Digital Evidence and Computer Forensics
|
|
|
- William Sanders
- 10 years ago
- Views:
Transcription
1 Digital Evidence and Computer Forensics Don Mason Associate Director Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Objectives After this session, you will be able to: Define and describe digital evidence Identify devices and locations where digital evidence may be found Identify and describe the basic principles, practices, and tools of digital forensics Describe selected trends and challenges in computer forensics From the old days to Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 1
2 Evolving technology in The Digital age with Convergent, Smart Devices Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 2
3 Post-PC Era? Cellular phone a computer? Yes, as defined in Computer Fraud and Abuse Act U.S. v. Kramer, 631 F.3d 900 (Feb 8, 2011) Ultimately, does it make any difference whether a device capable of storing digital evidence is deemed to be a computer? Computers = Digital Devices A computer is like a light switch Switch Computer Binary Symbol ON signal present 1 OFF no signal present 0 Each 0 or 1 is a BIT (for BINARY DIGIT) = = 2 (2+0) = 3 (2+1) An 8-bit sequence = 1 byte = a keystroke Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 3
4 Digital Devices Printer Monitor Computer The Investigative Future is Here Criminal Connectivity: ipads Kindles itouches E-Readers Appliances! From homes, offices, coffee shops, airplanes, cars, buses, trains, almost anywhere Always Something New Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 4
5 And Yet Newer Or Even Newer Roles of Digital Devices Computer as Target Unauthorized access, damage, theft Spam, viruses, worms Denial of service attacks Computer as Tool Fraud Threats, harassment Child pornography Computer as Container From drug dealer records to how to commit murder Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 5
6 Digital Evidence Information of probative value that is stored or transmitted in binary form and may be relied upon in court Two types Digital Evidence User-created Text (documents, , chats, IM s) Address books Bookmarks Databases Images (photos, drawings, diagrams) Video and sound files Web pages Service provider account subscriber records Digital Evidence Computer/Network-created headers Metadata Activity logs Browser cache, history, cookies Backup and registry files Configuration files Printer spool files Swap files and other transient data Surveillance tapes, recordings Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 6
7 Forms of Evidence Files Present / Active (doc s, spreadsheets, images, , etc.) Archive (including as backups) Deleted (in slack and unallocated space) Temporary (cache, print records, Internet usage records, etc.) Encrypted or otherwise hidden Compressed or corrupted Fragments of Files Paragraphs Sentences Words How Much Data? 1 Byte (8 bits): A single character 1 Kilobyte (1,000 bytes): A paragraph 1 Megabyte (1,000 KB): A small book 1 Gigabyte (1,000 MB): 10 yards of shelved books 1 Terabyte (1,000 GB): 1,000 copies of Encyclopedia 1 Petabyte (1,000 TB): 20 million four-door filing cabinets of text 1 Exabyte (1,000 PB): 5 EB = All words ever spoken by humans 1 Zettabyte (1,000 EB, or 1 billion TB) = 250 billion DVDs, 36 million years of HD video, or the volume of the Great Wall of China Data Generated in trillion gigabytes (1.2 zettabytes) 89 stacks of books each reaching from the Earth to the Sun 22 million times all the books ever written Would need more than 750 million ipods to hold it 107 trillion s sent in 2010 Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 7
8 Projection In 2020: 35 zettabytes will be produced All words ever spoken by human beings, written 7 times How Much in Real Cases? One recent example: 17 terabytes 24+ million images 17,000 movies CVIP hits (known CP images) Sources of Evidence Offender s computer accessed and downloaded images documents chat sessions user log files Internet connection logs browser history and cache files and chat logs passwords & encryption keys Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 8
9 Sources of Evidence Servers Internet Protocol addresses ISP authentication user logs FTP and Web server access logs server user logs Subscriber account information LAN server logs Cloud storage Web pages Social media Sources of Evidence Online activity Internet Protocol addresses Router logs Third party service providers "inside the box, outside the box" The Box Outside the box: network investigations Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 9
