Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.

Slides:



Advertisements
Similar presentations
Computer Forensics.
Advertisements

Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Utility program + driver program Thomas Wat 4D (21)
Computer Forensics.
Guide to Computer Forensics and Investigations Fourth Edition
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Guide to Computer Forensics and Investigations, Second Edition
Computer & Network Forensics
BACS 371 Computer Forensics
5-9/12/2005 CPE How to format your computer and re-install Windows XP.
Guide to Computer Forensics and Investigations Fourth Edition
COS 413 DAY 2. Agenda Questions? Assignment 1 due next class Finish Discussion on Preparing for Computing Investigations Begin Discussion on Understanding.
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Third Edition
COS 413 Day 13. Agenda Questions? Assignment 4 Due Assignment 5 posted –Due Oct 21 Capstone proposal Due Oct 17 Lab 5 on Oct 15 in N105 –Hands-on Projects.
Guide to Computer Forensics and Investigations Third Edition
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
Guide to Computer Forensics and Investigations Third Edition Chapter 7 Current Computer Forensics Tools.
COS/PSA 413 Day 5. Agenda Questions? Assignment 2 Redo –Due September 3:35 PM Assignment 3 posted –Due September 3:35 PM Quiz 1 on September.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 5: Data, PDA, and Cell Phone Forensics.
COS/PSA 413 Lab 4. Agenda Lab 3 write-ups over due –Only got 9 out of 10 Capstone Proposals due TODAY –See guidelines in WebCT –Only got 4 out of 10 so.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 5: Data, PDA, and Cell Phone Forensics.
COS/PSA 413 Day 15. Agenda Assignment 3 corrected –5 A’s, 4 B’s and 1 C Lab 5 corrected –4 A’s and 1 B Lab 6 corrected –A, 2 B’s, 1 C and 1 D Lab 7 write-up.
COS/PSA 413 Day 2. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Begin.
Guide to Computer Forensics and Investigations, Second Edition
COEN 252 Computer Forensics
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 9 Data Acquisition.
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
Guide to Computer Forensics and Investigations Fourth Edition
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
SUMMER BRIDGE PROGRAM DR. HWAJUNG LEE DR. ASHLEY PODHRADSKY Computer Forensics.
Guide to Computer Forensics and Investigations Fourth Edition
Mohd Taufik Abdullah Department of Computer Science
Teaching Digital Forensics w/Virtuals By Amelia Phillips.
Hands-On Microsoft Windows Server 2003 Administration Chapter 2 Managing Windows Server 2003 Hardware and Software.
Preserving Evidence ● Number one priority ● Must also find incriminating evidence ● Must search the contents of the hard drive ● Can not change the hard.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Computer Forensics Principles and Practices
Chapter 2 Understanding Computer Investigations
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Guide to Computer Forensics and Investigations Fourth Edition
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
& Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Understanding Backup and Recovery Methods Lesson 8.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
COMPUTER SYSTEM TOOLS. SCANDISK MICROSOFT UTILITY PURCHASED FROM NORTON, WHICH IS NOW SYMANTEC; INCLUDED WITH MS-DOS 6.2 AND ON AS WELL AS ALL VERSIONS.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 24 Troubleshooting and Maintenance Fundamentals.
Chapter 3 Data Acquisition Guide to Computer Forensics and Investigations Fifth Edition All slides copyright Cengage Learning with additional info from.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
Guide to Computer Forensics and Investigations Fifth Edition
Guide to Computer Forensics and Investigations Third Edition
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Jeopardy Data Hardware & Software Files and Folders Networking Q $100
Forensic Recovery of Evidence Device (FRED)
Presentation transcript:

Computer Forensics Tim Foley COSC 480 Nov. 17, 2006

Roadmap What computer forensics is Preparing a case Beginning an investigation Conducting an investigation Critiquing a case Summary Sources Questions

What is computer forensics? The obtaining and analysis of digital information for use as evidence in cases. Civil Criminal Administrative

Preparing a Case The goal is to gather evidence from a suspect’s computer and determine whether the suspect committed a crime. Inspect suspect’s computer and save that information on another computer Document the chain of evidence

