Bringing Science to Digital Forensics with Standardized Forensic Corpora.
|
|
|
- Valentine O’Neal’
- 10 years ago
- Views:
Transcription
1 Bringing Science to Digital Forensics with Standardized Forensic Corpora. Digital Evaluation and Exploitation (DEEP) Group February
2 NPS is the Navyʼs Research University. Location: " Monterey, CA Campus Size: "627 acres Students: 1500 US Military (All 5 services) US Civilian (Scholarship for Service & SMART) Foreign Military (30 countries) All students are fully funded Schools: Business & Public Policy Engineering & Applied Sciences Operational & Information Sciences International Graduate Studies 2
3 Digital Forensics is at a turning point. Yesterdayʼs work was primarily reverse engineering. Key technical challenges: Evidence preservation. File recovery (file system support); Undeleting files Encryption cracking. Keyword search. 3
4 Digital Forensics is at a turning point. Todayʼs work is increasingly scientific. Evidence Reconstruction Files (fragment recovery carving) Timelines (visualization) Clustering and data mining Social network analysis Sense-making Same Community College Drives #74 x #77 25 CCNS in common Drives #171 & # CCNS in common Same Medical Center Same Car Dealership Drives #179 & # CCNS in common 4
5 Science requires the scientific process. Hallmarks of Science: Controlled and repeatable experiments. No privileged observers. Publication of data and results. Sharing of scientific materials. Today's Digital Forensics is not Scientific! Researchers work on their own data Data can't be shared with other researchers (privacy) Data can't be published (copyright) Results can't be meaningfully compared. 5
6 Our solution: Standardized Corpora for Digital Forensics Research. "Standardized" Known contents Documented provenance "Corpora" Many data sets Realistic lifelike, but no Personally Identifiable Information (PII) Real Public and Private "Digital Forensics Research" Created to enable research Legally obtained (c.f. wiretap law) Publishable results Specific attention to privacy and copyright issues 6
7 UNCLASSIFIED Many different kinds of forensic corpora are needed. Test Data Constructed for the purpose of testing a specific feature. CFReDS Russian Tea Room floppy disk image to validate Unicode search & display. Sampled Data A subset of a large data source e.g., sampled web pages or packets. Hard to randomly sample. Realistic Data Not real made in a lab, not in the field. Real and Restricted Data Created by actual human beings during activities that were not performed for the purpose of creating forensic data. Controlled for privacy reasons. Real but Unrestricted Released for some reason. e.g. the Enron Dataset Photos on Flickr; User profiles on Facebook. UNCLASSIFIED 7
8 1 Million files available now 1 million(*) documents from US Government web servers Specifically for file identification, data & metadata extraction. Found by random word searches on Google & Yahoo DOC, DOCX, HTML, ASCII, SWF, etc. Free to use; Free to redistribute No copyright issues US Government work is not copyrightable. Other files have simply been moved from one USG webserver to another. No PII issues These files were already released jpg Distribution format: ZIP files 1000 ZIP files with 1000 files each. 10 threads of 1000 randomly chosen files for student projects. Full provenance for every file (how found; when downloaded; SHA1; etc.) (*Approximately 3000 files redacted after release.) 8
9 "Test" and "Realistic" disk images Test Images Designed to demonstrate a particular aspect nps-2009-hfstest1" (HFS+) nps-2009-ntfs1 " (NTFS) Realistic Images Like real life, but no personally identifiable info. nps-2009-canon2" (FAT32) nps-2009-ubnist1" (FAT32) nps-2009-casper-rw " (embedded EXT3) nps-2009-domexusers" (NTFS) Each image has: Narrative of how the image was created and expected uses. Image file in RAW/SPLITRAW, AFF and E01 formats SHA1 of raw image Ground truth report 9
10 Complete Scenarios Typical scenarios include: Distribution of simulated pornography ("kitty porn.") Theft of corporate data. Nitroba University: University harassment case m57 theft Theft of corporate data m57 patents 3 week simulation of a small business Four computers Daily disk and memory images Complete Network Packet Capture 10
11 The Real Data Corpus: "Real Data from Real People." Most forensic work is based on realistic data created in a lab. We get real data from CN, IN, IL, MX, and other countries. Real data provides: Real-world experience with data management problems. Unpredictable OS, software, & content Unanticipated faults We have multiple corpora: Non-US Persons Corpus US Persons Corpus (@Harvard) Releasable Real Corpus Realistic Corpus IRB approval required for federally funded research. 11