10 Inside the Box What the computer owner actually has possession of Computer s hard drive and other memory Documents Pictures Outlook s Internet Cache CD s and floppy disks ipods Cell Phones External Hard Drives Inside the Box What the computer owner actually has possession of Outside the Box What is not stored on the owner s computer Online Accounts (Gmail and Yahoo) Internet Shopping Accounts Social Networking Accounts Backups of text messages Cell Site Location Data Using Pen/Trap for Internet DRAS information Subscriber account records Contents of Websites Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 10
11 Outside the Box What is not stored on the owner s computer Variety of Boxes Computer Hardware Monitor Printer Zip Drive Hard Drive Monitor Laptop Computer Tape Drive Digital Camera Cd-Rom Drive Disks Computer Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 11
12 Challenges Increasing ubiquity and convergence of digital devices Increasing data storage capacity Shrinking devices and media Growing use of solid state devices Internal Drives Removable Media Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 12
13 USB Storage Devices More Digital Devices Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 13
14 And Still More Remember this news item? More Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 14
15 More More Vehicle black boxes Event data recorders Sensing and diagnostic modules Data loggers Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 15
16 More More Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 16
17 More GPS devices What next? Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 17
18 Computer Forensics Computer Forensics Obtaining, Processing, Authenticating, and Producing digital data/records for legal proceedings. Computer Forensics Usually pre-defined procedures followed but flexibility is necessary as the unusual will be encountered Was largely post-mortem What s on the hard drive? Rapidly evolving Ex: From Pull the plug to Don t power down before you know what s on it Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 18
19 Terms, Branches, Trends Computer forensics Network forensics Live forensics Software forensics Image forensics Mobile device forensics Browser forensics Triage forensics Distributed forensics Digital Knowledge and Intent Evidence Evidence that the CP files were purposely collected CP found in computer s allocated space? In folders assigned to particular user of the computer? Files organized, given relevant folder/file titles? Default settings of the computer s software changed? Evidence that CP was obtained via Web browsing Evidence in the Index.dat files of web searches for CP? CP found in the Temporary Internet Files? Any CP-related Bookmarks/Favorites saved? Evidence that the CP was viewed by a user Any Recent Files/Link Files to the CP? Windows Registry list other devices (scanners, thumb drives, etc.) recently connected to the computer? Any Thumbs.db files containing CP? Any CP videos listed in Windows Media Player/Real Player 56 histories? Basic Steps Acquiring (and preserving) evidence without altering or damaging original data Authenticating acquired evidence by showing it s identical to data originally seized Analyzing (searching for) the evidence without modifying it Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 19
20 Popular Automated Tools Encase Guidance Software Forensic Tool Kit (FTK) Access Data Skills / Expertise Required Technical Data processing and production Investigative Understanding computer evidence Building a case Legal Maintaining chain of custody Managing digital evidence per the rules Certifications Various offered IACIS s CFCE Guidance Software s Encase CE ISFCE s CCE Some states require P.I. licenses Growing number of schools offering certificate and degree programs But no uniform, accepted standards Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 20
