Fuzzy Hashing for Digital Forensic Investigators Dustin Hurlbut - AccessData January 9, 2009
|
|
|
- Walter Stafford
- 9 years ago
- Views:
Transcription
1 Fuzzy Hashing for Digital Forensic Investigators Dustin Hurlbut - AccessData January 9, 2009 Abstract Fuzzy hashing allows the investigator to focus on potentially incriminating documents that may not appear using traditional hashing methods. The use of the fuzzy hash is much like the fuzzy logic search; it is looking for similar documents but not exact equals, called homologous files. An example would be two word processor documents, with a paragraph added in the middle of one. To locate homologous files, they must be hashed traditionally, in segments, to identify the strings of identical binary data. Introduction This document will discuss in lay terms what a fuzzy hash is and the theory behind it. FTK contains a fuzzy hash utility that will enable investigators to use this new tool to locate evidence that otherwise could take considerable time to track down. This would include trying to compare live documents active in the file system and partial files recovered from unallocated or slack space. This applies to the law enforcement analyst who is trying to determine if files were ever on a suspect s system, or perhaps the corporate investigator who is dealing with an employee who is removing proprietary documents and then making minor alterations to them to avoid detection through conventional hashing techniques. Background There are three types of hashes the investigator must be familiar with to understand the fuzzy hash utility; Cryptographic, Rolling, and Context hashing. Cryptographic Hashes: Traditional hashing is used to validate media, to locate exact duplicate files, alert us to known files of interest, or let us skip files that are known not to contain evidence. Altering a single bit of data will radically alter the hash. There is no way a cryptographic hash by itself can show us associations with files that may have had even small alterations of their data. Dustin Hurlbut - January 9, 2009 AccessData Page 1
2 Figure 1 Traditional Cryptographic Hash Results with a Minor Data Change In Figure 1, a traditional hash is used to compare two files. In the second file, the 1 was removed and the two files were hashed using the MD5 cryptographic hash. The hashes are radically dissimilar, and there is no way to know the documents are virtually identical through this type of hash analysis. The fuzzy hash utility makes use of traditional hashing, but in pieces. The document is hashed in segments depending on the size of the document. These segments will contain fragments of traditional hashes joined together for comparative purposes. Before this segmented hash can be done, a rolling hash is used to begin the process. Rolling Hashes: A rolling hash is used to piece through the document. It uses a trigger value generated by the rolling hash engine to determine where these segments will be created. Once located, the segments will be processed to create sequences of traditional hash strings. In FTK, the trigger value is first based on the file size and on the number of trigger values in the document. Once the trigger value in the rolling hash is determined, the traditional hash for that segment is generated and archived. Final hashes are computed based on dividing the file into two blocks and parsing between the trigger values 1. The final hash is displayed using a colon to separate the two hashes derived from the two blocks of data. This hash result is called a Context Triggered Piecewise Hash (CTPH) as postulated by Jessie Kornblum 2. The CTPH makes use of the traditional and rolling hashes to create a segmented hash to evaluate documents for matching binary strings. CTP Hashes: The Context Triggered Piecewise Hash is based upon segments of traditional hashes. Comparisons can be drawn between documents with similar strings of data that are not exact duplicates. Dustin Hurlbut - January 9, 2009 AccessData Page 2
3 Figure 2 Context Triggered Piecewise Hash Example Original Document Figure 2 shows an analogy of a CTPH string. In this example, there are four trigger values. The data segments between each trigger value are hashed traditionally and stored. Each trigger value is located by using the rolling hash. The data segment up to the trigger value is hashed. The trigger value designates a new segment of data and the traditional hash begins again after each is located. Figure 3 shows the same document as Figure 2, however in this example; the second paragraph has been removed. Figure 3 Context Triggered Piecewise Hash Example Altered Document Dustin Hurlbut - January 9, 2009 AccessData Page 3
