SYSTEM FORENSICS INVESTIGATORS HAVE MANY PLATFORMS and tools to turn
|
|
|
- Julianna Alicia Wilcox
- 9 years ago
- Views:
Transcription
1 System Forensics Resources CHAPTER 15 SYSTEM FORENSICS INVESTIGATORS HAVE MANY PLATFORMS and tools to turn to in their work, whether strengthening a system against attack or dealing with the consequences of a cyberattack. Add to your knowledge by doing the following: Studying for forensic certifications Earning a college or university degree in digital forensics Networking with professionals in the field Joining user groups and online discussion groups Attending lectures, conferences, and events Reading books, articles, and Web sites This chapter discusses resources for system forensics. It begins by looking at some of the available system forensics training programs and certifications. It then provides lists of system forensics resources. Finally, it supplies URLs for forensic organizations and information sources, journals related to system forensics, and software and hardware forensic tools. Chapter 15 Topics This chapter covers the following topics and concepts: What system forensics training and certifications are available What system forensics user groups exist What online system forensics resources are available 289
2 Chapter 15 Goals When you complete this chapter, you will be able to: Understand what system forensics training programs and certifications are available Locate a local chapter of a system forensics user group Access online resources for system forensics System Forensics Certification and Training Numerous organizations offer certification programs for system TIP forensics. These programs usually test a student after completing Before enlisting in a certification one or more training sessions successfully. Certifying organizations range from nonprofit associations to vendor-sponsored program, thoroughly research the program s requirements, cost, groups. All these programs charge fees for certification. Some and acceptability in your chosen require candidates to take vendor- or organization-sponsored area of employment. Most training to qualify for the certification. certification programs require Some state and federal government agencies have established continuing education credits or their own certification programs. These programs address the re-examination of candidates skills needed to conduct computing investigations at various skills. This can become costly. levels. In addition, a number of universities and other organizations offer courses in system forensics. The following sections describe some of the most prominent system forensics training programs and certifications. International Association of Computer Investigative Specialists (IACIS) The International Association of Computer Investigative Specialists (IACIS) is one of the oldest professional system forensics organizations. It was created by police officers who wanted to formalize credentials in computing investigations. Currently, IACIS limits membership. Only law enforcement personnel and government employees working as system forensics examiners may join. IACIS conducts an annual two-week training course for qualified members. Students learn to interpret and trace , acquire evidence properly, identify operating systems, recover data, and understand encryption theory and other topics. Students must pass a written exam before continuing to the next level. Passing the exam earns the student Certified Electronic Evidence Collection Specialist (CEECS) status. 290
3 CHAPTER 15 System Forensics Resources 291 Other candidates who complete all parts of the IACIS test successfully receive Certified Forensic Computer Examiner (CFCE) certification. The CFCE process changes as technology changes. Topics include data hiding, determining file types of disguised files, and accessing password-protected files. The program might also ask a student to find evidence and draw conclusions from it. Students must demonstrate proficiency in technical tools and deductive reasoning. For the latest information about IACIS, visit its Web site, IACIS requires recertification every three years to demonstrate continuing work in the field of system forensics. Recertification is less intense than the original certification. High Tech Crime Network (HTCN) High Tech Crime Network (HTCN) offers several levels of certification, with different requirements: Certified Computer Crime Investigator, Basic Certified Computer Crime Investigator, Advanced Certified Computer Forensic Technician, Basic Certified Computer Forensic Technician, Advanced HTCN certification is open to anyone in a computing investigations profession. Unlike IACIS, HTCN requires a review of all related training. This includes training in one of its approved courses, a written test for the specific certification, and a review of the candidate s work history. The HTCN Web site, specifies requirements for the various certification levels. EnCase Certified Examiner (EnCE) Certification Guidance Software, the creator of the EnCase software, sponsors the EnCase Certified Examiner (EnCE) certification program. EnCE certification is open to the public and private sectors. This certification focuses on the use and mastery of system forensics analysis using EnCase. For more information on EnCE certification requirements, visit AccessData Certified Examiner (ACE) AccessData is the creator of Forensic Toolkit (FTK) software. AccessData sponsors the AccessData Certified Examiner (ACE) certification program. ACE certification is open to the public and private sectors. This certification is specific to use and mastery of FTK. Requirements for taking the ACE exam include completing the AccessData boot camp and Windows forensic courses. For more information on ACE certification, visit 15 System Forensics Resources