21 Acquiring the Evidence Seizing computer ( bag and tag ) Handling computer evidence carefully Chain of custody Evidence collection (including volatile memory) Evidence identification Transportation Storage Making at least two images of each container Perhaps 3rd in criminal case Documenting, Documenting, Documenting Preserving Digital Evidence The Forensic Image or Duplicate A virtual clone of the entire drive Every bit & byte Erased & reformatted data Data in slack & unallocated space Virtual memory data Authenticating the Evidence Proving that evidence to be analyzed is exactly the same as what suspect/party left behind Readable text and pictures don t magically appear at random Calculating hash values for the original evidence and the images/duplicates MD5 (Message-Digest algorithm 5) SHA (Secure Hash Algorithm) (NSA/NIST) Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 21
22 What Is a Hash Value? An MD5 Hash is a 32 character string that looks like: Acquisition Hash: 3FDSJO90U43JIVJU904FRBEWH Verification Hash: 3FDSJO90U43JIVJU904FRBEWH The Chances of two different inputs producing the same MD5 Hash is greater than: 1 in 340 Unidecillion: or 1 in 340,000,000,000,000, 000,000,000,000,000,000,000,000 Hashing Tools Examples 5.php tm Also, AccessData s FTK Imager can be downloaded free at Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 22
23 MD5 Hash 128-bit (16-byte) message digest a sequence of 32 characters The quick brown fox jumps over the lazy dog 9e107d9d372bb6826bd81d3542a419d6 The quick brown fox jumps over the lazy dog. e4d909c290d0fb1ca068ffaddf22cbd0 Hashing an Image MD c96bc7a6a e78e7a371 SHA1 77fe03b07c0063cf35dc268b19f5a449e5a97386 MD5 ea8450e5e8cf1a1c17c6effccd95b484 SHA1 01f57f330fb06c16d5872f5c1decdfeb88b69cbc Analyzing the Evidence Working on bit-stream images of the evidence; never the original Prevents damaging original evidence Two backups of the evidence One to work on One to copy from if working copy altered Analyzing everything Clues may be found in areas or files seemingly unrelated Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 23
24 Analysis (cont d) Existing Files Mislabeled Hidden Deleted Files Trash Bin Show up in directory listing with in place of first letter taxes.xls appears as axes.xls Free Space Slack Space Sources of Digital Gold Internet history Temp files (cache, cookies etc ) Slack/unallocated space Buddy lists, chat room records, personal profiles, etc. News groups, club listings, postings Settings, file names, storage dates Metadata ( header information) Software/hardware added File sharing ability How Data Is Stored Track Sector Clusters are groups of sectors Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 24
25 How Data Is Stored Files are written to Clusters Each file may occupy more or less than full clusters May write to noncontiguous clusters How Data Is Stored Every file in a computer fills a minimum amount of space In some old computers, one kilobyte (1,024 bytes). In newer computers, 32 KB (32,768 bytes). If file is 2,000 bytes long, everything after the 2000 th byte is slack space. Free Space Currently unoccupied, or unallocated space May have held information before Valuable source of data Files that have been deleted Files that have been moved during defragmentation Old virtual memory Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 25
26 Pop Quiz How can you reliably destroy data? Jackhammer hard drive shredder Slack Space Space not occupied by an active file, but not available for use by the operating system How Slack Is Generated File B (Draft in RAM) File B saved to disk, on top of File A File B (Saved to disk) File A ( Erased, on disk) File B overwrites part of File A, creating slack File B (Now on disk) Remains of File A (Slack) Slack space: The area between the end of the file and the end of the storage unit Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 26
27 Selected Developments in Digital Forensics Browser Forensics Triage Forensics Browser Forensics Web browsers (e.g. Microsoft Internet Explorer, Mozilla Firefox, Safari, Opera) maintain histories of recent activity, even if not web related Internet History Computers store Internet history in a number of locations including: Temporary Internet files Windows Registry Browser / Search Term history Cookies This information is browser specific 81 Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 27
28 Triage Forensics Rolling forensics, or on-site preview Image scan Especially useful in knock & talk consent situations, screening multiple computers to determine which to seize, or probation or parole monitoring Not all agencies equipped or trained yet to do this Triage Forensics Increasingly important, as the number and storage capacities of devices rapidly grow. But does NOT enable a comprehensive forensically sound examination of any device on the scene. When is enough enough? Triage Forensics - Steps Attach/Install write-blocking equipment Turn on target device Scan for file extensions, such as:.doc.jpg (.jpeg).mpg (.mpeg).avi.wmv.bmp Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 28
