Exam Information CSI5107 Network Security.

Slides:



Advertisements
Similar presentations
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Advertisements

E-Discovery for System Administrators Russell M. Shumway.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
BACS 371 Computer Forensics
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Guide to Computer Forensics and Investigations Fourth Edition
1 PROJECT Web-based Database Applications Lecture 1: Basic Internet Concepts & Databases - the History.
Guide to Computer Forensics and Investigations Fourth Edition
MS DB Proposal Scott Canaan B. Thomas Golisano College of Computing & Information Sciences.
COS 413 Day 13. Agenda Questions? Assignment 4 Due Assignment 5 posted –Due Oct 21 Capstone proposal Due Oct 17 Lab 5 on Oct 15 in N105 –Hands-on Projects.
Guide to Computer Forensics and Investigations Third Edition
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
COS/PSA 413 Day 15. Agenda Assignment 3 corrected –5 A’s, 4 B’s and 1 C Lab 5 corrected –4 A’s and 1 B Lab 6 corrected –A, 2 B’s, 1 C and 1 D Lab 7 write-up.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Capturing Computer Evidence Extracting Information.
Introduction to Database Systems 1.  Assignments – 3 – 9%  Marked Lab – 5 – 10% + 2% (Bonus)  Marked Quiz – 3 – 6%  Mid term exams – 2 – (30%) 15%
Guide to Computer Forensics and Investigations, Second Edition Chapter 9 Data Acquisition.
July 9, National Software Reference Library Douglas White Information Technology Laboratory July 2004.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
Defining Digital Forensic Examination & Analysis Tools Brian Carrier.
Computer Forensics Iram Qureshi, Prajakta Lokhande.
Digital Forensics
Investigating Cybercrime DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
Digital Crime Scene Investigative Process
Chapter 9 Digital Forensics Analysis and Validation
Computer Forensics Principles and Practices
Introduction to Digital Forensics Florian Buchholz.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
Windows NTFS Introduction to Operating Systems: Module 15.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Guest Lecture September 21, 2009.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
Guide to Computer Forensics and Investigations Fourth Edition
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Evidence Handling If the evidence is there the case is yours to lose.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
CJ 317 – Computer Forensics
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
Forensic Investigation Techniques Michael Jones. Overview Purpose People Processes Michael Jones2Digital Forensic Investigations.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Investigations 2016 First semester [ 12 week ]-Forensic Analysis of the Windows 7 Registry.
Intrusion Detection MIS ALTER 0A234 Lecture 12.
Digital Forensics Anthony Lawrence. Overview Digital forensics is a branch of forensics focusing on investigating electronic devises. Important in for.
Responder Field Edition & Pro
Creighton Barrett Dalhousie University Archives
Digital Technologies for Administrators
Efficient Drive forensics – and it’s free!
PhD Oral Exam Presentation
Chapter 13: The IT Professional
Instructor Materials Chapter 13: The IT Professional
COMPUTING BTEC LEVEL /17.
Responder Field Edition & Pro
Knut Kröger & Reiner Creutzburg
Computer Forensics Discovery and recovery of digital evidence
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
OPS235: Week 1 Installing Linux ( Lab1: Investigations 1-4)
Digital Forensics Dr. Bhavani Thuraisingham
Computer Forensics Lab 1 INFORMATION TECHNOLOGY DEPARTMENT LEBANESE FRENCH UNIVERSITY (LFU) COURSE CODE: IT402CF 1.
PLANNING A SECURE BASELINE INSTALLATION
1 Guide to Computer Forensics and Investigations Sixth Edition Chapter 3 Data Acquisition.
Presentation transcript:

Exam Information CSI5107 Network Security

The following slides are designed to prompt your thinking with regards to the content covered in this unit The exam is not just about describing or defining concepts. The exam is about the application of your knowledge of digital forensic concepts towards different issues.

To pass the unit you must obtain at least 50% of the available marks in the exam AND obtain at least 50 marks in the unit in total

Module 1 What is computer forensics? Civil versus criminal case requirements Incuplatory versus exculpatory evidence Computer forensics versus data recovery? Why is planning important in computer forensics? Consideration when preparing for an investigation? Why is planning important?