12 UNCLASSIFIED Real Data Corpus: Current Status Country HDs Flash Optical GB (uncomp) BA 7 38 CA ,064 CE 1 82 CH 2 5 CN ,627 DE GR IL ,226 IN ,540 MX 175 1,110 NZ 1 4 PS TH 1 13 UA , ,008 UNCLASSIFIED 12
13 UNCLASSIFIED RDC has been provided to a range of researchers. Received and satisfied data sharing request for Real Data: CMU Software Engineering Institute. AccessData I.D.E.A.L. Technology Pending Agreements: University of Texas San Antonio University of California, Santa Cruz Georgetown University Data sharing for use in training: West Point DC3/DCCI CMU Computer Science Department UNCLASSIFIED 13
14 Conclusion: Digital forensics needs digital corpora! National Research Council 2009 Report found a lack of science in forensics... Substantive information and testimony based on faulty forensic science analysis may have contributed to wrongful convictions of innocent people... PREPUBLICATION COPY Moreover, imprecise or exaggerated expert testimony has sometimes contributed to the admission of erroneous or misleading evidence. National Research Council, 2009 STRENGTHENING FORENSIC SCIENCE IN THE UNITED STATES: A PATH FORWARD Contact Information: Joshua B. Gross <[email protected]> Simson L. Garfinkel <[email protected]> Committee on Identifying the Needs of the Forensic Science Community Committee on Science, Technology, and Law Policy and Global Affairs Committee on Applied and Theoretical Statistics Division on Engineering and Physical Sciences Questions? 14
A Short Introduction to Digital and File System Forensics
Antonio Barili Lab Dept. of Industrial and Information Engineering University of Pavia (Italy) [email protected] Every contact leaves a trace Culprit Scene Victim Edmond Locard (1877-1966) 2015 -
Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012
Just EnCase Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 What is e-discovery Electronically Stored Information (ESI) Discover or Monitor for Fraudulent Activity Tools used
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE Vahidin Đaltur, Kemal Hajdarević, Internacional Burch University, Faculty of Information Technlogy 71000 Sarajevo, Bosnia
Gaming System Monitoring and Analysis Effort
for the Gaming System Monitoring and Analysis Effort DHS/S&T/PIA-025 October 11, 2012 Contact Point Douglas Maughan DHS S&T Cyber Security Division 202-254-6145 Reviewing Official Jonathan R. Cantor Acting
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
Deleted File Recovery Tool Testing Results
Deleted File Recovery Tool Testing Results Jim Lyle NIST 1 AAFS Washington CFTT Develop specifications for testing forensic tools Disk Imaging Write Blocking Drive erase for reuse Metadata based deleted
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL)
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL) COURSE DESCRIPTION: Computer Forensics is focused on teaching
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers Brian Carrier Research Scientist @stake Abstract This paper uses the theory of abstraction layers to describe the purpose
場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :[email protected] Sr. Technology Consultant GCR
場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :[email protected] Sr. Technology Consultant GCR Minimum Requirements of Security Management and Compliance
Using Open Source Digital Forensics Software for Digital Archives Workshop
Using Open Source Digital Forensics Software for Digital Archives Workshop Mark A. Matienzo 04 Manuscripts and Archives, Yale University Library Society of American Archivists University of Michigan School
Welcome to new students seminar!! Security is a people problem. forensic proof.com proneer.tistory.com. @pr0neer JK Kim
Welcome to new students seminar!! Data Recovery Security is a people problem proneer.tistory.com [email protected] @pr0neer JK Kim Outline Data & Recording Method Definition & Classification Recovering
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
Survey of Disk Image Storage Formats
Survey of Disk Image Storage Formats Version 1.0 Common Digital Evidence Storage Format Working Group Digital Forensic Research Workshop September 1, 2006 Digital data that could be used as evidence are
Strengthening Forensic Science in the United States: A Path Forward
This PDF is available from The National Academies Press at Strengthening Forensic Science in the United States: A Path Forward ISBN 978-0-309-13135-3 Committee on Identifying the Needs of the Forensic
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012 Jan Balatka, Deloitte Czech Republic, Analytic & Forensic Technology unit Agenda Introduction ediscovery investigation
Open Source Digital Forensics Tools
The Legal Argument 1 [email protected] Abstract This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a
Where is computer forensics used?