29 Triage Forensics - Steps Pull up thumbnail views images at a time Right click on image, save to CD or separate drive. Determine file structure or file path. Tool Example: ostriage Live response tool Developed by F.B.I. SA in SLC Free to U.S. law enforcement Validated by F.B.I. November MB software package Run from USB storage (e.g., thumb drive or external hard drive) ostriage Reasons to Use Increasing use and ease of virtualization May be multiple additional computers Increasing use of free & low cost encryption Loss of valuable info when computer is rebooted Loss of visibility of network storage Saves time Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 29
30 ostriage Capabilities Display comprehensive details User accounts Physical and logical hard drives Mapped networked drives NIC information Every USB device ever inserted into machine Browser history Flash cookies Applications running (e.g., P2P or encryption) ostriage Capabilities Searches drives, finds images/videos, displays thumbnails Allows easy copying of contraband images, videos to USB storage device Compares images/videos to SHAs Checks files names against keyword list Has built-in image viewer Supports viewing any EXIF data and thumbs.db ostriage Capabilities Extracts saved passwords Extracts list of recently opened files Writes nothing to computer being scanned Allows for custom searches Looks inside archives for key word filenames Gathers and saves volatile data before shutdown Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 30
31 ostriage - Limitations Cannot find and display data no longer there (e.g., cleared browser history) Doesn t look for deleted files Doesn t look at file headers to identify images or videos Does not substitute for full, forensically sound examination of device, if needed Ways of Trying to Hide Data Password protection schemes Encryption Steganography Anonymous r ers Proxy servers Changing File Extensions Password Protection Computer/BIOS Passwords Encryption Programs Archive Passwords Document Passwords Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 31
32 Changing File Extensions Encryption Sometimes used as security measure to prevent others from accessing file data. Examples: "Pretty Good Privacy and Truecrypt Scrambles file data so that it is unusable. Encoded begin cindy.jpg MVP!#`0\0$!83%BH7%RI9.S([65E965E965E965E965E965E965E965E965E9 M65E965E965E965E965E965E965E965G_P``1"`#P`,D#`2(``A$!`Q$!_\0` M%A<8&1HE)B<H*2HT-38W.#DZ0T1%1D=(24I35%565UA96F-D969G:&EJ<W1U M=G=X>7J#A(6&AXB)BI*3E)66EYB9FJ*CI*6FIZBIJK*SM+6VM[BYNL+#Q,7& MQ\C)RM+3U-76U]C9VN'BX^3EYN?HZ>KQ\O/T]?;W^/GZ_\0`'P$``P$!`0$! M`Q$$!2$Q!A)!40=A<1,B,H$(%$*1H;'!"2,S4O`58G+1"A8D-.$E\1<8&1HF MA8:'B(F*DI.4E9:7F)F:HJ.DI::GJ*FJLK.TM;:WN+FZPL/$Q<;'R,G*TM/4 MU=;7V-G:XN/DY>;GZ.GJ\O/T]?;W^/GZ_]H`#`,!``(1`Q$`/P#NBN1D$^]& MT>_YTX=**!B;1[_G2;1[_G3J0T`)M^OYTFT>I_.GYIIXH`:0/4U6N+N"W_UL MRIZ9:L+7_$L=CNAM]KR]R3PM><7^JSW<S,TKNQ/KQ2N.W<]4FUFW1OEF!_X% MB>-M848,RGZK7+9I:9-SNK#QM=.ZBZ.Y>Y0X-=I8:K!?0AH9=QP.">:\361E M*=Q-6+&]CW-.WGBH%>G[A0(FSQUH_$_G3%>G!Q0`['N>*7!]:12*7-``0?6H M/LG_`$UD_P"_C?XU8'K2_E3`4=**!THH`*0BEHH`:36#XEUJ/3K5XT8&9E]? MNBM+4[G[-:NP.#BO+]3CGU#4&MX\LY.Y\G]/PI-E)=3&NKF:_N,#+;V^51WK MF8M'T![K7!#FIH;AX6!&:EHM2[GLL,ZS)O1LJ>>*F5P1Q7GNA:\;=PDA_='] Decoded Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 32
33 Steganography Example StenographyOriginal.png ( pixels, file size: 88 KB) StenographyRecovered.png ( pixels, file size: 19 KB) Another example What do you see? F-22s What else? Embedded 121-page extract of a terrorist training manual The F-22 image, the carrier file, is 2.25MB bitmap file (.bmp). The payload, the training manual extract, is a text file (.txt) that is only 227KB. So the payload easily fits in. Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 33
34 And Remember the Cloud Questions? Copyright 2012 National Center for Justice and the Rule of Law All Rights Reserved Page 34
The Internet and Network Technologies
The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
CYBER FORENSICS. KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad.
