) Portable Document Format (PDF) Files ZIP (Compressed) Archives Defeating Passwords and Encryption Social Engineering Dictionary Attack Brute Force Attack Rainbow Tables
98 98 Analysis Windows Artefacts Registry - The configuration of the Windows operating system and installed software applications Recycle Bin - The storage location of deleted files Event Logs - System and user activity logs Restore Points - Automatic backups of the Registry and other key system files Shadow Copies - Previous versions of files stored by Windows Shortcut (Link) Files - A file that is a shortcut to another file. Contains metadata about the target file. Can be created by Windows automatically (e.g. in the Recent Documents folder) or user-created
99 99 Analysis USB Devices Universal Serial Bus (USB) Devices USB Keys USB External Hard Drives RIM BlackBerry Apple ipod, iphone and ipad Recorded each time a USB Device is connected to a computer Last connected Device Manufacturer Device Model Serial Number
100 100 Analysis USB Devices Image Copyright 2011 Nirsoft.
101 101 Analysis Shortcut Files and USB Devices
102 102 Analysis Internet Intelligence WHOIS searches can be performed to identify the registered operator of a Domain Name (e.g. or operator of an Internet Protocol (IP) address (e.g ) DNS Lookup searches identify the IP address(es) associated with a Domain Name
103 103 Analysis Internet Intelligence Image Copyright 2011 dnstools.com
104 104 Analysis Web Browsers History - The History data file or database records a user s web browsing activity Cache - The Cache data file or database stores a temporary copy of web pages that have been recently accessed on the user s computer so that they can be displayed faster in the future Cookies - Text files that are used by web servers to track or manage a user s web browsing activity on a specific web site Private mode browsing - Enables a user to easily undertake a web browsing session without permanently storing History, Cache or Cookies
105 105 Analysis Web Intelligence - Google Image Copyright 2011 google.com
106 106 Analysis Web Intelligence - Spokeo Image Copyright 2011 spokeo.com
107 107 Analysis Web Intelligence - Wayback Image Copyright 2011 archive.org
108 108 Analysis Parts of an Header - The envelope that contains the metadata Body - The message content Attachments Important Notes s sent from Yahoo! Mail and Microsoft Hotmail/Live Mail can generally be traced to a public IP address - Google Mail (Gmail) cannot at this time Even with a public IP address - The may only trace to an organisation (not a specific user) or even an Internet cafe
109 109 Computer Forensics Analysis Image Copyright 2009 Clearwell Systems Inc.
110 110 Analysis Tracing Images Copyright 2011 ip-adress.com
111 111 Analysis Tracking Image Copyright 2011 readnotify.com
112 112 Computer Forensics Presentation Report preparation Prepare in accordance with Court requirements No standard layout Understand the audience Avoid technical terminology overload Use an appendix wisely Court attendance Potentially months or years later
113 113 Computer Forensics Presentation HIS HONOUR: Mr Couper? MR COUPER: I'll call Mr Byrne, if your Honour pleases. HIS HONOUR: Yes. MR COUPER: We'll see if all this technology is what it's cracked up to be. HIS HONOUR: Is that what you're going to ask Mr Byrne? MR COUPER: More or less, your Honour.
114 114 Computer Forensics Further Reading Reference Materials DOJ, Search and Seizure Manual (USA) NIJ, Electronic Crime Scene Investigation: A Guide for First Responders (USA) ACPO, Good Practice Guide for Computer-Based Electronic Evidence (UK) BS 10008, Evidential Weight and Legal Admissibility of Electronic Information AS HB , Guidelines for the Management of IT Evidence NATA, Technical Circular No 9 NIST, Computer Forensic Tool Testing Project (USA) Public Websites The Electronic Evidence Information Center Forensic Focus
115 115 Thank You If you have any questions or feedback regarding this presentation please contact Seamus E. Byrne Director, Forensics, KordaMentha !