4 292 PART 3 Incident Response, Future Directions, and Resources Defense Cyber Investigations Training Academy (DCITA) The Defense Cyber Investigations Training Academy (DCITA) develops and delivers com puter investigation training courses for government and law enforcement organizations. DCITA is accredited through the Council of Occupational Education (COE). DCITA is a government organization dedicated to computer investigations training, development, and delivery. It uses state-of-the-art equipment, classrooms, and technologies to train students in digital forensics techniques. DCITA s training topics include the following: How to perform computer search and seizure How to investigate network intrusions How to forensically analyze computer media How to perform basic and advanced forensic examinations For more information on DCITA training, see Other Training Programs and Certifications Besides those already listed, other organizations offer certification programs and related training programs. The following are some of these other organizations and universities that offer certification and training: ComputerTechnologyInvestigatorsNetwork(CTIN) CyberSecurityInstitute DIBSUSA,Inc. Federal Bureau of Investigation Academy academy.htm FederalLawEnforcementTrainingCenter(FLETC) FloridaAssociationofComputerCrimeInvestigators,Inc. Forensic Association of Computer Technologists GlobalDigitalForensics %20training.htm HenryC.LeeCollegeofCriminalJusticeandForensicSciences HighTechCrimeInstitute HighTechnologyCrimeInvestigationAssociation(HTCIA) IndianaForensicInstitute Institute of Police Technology and Management InternationalSocietyofForensicComputerExaminers -computer-examiner.com NationalCenterforForensicScience National White Collar Crime Center (NW3C)
5 CHAPTER 15 System Forensics Resources 293 NewTechnologies,Inc.(NTI) Paraben RegionalComputerForensicsLaboratories(RCFLs)Program SANSInstitute TechnicalResourceCenter UticaCollegeEconomicCrimeInstitute institutes/ecii/ WisconsinAssociationofComputerCrimeInvestigators User Groups A system forensics user group is a good way for you to keep up with the latest tools and trends. Two organizations to consider joining are: HighTechnologyCrimeInvestigationAssociation(HTCIA) HTCIA enables members to share information, experience, ideas, and knowledge with one another. Members discuss methods, processes, and techniques related to investigations and security in advanced technologies. See for more information. ComputerTechnologyInvestigatorsNetwork(CTIN) CTIN provides instruction, presentations, and monthly meetings. It enables discussions on high-tech crime, investigative strategies, and tools. CTIN includes members of federal, state, and local law enforcement. It also includes members from corporate security, educational institutions, and the computer science community. Web site access is available to members only. Membership is free. See for more information. Online Resources The following sections provide lists of online system forensics resources. They start with an inventory of forensic organizations and information sources. Then they catalog discussion list servers, journals, and conferences related to system forensics. Finally, they list open source and commercial software tools as well as commercial hardware tools. System Forensics Organizations and Information AmericanAcademyofForensicSciences ComputerForensics,CybercrimeandSteganographyResources ComputerForensicsWorld DepartmentofDefenseCyberCrimeCenter(DC3) DepartmentofJusticeComputerCrime&IntellectualPropertySection DigitalForensicResearchWorkshop 15 System Forensics Resources
6 294 PART 3 Incident Response, Future Directions, and Resources ElectronicEvidenceInformationCenter FederalBureauofInvestigationComputerAnalysisandResponseTeam FederalBureauofInvestigationCyberInvestigations cyberinvest/cyberhome.htm ForensicFocus:ComputerForensicsNews,InformationandCommunity ForensicsWiki GlobalDigitalForensics %20FORENSIC%20RESOURCES.htm HighTechCrimeConsortium HighTechnologyCrimeInvestigationAssociation(HTCIA) InformationSystemsSecurityAssociation(ISSA) InternationalAssociationofComputerInvestigativeSpecialists(IACIS) InternationalOrganizationonComputerEvidence NationalCenterforForensicScience NationalCriminalJusticeComputerLaboratoryandTrainingCenter NationalInstituteofJusticeElectronicCrime technology/electronic-crime/welcome.htm NationalInstituteofStandardsandTechnologyComputerForensicsToolTesting (CFTT) NationalWhiteCollarCrimeCenter Discussion List Servers ComputerForensicInvestigatorsDigestListserv(CFID) For subscription information, see or [email protected] ComputerForensicsToolTesting(CFTT) For subscription information, see groups.yahoo.com/group/cftt SecurityFocus:BinaryAnalysis [email protected] SecurityFocus:Forensics [email protected] SecurityFocus:Honeypots [email protected] SecurityFocus:Incidents [email protected] SecurityFocus:LogAnalysis [email protected] SecurityFocus:PhishingandBotnets [email protected] SecurityFocus:RealCases [email protected]
7 CHAPTER 15 System Forensics Resources 295 Forensic Journals DigitalInvestigation Digital Investigation covers cutting-edge developments in digital forensics and incident response from around the globe. It covers new technologies, useful tools, relevant research, investigative techniques, and methods for handling security breaches. See InternationalJournalofDigitalCrimeandForensics(IJDCF) IJDCF provides state-of-the-art coverage of issues related to digital evidence. IJDCF addresses the use of electronic devices and software for crime prevention and investigation. It contains high-quality theoretical and empirical research articles, research reviews, case studies, book reviews, tutorials, and editorials. See Bookstore/TitleDetails.aspx?TitleId=1112. International Journal of Digital Evidence (IJDE) IJDE is a forum for discussion of theory, research, policy, and practice in the rapidly changing field of digital evidence. IJDE is supported by the Economic Crime Institute (ECI) at Utica College. See ijde.org. Journal of Digital Forensic Practice The Journal of Digital Forensic Practice is a helpful resource for forensic specialists. Articles in the journal target both the public and private sectors. They present useful information, techniques, and unbiased reviews designed to assist forensic specialists in day-to-day practice. See JournalofDigitalForensics,SecurityandLaw(JDFSL) JDFSL is a unique and innovative publication of the Association of Digital Forensics, Security and Law. The mission of JDFSL is to expand digital forensics research to a wide and eclectic audience. See JournalofForensicSciences The American Academy of Forensic Sciences produces the Journal of Forensic Sciences. This organization is a multidisciplinary professional organization. The academy aims to promote integrity, competency, education, research, practice, and collaboration in the forensic sciences. See SmallScaleDigitalDeviceForensicsJournal(SSDDFJ) SSDDFJ is an online journal for academics and practitioners. It publishes articles regarding theory, research, and practice in the rapidly changing field of small-scale digital device forensics. SSDDFJ is supported by the Cyber Forensics Lab (CFL) at Purdue University. See Conferences AmericanAcademyofForensicSciences asp?section_id=meetings&page_id=aafs_annual_meeting AssociationofDigitalForensicsSecurityandLaw(ADFSL)ConferenceonDigital Forensics,SecurityandLaw 15 System Forensics Resources