CYBER FORENSICS KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad. 11 DIGITAL EVIDENCE? Cyber crimes Digital evidence Digital evidence is any information of
Digital Forensics for Attorneys Overview of Digital Forensics
Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence
Digital Forensics, ediscovery and Electronic Evidence
Digital Forensics, ediscovery and Electronic Evidence By Digital Forensics What Is It? Forensics is the use of science and technology to investigate and establish facts in a court of law. Digital forensics
Computer Forensic Capabilities
Computer Forensic Capabilities Agenda What is computer forensics? Where to find computer evidence Forensic imaging Forensic analysis What is Computer Forensics? The preservation, identification, extraction,
National District Attorneys Association National Center for Prosecution of Child Abuse. Computer Forensics for Prosecutors
National District Attorneys Association National Center for Prosecution of Child Abuse Computer Forensics for Prosecutors February 18-19, 2013 Portland, Oregon Detective Michael Smith Computer Crimes &
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
Computer Forensics as an Integral Component of the Information Security Enterprise
Computer Forensics as an Integral Component of the Information Security Enterprise By John Patzakis 10/28/03 I. EXECUTIVE SUMMARY In addition to fending off network intrusions and denial of service attacks,
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
Computer Forensics. Securing and Analysing Digital Information
Computer Forensics Securing and Analysing Digital Information Aims What is a computer? Where is the evidence? Why is digital forensics important? Seizing evidence Encryption Hidden files and folders Live
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL)
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL) COURSE DESCRIPTION: Computer Forensics is focused on teaching
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
Chapter 7 Securing Information Systems
1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,
About Your Presenter. Digital Forensics For Attorneys. Overview of Digital Forensics
Larry E. Daniel, EnCE, DFCP, BCE Digital Forensic Examiner Digital Forensics for Attorneys An Overview of Digital Forensics About Your Presenter EnCase Certified Examiner (EnCE) Digital Forensics Certified
Digital Forensics. Larry Daniel
Digital Forensics Larry Daniel Introduction A recent research report from The Yankee Group found that 67.6 percent of US households in 2002 contained at least one PC The investigators foresee three-quarters
The Dimensions of Cyber Crime
The Dimensions of Cyber Crime Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials appear as 2, CYBER CRIME AND ITS DIMENSIONS,
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices Introduction As organizations rely more heavily on technology-based methods of communication, many corporations
1 File Management, Virus Protection, and Backup 2 File Basics Every file has a name, and might also have a filename extension You must provide a valid filename that adheres to rules or file-naming conventions
Backing up Data. You have lots of different options for backing up data, different methods offer different protection.
Backing up Data Why Should I Backup My Data? In these modern days more and more is saved on to your computer. Sometimes its important work you can't afford to lose, it could also be music, photos, videos
ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT
ITU Session Four: Device Imaging And Analysis Mounir Kamal Q-CERT 2 Applying Forensic Science to Computer Systems Like a Detective, the archaeologist searches for clues in order to discover and reconstruct
Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012
Just EnCase Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 What is e-discovery Electronically Stored Information (ESI) Discover or Monitor for Fraudulent Activity Tools used
Detection of Data Hiding in Computer Forensics. About Your Presenter
Detection of Data Hiding in Computer Forensics NEbraskaCERT Conference August 22nd, 2008 James E. Martin CISSP, JD About Your Presenter 2008-Present: Security Engineer, West Corporation 2004-2008: Senior
Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works
Cloud Computing TODAY S TOPICS What Cloud Computing is and How it Works Security & Privacy Issues Investigative Challenges WHAT IS CLOUD COMPUTING? Cloud computing refers to software or processes offered
File System Management
Lecture 7: Storage Management File System Management Contents Non volatile memory Tape, HDD, SSD Files & File System Interface Directories & their Organization File System Implementation Disk Space Allocation
Operating Systems Forensics
Operating Systems Forensics Section II. Basic Forensic Techniques and Tools CSF: Forensics Cyber-Security MSIDC, Spring 2015 Nuno Santos Summary! Windows boot sequence! Relevant Windows data structures!