What is computer forensics? The preservation, recovery, analysis and reporting of digital artifacts including information stored on computers, storage media (such as a hard disk or CD-ROM), an electronic
COMPUTER FORENSICS. DAVORY: : DATA RECOVERY
COMPUTER FORENSICS. DAVORY: : DATA RECOVERY Supervised By: Dr. Lo ai Tawalbeh New York Institute of Technology (NYIT)-Amman-2006 TOPICS Definition Recovery from what?? Davory SOFTWARE. Restore Software.
Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014
Chapter Contents Operating Systems and File Management Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup Security
Cloud Forensics. 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu
Cloud Forensics Written & Researched by: Maegan Katz & Ryan Montelbano 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu November 4, 2013 Disclaimer: This document
Research Data Management PROJECT LIFECYCLE
PROJECT LIFECYCLE Introduction and context Basic Project Info. Thesis Title UH or Research Council? Duration Related Policies UH and STFC policies: open after publication as your research is public funded
2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.
Acquisition and Tools COMP 2555: Principles of Computer Forensics Autumn 2014 http://www.cs.du.edu/2555 1 Planning Your Investigation! A basic investigation plan should include the following activities:!
PTK Forensics. Dario Forte, Founder and Ceo DFLabs. The Sleuth Kit and Open Source Digital Forensics Conference
PTK Forensics Dario Forte, Founder and Ceo DFLabs The Sleuth Kit and Open Source Digital Forensics Conference What PTK is about PTK forensics is a computer forensic framework based on command line tools
McGraw-Hill Technology Education McGraw-Hill Technology Education
McGraw-Hill Technology Education McGraw-Hill Technology Education Copyright 2006 by The McGraw-Hill Companies, Inc. All rights reserved. Copyright 2006 by The McGraw-Hill Companies, Inc. All rights reserved.
ediscovery 6.0 Release Notes
ediscovery 6.0 Release Notes Document Date: 10/13/2015 2015 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues for this release.
4 II. Installation. 6 III. Interface specification. 9 1. Partition selection view. 9 1.1. Partition selection panel. 9 1.2.