4 Traditional hashing will not make any conclusion between the two documents as to similarity, however the CTPH will use the sequences to display potential homologous documents. In the example in Figures 2 and 3, a single paragraph has been removed. The segmented traditional hashes can be compared for potential associations. Figure 4 shows an analogy of the two hashes from Figures 2 and 3 for comparative purposes. Comparing these hashes shows a similarity between the two documents. Figure 4 CTPH Comparisons from Figures 2 and 3 The comparison hashes are created by dividing the file into two blocks; BS1 and 2xBS1 (Where BS stands for Block Size) 1. Each block will have a hash that is a compilation of the traditional hashes that were generated for each data stream between the trigger values. The two blocks will have a colon as a separator in the hash sequence. In Figure 4, note the similarities between the hash sequences. In the figure examples, a comparison was made of six text files. Each numbered file; 1, 2, 3, 4, and 5 had a paragraph added. Number 6 had Paragraph 2 removed. The second number four document (seen in Figure 5); Trad Test Change the 1 had only a single byte of data changed between it and document number 4. This was the document shown in Figure 1 where traditional hashing did not show a match. Figure 4 CTPH Examples from FTK Associations are made by scoring from 0 to 100 with 0 being a low probability and 100 being a high probability for similarity 3. FTK will make these hash comparisons to establish the likelihood of similarity. If files of interest are located, they will be displayed in descending order of probability. It is important to note that this process is not perfect. Documents may or may not match up depending on a number of factors. Dustin Hurlbut - January 9, 2009 AccessData Page 4
5 Figure 5 Fuzzy Hash of Modified Text Files The results of FTK fuzzy hashing on these documents are shown in Figure 5. In Example A, the first document with a single paragraph was checked for possible similar files. It did not compute all the related files as being homologous and is missing both documents 4 and 5. However, the second and sixth document values shown in Examples B and C saw all the files as being potentially related. When the testing is conducted on more complicated files, such as word documents or spreadsheets that have embedded formatting, the results are not always as expected. Tests that discover matches should be run on the other matched files to ensure all potentially homologous documents are located. This type of action can also be conducted on other types of files such as graphics. Viewing a set of twelve graphics that were analyzed as being similar, did have a functional similarity; they all had the same border color around the graphic. Because the files are tested and a similarity is indicated, won t always mean they are similar or related. The hash is not as distinctive as an MD5 or SHA hash to show relations. The more segments in a document, particularly one with many minor changes, can also show the document as not being related even when it may be. Dustin Hurlbut - January 9, 2009 AccessData Page 5
6 Forensic Issues The use of the fuzzy hash utility may decrease performance by 7 to 10 times the normal time to process a case 2, 4. It would be advisable to use checked files in FTK for comparative purposes or use filters to limit the number of comparisons on large media. The strength of the fuzzy hashes are their ability to locate similar files. It can be used to match altered documents, such as multiple or incremental versions of the same document. Malicious alteration of a document to avoid detection is difficult to detect as discussed in the introduction. A thorough examination of documents is required. Fuzzy hashing can easily find documents altered in this manner. Fuzzy hashing will point to the documents that should be reviewed. Fuzzy hashing can also be useful in examining partial files such as carved documents. Carving may retrieve partial documents that can be related to the original. Fuzzy hashes may also relate a document to a suspect when the incriminating document doesn t exist in the active file system. If the investigator has access to the original or suspected document in question, that document can be fuzzy hashed from outside of FTK by pointing to it. It can then be compared with carved items to determine if it was ever in the system at one time. Partial graphics without headers may also be discovered in this manner. It seems to be common to search a drive for child pornographic