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
Digital Forensics, ediscovery and Electronic Evidence
Digital Forensics, ediscovery and Electronic Evidence By Digital Forensics What Is It? Forensics is the use of science and technology to investigate and establish facts in a court of law. Digital forensics
E-Discovery. Disclaimer. Where Information Management and Litigation Meet
1 Where Information Management and Litigation Meet Seamus E. Byrne For the Institute for Information Management Melbourne, Australia 27 April 2010 2 Disclaimer This presentation is made available by Seamus
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL)
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL) COURSE DESCRIPTION: Computer Forensics is focused on teaching
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices Introduction As organizations rely more heavily on technology-based methods of communication, many corporations
Digital Forensics. Larry Daniel
Digital Forensics Larry Daniel Introduction A recent research report from The Yankee Group found that 67.6 percent of US households in 2002 contained at least one PC The investigators foresee three-quarters
Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012
Just EnCase Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 What is e-discovery Electronically Stored Information (ESI) Discover or Monitor for Fraudulent Activity Tools used
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
CDFE Certified Digital Forensics Examiner (CFED Replacement)
Course: CDFE Certified Digital Forensics Examiner (CFED Replacement) Description: Price: $3,450.00 Category: Popular Courses Duration: 5 days Schedule: Request Dates Outline: COURSE OVERVIEW Computer Forensics
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE Vahidin Đaltur, Kemal Hajdarević, Internacional Burch University, Faculty of Information Technlogy 71000 Sarajevo, Bosnia
Electronic documents questionnaire
Electronic documents questionnaire (Civil Procedure Rules Practice Direction 31B) WARNING: Unless the court makes some other order, the answers given in this document may only be used for the purposes
On the Trail of the Craigslist Killer: A Case Study in Digital Forensics
On the Trail of the Craigslist Killer: A Case Study in Digital Forensics Presenters: Sharon Nelson and John Simek President and Vice President, Sensei Enterprises www.senseient.com [email protected];
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
Digital Forensic Techniques
Digital Forensic Techniques Namrata Choudhury, Sr. Principal Information Security Analyst, Symantec Corporation Professional Techniques T23 CRISC CGEIT CISM CISA AGENDA Computer Forensics vs. Digital Forensics
Information Technologies and Fraud
Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting Information Technologies for Fraud investigation A.
Chapter 7 Securing Information Systems
1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
National District Attorneys Association National Center for Prosecution of Child Abuse. Computer Forensics for Prosecutors
National District Attorneys Association National Center for Prosecution of Child Abuse Computer Forensics for Prosecutors February 18-19, 2013 Portland, Oregon Detective Michael Smith Computer Crimes &
C. All responses should reflect an inquiry into actual employee practices, and not just the organization s policies.
Questionnaire on Electronically Stored Information (May 2014) Comment The Questionnaire is intended to be a comprehensive set of questions about a company s computer systems. The extent to which you should
Digital Forensics & e-discovery Services
Digital Forensics & e-discovery Services U.S. Security Associates Digital Forensics & e-discovery Services 21st century fraud investigations require expert digital forensics skills to deal with the complexities
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
Scientific Working Group on Digital Evidence
Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification by e-mail before or contemporaneous to the introduction of this document, or
Best Practices for Computer Forensics
Scientific Working Group on Digital Evidence Best Practices for Computer Forensics Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012 Jan Balatka, Deloitte Czech Republic, Analytic & Forensic Technology unit Agenda Introduction ediscovery investigation
How To Answer A Question About Your Organization'S History Of Esi
Questionnaire on Electronically Stored Information (March 17, 2011) I. Definitions and Instructions A. ESI means electronically stored information as the term is used in the Federal Rules of Civil Procedure.
BDO CONSULTING FORENSIC TECHNOLOGY SERVICES
BDO CONSULTING FORENSIC TECHNOLOGY SERVICES MARCH 2013 AGENDA Introduction About BDO Consulting Computer Forensics & E-Discovery Practice Current Trends Case Studies Q&A Page 2 Michael Barba Managing Director,
e-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:
ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT
ITU Session Four: Device Imaging And Analysis Mounir Kamal Q-CERT 2 Applying Forensic Science to Computer Systems Like a Detective, the archaeologist searches for clues in order to discover and reconstruct
EnCase 7 - Basic + Intermediate Topics
EnCase 7 - Basic + Intermediate Topics Course Objectives This 4 day class is designed to familiarize the student with the many artifacts left behind on Windows based media and how to conduct a forensic
Electronic evidence: More than just a hard drive. March 2015 Publication No. 15-02
Electronic evidence: More than just a hard drive March 2015 Publication No. 15-02 1 Introduction 2 Over the last decade, the computer hard drive has been the main point of data storage and therefore the
Life Cycle of Records
Discard Create Inactive Life Cycle of Records Current Retain Use Semi-current Records Management Policy April 2014 Document title Records Management Policy April 2014 Document author and department Responsible
E-Discovery Technology Considerations
E-Discovery Technology Considerations Presented by: Dave Howard Oregon Department of Justice Deputy CIO Topics E-Discovery Process Overview Sources of Electronically Stored Information (ESI) Data Maps
Design and Implementation of a Live-analysis Digital Forensic System
Design and Implementation of a Live-analysis Digital Forensic System Pei-Hua Yen Graduate Institute of Information and Computer Education, National Kaohsiung Normal University, Taiwan [email protected]
Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI)
University of California, Merced Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI) Responsible Officials: Executive Vice Chancellor and Provost Vice Chancellor
Digital Forensics for Attorneys Overview of Digital Forensics
Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence
CAPABILITY STATEMENT. > Forensic Technology Team < Daniel Hains, Director t (07) 3228 4028 e [email protected] w www.vincents.com.