Digital Evidence Search Kit
Digital Evidence Search Kit K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K. H. Pun, W.W. Tsang, H.W. Chan Center for Information Security and Cryptography Department of Computer Science The University
Digital Forensics. Tom Pigg Executive Director Tennessee CSEC
Digital Forensics Tom Pigg Executive Director Tennessee CSEC Definitions Digital forensics Involves obtaining and analyzing digital information as evidence in civil, criminal, or administrative cases Analyze
Computer Backup Strategies
Computer Backup Strategies Think how much time it would take to recreate everything on your computer...if you could. Given all the threats to your data (viruses, natural disasters, computer crashes, and
EnCase Portable. Extend Your Forensic Reach with Powerful Triage & Data Collection
GUIDANCE SOFTWARE EnCase Portable EnCase Portable Extend Your Forensic Reach with Powerful Triage & Data Collection GUIDANCE SOFTWARE EnCase Portable EnCase Portable Triage and Collect with EnCase Portable
Seagate Business Storage 1-Bay, 2-Bay, and 4-Bay NAS User Guide
Seagate Business Storage 1-Bay, 2-Bay, and 4-Bay NAS User Guide Seagate Business Storage NAS User Guide 2013 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and
Introduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014
Introduction to Data Forensics Jeff Flaig, Security Consultant January 15, 2014 WHAT IS COMPUTER FORENSICS Computer forensics is the process of methodically examining computer media (hard disks, diskettes,
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
File Management Windows
File Management Windows : Explorer Navigating the Windows File Structure 1. The Windows Explorer can be opened from the Start Button, Programs menu and clicking on the Windows Explorer application OR by
[DESCRIPTION OF CLAIM, INCLUDING RELEVANT ACTORS, EVENTS, DATES, LOCATIONS, PRODUCTS, ETC.]
What follows isn t the perfect preservation letter for your case, so don t simply treat it as a form. Use it as a drafting aid that flags issues unique to EDD, but tailor your preservation demand to the
Housekeeping Your PC
for WINDOW 7 Course documentation Material at:sussex.ac.uk/its/training/material/housekeeping University of Sussex Updated: June 2011 IT Services Created: December 2002 University of Sussex IT Services
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1
File System Forensics FAT and NTFS 1 FAT File Systems 2 File Allocation Table (FAT) File Systems Simple and common Primary file system for DOS and Windows 9x Can be used with Windows NT, 2000, and XP New
"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure
ICPAK ANNUAL FORENSIC AUDIT CONFERENCE Digital Forensics in Fraud & Corruption Investigations 9 October 2014 Leisure Lodge Hotel, Diani Kenya Faith Basiye, CFE Head Group Forensic Services KCB Banking
Where is computer forensics used?
What is computer forensics? The preservation, recovery, analysis and reporting of digital artifacts including information stored on computers, storage media (such as a hard disk or CD-ROM), an electronic
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Media Backup Storage Device. Operation Manual
Media Backup Storage Device CGA-02540 - Black CGA-02541 - White Operation Manual 20061201 Page 1 of 23 CONGRATULATIONS on your purchase of a Polaroid media backup storage device. Please read carefully
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
Forensics on the Windows Platform, Part Two
1 of 5 9/27/2006 3:52 PM Forensics on the Windows Platform, Part Two Jamie Morris 2003-02-11 Introduction This is the second of a two-part series of articles discussing the use of computer forensics in
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR Supervised by : Dr. Lo'ai Tawalbeh New York Institute of Technology (NYIT)-Jordan X-Ways Software Technology AG is a stock corporation
PRIVAZER USER GUIDE Version 1.2 Dated 08 June 2013
PRIVAZER USER GUIDE Version 1.2 Dated 08 June 2013 CONTENTS Introduction... 3 System Requirements... 4 Install PrivaZer... 5 Uninstall PrivaZer... 9 Scan and Clean C Drive... 11 Scan Options... 20 Cleanup
Managing Applications, Services, Folders, and Libraries
Lesson 4 Managing Applications, Services, Folders, and Libraries Learning Objectives Students will learn to: Understand Local versus Network Applications Remove or Uninstall an Application Understand Group
Backup and Recovery Procedures
CHAPTER 10 This chapter provides Content Distribution Manager database backup and ACNS software recovery procedures. This chapter contains the following sections: Performing Backup and Restore Operations
Battling Current Technological Trends
Law Enforcement Incident Response to Cybercrimes & Battling Current Technological Trends Corey J. Bourgeois, Computer Forensic Examiner & David Ferris, Investigator Louisiana Department of Justice HTCU
How To Store Data On A Computer (For A Computer)
TH3. Data storage http://www.bbc.co.uk/schools/gcsebitesize/ict/ A computer uses two types of storage. A main store consisting of ROM and RAM, and backing stores which can be internal, eg hard disk, or
BlackArmor NAS 110 User Guide
BlackArmor NAS 110 User Guide BlackArmor NAS 110 User Guide 2010 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or registered trademarks
Design and Implementation of a Live-analysis Digital Forensic System
Design and Implementation of a Live-analysis Digital Forensic System Pei-Hua Yen Graduate Institute of Information and Computer Education, National Kaohsiung Normal University, Taiwan [email protected]
Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition
APR. 08 Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition Cover photographs copyright 2001 PhotoDisc, Inc. NCJ 219941 Chapter 1. Electronic Devices: Types, Description,
Modern Digital Forensics!!