Module 2 What is a computer forensics plan? Why is it important? What does it contain? Digital forensic reports – purpose? What is the purpose of segregating a report into issues (chapters)? What is the purpose of a running sheet? You should be able to communicate the findings of an investigation

Module 3 Acquisition formats Static versus live acquisitions Raw Proprietary Advanced Forensics Format (AFF) Definitions, examples, pros and cons of each Static versus live acquisitions Logical versus physical acquisitions Focus on process, procedure, tools/software commands, benefits, issues and constraints

Module 3 Security requirements before acquisitions Media preparation, policies, procedures etc. Forensic tool benefits and their limitations Validation techniques MD5 vs SHA1 vs etc. Issues with acquiring a RAID Network and remote acquisitions

Module 4 Understand binary/hex conversions etc. Little vs big endian – OS dependency What does the ‘endian’ mean when interpreting data with a hex editor? Why should we care in what order data is stored? Sectors vs clusters File slack Partitions Boot code Rules of evidence: Admissible – Conform to legal rules for admissibility in court Authentic – Possible to tie evidentiary material to the incident Complete – Must tell the whole story not just a perspective Reliable – Nothing from the time the evidence is collected and handled should be able to cast doubt on its authenticity and reliability Believable – It must be readily believable and understandable by a court

Module 5 What is a file system? Explain how a FAT FS works? Directory entry structure Reading/deleting files Explain how an NTFS FS works? MFT, records, record structure Windows registry benefits in forensics Structure, data, offline acquisition

Module 6 Graphic file types – contemporary formats EXIF metadata and its use in forensics File signature – purpose, benefits, limitations Fragmented vs continuous file carving Issues related to fragmented files Software strategies to carve fragmented files Scalpel carving processes and procedures Smart carving benefits and limitations

Module 6 Web browser forensics analysis Potential digital artefacts from web browsers How can web browser history be used to show intent? What files do we look for with browsers such as...Internet Explorer, Firefox, Chrome The effects of anti-web browser forensic tools on digital forensics

Module 7 How do we evaluate digital forensic tools? Standards? Models? Methods? Hardware vs software forensic tools Define, explain, provide specific examples Acquisition Validation and discrimination Extraction Reconstruction Reporting

Module 8 How to determine what data to collect and analyse? NSRL RDS databases – pros/cons? limitations? How to implement/use a RDS? Validation techniques of collected data Locating/analysing hidden data Tools for detecting encryption, breaking passwords, detecting concealment

Module 9 Email investigations Email headers as a source of evidence Structure of email headers Interpreting data in email headers Email forensic tools their functionality/limitations/benefits Issues/challenges with cloud forensics

Module 10 Order of Volatility – impact on the collection of evidence – what should you prioritize? The impact of virtual machines on computer investigations? Tools for live acquisitions Network forensics – purpose/benefits/tools

Module 11 Types of evidence from smartphones? Issues with gathering evidence from phones Types of tools their limitations and purpose Physical vs logical vs manual acquisition Flash file systems issues for forensics Bypassing FTL benefits? JTAG/Flasher tools processes

CSG2305 exam 2 hour exam 1 section 10 questions @ 5 marks each Each question will require up to ½ a page to be answered sufficiently Questions cover entire unit Lecture notes, workshops, text book, tools, procedures, additional readings

CSG5126 exam 3 hour exam 2 sections Section A - 1 question @ 20 marks Scenario based question focusing on correctly undertaking a forensic investigation Tools, procedures, best practices etc. Section B – 6 questions @ 5 marks each Each question will require up to ½ a page to be answered sufficiently

Study Notes Read all lecture notes Complete all tutorial/workshop activities Read appropriate chapters in text book Read additional readings found on Blackboard Some questions are based on theory others are based on application of commands and processed within tools/software

No notes or calculators are permitted in the exam The text book or other supportive material is not permitted within the exam Write legibly If we can’t read your writing, we cannot award you marks for your answer!