COS/PSA 413 Day 17. Agenda Lab 8 write-up grades –3 B’s, 1 C and 1 F –Answer the Questions!!! Capstone progress report 2 overdue Today we will be discussing.

Slides:



Advertisements
Similar presentations
Introduction to Networks
Advertisements

Project 1 Introduction to HTML.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
The Internet Useful Definitions and Concepts About the Internet.
Layer 7- Application Layer
Remote mailbox access gateway Software lab project.
Guide to Computer Forensics and Investigations Third Edition Chapter 12 Investigations.
COS 413 Day 17. Agenda Quiz 2 corrected –2 A’s, 6 B’s & 1 C Assignment 5 corrected –5 B’s, 2 C’s, 1 non-submit & 1 corrupt file that I cannot read Lab.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
Lesson 19 Internet Basics.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Web Design Terms and Concepts Ms. Scales. Q. What is a Server? A. A server is a computer that stores information many people can access. It runs special.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
Forensic and Investigative Accounting
Computer Concepts 2014 Chapter 7 The Web and .
Chapter 7: Using Windows Servers to Share Information.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Guide to Computer Forensics and Investigations, Second Edition Chapter 13 Investigations.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
思科网络技术学院理事会. 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
Lesson 2 — The Internet and the World Wide Web
Some Data Comm. Standards
1 ELEN602 Lecture 2 Review of Last Lecture Layering.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Web Page Design I Retest Terms Review. 1. Web pages are created using a language known as ___________. The coding of this language must follow specific.
Guide to Computer Forensics and Investigations Fourth Edition Unit 8 Investigations.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Web Page Design I Basic Computer Terms “How the Internet & the World Wide Web (www) Works”
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols Network Fundamentals.
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
Windows Tutorial 4 Working with the Internet and
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
CIS 1310 – HTML & CSS 1 Introduction to the Internet.
Electronic Mail. Client Software and Mail Hosts –Client PC has client software that communicates with user’s mail host –Mail hosts deliver.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
CIS 250 Advanced Computer Applications Internet/WWW Review.
Communication, Networks, The internet and the Worldwide Web.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Concepts  messages are passed through the internet by using a protocol called simple mail transfer protocol.  The incoming messages are.
Application Layer Honolulu Community College Cisco Academy Training Center Semester 1 Version
Introduction to Internet. Chapter 1 Objectives Origins of the Internet Packets and Routers TCP/IP DNS HTTP URL Client-Server.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
Web Design. What is the Internet? A worldwide collection of computer networks that links millions of computers by – Businesses (.com.net) – the government.
  is a system of electronic communication that allows the user to exchange messages over the internet  Everyone’s address is unique  Two.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
Revision Unit 1 – The Online World Online Services Online Documents Online Communication Cloud Computing The Internet Internet Infrastructure Internet.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
By: The Immigrants :D I mean the Mexican and the Colombian I mean Daniel and Felipe.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Chapter 11 Panko and Panko Business Data Networks and Security, 11 th Edition Copyright © 2016 Pearson Finally, Layer 5!
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Chapter 7: Using Windows Servers
SMTP SMTP stands for Simple Mail Transfer Protocol. SMTP is used when is delivered from an client, such as Outlook Express, to an server.
SMTP SMTP stands for Simple Mail Transfer Protocol. SMTP is used when is delivered from an client, such as Outlook Express, to an server.
Networking for Home and Small Businesses – Chapter 6
Chapter 10: Application Layer
Web Development & Design Chapter 1, Sections 4, 5 & 6
Networking for Home and Small Businesses – Chapter 6
Unit-V Investigations
Guide to Computer Forensics and Investigations Third Edition
Networking for Home and Small Businesses – Chapter 6
Protocol Application TCP/IP Layer Model
Presentation transcript:

