Chapter 11 Analysis Methodology Spring 2016 - Incident Response & Computer Forensics.

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Collaboration Model for Law Enforcement X-Ways Investigator (investigator version of X-Ways Forensics)
File Management Chapter 3
Objectives Overview Define an operating system
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Effective Discovery Techniques In Computer Crime Cases.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
COMPUTER CONCEPTS Computer Information Systems. COURSE COMPETENCIES Explain the functions of computer system components. Describe the information processing.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 5: User Environment and Multiple Languages.
Advance evidence collection and analysis of web browser activity by Junhoon Oh David Rivera 11/7/2013 Digital Forensics.
Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.
Capturing Computer Evidence Extracting Information.
Distinguish between primary and secondary storage.
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
Chapter 5: System Software: Operating Systems and Utility Programs.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Operating System Utility Programs & Stand-alone utility Programs.
Secondary Storage Chapter 7.
Storage Devices. Internal / External Hard Drive Also known as hard disks Internal drive stores the operating system software, application software and.
Computers Are Your Future Eleventh Edition Chapter 4: System Software Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
ROM Read Only Memory “…computer memory on which data has been prerecorded. Once data has been written onto a ROM chip, it cannot be removed and can only.
Getting Started with Application Software
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
CMPTR Chapter 2 – Part 2 (Storage). Storage – Punch Cards Player Piano Roll Punch Cards were used before disk drives.
Storage & Connectivity Devices. Internal / External Hard Drive Also known as hard disks Internal drive stores the operating system software, application.
Your Interactive Guide to the Digital World Discovering Computers 2012.
CHAPTER FOUR COMPUTER SOFTWARE.
Explain the purpose of an operating system
XP. The Start menu New streamlined design No more “My” Recently programs now sport Jump Lists All Programs menu slides in and out of existing space Search.
Chapter 2 Working with Disks and Other Removable Media 2.
Eng.Abed Al Ghani H. Abu Jabal Introduction to computers.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
1. MAGNETIC HARD DRIVES 2. SOLID STATE DRIVES 3. OPTICAL DISKS 4. FLASH MEMORY 5. CLOUD STORAGE 6. CONNECTIVITY DEVICES Storage and connectivity devices.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
Lesson 3 Data Storage. Objectives Define data storage Identify the difference between short-term and long-term data storage Understand cloud storage and.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Configuring Data Protection Chapter 12 powered by dj.
Chapter 3 Installing and Learning Software. 2Practical PC 5 th Edition Chapter 3 Getting Started In this Chapter, you will learn: − What is in an application.
ITGS Networks. ITGS Networks and components –Server computers normally have a higher specification than regular desktop computers because they must deal.
Storage Devices 1. Objectives Overview Differentiate between storage devices and storage media Describe the characteristics of an internal hard disk including.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
© GCSE Computing Computing Hardware Starter. Creating a spreadsheet to demonstrate the size of memory. 1 byte = 1 character or about 1 pixel of information.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Enw / Name. What is a on-line / paper based data capture form Can you give an example where each are used? Automated data capture systems are used around.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
IT Vocabulary Basics Review Sit at tables. Need pencil/pen.
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Computer Information Systems
USB flash drive A flash drive consists of a small printed circuit board carrying the circuit elements and a USB connector, insulated electrically and protected.
Unit Computer Components
Getting Started with Application Software
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
Introduction to Computers
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
BASICS 1 Windows XP.
Chapter 7.
Computer Application Waseem Gulsher
Comodo Dome Data Protection
Presentation transcript:

Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics

Define Objectives  Well-defined objectives help achieve better results  It is important to determine who will define the objectives  Objectives are usually defined as a series of questions.  Some objectives are hard to achieve  Example: Proving that the system has not been compromised  Stay focused - do not run after tempting artifacts

Know Your Data  Data available in many formats and locations  Explore possible data sources and know how they can be used  It will help you decide what to collect

Where is Data Stored?  Desktops and laptops  Hard drives and external storage  OS, Applications, and associated data  If virtualized, data in central infrastructure  Servers  Hard drives - OS  External storage solutions – (likely) Application and other data  Mobile devices  Small amount of storage, normally nonvolatile (flash) memory  Cloud (??)

Where is Data Stored?  Storage solutions and media  USB flash drives, USB hard drives, CDs, DVDs, Network Attached Storage (NAS), Storage Area Networks (SAN)  Network Devices  Firewalls, switches, routers  Cloud services  Data belonging to organizations and individual users  Backups  On-site and off-site storage

What is Available  Operating System  File systems, State information (info on processes, ports, etc.), OS Logs, etc.  Application  Application specific artifacts (logs, s, browser cache, etc.)  Some artifacts are left behind even after the application is removed  User data  Documents, s, source-code, etc.  Network service and instrumentation  DHCP, DNS, proxy server information, firewall, etc.

Access Your Data  Issues: data formats vary, storage media are different, data may have been encrypted, compressed, etc.  Disk images  Which system? How was it obtained? etc.  What does it look like?  How was data encoded? Things looking different may have similar information  What to search and how to search? Example: a string may appear disconnected and search may not work

Analyze Your Data  Outline an approach  Where to start, what to look for  Network and hosts Abnormal user activities Abnormal connection durations Abnormally high CPU activity Recently installed or modified services Programs that automatically start Integrity of system binaries …

Select Methods  Use of external resources  Using methods and tools developed by others  Manual inspection of data  Particularly when amount of data collected is small  Use of specialized tools  Can help in data visualization, malware identification, browser artifact analysis, etc.  Data minimization through sorting and filtering  Helps in focusing on a subsection of data

Select Methods  Statistical analysis  Helps in discovering patterns or anomalies  Keyword searching  Be careful of cases such as encoding or formatting  Search unallocated spaces and slack spaces as well  File and record carving  Searching for file information based on content – not based on metadata  The method works even if a file is deleted or renamed

Evaluate Results  Evaluate results periodically  Can correct or change the method early enough, if results are not satisfactory  After finishing data analysis, evaluate how well the result answers the investigative questions  If result does not help, try a different method or sources of evidence