photos only to discover no active documents. Other evidence may point to their existence, but the files are not in the file system. Data carving may reveal graphics, but if their headers aren t carved with them, they can t normally be viewed. Using fuzzy hashing may uncover partial graphics that will help determine if such graphics were in the system at one time. FTK can create libraries of fuzzy hashes for specific document types 1,3, such as child pornography graphics or corporate proprietary documents. These libraries can then be applied to a seized media to see if potential matches exist without a close initial examination by the investigator of each document. A comparative threshold can be set to further limit the comparative hits. This utility has the potential to save considerable analysis time in locating matching documents. References 1 AccessData. Fuzzy Hashing Kornblum Jesse. Identifying almost identical files using context triggered piecewise hashing. Digital Investigation, 3(S):91-97, Proceedings of the Digital Forensic Workshop, August AccessData. FTK Users Guide Kornblum Jesse. jessekornblum.com/research/fuzzy-hashing-cdfsl-2007.ppt. Dustin Hurlbut - January 9, 2009 AccessData Page 6
Chapter 8: On the Use of Hash Functions in. Computer Forensics
Harald Baier Hash Functions in Forensics / WS 2011/2012 2/41 Chapter 8: On the Use of Hash Functions in Computer Forensics Harald Baier Hochschule Darmstadt, CASED WS 2011/2012 Harald Baier Hash Functions
ACE STUDY GUIDE. 3. Which Imager pane shows information specific to file systems such as HFS+, NTFS, and Ext2? - Properties Pane
ACE STUDY GUIDE *Note* All of the actual exam questions are in multiple choice format. This Study Guide is designed to cover all of the material on the exam, 1. FTK Imager supports the encryption of forensic
Digital Forensics. Tom Pigg Executive Director Tennessee CSEC
Digital Forensics Tom Pigg Executive Director Tennessee CSEC Definitions Digital forensics Involves obtaining and analyzing digital information as evidence in civil, criminal, or administrative cases Analyze
Where is computer forensics used?
What is computer forensics? The preservation, recovery, analysis and reporting of digital artifacts including information stored on computers, storage media (such as a hard disk or CD-ROM), an electronic
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
Digital Evidence Search Kit
Digital Evidence Search Kit K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K. H. Pun, W.W. Tsang, H.W. Chan Center for Information Security and Cryptography Department of Computer Science The University
Forensically Determining the Presence and Use of Virtual Machines in Windows 7
Forensically Determining the Presence and Use of Virtual Machines in Windows 7 Introduction Dustin Hurlbut Windows 7 has the ability to create and mount virtual machines based upon launching a single file.
Legal Notices. AccessData Corp.
Legal Notices AccessData Corp. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability
PTK Forensics. Dario Forte, Founder and Ceo DFLabs. The Sleuth Kit and Open Source Digital Forensics Conference
PTK Forensics Dario Forte, Founder and Ceo DFLabs The Sleuth Kit and Open Source Digital Forensics Conference What PTK is about PTK forensics is a computer forensic framework based on command line tools
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices Introduction As organizations rely more heavily on technology-based methods of communication, many corporations
Visualizing Data: Scalable Interactivity
Visualizing Data: Scalable Interactivity The best data visualizations illustrate hidden information and structure contained in a data set. As access to large data sets has grown, so has the need for interactive
PDF Primer PDF. White Paper
White Paper PDF Primer PDF What is PDF and what is it good for? How does PDF manage content? How is a PDF file structured? What are its capabilities? What are its limitations? Version: 1.0 Date: October
Survey of Disk Image Storage Formats
Survey of Disk Image Storage Formats Version 1.0 Common Digital Evidence Storage Format Working Group Digital Forensic Research Workshop September 1, 2006 Digital data that could be used as evidence are
ediscovery 5.3 and 5.3.1 Release Notes
ediscovery 5.3 and 5.3.1 Release Notes Document Date: 4/7/2014 2014 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues for this
2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.
Acquisition and Tools COMP 2555: Principles of Computer Forensics Autumn 2014 http://www.cs.du.edu/2555 1 Planning Your Investigation! A basic investigation plan should include the following activities:!