COS/PSA 413 Day 17

Agenda Lab 8 write-up grades –3 B’s, 1 C and 1 F –Answer the Questions!!! Capstone progress report 2 overdue Today we will be discussing investigations –Chap 11 in 1e, Chap 13 in 2e Lab 10 in OMS tomorrow –11-1, 11-2, 11-3, 11-4,11-6 –Make sure you know what is you will be doing before you get to the lab –You will need your maine.edu account info User/password

Investigations Chapter 11

Learning Objectives Understand Internet Fundamentals Explore the Roles of the Client and Server in E- mail Identify and Investigate Crimes and Violations Understand Servers Use Specialized Computer Forensic Tools

Understand Internet Fundamentals Internet Service Provider (ISP) – Provides a service or membership that allows you to access the information available on the Internet. Dialup Connection – A connecting device to a network via modem or a public telephone network. Dialup access acts just like a phone connection, except that the two connecting parties are computers instead of people.

Understand Internet Fundamentals

Code – A group of specialized characters combined in a sequence to provide instructions to a program on how to perform a specific action. Web Browser – A software program used to locate and display web pages. HTML – The authoring language used to create documents on the World Wide Web. It defines the structure and layout of a Web document by using a variety of tags and attributes.

Understand Internet Fundamentals

Domain Name Service (DNS) – An Internet service that translates domain names to IP addresses. Open Systems Interconnect (OSI) – A standard for worldwide communications that defines a networking framework for implementing protocols in seven layers.

Understand Internet Fundamentals Simple Mail Transfer Protocol (SMTP) – A protocol used for sending messages between servers. Post Office Protocol Version 3 (POP3) – A protocol used to retrieve messages from an server. Internet Message Access Protocol version 4 (IMAP) – A protocol for retrieving messages. Supports more features than POP3.

Explore the Roles of the Client and Server in

Mail to and from

end to end

Explore the Roles of the Client and Server in Universal Naming Convention (UNC) – A PC format that specifies the location of resources on a local area network. It uses the following format: \\servername\shared\\servername\shared resource-pathname.

Identify and Investigate Crimes and Violations To Copy an Message from Outlook 1.Insert formatted floppy disk into the drive. 2.Start Outlook. 3.Making sure the folders list is open, click the folder that contains the file you would like to copy. 4.Resize the Outlook window so that you can see the message you want to copy and the icon for the floppy disk. 5.Click and drag the message from Outlook to the floppy disk drive.

Identify and Investigate Crimes and Violations

Investigation Process -Copy the you would like to investigate. -Print the message. -View the file header. -Examine the file header and body of the . -Open any attachments. -Trace the , record all IP Addresses. -Document all findings.

Identify and Investigate Crimes and Violations Router – A network device that connects a number of local area networks together. Routers use the IP address to determine the destination of a packet.

Identify and Investigate Crimes and Violations

Understand Servers Server – A computer that is running an operating system such as UNIX or Windows 2000 that is loaded with software to manage the transmission and holding of messages.

Understand Servers

GroupWise – The Novell server software; a database server like Microsoft Exchange and UNIX Sendmail.

Using Specialized Forensic Tools Tools That Can Investigate Messages -EnCase -FTK -FINAL -Sawmill-GroupWise -Audimation for Logging

Using Specialized Forensic Tools

Chapter Summary - Because programs employ some protocols used with the internet to exchange messages, you should understand the fundamentals of the Internet to realize how e- mail works. -You can send and receive via the Internet and local area network. Client computers access servers to receive messages. -Investigating crimes or policy violations with e- mail is similar to other computer crimes and abuses.

Chapter Summary -Once you have determined that a crime has been committed using , first access the victims computer to recover any evidence, then copy the messages from the victims computer. -Be sure to copy and print any messages that will be used in the investigation. -Examine the header, trace the IP address from the sending computer, and record the date and time stamps of the message.

Chapter Summary -To investigate , you should know how an server records and handles messages. servers are databases of user information and messages. All servers contain a log file which can tell valuable information when investigating a crime. -For many investigations, you can rely on the message files, headers, and server log files to investigate crimes.