8 296 PART 3 Incident Response, Future Directions, and Resources BlackHatBriefings&Training ChicagoCon WhiteHatsComeTogetherinDefenseoftheDigitalFrontier ComputerandEnterpriseInvestigationsConference(CEIC) DepartmentofDefenseCyberCrimeConference DFRWS(DigitalForensicsResearchConference) ediscoverysummit ForumofIncidentResponseandSecurityTeams(FIRST)Conference HTCIAInternationalTrainingConferenceandExpo index.shtml IACISComputerForensicTrainingEvent MobileForensicsWorldTrainingConference OpenSourceSoftwareforComputerandNetworkForensics RegionalComputerForensicsGroupConference(RCFG) SANSComputerForensics SANSFIRE(SANSForensics,Investigations,Response,Education) SystematicApproachestoDigitalForensicEngineering(SADFE) TechnoForensicsConference TechnoSecurityConference Forensic Tools Forensic tools can be hardware or software. Software forensics tools can be either open source or commercial. Commercial forensic software ranges in price. Some products cost very little, and others are so costly that only large companies can afford them. The following sections provide Web addresses for a number of tools. Mares and Company ( lists dozens of system forensics tools, both commercial and open source. Open Source Software Tools AutopsyForensicBrowser Autopsy Forensic Browser is a graphical interface to the command-line digital investigation tools in The Sleuth Kit (TSK). Together, these tools enable investigation of the file system and volumes of a computer. See
9 CHAPTER 15 System Forensics Resources 297 BitPim BitPim allows an investigator to view and manipulate data on many mobile phones. See TheSleuthKit(TSK) TSK is a tool that runs on Windows and UNIX systems, such as Linux, OS X, Cygwin, FreeBSD, OpenBSD, and Solaris. Use it to analyze NTFS, FAT, HFS+, Ext2, Ext3, UFS1, and UFS2 file systems and several volume system types. See Open source tools are available online at a number of sites. For more information on open source forensic tools and links to open source tools, see the site Open Source Digital Forensics, at Also, see the Open Source Computer Forensics Manual, at Commercial Software Tools and Vendors AccuBurn R-AccuBurn-R produces exact copies of disks that have been imaged using CD/DVD Inspector. It supports all types and formats of disks. See ASRDataAcquisition&Analysis ASR Data Acquisition & Analysis offers a variety of software: SMART Linux, SMART for Linux, SmartMount (Windows/Linux/ Macintosh), Grok-NTFS (Windows/Linux/Macintosh), and Grok-LNK (Windows/ Linux/Macintosh). These products are customized for forensic work, integrated acquisition, authentication, and analysis. See BlackBagTechnologies,Inc. BlackBag offers several forensic software products, including Mobilyze, SoftBlock, Macintosh Forensic Suite, and MacQuisition CF. Below are some product details (for even more information on Blackbag s tools, see Mobilyze was designed to forensically analyze iphone, ipod Touch, and ipad devices. The product is capable of analyzing multiple devices simultaneously, easing the time and effort of consolidating findings into one comprehensive report. SoftBlock is kernel-based, write-blocking software for Macs that identifies devices when they connect. It can mount a device in a forensically sound read-only manner. It can also mount a device in a conventional read/write configuration. SoftBlock offers flexibility, security, and speed in previewing and analyzing evidence across a number of devices. MacintoshForensicSuite is a unique set of 19 tools that gives forensic examiners a flexible, open analysis environment. The suite is specifically designed for Mac OS X versions 10.1 and higher. The applications speed an examiner s analysis time while ensuring a thorough investigation of the drive. MacQuisitionCF is an external bootable forensic acquisition tool that safely and easily images Mac drives using the suspect system. MacQuisition provides an intuitive user interface. The tool automatically generates hashes. 15 System Forensics Resources
10 298 PART 3 Incident Response, Future Directions, and Resources ComputerCOP ComputerCOP has developed two unique forensic tools: Professional and Forensic Examiner. For information on both tools, see ComputerCOPProfessional is an automated search tool that allows an examiner to immediately find electronic evidence for trial. Many supervision officers use it to monitor probationers and parolees computer use. ComputerCOPForensicExamineris a field forensic solution. It acts as both an automated forensic search software and a simple-to-connect write blocker. Darik sbootandnuke(dban) DBAN is a self-contained boot disk that securely wipes the hard disks of most computers. DBAN automatically and completely deletes the contents of any hard disk that it can detect. It is a useful utility for bulk or emergency data destruction. See DataLifter DataLifter is a suite of products designed to assist with computer forensics. DataLifter Forensicware Solution package contains investigative tools and comes in two versions: DataLifter and DataLifter.Net Bonus Tools. Two additional packages, DataLifter Digital Companion and DataLifter File Extractor Pro, are add-ons or major updates to tools already included with DataLifter or DataLifter.Net Bonus Tools. See DigitalDetective Digital Detective offers Blade, HstEx, and NetAnalysis. For more information on all these tools, see Blade is a Windows-based data recovery solution. It supports plug-ins that give it advanced data recovery and analysis capabilities. HstEx is a Windows-based data recovery solution. It is designed to recover browser artifacts and Internet history. HstEx supports all major forensic image formats. NetAnalysis is software for the recovery and analysis of Internet browser artifacts. DigitalIntelligence Digital Intelligence, Inc., offers forensic hardware and software. Its software products include DRIVESPY, IMAGE, PART, PDBlock, and PDWipe. For information on all these products, see DRIVESPYprocesses large hard drives, FAT12/16/16x/32/32x partitions, hidden DOS partitions, and non-dos partitions. It investigates long filenames, file dates, erased files, slack space, and unallocated space. IMAGE is a standalone utility that generates physical images of floppy disks. The program is capable of generating highly compressed images for forensic analysis. PART is a partition manager. It lists summary information about all the partitions on a hard disk. It also switches bootable partitions and even hides and unhides DOS partitions. PDBlock is a write blocker. It provides customary write protection from Interrupt 13 disk access methods. PDWipe is a standalone utility capable of quickly wiping large hard drives.