Cloud Forensics. 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu
Cloud Forensics Written & Researched by: Maegan Katz & Ryan Montelbano 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu November 4, 2013 Disclaimer: This document
Introduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014
Introduction to Data Forensics Jeff Flaig, Security Consultant January 15, 2014 WHAT IS COMPUTER FORENSICS Computer forensics is the process of methodically examining computer media (hard disks, diskettes,
AN INVESTIGATION INTO COMPUTER FORENSIC TOOLS
AN INVESTIGATION INTO COMPUTER FORENSIC TOOLS K.K. Arthur 1 H.S. Venter 2 Information and Computer Security Architectures (ICSA) Research Group University of Pretoria Pretoria Department of Computer Science
Forensic Analysis of Internet Explorer Activity Files
Forensic Analysis of Internet Explorer Activity Files by Keith J. Jones [email protected] 3/19/03 Table of Contents 1. Introduction 4 2. The Index.dat File Header 6 3. The HASH Table 10 4. The
File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1
File System Forensics FAT and NTFS 1 FAT File Systems 2 File Allocation Table (FAT) File Systems Simple and common Primary file system for DOS and Windows 9x Can be used with Windows NT, 2000, and XP New
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
State of the art of Digital Forensic Techniques
State of the art of Digital Forensic Techniques Enos K. Mabuto 1, H. S Venter 2 Department of Computer Science University of Pretoria, Pretoria, 0002, South Africa Tel: +27 12 420 3654 Email: [email protected]
The Business Case for ECA
! AccessData Group The Business Case for ECA White Paper TABLE OF CONTENTS Introduction... 1 What is ECA?... 1 ECA as a Process... 2 ECA as a Software Process... 2 AccessData ECA... 3 What Does This Mean
Security Aspects of Piecewise Hashing in Computer Forensics
Security Aspects of Piecewise Hashing in Computer Forensics Harald Baier Center for Advanced Security Research Darmstadt and Hochschule Darmstadt 64295 Darmstadt, Germany [email protected] Frank Breitinger
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints John Haggerty and Mark Taylor Liverpool John Moores University, School of Computing & Mathematical Sciences, Byrom
Opening, Importing and Saving Images
Opening, Importing and Saving Images This tutorial will help you to become familiar with how to open, import and save the various file types that the Make The Cut! (MTC!) software supports. You can find
NEMA Standards Publication PS 3 Supplement 41. Digital Imaging and Communications in Medicine (DICOM) Digital Signatures
NEMA Standards Publication PS 3 Supplement 1 Digital Imaging and Communications in Medicine (DICOM) Digital Signatures Status: Final Text Sep 001 Prepared by DICOM Standards Committee, Working Group 1
Hitachi Storage Command Suite Logical Groups and LDEV Labels
Hitachi Storage Command Suite Logical Groups and LDEV Labels September 10, 2008 John Harker Senior Product Marketing Manager Malcolm Muir Senior Competitive Analyst Hitachi Data Systems WebTech Series
Archival Data Format Requirements
Archival Data Format Requirements July 2004 The Royal Library, Copenhagen, Denmark The State and University Library, Århus, Denmark Main author: Steen S. Christensen The Royal Library Postbox 2149 1016
Concepts of digital forensics
Chapter 3 Concepts of digital forensics Digital forensics is a branch of forensic science concerned with the use of digital information (produced, stored and transmitted by computers) as source of evidence
The following features have been added to FTK with this release:
FTK 2.0.2 Readme The following sections present information on the new features, resolved issues, and known issues with the FTK 2.0.2 release. NEW FEATURES The following features have been added to FTK
(b) slack file space.