Contents 2 I. Introduction 4 II. Installation 6 9 1. Partition selection view 9 1.1. Partition selection panel 9 1.2. Information panel 11 1.2.1. Current configuration 11 1.2.2. Storage information 12
Web Security, Privacy, and Commerce
SECOND EDITION Web Security, Privacy, and Commerce Simson Garfinkel with Gene Spafford O'REILLT Beijing Cambridge Famham Köln Paris Sebastopol Taipei Tokyo Table of Contents Preface xi Part I. Web Technology
Digital Forensics, ediscovery and Electronic Evidence
Digital Forensics, ediscovery and Electronic Evidence By Digital Forensics What Is It? Forensics is the use of science and technology to investigate and establish facts in a court of law. Digital forensics
Computer Forensic Tools. Stefan Hager
Computer Forensic Tools Stefan Hager Overview Important policies for computer forensic tools Typical Workflow for analyzing evidence Categories of Tools Demo SS 2007 Advanced Computer Networks 2 Important
CCE Certification Competencies
CCE Certification Competencies May 10, 2012 Page 1 The Certified Computer Examiner (CCE) has evolved into one of the most desired certifications in the computer forensics industry. The certification is
Massive Data Storage
Massive Data Storage Storage on the "Cloud" and the Google File System paper by: Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung presentation by: Joshua Michalczak COP 4810 - Topics in Computer Science
Paraben s P2C 4.1. Release Notes
Paraben s P2C 4.1 Release Notes Welcome to Paraben s P2C 4.1! Paraben's P2C is a comprehensive digital forensic analysis tool designed to handle more data, more efficiently while keeping to Paraben's P2
User Manual. Published: 12-Mar-15 at 09:36:51
User Manual Published: 12-Mar-15 at 09:36:51 Chapter Contents Published: 12-Mar-15 at 09:36:48 Chapter 1 - Introduction... 11 1.1 Introducing Forensic Explorer... 12 1.2 Supported file formats... 12 1.3
Top Ten Questions. to Ask Your Primary Storage Provider About Their Data Efficiency. May 2014. Copyright 2014 Permabit Technology Corporation
Top Ten Questions to Ask Your Primary Storage Provider About Their Data Efficiency May 2014 Copyright 2014 Permabit Technology Corporation Introduction The value of data efficiency technologies, namely
Introduction to File Carving
By Christiaan Beek Principal Security Consultant McAfee Foundstone Professional Services Table of Contents Overview 3 File Recovery Versus Carving 3 Fragmentation 5 Tooling 5 An example of using Photorec
(U) Converged Analysis of Smartphone Devices
(U) Converged Analysis of Smartphone Devices Identification/Processing/Tasking All in a day s work Paula Kuruc, NSA May 2010 1 Smartphone Converged mobile devices offering advanced capabilities, often
ELEN 115 Computer Components and Peripherals
Course Outline Professor: Philip Ashman, M.Sc., P.Eng., CCAI Prerequisite: None Office: C330 Co-requisite: None Phone: (250) 762-5445 ext 4364 Lecture: 3 hrs/wk, Lab: 2.5 hrs/wk E-mail: [email protected]
Using TrueCrypt to protect data
Using TrueCrypt to protect data Password protecting and encrypting files one by one is a certainly an effective way to securely store and share data. However, what if you have a lot of files? Creating
Performance Monitor. Intellicus Web-based Reporting Suite Version 4.5. Enterprise Professional Smart Developer Smart Viewer
Performance Monitor Intellicus Web-based Reporting Suite Version 4.5 Enterprise Professional Smart Developer Smart Viewer Intellicus Technologies [email protected] www.intellicus.com Copyright 2009 Intellicus
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)
s Unix Definition of : Computer Coherent application of a methodical investigatory techniques to solve crime cases. Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM) s Unix
(b) slack file space.