11 CHAPTER 15 System Forensics Resources 299 DirectorySnoop This data recovery tool is a cluster-level search tool. It allows Windows users to search FAT and NTFS-formatted disk drives to see what data may be hiding. Directory Snoop can recover deleted files and permanently erase sensitive files. See dtsearch The dtsearch product line can instantly search terabytes of text across a desktop, network, Internet, or intranet site. See e-fense e-fense produces both Helix3 and Live Response. For more information on both of these products, see Helix3Enterprise(H3E) provides incident response, computer forensics, and e-discovery in one interface. The Helix3 Pro edition software is available to e-fense forum members only. LiveResponse allows a forensic examiner to acquire volatile data, such as Internet history, screen capture, and memory. The examiner can move this data from a suspect system onto a USB thumb drive. ForensicToolkit(FTK) This court-validated digital investigations platform delivers computer forensics analysis, decryption, and password cracking. FTK 3 is fast and provides enterprise-class scalability. See Foundstone Foundstone is a source for a number of free forensic tools. PatchIt is a file byte-patching utility. DumpAutoComplete is an application that searches for the default Firefox profile of the user who runs the tool and dumps the AutoComplete cache in XML format to standard output. Galleta is an Internet Explorer cookie forensic analysis tool. BinText can extract text from any kind of file and includes the ability to find plain ASCII text, Unicode text, and resource strings. Vision shows all open TCP and UDP ports and maps them to the owning process or application. Pasco is an Internet Explorer activity forensic analysis tool. NTLast is a security audit tool for Windows NT. Rifiuti is a Recycle Bin forensic analysis tool. See GuidanceSoftware Guidance Software offers a number of EnCase products, including Enterprise, ediscovery, Forensic, and Portable. For more information on all these products, see EnCaseEnterprise allows the deepest level of visibility into laptops, desktops, file servers, and servers. Use it to investigate human resources matters or to quickly determine the root cause of suspicious network activity. EnCaseeDiscovery performs search, collection, preservation, and processing in a forensically sound manner. It collects and processes only potentially relevant data. EnCaseForensic gives you the ability to image a drive and preserve it in a forensically sound manner. The EnCase evidence file format is a digital evidence container validated and approved by courts worldwide. EnCase Forensic also contains a full suite of analysis, bookmarking, and reporting features. EnCasePortable is a pocket-sized USB data collection and triage solution. Even non-experts can use EnCase Portable so that specialists can focus on case management, processing, detailed analysis, and reporting. 15 System Forensics Resources
12 300 PART 3 Incident Response, Future Directions, and Resources ILookPI ILookPI is an advanced digital evidence toolset. It includes imaging software and also enables virus/trojan search and identification. Its analysis features are designed to reduce investigative time while providing focus and clarity. See L0phtCrack L0phtCrack is password auditing and recovery software offered in three versions: L0phtCrack Professional, Administrator, and Consultant. See M-Sweep This tool can repeatedly overwrite ambient computer data storage areas. See NewTechnologies,Inc.(NTI) NTI offers a number of tools and software suites, including AnaDisk, Filter_G, GFE Stealth, SafeBack, TextSearch Plus, and CopyQM Plus. For more information on NTI products, see AnaDisk software identifies data storage anomalies on floppy diskettes and generic hardware in the form of floppy disk controllers. BIOS are needed when using this software. AnaDisk works at a very low level and makes maximum use of the floppy diskette hardware. The software also has limited search capabilities, and you can use it to copy abnormal diskettes. Apply it as well to write data at a physical sector level and to format diskettes using any number of combinations. Filter_G is a forensic English grammar filter utility used to quickly make sense of nonsense in the analysis of ambient data sources, e.g., Windows swap/page files, file slack, and data associated with erased files. Filter_G is a patented fuzzy logic filter that quickly identifies patterns of English language grammar in ambient data files. Use it as a sampling tool. It is particularly useful for evaluating Windows swap/page files. GFEStealth, NTI s forensic graphics image file extractor, is a computer forensics software tool which was designed to automatically extract exact copies of graphics file images from ambient data sources and from SafeBack bit stream image backup files. SafeBack creates mirror-image (bit-stream) backup files of hard disks or makes a mirror-image copy of an entire hard disk drive or partition. TextSearchPlus is software that quickly searches hard disk drives, zip disks, and floppy diskettes for keywords or specific patterns of text. It operates at either a logical or physical level at the user s option. CopyQMPlus essentially turns a PC into a disk duplicator. In a single pass, it formats, copies, and verifies a disk. This capability is useful for system forensics specialists who need to preconfigure CDs for specific uses and duplicate them. NortonGhost Norton Ghost creates full system and file backups, including settings, applications, and files. It also restores from system failures and enables convenient, secure offsite backups. See NotestheRipper This computer forensic and electronic discovery tool quickly and safely analyzes and extracts data from Lotus Notes NSF files. See
13 CHAPTER 15 System Forensics Resources 301 Ontrack Ontrack provides slack space and data recovery tools. See ParabenForensicTools Paraben Forensic Tools produces a number of tools, including Device Seizure and P2 Commander. For more information on these tools, see DeviceSeizure is a forensic investigation tool for handheld devices. P2Commander is a comprehensive digital forensic tool. It examines and chat logs. Use it as well for file sorting and Internet file analysis. p d d Pdd (Palm dd) is a Windows-based tool for memory imaging and forensic acquisition of data from the Palm OS family of PDAs. Pdd preserves the crime scene by obtaining a bit-by-bit image or snapshot of the Palm device s memory contents. See ProcessMonitor Process Monitor is an advanced monitoring tool for Windows that shows real-time file system, registry, and process/thread activity. It combines the features of two legacy utilities, Filemon and Regmon, and adds an extensive list of enhancements. See SnapBackExact This server-based backup and restore program for Windows servers features full open file management, remote administration, and backup scheduling. It copies an actual byte-by-byte copy of a server hard drive to tape while the backup is running and files are open and being modified. See TechAssist,Inc.(ToolsThatWork) Tech Assist offers a variety of forensic software products, including BringBack, ByteBack, and Omniquad Detective. For information on all these tools, visit the Web at BringBack enables easy-to-use and highly successful file recovery for Windows and Linux operating systems. It also works on digital images stored on memory cards and more. ByteBackDataRecoveryInvestigativeSuite allows forensic examiners to recover data, repair logical damage, and verify the integrity of an investigation. OmniquadDetective is a Windows-driven search-and-report utility. It can make searching for images and keywords simple and fast. TechnologyPathwaysTools Technology Pathways offers the ProDiscover Family of tools, including Forensics and Incident Response. For more information on these tools, see ProDiscoverForensics is a Windows application for the collection, analysis, management, and reporting of evidence. It supports all Windows-based file systems in addition to file systems such as Sun Solaris UFS and Linux Ext 2/3. ProDiscoverIncidentResponse turns the ProDiscover Forensics workstation product into a client/server application. It allows disk preview, imaging, and analysis over any TCP/IP network. It also allows live disk preview, imaging, and analysis. In addition, it includes advanced tools for incident response to cyberattacks. 15 System Forensics Resources