Hidden Files A Computer Forensics Case Study Question Paper 1. Outline the meaning of the following terms: (a) cookie, [2 marks] A cookie is data stored locally that is used by some websites for data that
The Hexadecimal Number System and Memory Addressing
APPENDIX C The Hexadecimal Number System and Memory Addressing U nderstanding the number system and the coding system that computers use to store data and communicate with each other is fundamental to
Asset Track Getting Started Guide. An Introduction to Asset Track
Asset Track Getting Started Guide An Introduction to Asset Track Contents Introducing Asset Track... 3 Overview... 3 A Quick Start... 6 Quick Start Option 1... 6 Getting to Configuration... 7 Changing
edgebooks Quick Start Guide 4
edgebooks Quick Start Guide 4 memories made easy SECTION 1: Installing FotoFusion Please follow the steps in this section to install FotoFusion to your computer. 1. Please close all open applications prior
Indexed vs. Unindexed Searching:
Indexed vs. Unindexed Searching: Distributed Searching Email Filtering Security Classifications Forensics Both indexed and unindexed searching have their place in the enterprise. Indexed text retrieval
ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT
ITU Session Four: Device Imaging And Analysis Mounir Kamal Q-CERT 2 Applying Forensic Science to Computer Systems Like a Detective, the archaeologist searches for clues in order to discover and reconstruct
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
Web Browser Session Restore Forensics A valuable record of a user s internet activity for computer forensic examinations
A valuable record of a user s internet activity for computer forensic examinations Each session of activity in a Mozilla browser is recorded by the browser so that in the event of the browser crashing
Digital Forensic Techniques
Digital Forensic Techniques Namrata Choudhury, Sr. Principal Information Security Analyst, Symantec Corporation Professional Techniques T23 CRISC CGEIT CISM CISA AGENDA Computer Forensics vs. Digital Forensics
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with
Windows File Analyser Guidance Allan S Hay
Windows File Analyser Guidance Allan S Hay ** The following information is a guide to understanding the Prefetch Folder and Windows Shortcut File Format ( LNK) and all work undertaken in my research, should
Editing exempt information from paper and electronic documents prior to release
Redaction toolkit Editing exempt information from paper and electronic documents prior to release Crown copyright 2012 You may re-use this information (excluding logos) free of charge in any format or
PART OF THE PICTURE: The TCP/IP Communications Architecture
PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals
Game Center Programming Guide
Game Center Programming Guide Contents About Game Center 8 At a Glance 9 Some Game Resources Are Provided at Runtime by the Game Center Service 9 Your Game Displays Game Center s User Interface Elements
National District Attorneys Association National Center for Prosecution of Child Abuse. Computer Forensics for Prosecutors
National District Attorneys Association National Center for Prosecution of Child Abuse Computer Forensics for Prosecutors February 18-19, 2013 Portland, Oregon Detective Michael Smith Computer Crimes &
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
Memory Systems. Static Random Access Memory (SRAM) Cell
Memory Systems This chapter begins the discussion of memory systems from the implementation of a single bit. The architecture of memory chips is then constructed using arrays of bit implementations coupled
Finding Business Rules in COBOL Systems
Finding Business Rules in COBOL Systems Use Case for evolveit Scott Hesser 6/1/2013 pg. 1 blackboxit.com Understanding the 1 st step to Modernization Large commercial organizations have been developing
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
Skype Forensics: Analyzing Call and Chat Data From Computers and Mobile
Skype Forensics: Analyzing Call and Chat Data From Computers and Mobile Even before being acquired by Microsoft in 2011, Skype had already established a strong presence in the VoIP and instant messaging
Preliminary Slides. These are rough rough drafts of my final slides. The most up-to-date version that was used at DEFCON20 will be posted online
Preliminary Slides These are rough rough drafts of my final slides The most up-to-date version that was used at DEFCON20 will be posted online 1 Anti-Forensics and Anti-Anti-Forensics by Michael Perklin
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
CA DLP. Stored Data Integration Guide. Release 14.0. 3rd Edition
CA DLP Stored Data Integration Guide Release 14.0 3rd Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Computer Forensic Capabilities
Computer Forensic Capabilities Agenda What is computer forensics? Where to find computer evidence Forensic imaging Forensic analysis What is Computer Forensics? The preservation, identification, extraction,
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
EnCase 7 - Basic + Intermediate Topics
EnCase 7 - Basic + Intermediate Topics Course Objectives This 4 day class is designed to familiarize the student with the many artifacts left behind on Windows based media and how to conduct a forensic
E- Discovery in Criminal Law
E- Discovery in Criminal Law ! An e-discovery Solution for the Criminal Context Criminal lawyers often lack formal procedures to guide them through preservation, collection and analysis of electronically
AwanaGames Circle. Official. Diagram 1. Key to diagram: Pin & Striped Bean Bag C Diagonal or Starting Line. B Scoring Pins, or Center.