ISA 785 Research in Digital Forensics Modern Digital Forensics!! ISA 785! Angelos Stavrou, George Mason University! Modern Digital Forensics What s New 2! New Intellectual property concerns! IP/Brand related
Web-Based Data Backup Solutions
"IMAGINE LOSING ALL YOUR IMPORTANT FILES, IS NOT OF WHAT FILES YOU LOSS BUT THE LOSS IN TIME, MONEY AND EFFORT YOU ARE INVESTED IN" The fact Based on statistics gathered from various sources: 1. 6% of
Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)
Computer Storage Computer Technology (S1 Obj 2-3 and S3 Obj 1-1) Storage The place in the computer where data is held while it is not needed for processing A storage device is device used to record (store)
IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE
IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE IAPE STANDARD SECTION 16.1 DIGITAL EVIDENCE Standard: Digital evidence is a critical element of modern criminal investigation that should be maintained in strict
Best Practices for Incident Responders Collecting Electronic Evidence
Best Practices for Incident Responders Collecting Electronic Evidence rev. April 2013 Prepared by: Rick Clyde Forensic Examiner [email protected] M: (402) 709-6064 Chris Hoke Principal and Owner
Digital Forensic Techniques
Digital Forensic Techniques Namrata Choudhury, Sr. Principal Information Security Analyst, Symantec Corporation Professional Techniques T23 CRISC CGEIT CISM CISA AGENDA Computer Forensics vs. Digital Forensics
Logical Operations. Control Unit. Contents. Arithmetic Operations. Objectives. The Central Processing Unit: Arithmetic / Logic Unit.
Objectives The Central Processing Unit: What Goes on Inside the Computer Chapter 4 Identify the components of the central processing unit and how they work together and interact with memory Describe how
Upgrade to Webtrends Analytics 8.7: Best Practices
Technical Best Practices 8.7 Software Upgrade Upgrade to Webtrends Analytics 8.7: Best Practices Version 3 Webtrends Analytics is a powerful application that must be installed on a dedicated computer.
Legal Notices. AccessData Corp.