14 302 PART 3 Incident Response, Future Directions, and Resources ThumbsDisplay This tool examines and reports on the contents of Thumbs.db files used by Windows. ThumbsDisplay prints a full-page version of thumbnail images without any other graphics programs being required. See forensicsoftware.html. ThumbsPlus This tool provides database and thumbnail organization, image viewing and editing, and folder and file organization. See thumbnails.shtml. VisualTimeAnalyzer Visual TimeAnalyzer automatically tracks all computer use and activities, including working time and pauses. It presents detailed, richly illustrated reports. See X-WaysSoftwareTechnologyAG X-Ways produces a number of products, including Evidor, X-Ways Forensics, and WinHex. For more information on all these products, see Evidor searches text on hard disks and retrieves the context of keyword occurrences on computer media. It examines the entire allocated space as well as currently unallocated space and slack space. That means it even finds data from files that have been deleted if the files still exist physically. X-WaysForensics X-Ways Forensics is an advanced work environment for system forensics examiners. It s integrated with the WinHex hex and disk editor. WinHex is a system forensics, data recovery, and IT security tool that includes a hex editor, disk editor, and RAM editor. Zdziarski sforensicguidefortheiphone Jonathan Zdziarski s forensic technique for iphones provides a way to make a bit-by-bit copy of the original media. By analyzing the image this method provides, discover a wealth of information that other tools can t provide. Site access is freely available to full-time, active-duty law enforcement or military personnel tasked with mobile forensic imaging as part of their duties. See Commercial Hardware Tools and Vendors DIBSUSA,Inc. DIBS USA, Inc., produces a range of computer forensics hardware and software. Its products are specifically designed to copy, analyze, and present computer data in a forensically sound manner. DIBS Mobile Forensic Workstation is for on-site collection and analysis of suspect computer data. DIBS Advanced Forensic Workstation is for laboratory-based collection and analysis of suspect computer data. DIBS Rapid Action Imaging Device (RAID) enables fast copying of suspect hard drives. See ForensicComputers,Inc. Forensic Computers, Inc., offers forensic workstations, hardware, accessories, and software. It sells write-protection kits, forensic bridges, adaptors, hardware accelerators, hard disk drive erasure tools, and more. See
15 CHAPTER 15 System Forensics Resources 303 ForensicPC.com ForensicPC.com sells forensic workstations and forensic computer systems, including laboratory and portable stations. It also offers forensic acquisition devices, drive bays, tools, and kits. In addition, if offers write blockers and forensic software. See FRED(ForensicRecoveryofEvidenceDevice) Digital Intelligence, Inc., produces devices, write blockers, networks, and the FRED family of forensic workstations. FRED workstations are integrated forensic processing platforms available in mobile, stationary, and laboratory configurations. These systems are designed for both the acquisition and examination of computer evidence. Digital Intelligence, Inc., products enable you to easily duplicate evidence directly from hard drives and other media in a forensically sound manner. See IntelligentComputerSolutions Intelligent Computer Solutions produces a wide variety of forensic products. Image MASSter Solo-4 is a high-speed, handheld hard drive duplication device. RoadMASSter-3 is a portable forensic station. Intelligent Computer Solutions also produces multi-drive duplicators, write protectors, and hard drive encryption products. See Kazeon Kazeon offers both software forensics products and hardware devices. The Information Server product line creates a content and metadata index, applies classification rules and policies, and enables automated or manual searching, reporting, and action on resulting data sets. Information Center allows corporations with distributed information to create groups of clusters to deliver administrators a data management capability across all Information Server installations. Information Center also allows a unified search and unified reporting capability across clusters. See Logicube Logicube provides hard drive duplication and computer forensics systems. Logicube s hard drive cloning systems offer high-speed solutions for copying hard drives, drive formatting, data recovery, and disaster recovery. Logicube s products include Echo Plus, SuperSonix, OmniClone Xi series, OmniSCSI, and OmniSAS hard drive duplicators. See MOBILedit MOBILedit! Forensic is a mobile phone investigation tool. It extracts all content from a device and generates a forensic report ready for courtroom presentation. See MyKeyTechnology,Inc. MyKey Technology, Inc., produces NoWrite FPU, a FireWire write blocker. It also produces NoWrite FlashBlock II, a write-blocker add-on for compact flash and digital media. See ParabenForensicTools In addition to forensic software, Paraben provides cell phone cable kits, hard drive lockdown devices, signal blocking bags, and other forensic hardware to support investigations. See 15 System Forensics Resources
16 304 PART 3 Incident Response, Future Directions, and Resources SecureKitforForensics This software and hardware solution provides law enforcement, corporate security, and forensic consultants with logical data extraction of the content stored in a mobile phone. Susteen also provides Secure View Mobile, a standalone mobile forensics solution to extract mobile phone data at the touch of a button. See UFED(UniversalForensicExtractionDevice)System CelleBrite UFED is a standalone device for use in the field as well as in the forensics labs. UFED can extract vital data, such as phonebook, pictures, videos, text messages, and call logs from 2,500 models of handsets sold worldwide. UFED system supports almost all mobile phones on the market today, including smartphones and PDA devices. UFED easily stores hundreds of phonebooks and content items onto an SD card or USB flash drive. Extractions can then be brought back to the forensics lab for review and verification using the reporting/analysis tool. See WiebeTech WiebeTech produces a variety of forensic products. USB WriteBlocker is for in-line USB write-blocking. RTX400-QR is a RAID in a portable enclosure. Forensic UltraDock is a quad-interface, write-blocking imager. Forensic Notebook DriveDock provides write-block access to 2.5-inch notebook drives via FireWire. HotPlug lets a forensic specialist move a computer to battery power and transport it elsewhere without ever shutting it down. WiebeTech also offers forensic field kits. See