Hidden Files A Computer Forensics Case Study Question Paper 1. Outline the meaning of the following terms: (a) cookie, [2 marks] A cookie is data stored locally that is used by some websites for data that
WildPackets engaged Miercom to conduct comprehensive,
Lab Testing Summary Report January 2014 Report 140109 Key findings and conclusions: Omnipliance TL network analysis appliance with two-port OmniAdapter 10G card proves in testing a capture-to-disk rate
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
Journal of Digital Forensic Practice
Journal of Digital Forensic Practice Journal of Digital Forensic Practice, 2:57 61, 2008 Copyright Taylor & Francis Group, LLC ISSN: 1556-7281 print / 1556-7346 online DOI: 10.1080/15567280801958464 UDFP
ACE STUDY GUIDE. 3. Which Imager pane shows information specific to file systems such as HFS+, NTFS, and Ext2? - Properties Pane
ACE STUDY GUIDE *Note* All of the actual exam questions are in multiple choice format. This Study Guide is designed to cover all of the material on the exam, 1. FTK Imager supports the encryption of forensic
Multiple Digital Content Types in a Single Collection. Dina Sokolova and Jane Gorjevsky, Columbia University
Multiple Digital Content Types in a Single Collection Dina Sokolova and Jane Gorjevsky, Columbia University Digitized Digital-born records (modern and legacy) Delivered-digital Harvested online materials
File System Management
Lecture 7: Storage Management File System Management Contents Non volatile memory Tape, HDD, SSD Files & File System Interface Directories & their Organization File System Implementation Disk Space Allocation
Automating the Computer Forensic Triage Process With MantaRay
Automating the Computer Forensic Triage Process With MantaRay Senior Computer Forensic Analysts Doug Koster & Kevin Murphy Worlds best Summer Intern Chapin Bryce GMU RCFG Conference August 2013 1 MantaRay
Lab V: File Recovery: Data Layer Revisited
New Mexico Tech Digital Forensics Fall 2006 Lab V: File Recovery: Data Layer Revisited Objectives - Perform searches based on file headers - Data Carving with Foremost - Zip password recovery Procedures
Dr. Lodovico Marziale Managing Partner 504ENSICS, LLC [email protected]
Dr. Lodovico Marziale Managing Partner 504ENSICS, LLC [email protected] Education Ph.D. in Computer Science, University of New Orleans, 2009. Dissertation Topic: Advanced Techniques for Improving the
Web Archiving and Scholarly Use of Web Archives
Web Archiving and Scholarly Use of Web Archives Helen Hockx-Yu Head of Web Archiving British Library 15 April 2013 Overview 1. Introduction 2. Access and usage: UK Web Archive 3. Scholarly feedback on
Computing Orientation
Computing Orientation Welcome to Carnegie Mellon! Computing Orientation Online Orientation Computing Resources Websites Security Online Orientation http://www.heinz.cmu.edu Current Students -> Computing
NTFS Undelete User Manual
NTFS Undelete User Manual What is NTFS Undelete? NTFS Undelete is a small utility that scans your hard drive for all files that can be undeleted and attempts to recover them for you. Sounds like magic?
COEN 152 / 252 Lab Exercise 1. Imaging, Hex Editors & File Types
COEN 152 / 252 Lab Exercise 1 Imaging, Hex Editors & File Types In this lab we will explore the concepts associated with creating a forensic image. Write-blocking will be accomplished utilizing a mounted
Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works
Cloud Computing TODAY S TOPICS What Cloud Computing is and How it Works Security & Privacy Issues Investigative Challenges WHAT IS CLOUD COMPUTING? Cloud computing refers to software or processes offered
DATA RECOVERY SOLUTIONS EXPERT DATA RECOVERY SOLUTIONS FOR ALL DATA LOSS SCENARIOS.
