Thursday April 19, 2018 (Discussion – Storing and Retrieving Data, Processing the Electronic Crime Scene)

Slides:



Advertisements
Similar presentations
Chapter 4 Storing Information in a Computer Peter Nortons Introduction to Computers.
Advertisements

Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
THIS IS A COMPUTER COMPILED BY RICHARD AMOAKO, CO-FOUNDER OF PROJECT GOODWILL AFRICA, A YOUTH EMPOWERMENT ORGANIZATION.
Guide to Computer Forensics and Investigations, Second Edition
Operating Systems.
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
Computer Basics Flashcards #2
17-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein COMPUTER FORENSICS.
Flash Cards Computer Technology.
Chapter 3 Computer Hard ware
Learning Targets Identify the external parts of the computer Identify examples of input devices Identify examples of output devices Define basic computer.
Computer Forensics An Intro to Computer Crime. Computer Forensics BTK  The BTK Killer ( B lind, T orture, K ill)  Dennis Rader - Feb 2005 Charged with.
17- PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ CRIMINALISTICS An Introduction to Forensic Science, 9/E By Richard Saferstein.
COMPUTER MAIN PART DANILO GARCÍA GONZÁLEZ TÉCNICO EN SISTEMAS.
Computer Basic Vocabulary
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Click once to reveal the definition. Think of the answer. Then click to see if you were correct. HARDWARE Physical parts of the computer.
2/17 How Disk Storage Works Roll call. Video: disk storage. Step-by-step lecture.
Digital Forensics. Hardware components Motherboard Motherboard System bus System bus CPU CPU ROM ROM RAM RAM HDD HDD Input devices Input devices Output.
Chapter 8 File Systems FAT 12/16/32. Defragmentation Defrag a hard drive – Control Panel  System and Security  Administration tools  Defrag hard drive.
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
WHAT SHOULD HAVE BEEN COVERED DAY ONE Part 4 Ms. T. N. Jones1.
Five Components of a Computer Input Device – keyboard, scanner, PDA/stylus, digital camera, mouse, MP3 player, fax machine, microphone Storage Device –
Class Name, Instructor Name
Parts of a computer Vocabulary & Labeling.
Chapter 18: Computer Forensics 1.
Disks and Formatting Ch 3.
Types of Computers & Computer Hardware
Types of Computers & Computer Hardware
The Computer Work Stations
(E-Research Paper (Engrade)
Tuesday April 10, 2018 (Document Evidence Part 2 – Alterations, Erasures, Obliterations, and other Document Problems)
(Activity - Identifying Random Fingerprints)
(Discussion – The Department of Defense)
(Discussion and WS – Analysis of Electronic Data)
(eResearch Paper – Forensic Toxicology)
Tuesday April 17, 2018 (Discussion – Dennis Rader; Input to Output – How Does the Computer Work?)
Wednesday February 14, 2018 (Worksheet - Explosions Vocabulary)
(Textbook Assignment – Explosions and Explosives)
(Discussion – The Internet and the World Wide Web)
(XC - Current Events Crossword)
Wednesday February 7, 2018 (eResearch Paper – The Chemistry of Fire, Searching the Fire Scene, Forensics Files – Up in Smoke)
(Textbook Assignment – Understanding DNA )
(Discussion - The Forensics of Explosions)
Thursday February 22, 2018 (Textbook Assignment – Collection and Analysis of Evidence of Explosions)
(Final Review for Quiz 10 Using the Forensics Textbook)
(e-Research Paper - Impression Evidence)
(Thanksgiving Activities)
(eResearch Paper - DNA)
(Forensic Files - Letter Perfect)
Tuesday February 13, 2018 (??).
(Forensic Files – Beaten by a Hair)
(Review for Quiz 6 & Ketchup Day)
Friday February 16, 2018 (??).
Chapter 17 COMPUTER FORENSICS.
Tuesday October 24, 2017 (Continue Textbook Assignment – Pages 247 – 253, – Toxicology of Alcohol)
(TELPAS Writing Sample)
(Textbook Assignment – Replication of DNA )
(Textbook Assignment – More Bloodstain Spatter Patterns)
(Video: World Biomes – An Introduction to Climate)
(XC - Current Events Crossword)
Period 5 – Writing Assignment)
(Textbook Assignment – DNA Typing with Tandem Repeats)
(Discussion - Forensic Serology; Worksheet – Blood Basics Online)
(Forensics Textbook Questions - Drugs)
Wednesday May 23, 2018 (Quiz 18).
Tuesday May 15, 2018 (??).
Tuesday October 3, 2017 (eResearch Paper Drug Dependence)
Thursday November 16, 2017 (Quiz 7).
Lesson 3 Computer Devices.
Presentation transcript:

Thursday April 19, 2018 (Discussion – Storing and Retrieving Data, Processing the Electronic Crime Scene)

What is a hard disk drive (HDD)? The Daily CSI Thursday, 4/19/18 1/1 What is a hard disk drive (HDD)? A hard disk drive is typically the primary location of data storage within the computer. B A C

Remediation for Quiz 15 ends tomorrow at 5:00! Announcements Remediation for Quiz 15 ends tomorrow at 5:00!