CAPABILITY STATEMENT > Forensic Technology Team < Daniel Hains, Director t (07) 3228 4028 e [email protected] w www.vincents.com.au CAPABILITY FORENSIC TECHNOLOGY INDEX Page No. Introduction... 3
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 4 Current Computer Forensics Tools Objectives Understand how to identify needs for computer forensics tools Evaluate the requirements
Ten Deadly Sins of Computer Forensics
Ten Deadly Sins of Computer Forensics Cyber criminals take advantage of the anonymity of the Internet to escape punishment. Computer Forensics has emerged as a new discipline to counter cyber crime. This
Digital Evidence and Computer Forensics
Digital Evidence and Computer Forensics Don Mason Associate Director Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Objectives After this session, you will be able to:
Certified Digital Forensics Examiner
Cyber Security Training & Consulting Certified Digital COURSE OVERVIEW 5 Days 40 CPE Credits $3,000 Digital is the investigation and recovery of data contained in digital devices. This data is often the
Guidelines on Digital Forensic Procedures for OLAF Staff
Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR Supervised by : Dr. Lo'ai Tawalbeh New York Institute of Technology (NYIT)-Jordan X-Ways Software Technology AG is a stock corporation
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
EnCase Portable. Extend Your Forensic Reach with Powerful Triage & Data Collection
GUIDANCE SOFTWARE EnCase Portable EnCase Portable Extend Your Forensic Reach with Powerful Triage & Data Collection GUIDANCE SOFTWARE EnCase Portable EnCase Portable Triage and Collect with EnCase Portable
Computer Forensics as an Integral Component of the Information Security Enterprise
Computer Forensics as an Integral Component of the Information Security Enterprise By John Patzakis 10/28/03 I. EXECUTIVE SUMMARY In addition to fending off network intrusions and denial of service attacks,
Computer Forensics. Securing and Analysing Digital Information
Computer Forensics Securing and Analysing Digital Information Aims What is a computer? Where is the evidence? Why is digital forensics important? Seizing evidence Encryption Hidden files and folders Live
CITY UNIVERSITY OF HONG KONG. Information Classification and
CITY UNIVERSITY OF HONG KONG Handling Standard (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification
Modern Digital Forensics!!
ISA 785 Research in Digital Forensics Modern Digital Forensics!! ISA 785! Angelos Stavrou, George Mason University! Modern Digital Forensics What s New 2! New Intellectual property concerns! IP/Brand related
How To Store Data On A Computer (For A Computer)
TH3. Data storage http://www.bbc.co.uk/schools/gcsebitesize/ict/ A computer uses two types of storage. A main store consisting of ROM and RAM, and backing stores which can be internal, eg hard disk, or
Technical Procedure for Evidence Search
Technical Procedure for Evidence Search 1.0 Purpose - The purpose of this procedure is to provide a systematic means of searching digital evidence in order to find data sought by the search authorization.
What is Digital Forensics?
DEVELOPING AN UNDERGRADUATE COURSE IN DIGITAL FORENSICS Warren Harrison PSU Center for Information Assurance Portland State University Portland, Oregon 97207 [email protected] What is Digital Forensics?
Updates Click to check for a newer version of the CD Press next and confirm the disc burner selection before pressing finish.
Backup. If your computer refuses to boot or load Windows or if you are trying to restore an image to a partition the Reflect cannot lock (See here), and then you will have to start your PC using a rescue
COURCE TITLE DURATION CompTIA A+ Certification 40 H.
COURCE TITLE DURATION CompTIA A+ Certification 40 H. Overview: The target student is anyone with basic computer user skills who is interested in: obtaining a job as an IT professional or PC technician.