17 CHAPTER 15 System Forensics Resources 305 CHAPTER SUMMARY This chapter discusses a variety of system forensics resources. It begins by discussing training and certifications available in the field of system forensics. It also lists other system forensics resources, such as user groups, conferences, and list servers. It provides URLs for forensic organizations and information sources, journals related to system forensics, and software and hardware forensics tools. KEY CONCEPTS AND TERMS Certification CHAPTER 15 ASSESSMENT 1.A number of free system forensics certification programs are available. A. True B. False 2.EnCE stands for. 3.Which of the following is a government organization dedicated to computer investigations training, development, and delivery? A. IACIS B. HTCN C. EnCE D. DCITA 4. Being a member of a is a good way for a forensic specialist to keep up with the latest tools and trends. 5.The field of system forensics is so young that not many resources exist. A. True B. False 15 System Forensics Resources
18
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING MODULE A INTRODUCTION TO COMPUTER FORENSICS AND NVESTIGATIONS A1.0 Explain concepts related to computer forensics. A1.1 This module is measured
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 4 Current Computer Forensics Tools Objectives Understand how to identify needs for computer forensics tools Evaluate the requirements
Useful Computer Forensics Tools Updated: Jun 10, 2003
Useful Computer Forensics Tools Updated: Jun 10, 2003 ProDiscover http://www.techpathways.com Platforms: (Windows NT/2000) ProDiscover is a disk forensics tool with the capabilities of many utilities into
2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.
Acquisition and Tools COMP 2555: Principles of Computer Forensics Autumn 2014 http://www.cs.du.edu/2555 1 Planning Your Investigation! A basic investigation plan should include the following activities:!
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL)
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL) COURSE DESCRIPTION: Computer Forensics is focused on teaching
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 9 Data Acquisition Objectives Determine the best acquisition method Plan data-recovery contingencies Use MS-DOS acquisition tools
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
HAVE YOUR COMPUTER FORENSICS TOOLS BEEN TESTED?
Contact: James Lyle Computer Forensics Tool Testing Program Office of Law Enforcement Standards National Institute of Standards and Technology HAVE YOUR COMPUTER FORENSICS TOOLS BEEN TESTED? NIJ, DHS,
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
Chapter 3: The Investigator s Office and Laboratory
Chapter 3: The Investigator s Office and Laboratory Dept. of Computer Science 1 Objectives Describe certification requirements for computer forensics labs List physical requirements for a computer forensics
Modern Digital Forensics!!
ISA 785 Research in Digital Forensics Modern Digital Forensics!! ISA 785! Angelos Stavrou, George Mason University! Modern Digital Forensics What s New 2! New Intellectual property concerns! IP/Brand related
Digital Forensics. Tom Pigg Executive Director Tennessee CSEC
Digital Forensics Tom Pigg Executive Director Tennessee CSEC Definitions Digital forensics Involves obtaining and analyzing digital information as evidence in civil, criminal, or administrative cases Analyze
Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012
Just EnCase Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 What is e-discovery Electronically Stored Information (ESI) Discover or Monitor for Fraudulent Activity Tools used
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE Vahidin Đaltur, Kemal Hajdarević, Internacional Burch University, Faculty of Information Technlogy 71000 Sarajevo, Bosnia
EnCase Portable. Extend Your Forensic Reach with Powerful Triage & Data Collection
GUIDANCE SOFTWARE EnCase Portable EnCase Portable Extend Your Forensic Reach with Powerful Triage & Data Collection GUIDANCE SOFTWARE EnCase Portable EnCase Portable Triage and Collect with EnCase Portable
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT
ITU Session Four: Device Imaging And Analysis Mounir Kamal Q-CERT 2 Applying Forensic Science to Computer Systems Like a Detective, the archaeologist searches for clues in order to discover and reconstruct
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
Chapter 4. Operating Systems and File Management
Chapter 4 Operating Systems and File Management Chapter Contents Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup
STUDY GUIDE CHAPTER 4
STUDY GUIDE CHAPTER 4 True/False Indicate whether the statement is true or false. 1. A(n) desktop operating system is designed for a desktop or notebook personal computer. 2. A(n) mirrored user interface
Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014
Chapter Contents Operating Systems and File Management Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup Security
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012 Jan Balatka, Deloitte Czech Republic, Analytic & Forensic Technology unit Agenda Introduction ediscovery investigation
Chapter 8 Operating Systems and Utility Programs
Operating Systems What are the functions of an? start the computer provide a user interface manage programs Chapter 8 Operating Systems and Utility Programs administer security control a network manage
Chapter 7 Securing Information Systems
1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,
Course Title: Computer Forensic Specialist: Data and Image Files
Course Title: Computer Forensic Specialist: Data and Image Files Page 1 of 9 Course Description The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute
CYBER FORENSICS (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 CYBER FORENSICS (W/LAB) Course Syllabus Course Number: CSFS-0020 OHLAP Credit: Yes OCAS Code: 8134 Course Length: 130 Hours Career Cluster: Information
CDFE Certified Digital Forensics Examiner (CFED Replacement)
Course: CDFE Certified Digital Forensics Examiner (CFED Replacement) Description: Price: $3,450.00 Category: Popular Courses Duration: 5 days Schedule: Request Dates Outline: COURSE OVERVIEW Computer Forensics
Digital Forensics. Larry Daniel
Digital Forensics Larry Daniel Introduction A recent research report from The Yankee Group found that 67.6 percent of US households in 2002 contained at least one PC The investigators foresee three-quarters
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR Supervised by : Dr. Lo'ai Tawalbeh New York Institute of Technology (NYIT)-Jordan X-Ways Software Technology AG is a stock corporation
Forensics on the Windows Platform, Part Two
1 of 5 9/27/2006 3:52 PM Forensics on the Windows Platform, Part Two Jamie Morris 2003-02-11 Introduction This is the second of a two-part series of articles discussing the use of computer forensics in
State of the art of Digital Forensic Techniques
State of the art of Digital Forensic Techniques Enos K. Mabuto 1, H. S Venter 2 Department of Computer Science University of Pretoria, Pretoria, 0002, South Africa Tel: +27 12 420 3654 Email: [email protected]
CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 4A: Forensic Processes Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Forensics Processes - objectives Investigation Process Forensic Ethics Issues Forensic
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
Digital Forensics, ediscovery and Electronic Evidence
Digital Forensics, ediscovery and Electronic Evidence By Digital Forensics What Is It? Forensics is the use of science and technology to investigate and establish facts in a court of law. Digital forensics
Where is computer forensics used?