Redefining High Speed ediscovery Processing & Production
Redefining High Speed ediscovery Processing & Production Conversion of the EDRM Enron Dataset from Natives to TIFF images in 5.3 hours (23 Million pages/day rate) using the Lexbe ediscovery Processing
AN INVESTIGATION INTO COMPUTER FORENSIC TOOLS
AN INVESTIGATION INTO COMPUTER FORENSIC TOOLS K.K. Arthur 1 H.S. Venter 2 Information and Computer Security Architectures (ICSA) Research Group University of Pretoria Pretoria Department of Computer Science
Paragon ExtFS for Mac OS X
PARAGON Software GmbH Heinrich-von-Stephan-Str. 5c 79100 Freiburg, Germany Tel. +49 (0) 761 59018201 Fax +49 (0) 761 59018130 Internet www.paragon-software.com E-mail [email protected] Paragon
EnCase v7 Essential Training. Sherif Eldeeb https://eldeeb.net
هللامسب EnCase v7 Essential Training What s in this course Explore the most notable features of the new version. Everything you need to know about EnCase v7 to conduct basic investigations. Create Cases
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
AppBoard TM 2.6. System Requirements. Technical Documentation. Version 2.6.0. July 2015
Technical Documentation AppBoard TM 2.6 System Requirements Version 2.6.0 July 2015 Edge Technologies 1881 Campus Commons Drive Suite 101 Reston, VA 20191 T 703.691.7900 F 703.691.4020 1.888.771.EDGE www.edge-technologies.com
Edinburg Napier University. Cloud-based Digital Forensics Evaluation Test (D-FET) Platform
Edinburg Napier University Cloud-based Digital Forensics Evaluation Test (D-FET) Platform Flavien Flandrin 6/10/2011 Executive Summary Digital forensics is nowadays commonly used to provide evidence in
Forensic Decryption of FAT BitLocker Volumes
Forensic Decryption of FAT BitLocker Volumes P. Shabana Subair, C. Balan (&), S. Dija, and K.L. Thomas Centre for Development of Advanced Computing, PO Box 6520, Vellayambalam, Thiruvananthapuram 695033,
BIOS Update Release Notes
BIOS Update Release Notes PRODUCTS: DG31PR, DG31PRBR (Standard BIOS) BIOS Version 0059 October 24, 2008 PRG3110H.86A.0059.2008.1024.1834 Added Fixed Disk Boot Sector option under Maintenance Mode. Fixed
e-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:
Forensic Imaging and Artifacts analysis of Linux & Mac (EXT & HFS+)
Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative
Securing Data on Portable Media. www.roxio.com
Securing Data on Portable Media www.roxio.com Contents 2 Contents 3 Introduction 4 1 The Importance of Data Security 5 2 Roxio Secure 5 Security Means Strong Encryption 6 Policy Control of Encryption 7
Viewpoint ediscovery Services
Xerox Legal Services Viewpoint ediscovery Platform Technical Brief Viewpoint ediscovery Services Viewpoint by Xerox delivers a flexible approach to ediscovery designed to help you manage your litigation,
See Criminal Internet Communication as it Happens.
A PRODUCT OF See Criminal Internet Communication as it Happens. In Real Time or Recreated. From the Field or From Your Desk. That s Intelligence. That s Intellego. 2 / Visual Reconstruction & Analysis
Chapter 4. Operating Systems and File Management
Chapter 4 Operating Systems and File Management Chapter Contents Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup
Digital Forensics at the National Institute of Standards and Technology
NISTIR 7490 Digital Forensics at the National Institute of Standards and Technology James R. Lyle Douglas R. White Richard P. Ayers NISTIR 7490 Digital Forensics at the National Institute of Standards
RecoverIt Frequently Asked Questions
RecoverIt Frequently Asked Questions Windows Recovery FAQs When can I use Windows Recovery application? This application is used to recover the deleted files from internal or external storage devices with
Understanding Flash SSD Performance
Understanding Flash SSD Performance Douglas Dumitru CTO EasyCo LLC August 16, 2007 DRAFT Flash based Solid State Drives are quickly becoming popular in a wide variety of applications. Most people think
Chapter 7 Securing Information Systems
1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,
Master of Science in Information Systems & Security Management. Courses Descriptions
Master of Science in Information Systems & Security Management Security Related Courses Courses Descriptions ISSM 530. Information Security. 1 st Semester. Lect. 3, 3 credits. This is an introductory course
CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 1A: Introduction to Forensics Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Digital Forensics You will learn in this module: The principals of computer
In the Cloud. Scoville Memorial Library February, 2013 [email protected]
In the Cloud Scoville Memorial Library February, 2013 [email protected] What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the
Republic Polytechnic School of Information and Communications Technology C226 Operating System Concepts. Module Curriculum
Republic Polytechnic School of Information and Communications Technology C6 Operating System Concepts Module Curriculum Module Description: This module examines the fundamental components of single computer