Taking a Systematic Approach Make an initial assessment about the type of case you are investigation Determine a preliminary design or approach to the case Create a detailed design Determine the resources you need Obtain and copy an evidence disk drive Identify the risks

Systematic Approach Continued Mitigate or minimize the risks Test the design Analyze and recover the digital evidence Investigate the data you recovered Complete the case report Critique the case

Systematic Approach Continued The amount of time and effort you put into each step varies depending on the nature of the investigation. What the systematic approach gives you: Helps you discover more information Gives you a logically ordered investigation

Planning Your Investigation Once you have identified the requirements you can plan the investigation. Basic Plan: Acquire evidence Complete an evidence form and establish chain of custody Transport evidence to your computer forensics lab Secure your evidence in an approved secure container Prepare your forensic workstation Obtain the evidence from the secure evidence container Make a forensic copy of the evidence floppy or hard drive Return the evidence to a secure container Process the copied evidence with your forensics tools

Multi-Evidence Form

Securing the Evidence Items in evidence bags: Floppy disks Zip and Jaz cartridges 4 mm DDS digital audio tape (DAT) USB thumb drives Secure evidence in antistatic evidence bags

Securing the Evidence Continued Bigger items put into larger storage devices which are available at police supply stores Items: CPU Cabinet Monitor Keyboard Printer

Safe Ways of Powering Down

Copying Data Bit-stream copy: Is a bit-by-bit copy of the original storage medium and is an exact duplicate of the original disc. It is different from a simple backup copy because backups can only copy files stored in a folder or are of a known file type. Bit-stream image: Is the file that contains the bit-stream copy of all the data on a disk or disk partition.

Creating a Boot Disk The reason to make a boot disk is to not alter the original disk in any way. When the boot process accesses files on the hard disk, it changes their date and time stamps, which can jeopardize an investigation.

Creating a Boot Disk Continued Items needed to create a boot disk: Disk editor, such as Norton Disk Edit or Hex Workshop. Empty floppy disk. MS-DOS operation system such as MS-DOS 6.22,Windows 95B, or Windows 98 running on your computer, not Windows XP, 2000, ME or NT. Computer that can boot to a true MS-DOS level- that is, an MS-DOS 6.22, a Windows 95B, or a Windows 98 computer. Forensics acquisition tool, such as DriveSpy, Encase, SafeBack, or SnapCopy Write-blocking tool to protect the evidence drive.

Creating a Boot Disk Continued Can make it bootable from MS-DOS or Windows Explorer. Update the operating system files to remove any reference to the hard disk. This ensures that when your acquiring a FAT16 or FAT32 evidence disk, your boot floppy disk does not contaminate it.

Creating a Boot Disk Continued Next, you modify the Io.sys file to change all references to the C:drive and the DriveSpace utility. You don’t want to activate DriveSpace because it can corrupt data.

Creating a Boot Disk Continued Now you can use the floppy disk to boot a suspect’s computer without contaminating evidence on the hard disk. Add the forensic software to the floppy disk so that you can use it to acquire an evidence disk. Make backups and copies.

Completing the Case After you analyze the disk, you can retrieve deleted files and s, items that have been purposefully hidden and many other useful items. Finish by writing a report and stating what you did and what you found. Include any log files from forensic software. You should be able to repeat the steps to find the same result.

Critiquing the Case How could you improve your participation in the case? Did you expect the results your found? Did the case develop in ways you did not expect? Was the documentation as thorough as it could have been? What feedback has been received from the requesting source? Did you discover any new problems? If so, what are they? Did you use new techniques during the case or during research?

Summary Systematic Approach Planning the Investigation Multi-Evidence Forms Properly Securing Evidence Safe Ways of Powering Down Copying Data Boot Disks Critiquing the Case

Sources "Computer Forensics." Wikipedia. 15 Nov Nelson, Phillips, Enfinger, and Steuart. Guide to Computer Forensics and Investigations. 2nd ed. Canada: Tompson, "Understanding Computer Investigations." 15 Nov

Questions??