What is computer forensics? The preservation, recovery, analysis and reporting of digital artifacts including information stored on computers, storage media (such as a hard disk or CD-ROM), an electronic
Certified Digital Forensics Examiner
Cyber Security Training & Consulting Certified Digital COURSE OVERVIEW 5 Days 40 CPE Credits $3,000 Digital is the investigation and recovery of data contained in digital devices. This data is often the
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
CCE Certification Competencies
CCE Certification Competencies May 10, 2012 Page 1 The Certified Computer Examiner (CCE) has evolved into one of the most desired certifications in the computer forensics industry. The certification is
EnCase Forensic Product Overview
GUIDANCE SOFTWARE EnCase Forensic EnCase Forensic Product Overview The Standard in Digital Investigations GUIDANCE SOFTWARE EnCase Forensic EnCase Forensic Version 7 The mission of Guidance Software has
CatDV Pro Workgroup Serve r
Architectural Overview CatDV Pro Workgroup Server Square Box Systems Ltd May 2003 The CatDV Pro client application is a standalone desktop application, providing video logging and media cataloging capability
ACE STUDY GUIDE. 3. Which Imager pane shows information specific to file systems such as HFS+, NTFS, and Ext2? - Properties Pane
ACE STUDY GUIDE *Note* All of the actual exam questions are in multiple choice format. This Study Guide is designed to cover all of the material on the exam, 1. FTK Imager supports the encryption of forensic
Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4.
Chapter 8 Objectives Chapter 8 Operating Systems and Utility Programs Identify the the types types of of system software Summarize the the startup process on on a a personal computer Describe the the functions
Digital Forensic Techniques
Digital Forensic Techniques Namrata Choudhury, Sr. Principal Information Security Analyst, Symantec Corporation Professional Techniques T23 CRISC CGEIT CISM CISA AGENDA Computer Forensics vs. Digital Forensics
Lecture 6: Operating Systems and Utility Programs
Lecture 6: Operating Systems and Utility Programs Chapter 8 Objectives Identify the types of system software Summarize the startup process on a personal computer Summarize the features of several stand-alone
Computer Forensic Tools. Stefan Hager
Computer Forensic Tools Stefan Hager Overview Important policies for computer forensic tools Typical Workflow for analyzing evidence Categories of Tools Demo SS 2007 Advanced Computer Networks 2 Important
What is Digital Forensics?
DEVELOPING AN UNDERGRADUATE COURSE IN DIGITAL FORENSICS Warren Harrison PSU Center for Information Assurance Portland State University Portland, Oregon 97207 [email protected] What is Digital Forensics?
Best Practice Document Hints and Tips
Marshal Ltd. Date: 02/06/2007 Marshal EndPoint Security From Best Practice Document Hints and Tips Marshal Software Ltd CSL 005 Marshal EndPoint Security Best Practice (2) Privacy Control: None Version:
Computer Hacking Forensic Investigator v8
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge
Computer Forensics. Securing and Analysing Digital Information
Computer Forensics Securing and Analysing Digital Information Aims What is a computer? Where is the evidence? Why is digital forensics important? Seizing evidence Encryption Hidden files and folders Live
Computer Forensic Capabilities
Computer Forensic Capabilities Agenda What is computer forensics? Where to find computer evidence Forensic imaging Forensic analysis What is Computer Forensics? The preservation, identification, extraction,
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
Developing Computer Forensics Solutions for Terabyte Investigations
Developing Computer Forensics Solutions for Terabyte Investigations Eric Thompson Corporation Orem, Utah USA www.accessdata.com Overview Computer Forensic Definition, Objectives and Policies History of
Design and Implementation of a Live-analysis Digital Forensic System
Design and Implementation of a Live-analysis Digital Forensic System Pei-Hua Yen Graduate Institute of Information and Computer Education, National Kaohsiung Normal University, Taiwan [email protected]
RECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES
RECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES KEVIN MANSELL CONTROL-F LTD. [email protected] DARREN LOLE & FIONA LITCHFIELD SERVICE
Operating Systems Forensics
Operating Systems Forensics Section II. Basic Forensic Techniques and Tools CSF: Forensics Cyber-Security MSIDC, Spring 2015 Nuno Santos Summary! Windows boot sequence! Relevant Windows data structures!
CYBER FORENSICS. KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad.
CYBER FORENSICS KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad. 11 DIGITAL EVIDENCE? Cyber crimes Digital evidence Digital evidence is any information of
Chapter 8 Objectives. Chapter 8 Operating Systems and Utility Programs. Operating Systems. Operating Systems. Operating Systems.