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
Data storage, collaboration, backup, transfer and encryption
Data storage, collaboration, backup, transfer and encryption Scott Summers UK Data Archive Practical research data management 19 April 2016 Overview Looking after research data for the longer-term and
CCE Certification Competencies
CCE Certification Competencies May 10, 2012 Page 1 The Certified Computer Examiner (CCE) has evolved into one of the most desired certifications in the computer forensics industry. The certification is
Presentation Title Presentation Subtitle. The Unique Alternative to the Big Four
Presentation Title Presentation Subtitle The Unique Alternative to the Big Four Speaker Biography Tim L. Bryan, CPA/CFF/CITP, CISA, EnCE Senior Manager, Crowe Horwath LLP Forensic Technology Services Leader
CAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. www.controlrisks.com DECEMBER 2013
LEGAL TECHNOLOGIES AND COMPUTER FORENSICS DECEMBER 2013 Copyright Control Risks. All rights reserved. This document cannot be reproduced without the express written permission of Control Risks. Any reproduction
NetWrix Server Configuration Monitor
NetWrix Server Configuration Monitor Version 2.2 Quick Start Guide Contents NetWrix Server Configuration Monitor Quick Start Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW
Successful ediscovery in a Bring Your Own Device Environment
IT@Intel White Paper Intel IT IT Best Practices IT Governance and IT Consumerization June 2012 Successful ediscovery in a Bring Your Own Device Environment Executive Overview Close collaboration between
How to Avoid The Biggest Electronic Evidence Mistakes. Ken Jones Senior Technology Architect Pileum Corporation
How to Avoid The Biggest Electronic Evidence Mistakes Ken Jones Senior Technology Architect Pileum Corporation Why is Proper Handling of Electronic Data Important? Most of the evidence in your case isn
Using Computer Forensics in your Investigations
Deloitte Financial Advisory Services LLP Using Computer Forensics in your Investigations Presented to: ISACA Los Angeles Chapter Dave Nardoni January 12 th, 2010 Agenda Introduction Analytic & Forensic
Overview. Timeline Cloud Features and Technology
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition
APR. 08 Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition Cover photographs copyright 2001 PhotoDisc, Inc. NCJ 219941 Chapter 1. Electronic Devices: Types, Description,
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING MODULE A INTRODUCTION TO COMPUTER FORENSICS AND NVESTIGATIONS A1.0 Explain concepts related to computer forensics. A1.1 This module is measured
Forensics on the Windows Platform, Part Two
1 of 5 9/27/2006 3:52 PM Forensics on the Windows Platform, Part Two Jamie Morris 2003-02-11 Introduction This is the second of a two-part series of articles discussing the use of computer forensics in
CYBER FORENSICS (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 CYBER FORENSICS (W/LAB) Course Syllabus Course Number: CSFS-0020 OHLAP Credit: Yes OCAS Code: 8134 Course Length: 130 Hours Career Cluster: Information
What You Should Know About ediscovery
KPMG FORENSIC What You Should Know About ediscovery By Pamela Quintero February 18, 2009 What Guidelines Are Available? The Sedona Canada Principles Working Group 7 (WG7) The purpose and intent of the
The legal admissibility of information stored on electronic document management systems
Softology Ltd. The legal admissibility of information stored on electronic document management systems July 2014 SOFTOLOGY LIMITED www.softology.co.uk Specialist Expertise in Document Management and Workflow
VMware vsphere Data Protection 6.0
VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application
Email Archiving E-mail Compliance Storage Management Electronic Discovery
Email Archiving E-mail Compliance Storage Management Electronic Discovery archiver Athena www.athenaarchiver.com Athena Archiver is a next-generation email and instant message archiving system which enables
BackupAssist v6 quickstart guide
New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet
ELEN 115 Computer Components and Peripherals
Course Outline Professor: Philip Ashman, M.Sc., P.Eng., CCAI Prerequisite: None Office: C330 Co-requisite: None Phone: (250) 762-5445 ext 4364 Lecture: 3 hrs/wk, Lab: 2.5 hrs/wk E-mail: [email protected]
2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.
Acquisition and Tools COMP 2555: Principles of Computer Forensics Autumn 2014 http://www.cs.du.edu/2555 1 Planning Your Investigation! A basic investigation plan should include the following activities:!
Operating Systems Forensics
Operating Systems Forensics Section II. Basic Forensic Techniques and Tools CSF: Forensics Cyber-Security MSIDC, Spring 2015 Nuno Santos Summary! Windows boot sequence! Relevant Windows data structures!
Scene of the Cybercrime Second Edition. Michael Cross
Scene of the Cybercrime Second Edition Michael Cross Chapter 1 Facing the Cybercrime Problem Head-On 1 Introduction 2 Defining Cybercrime 2 Understanding the Importance of Jurisdictional Issues 3 Quantifying
VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014
VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of
Getting Physical with the Digital Investigation Process
Getting Physical with the Digital Investigation Process Brian Carrier Eugene H. Spafford Center for Education and Research in Information Assurance and Security CERIAS Purdue University Abstract In this
Computer Forensics Discipline
Computer Forensics Discipline Technical Procedure Manual Computer Forensics Discipline Technical Procedure Manual Approved By: Date: Reviewed By: Date: Reviewed By: Date: Table of Contents General Flow
Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014
Chapter Contents Operating Systems and File Management Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup Security
Fall 2009. Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. [email protected].
Fall 2009 Lecture 1 Operating Systems: Configuration & Use CIS345 Introduction to Operating Systems Mostafa Z. Ali [email protected] 1-1 Chapter 1 Introduction to Operating Systems An Overview of Microcomputers
