NETWORKS AND THE INTERNET



Similar documents
Networks and the Internet A Primer for Prosecutors and Investigators

The Internet and Network Technologies

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Chapter 9. The Internet: Information Technology Infrastructure for the Digital Firm. Essentials of Management Information Systems

Chapter 4 Restricting Access From Your Network

Masters of Science in Information Technology

Chapter 3 Restricting Access From Your Network

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.

Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications

lesson 19 Internet Basics

CA106 Web Design. Dr. Dónal Fitzpatrick, School of Computing Room l2.48, Extension 8929,

Configuring a Domain to work with your Server

Using MIS 3e Chapter 6A Appendix

Best Practices for Controlling Skype within the Enterprise. Whitepaper

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Copyright 2006 Comcast Communications, Inc. All Rights Reserved.

Cornerstones of Security

What really is a Service?

Step-by-Step Configuration

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

How Your Computer Accesses the Internet through your Wi-Fi for Boats Router

See Criminal Internet Communication as it Happens.

Configuring Network Address Translation (NAT)

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Technology/Internet Usage Workshop

Basic Network Configuration

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

Load Balance Mechanism

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Chapter 1 Configuring Basic Connectivity

CHAPTER 9: THE EVOLVING INTERNET

UIP1868P User Interface Guide

Internet Privacy Options

Internet Services. Sadiq M. Sait, Ph.D

F-Secure Messaging Security Gateway. Deployment Guide

Glossary of Technical Terms Related to IPv6

User Guide. You will be presented with a login screen which will ask you for your username and password.

Evaluation Guide. Powerful & Immediate Business Web Security via the Cloud

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, Page 1

12. Firewalls Content

Sage ERP Accpac Online

Chapter 3 Security and Firewall Protection

Lawful Interception in P2Pbased

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Proxy Server, Network Address Translator, Firewall. Proxy Server

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

What communication protocols are used to discover Tesira servers on a network?

Using Internet or Windows Explorer to Upload Your Site

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

Introduction to Web Technology. Content of the course. What is the Internet? Diana Inkpen

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Computer Networks - CS132/EECS148 - Spring

Transferring Your Internet Services

TELE 301 Network Management. Lecture 17: File Transfer & Web Caching

To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Web Browsers And Mailing Tools

Communications and Networking

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Guideline for setting up a functional VPN

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Broadband Phone Gateway BPG510 Technical Users Guide

Fundamentals of the Internet 2009/ Explain meaning the following networking terminologies:

Securing the Transition Mechanisms

Chapter 1 Configuring Internet Connectivity

The Challenges of Stopping Illegal Peer-to-Peer File Sharing

Network setup and troubleshooting

Protocol Data Units and Encapsulation

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Quick Scan Features Setup Guide

3Degrees Group, Inc. Privacy Policy

Why your own server space? Why should you set it up?

COMP 361 Computer Communications Networks. Fall Semester Midterm Examination

NETWORK SETUP GLOSSARY

Hosting more than one FortiOS instance on. VLANs. 1. Network topology


Firewalls, IDS and IPS

Remote login (Telnet):

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture # Apache.

Remote Console Installation & Setup Guide. November 2009

T.38 fax transmission over Internet Security FAQ

Step-by-Step Configuration

Machine control going www - Opportunities and risks when connecting a control system to the Internet

NEW AND IMPROVED! INSTALLING an IRC Server (Internet Relay Chat) on your WRT54G,GS,GL Version 1.02 April 2 nd, Rusty Haddock/AE5AE


SSL VPN Technology White Paper

Secure Mail Registration and Viewing Procedures

Transcription:

NETWORKS AND THE INTERNET Outline to accompany the slide presentation 1. Networks and the Internet A Primer for Prosecutors and Investigators 2. Getting There From networks to the Internet Locating a place on the Internet Applications that people use on the Internet 3. to Get the Evidence What evidence does Internet use create? Where is this evidence located? How do we gather this evidence? 4. Getting there: From networks to the Internet 5. What is a network? 6. What is an inter-network? Router Node 7. What is the Internet? 8. A Decentralized Network No center No one is in charge No one knows exactly where all the components are located 9. How do Internet hosts exchange data? Computer programs create DATA o Web page o Movie o E-mail message o Voice o Software