Official AwanaGames Circle Diagram 1 The AwanaGames Circle is 30 feet in diameter surrounded by a 37-40 foot square. Each team is designated by a color and occupies a quarter-circle or one side of that
The «include» and «extend» Relationships in Use Case Models
The «include» and «extend» Relationships in Use Case Models Introduction UML defines three stereotypes of association between Use Cases, «include», «extend» and generalisation. For the most part, the popular
CTC 328: Computer Forensics
FALL 2010 CSUDH COMPUTER SCIENCE DEPARTMENT CTC 328: Computer Forensics Instructor: Adam Kaplan, Ph.D. E-Mail: [email protected] Office: NSM E-117 WWW (Blackboard Site): http://toro.csudh.edu Class Meetings:
Determining VHD s in Windows 7 Dustin Hurlbut
Introduction Windows 7 has the ability to create and mount virtual machines based upon launching a single file. The Virtual Hard Disk (VHD) format permits creation of virtual drives that can be used for
Package PKI. July 28, 2015
Version 0.1-3 Package PKI July 28, 2015 Title Public Key Infrastucture for R Based on the X.509 Standard Author Maintainer Depends R (>= 2.9.0),
CALCULATIONS & STATISTICS
CALCULATIONS & STATISTICS CALCULATION OF SCORES Conversion of 1-5 scale to 0-100 scores When you look at your report, you will notice that the scores are reported on a 0-100 scale, even though respondents
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
Managing Agile Projects in TestTrack GUIDE
Managing Agile Projects in TestTrack GUIDE Table of Contents Introduction...1 Automatic Traceability...2 Setting Up TestTrack for Agile...6 Plan Your Folder Structure... 10 Building Your Product Backlog...
To Catch a Thief: Computer Forensics in the Classroom
To Catch a Thief: Computer Forensics in the Classroom Anna Carlin [email protected] Steven S. Curl [email protected] Daniel Manson [email protected] Computer Information Systems Department California
Nuix Forensic Focus 2014 Webinar Accelerating investigations using advanced ediscovery techniques 6 th March 2014
Nuix Forensic Focus 2014 Webinar Accelerating investigations using advanced ediscovery techniques 6 th March 2014 All rights reserved 2014. Nuix Software ABOUT THE PRESENTERS Paul Slater Director of Forensic
CYBER FORENSICS. KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad.
CYBER FORENSICS KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad. 11 DIGITAL EVIDENCE? Cyber crimes Digital evidence Digital evidence is any information of
Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr
Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr Copyright c 2007-2010 Xavier Clerc [email protected] Released under the LGPL version 3 February 6, 2010 Abstract: This
A White Paper from AccessData Group. Cerberus. Malware Triage and Analysis
A White Paper from AccessData Group Cerberus Malware Triage and Analysis What is Cerberus? Cerberus is the first-ever automated reverse engineering tool designed to show a security analyst precisely what
POLICY AND GUIDELINES FOR THE MANAGEMENT OF ELECTRONIC RECORDS INCLUDING ELECTRONIC MAIL (E-MAIL) SYSTEMS
POLICY AND GUIDELINES FOR THE MANAGEMENT OF ELECTRONIC RECORDS INCLUDING ELECTRONIC MAIL (E-MAIL) SYSTEMS 1. Purpose Establish and clarify a records management policy for municipal officers with respect
Lab III: Unix File Recovery Data Unit Level
New Mexico Tech Digital Forensics Fall 2006 Lab III: Unix File Recovery Data Unit Level Objectives - Review of unallocated space and extracting with dls - Interpret the file system information from the
What is Organizational Communication?