3/29 N/A 4/6 4/9 4/12 QUIZ 15 4/13 4/16 4/18 Assignment F5 Tomorrow F6 Summative or Formative # Date Issued Gone Missing Day Last Day Accepted XC Current Events Crossword F5 3/29 N/A Tomorrow eResearch Paper – The Forensics of Document Examination F6 4/6 LAB – Paper Chromatography of Inks F7 4/9 eResearch Paper - Alterations, Erasures, Obliterations F8 4/12 QUIZ 15 S4 4/13 Forensics Files – Internal Affair F1 4/16 WS – Dennis Rader, Input to Output: How Does the Computer Work? F2 4/18 Hold for eResearch Paper

Computer Forensics (Part 2) Storing and Retrieving Data Computer Forensics (Part 2)

Storing and Retrieving Data Vocabulary Storing and Retrieving Data operating system (OS) formatting file allocation table track sector cluster

Storing and Retrieving Data The computer’s operating system (OS) is the bridge between the human user and the computer’s electronic components. It provides the user with a working environment and facilitates interaction with the system’s components.

Storing and Retrieving Data Formatting is the process of preparing a hard disk drive to store and retrieve data in its current form.

Storing and Retrieving Data A disk drive track is a circular path on the surface of a disk or diskette on which information is magnetically recorded and from which recorded information is read. A sector is the smallest unit of data that a hard drive can address. A cluster usually is the minimum space allocated to a file. Clusters are groups of sectors.

Storing and Retrieving Data A FAT is a file allocation table. It tracks the locations of files and folders on the hard disk drive.

Summary Questions What is a computer’s “operating system (OS)?” A computer’s OS provides the user with a working environment and facilitates interaction with the system’s components. What is “formatting?” Formatting is the process of preparing a hard disk drive to store and retrieve data in its current form.

Summary Questions In regards to computer hard disk drive structure, describe the relationship between tracks, sectors and clusters. A disk drive track is a circular path on the surface of a disk or diskette on which information is magnetically recorded and from which recorded information is read. A sector is the smallest unit of data that a hard drive can address. A cluster usually is the minimum space allocated to a file. Clusters are groups of sectors.

Summary Questions What is a “FAT”, and what is its purpose? A File Allocation Table tracks the locations of files and folders on the hard disk drive.

Processing the Electronic Crime Scene Aspects of a computer that should be photographed close up at an electronic crime scene include: the screen of any running computer monitor. all the connections to the main system unit, such as peripheral devices (keyboard, monitor, speakers, mouse, etc.) equipment serial numbers

Processing the Electronic Crime Scene Two situations in which an investigator would not unplug a computer at an electronic crime scene are: if encryption is being used and pulling the plug would encrypt the data, rendering it unreadable without a password or key. Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. if data exists in RAM that has not been saved to HDD and will be lost if power to the system is discontinued.

Processing the Electronic Crime Scene The primary goal of obtaining data from a HDD is to do so without altering even one bit of data. To this end, a Message Digest 5 (MD5)/Secure Hash Algorithm (SHA) takes a “fingerprint” of a hard disk drive before and after forensic imaging.

Questions the screen of any running computer monitor What aspects of a computer should be photographed close up at an electronic crime scene? the screen of any running computer monitor all the connections to the main system unit, such as keyboards, monitors, speakers, mice, etc. equipment serial numbers

Questions Name two situations in which an investigator would not immediately unplug a computer at an electronic crime scene. if encryption is being used and “pulling the plug” will encrypt the data, rendering it unreadable without a password or key if data exists in RAM that has not been saved to the HDD, and will thus be lost if the power is turned off

Questions What is the primary goal of obtaining data from a HDD? to do so without altering even one bit of data

Questions What is the purpose of a Message Digest 5/Secure Hash Algorithm (MD5/SHA)? Why would a forensic computer examiner run such an algorithm? A MD5/SHA “fingerprints” a HDD before and after forensic imaging to demonstrate that the forensic image recovered is all-inclusive of the original contents and that nothing was altered in the process

Storing and Retrieving Data Processing the Electronic Crime Scene Pop Quiz Storing and Retrieving Data Processing the Electronic Crime Scene