Legal Notices AccessData Corp. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability
AN INVESTIGATION INTO THE METHODS USED FOR TRAFFICKING OF CHILD ABUSE MATERIAL
AN INVESTIGATION INTO THE METHODS USED FOR TRAFFICKING OF CHILD ABUSE MATERIAL Dr. Allan Charles Watt, PhD, CFCE, CFE Macquarie University, Sydney, Australia Session ID: CLE W02 Session Classification:
The following features have been added to FTK with this release:
FTK 2.0.2 Readme The following sections present information on the new features, resolved issues, and known issues with the FTK 2.0.2 release. NEW FEATURES The following features have been added to FTK
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Digital Evidence. Robert J. O Leary, CFCE; DFCP Director NIJ ECTCoE 550 Marshall St. Suite B Phillipsburg, NJ 08865
Digital Evidence Robert J. O Leary, CFCE; DFCP Director NIJ ECTCoE 550 Marshall St. Suite B Phillipsburg, NJ 08865 Russell Yawn, CFCE; Deputy Director NIJ ECTCoE 550 Marshall St. Suite B Phillipsburg,
MozyPro Online Backup. Overview and Sales Best Practices
MozyPro Online Backup Overview and Sales Best Practices Why Backup? Digital Data Continues to Grow Growing by a Factor of 44 One Zettabyte (ZB) = 1 trillion gigabytes 2009 0.8 ZB 2020 35 ZB Page 3 Source:
Developing Computer Forensics Solutions for Terabyte Investigations
Developing Computer Forensics Solutions for Terabyte Investigations Eric Thompson Corporation Orem, Utah USA www.accessdata.com Overview Computer Forensic Definition, Objectives and Policies History of
Practice Exercise March 7, 2016
DIGITAL FORENSICS Practice Exercise March 7, 2016 Prepared by Leidos CyberPatriot Forensics Challenge 1 Forensics Instruction Guide Introduction The goal of this event is to learn to identify key factors
Presentation Title Presentation Subtitle. The Unique Alternative to the Big Four
Presentation Title Presentation Subtitle The Unique Alternative to the Big Four Speaker Biography Tim L. Bryan, CPA/CFF/CITP, CISA, EnCE Senior Manager, Crowe Horwath LLP Forensic Technology Services Leader
Live View. A New View On Forensic Imaging. Matthiew Morin Champlain College
Live View A New View On Forensic Imaging Matthiew Morin Champlain College Morin 1 Executive Summary The main purpose of this paper is to provide an analysis of the forensic imaging tool known as Live View.
(b) slack file space.
Hidden Files A Computer Forensics Case Study Question Paper 1. Outline the meaning of the following terms: (a) cookie, [2 marks] A cookie is data stored locally that is used by some websites for data that
Incident Response and Forensics
Incident Response and Forensics Yiman Jiang, President and Principle Consultant Sumus Technology Ltd. James Crooks, Manager - Advisory Services PricewaterhouseCoopers LLP UBC 2007-04-12 Outline Computer
Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app
Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly
RFG Secure FTP. Web Interface
RFG Secure FTP Web Interface Step 1: Getting to the Secure FTP Web Interface: Open your preferred web browser and type the following address: http://ftp.raddon.com After you hit enter, you will be taken
NovaBACKUP. User Manual. NovaStor / November 2011
NovaBACKUP User Manual NovaStor / November 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without
Using Computer Forensics in your Investigations
Deloitte Financial Advisory Services LLP Using Computer Forensics in your Investigations Presented to: ISACA Los Angeles Chapter Dave Nardoni January 12 th, 2010 Agenda Introduction Analytic & Forensic
Auslogics BoostSpeed 5 Manual
Page 1 Auslogics BoostSpeed 5 Manual [ Installing and using Auslogics BoostSpeed 5 ] Page 2 Table of Contents What Is Auslogics BoostSpeed?... 3 Features... 3 Compare Editions... 4 Installing the Program...
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
Networks and the Internet A Primer for Prosecutors and Investigators
Computer Crime & Intellectual Property Section Networks and the Internet A Primer for Prosecutors and Investigators Michael J. Stawasz Senior Counsel Computer Crime and Intellectual Property Section ()
Microsoft Vista: Serious Challenges for Digital Investigations
Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 2 nd, 2008 Microsoft Vista: Serious Challenges for Digital Investigations Darren R. Hayes and Shareq Qureshi Seidenberg School of
How To Understand The History Of The Web (Web)
(World Wide) Web WWW A way to connect computers that provide information (servers) with computers that ask for it (clients like you and me) uses the Internet, but it's not the same as the Internet URL
Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders
Massachusetts Digital Evidence Consortium Digital Evidence Guide for First Responders May 2015 Digital Evidence Guide for First Responders - MDEC A Note to the Reader There are an unlimited number of legal
DISK DEFRAG Professional
auslogics DISK DEFRAG Professional Help Manual www.auslogics.com / Contents Introduction... 5 Installing the Program... 7 System Requirements... 7 Installation... 7 Registering the Program... 9 Uninstalling