What is Organizational Communication? By Matt Koschmann Department of Communication University of Colorado Boulder 2012 So what is organizational communication? And what are we doing when we study organizational
ithenticate User Manual
ithenticate User Manual Updated November 20, 2009 Contents Introduction 4 New Users 4 Logging In 4 Resetting Your Password 5 Changing Your Password or Username 6 The ithenticate Account Homepage 7 Main
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
Thank you for purchasing an Epilog Laser or PhotoLaser Plus!
Thank you for purchasing an Epilog Laser or PhotoLaser Plus! Epilog has teamed up with CadLink to bring you an exciting software package for transforming photographs for laser engraving applications. PhotoLaser
Section 1.5 Exponents, Square Roots, and the Order of Operations
Section 1.5 Exponents, Square Roots, and the Order of Operations Objectives In this section, you will learn to: To successfully complete this section, you need to understand: Identify perfect squares.
Digital Forensics for Attorneys Overview of Digital Forensics
Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence
THE TOP TEN TIPS FOR USING QUALTRICS AT BYU
THE TOP TEN TIPS FOR USING QUALTRICS AT BYU TIP #1: CREATING A SURVEY FROM A COPY AND COLLABORATING ON SURVEYS TIP #2: CREATING AND USING PANELS TIP #3: LIBRARIES AND HOW TO USE THEM TIP #4: BASIC SKIP
Fighting product clones through digital signatures
Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover
ithenticate User Manual
ithenticate User Manual Version: 2.0.2 Updated March 16, 2012 Contents Introduction 4 New Users 4 Logging In 4 Resetting Your Password 5 Changing Your Password or Username 6 The ithenticate Account Homepage
How they invented chord patterns for the guitar. J. Chaurette. Dec., 2012
How they invented chord patterns for the guitar J. Chaurette Dec., 2012 The guitar has a very long history; it has evolved over the ages to what it is now. It has achieved its final distinct form in 1770,
Digital forensic analysis aims to reconstruct
Hashing and Data Fingerprinting in Digital Forensics Hashing is a primary, yet underappreciated, tool in digital forensic investigations. Recent R&D has demonstrated that, with clever design, we can construct
SECTION 5: Finalizing Your Workbook
SECTION 5: Finalizing Your Workbook In this section you will learn how to: Protect a workbook Protect a sheet Protect Excel files Unlock cells Use the document inspector Use the compatibility checker Mark
UPK Content Development Rel 12.1
Oracle University Contact Us: 0800 945 109 UPK Content Development Rel 12.1 Duration: 5 Days What you will learn This UPK Content Development Rel 12.1 training will teach you how to use the User Productivity
FORENSIC ANALYSIS OF USB MEDIA EVIDENCE. Jesús Alexander García. Luis Alejandro Franco. Juan David Urrea. Carlos Alfonso Torres
FORENSIC ANALYSIS OF USB MEDIA EVIDENCE Jesús Alexander García Luis Alejandro Franco Juan David Urrea Carlos Alfonso Torres Manuel Fernando Gutiérrez UPB 2012 Content INTRODUCTION... 3 OBJECTIVE 4 EVIDENCE
Section 1.4 Place Value Systems of Numeration in Other Bases
Section.4 Place Value Systems of Numeration in Other Bases Other Bases The Hindu-Arabic system that is used in most of the world today is a positional value system with a base of ten. The simplest reason
Programming Languages
Programming Languages Programming languages bridge the gap between people and machines; for that matter, they also bridge the gap among people who would like to share algorithms in a way that immediately