Chapter 8 Objectives Chapter 8 s and Utility Programs Describe the two types of software Understand the startup process for a personal computer Describe the term user interface Explain features common
CERTIFIED DIGITAL FORENSICS EXAMINER
CERTIFIED DIGITAL FORENSICS EXAMINER KEY DATA Course Title: C)DFE Duration: 5 days CPE Credits: 40 Class Format Options: Instructor-led classroom Live Online Training Computer Based Training Who Should
EMC Retrospect 7.5 for Windows. Backup and Recovery Software
EMC Retrospect 7.5 for Windows Backup and Recovery Software Data Protection for Small and Medium Business EMC Retrospect backup and recovery software delivers automated, reliable data protection for small
Chapter 7A. Functions of Operating Systems. Types of Operating Systems. Operating System Basics
Chapter 7A Operating System Basics Functions of Operating Provide a user interface Run programs Manage hardware devices Organized file storage 2 Types of Operating Real-time operating system Very fast
Computer Forensics as an Integral Component of the Information Security Enterprise
Computer Forensics as an Integral Component of the Information Security Enterprise By John Patzakis 10/28/03 I. EXECUTIVE SUMMARY In addition to fending off network intrusions and denial of service attacks,
BACKUP SECURITY GUIDELINE
Section: Information Security Revised: December 2004 Guideline: Description: Backup Security Guidelines: are recommended processes, models, or actions to assist with implementing procedures with respect
EnCase Endpoint Investigator Fundamentals 5/25/2016
EnCase Endpoint Investigator Fundamentals Guidance Software 1 About Us Tony Balzanto Tony Balzanto is an instructor in the Orlando, FL office of Guidance Software s Professional Development and Training
To Catch a Thief: Computer Forensics in the Classroom
To Catch a Thief: Computer Forensics in the Classroom Anna Carlin [email protected] Steven S. Curl [email protected] Daniel Manson [email protected] Computer Information Systems Department California
Information Technologies and Fraud
Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting Information Technologies for Fraud investigation A.
About Your Presenter. Digital Forensics For Attorneys. Overview of Digital Forensics
Larry E. Daniel, EnCE, DFCP, BCE Digital Forensic Examiner Digital Forensics for Attorneys An Overview of Digital Forensics About Your Presenter EnCase Certified Examiner (EnCE) Digital Forensics Certified
Understanding Backup and Recovery Methods
Lesson 8 Understanding Backup and Recovery Methods Learning Objectives Students will learn to: Understand Local, Online, and Automated Backup Methods Understand Backup Options Understand System Restore
EMC Retrospect 7.5 for Windows. Backup and Recovery Software
EMC Retrospect 7.5 for Windows Backup and Recovery Software Data Protection for Small and Medium Business EMC Retrospect backup and recovery software delivers automated, reliable data protection for small
Digital Forensics Lecture 3. Hard Disk Drive (HDD) Media Forensics
Digital Forensics Lecture 3 Hard Disk Drive (HDD) Media Forensics Current, Relevant Topics defendants should not use disk-cleaning utilities to wipe portions of their hard drives before turning them over
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer
How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup
Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
The Virtual Digital Forensics Lab: Expanding Law Enforcement Capabilities
Briefing Paper The Virtual Digital Forensics Lab: Expanding Law Enforcement Capabilities Sean A. Ensz University of Oklahoma 200 Felgar Street, Norman, Oklahoma 73019 405.325.3954 Office 405.325.1633 Fax
INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION
" - * INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION CHRIS PROSISE KEVIN MANDIA McGraw-Hill /Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices Introduction As organizations rely more heavily on technology-based methods of communication, many corporations
Total Backup Recovery 7
7 TM 7 Enhance business functionality and productivity with guaranteed protection from 7 Server 7 Server is a total backup and recovery solution for Windows. With support for all operating systems, 7 Server
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
EnCase 7 - Basic + Intermediate Topics
EnCase 7 - Basic + Intermediate Topics Course Objectives This 4 day class is designed to familiarize the student with the many artifacts left behind on Windows based media and how to conduct a forensic
AN INVESTIGATION INTO COMPUTER FORENSIC TOOLS
AN INVESTIGATION INTO COMPUTER FORENSIC TOOLS K.K. Arthur 1 H.S. Venter 2 Information and Computer Security Architectures (ICSA) Research Group University of Pretoria Pretoria Department of Computer Science
Dacorum U3A Apple Mac Users Group Agenda TUESDAY 7th July 2015 Time Machine Backups for your MAC & ipad?
Agenda TUESDAY 7th July 2015 Time Machine Backups for your MAC & ipad? 1 Overview Time Machine Backups Mac Basics: Time Machine backs up your Mac Time Machine is the built-in backup feature of OS X. It
Total Backup Recovery 7
7 TM 7 Automat backup and restore management for all networked laptops & workstations from a centralized administrating console 7 Advanced Workstation assures that critical business information is well
APC Enterprise KVM Switches
APC Enterprise KVM Switches Introduction You need more than point access products. You need a system that provides more control, flexibility and scalability than ever before. Systems that reduce your Mean
Steven Kaplan, CISSP, CISA Accuvant [email protected] Sandra Bittner, CISSP Arizona Public Service Palo Verde Nuclear Generating Station
Steven Kaplan, CISSP, CISA Accuvant [email protected] Sandra Bittner, CISSP Arizona Public Service Palo Verde Nuclear Generating Station The Challenge: Commercial generation facilities must identify
Fall. Forensic Examination of Encrypted Systems Matthew Postinger COSC 374
Fall 2011 Forensic Examination of Encrypted Systems Matthew Postinger COSC 374 Table of Contents Abstract... 3 File System Encryption... 3 Windows EFS... 3 Apple FileVault... 4 Full Disk Encryption...
Product Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES
Product Brief DC-Protect Content based backup and recovery solution By DATACENTERTECHNOLOGIES 2002 DATACENTERTECHNOLOGIES N.V. All rights reserved. This document contains information proprietary and confidential
Computer Forensics Processing Checklist. Pueblo High-Tech Crimes Unit
Computer Forensics Processing Checklist Pueblo High-Tech Crimes Unit Cmdr. Dave Pettinari Pueblo County Sheriff's Office [email protected] The purpose of this document is to provide computer forensic technicians
Introduction. Ease-of-Use
Remote Data Backup Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and expensive method for