NETWORKS AND THE INTERNET 2 Data is organized into PACKETS 10. Exchanging Data [1] Information to be sent to another Internet host is divided into small DATA PACKETS The data packets are sent over the network to the receiving host The receiving host assembles the data packets into the complete communication 11. Exchanging Data [2] 12. Internet Protocol (IP) Packets Source address Destination address Data being sent 13. Getting There: Locating a place on the Internet 14. IP Addresses 15. Assigning IP Addresses [1] Types of IP addresses o Public o Private o Dynamic o Static Blocks of IP addresses registered to Internet service providers (ISP) 16. Assigning IP Addresses [2] Computer modem Internet service provider Internet Log: 149.101.1.120 assigned to Harry at 2:30 p.m. 17. ISP Login Records The ISP-equivalent of telephone company records Records each time a user logs in (or tries and fails) Logs show o Start time o Session duration o Account identifier o Assigned IP address

NETWORKS AND THE INTERNET 3 18. The Traceback We know the IP address used by the suspect How do we find out who this person is? 19. Step 1: What ISP has that address? Use the IP WHOIS service to find out what ISP owned that IP address. 20. Step 2: What user had that address at that time? Subpoena the ISP to find out who had that address Specify at least the address and the time and date with time zone. 21. Another Location Method: Prospective Evidence Gathering We know that our suspect was at a site and believe he ll return A pen/trap device installed at the site s server provides the suspect s IP address when he returns 22. A Twist: The NAT Several computers share one IP address Outside world sees the same address regardless of which computer communicates 23. Another Twist: The Proxy Laundering communications through someone else s IP address Outside world sees only the proxy s IP address 24. Infamous Proxies America Online s proxy cache Proxy caches used by private companies Bots Anonymizers 25. Domain Names How humans handle IP addresses o Every domain name has whois information o Owner, physical address, contact information o Almost always wrong if the domain name is registered by a criminal o Assume nothing about geography

NETWORKS AND THE INTERNET 4 26. Domain Name Queries Who is thecommonwealth.org? ISP domain name system 27. Getting There: Applications that let people use the Internet 28. How People Use the Internet People use APPLICATIONS to communicate with the Internet o Web page o Movie o E-mail message o Voice o Software 29. Internet Use Applications E-mail Web browser Peer-to-peer (P2P) Instant messaging (IM) Internet relay chat (IRC) File transfer protocol (FTP) 30. Internet Use Applications: E-mail 31. E-Mail Basics E-mail travels from sender to recipient s host, where it resides on a MAIL SERVER until the recipient retrieves it Sender s computer sender s ISP Internet recipient s ISP Recipient s computer 32. Evidence of Past Activity Content Copies of a previously sent e-mail message may be stored on the o sender s system o recipient s mail server (even after addressee has read it) o recipient s own machine 33. Evidence of Past Activity Traffic Data A record of the e-mail transmission (date, time, source, destination) usually resides in the MAIL LOGS of the

NETWORKS AND THE INTERNET 5 o sender s system o recipient s mail server 34. Prospective Evidence Content Interception, wiretap Creates a cloned account Subject s computer subject s ISP law enforcement computer 35. Prospective Evidence Traffic Data Install a pen/trap at user s ISP to find out the e-mail addresses of the correspondents 36. Internet Use Applications: Web browser 37. What is a web site? Three components o Domain name (or other address) o A web hosting server o Files sitting on the web hosting server 38. A Twist: Virtual Hosting One server hosts hundreds of web sites All web sites share a single IP address Think carefully before you seize or search an entire server 39. Web Addresses Uniform Resource Locators (URL) 40. Browsing the Web: Client-Server Interaction [1] User types a URL or clicks on link User s computer looks up IP address User ISP Internet domain name system 41. Browsing the Web: Client-Server Interaction [2] User s CLIENT PROGRAM sends a request to the WEB SERVER at the specified IP address The web server transmits a copy of the requested document (the web page) to the user s computer

NETWORKS AND THE INTERNET 6 User ISP Internet web server 42. Browsing the Web: Client-Server Interaction [3] The client program displays the transmitted document on the user s screen 43. Evidence of Web Query: On User s Compute Cache directory o Copies of recently viewed web pages History file o List of recently visited pages User ISP Internet web server 44. Evidence of Web Query: On Web Server Detailed logs of each request for any page o Date, time o Number of bytes o IP address of the system that requested the data User ISP Internet web server 45. Example: Web Server Log 46. See a theme? To do anything on the Internet, a computer communicates with another computer using an IP address Hopefully, that other computer will log what the suspect has done With that in mind 47. Other Internet Use Applications Peer-to-peer (P2P) Instant messaging (IM) Internet relay chat (IRC) File transfer protocol (FTP) 48. In Closing The Internet is a packet-switched network Systems keep many records about their interactions with the rest of the network Those records often help us locate and identify criminal actors, or at least to bolster the other evidence against them

NETWORKS AND THE INTERNET 7 End