Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission.

Slides:



Advertisements
Similar presentations
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Advertisements

Copyright © Texas Education Agency, These Materials are copyrighted © and trademarked ™ as the property of the Texas Education Agency (TEA) and.
Copyright © Texas Education Agency, These Materials are copyrighted © and trademarked ™ as the property of the Texas Education Agency (TEA) and.
2 Copyright and Terms of Service Copyright © Texas Education Agency, These materials are copyrighted © and trademarked ™ as the property of the.
A Look at Qualities of Effective Schools
Understanding How Networks Communicate. “Copyright and Terms of Service Copyright © Texas Education Agency. The materials found on this website are copyrighted.
Mathematical Applications in Human Services Practicum in Human Services.
17-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein COMPUTER FORENSICS.
Security Services Constitutional Issues in Private Security.
Copyright © Texas Education Agency, All rights reserved. 1 Assessing Financial Information Statistics & Risk Management.
Architecture BOM Bill of Materials Copyright © Texas Education Agency, All rights reserved. 1.
ADVERTISING MEDIA. 2 “Copyright and Terms of Service Copyright © Texas Education Agency. The materials found on this website are copyrighted © and trademarked.
Careers in Forensic Science. 2 Copyright and Terms of Service Copyright © Texas Education Agency, These materials are copyrighted © and trademarked.
Business Procedures, Equipment and Technology Practicum in Human Services.
Design Essentials of Networking. Copyright © Texas Education Agency, All rights reserved. 22 “Copyright and Terms of Service Copyright © Texas.
17- PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ CRIMINALISTICS An Introduction to Forensic Science, 9/E By Richard Saferstein.
The Internet and Constitutional Rights Copyright © Texas Education Agency, All rights reserved.
PERSONAL BUDGETING Budget – A plan for earning, saving, borrowing and spending.
Crime Scene Search Law Enforcement I.
Scientific Reasoning Forensic Science. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission.
Anything that serves the three basic functions. Money.
History of Fingerprinting Forensic Science 1. 2 Copyright and Terms of Service Copyright © Texas Education Agency, These materials are copyrighted.
What is Access?. “Copyright and Terms of Service Copyright © Texas Education Agency. The materials found on this website are copyrighted © and trademarked.
The Promotional Mix combination of advertising, public relations, personal selling, and sales promotion Copyright © Texas Education Agency, All rights.
Managing the Information Copyright © Texas Education Agency, All rights reserved.
Fashion and the Marketing Mix Copyright © Texas Education Agency, All rights reserved.
Advertising, Sales and Promotion Unit 2, Lesson 12 Copyright © Texas Education Agency, All rights reserved.1.
Architectural Practices Zoning Copyright © Texas Education Agency, All rights reserved. 1.
Linear Regression Statistics & Risk Management Copyright © Texas Education Agency, All rights reserved. 1.
Copyright © Texas Education Agency, All rights reserved. 1 Career Opportunities Statistics & Risk Management.
Copyright © Texas Education Agency, All rights reserved. Software Proficiency Statistics & Risk Management Copyright © Texas Education Agency, 2012.
Architectural Design One-Point Perspective Copyright © Texas Education Agency, All rights reserved. 1.
Roles and Functions of Private Security Principles of Law, Public Safety, Corrections and Security.
“Copyright and Terms of Service Copyright © Texas Education Agency. The materials found on this website are copyrighted © and trademarked ™ as the property.
Proofreading 101. “Copyright and Terms of Service Copyright © Texas Education Agency. The materials found on this website are copyrighted © and trademarked.
Texas Penal Code: Other Offenses Law Enforcement I.
Architectural Design Architect Walk Copyright © Texas Education Agency, All rights reserved. 1.
Copyright © Texas Education Agency, All rights reserved. 1 Risk Management Data Statistics & Risk Management.
Texas Penal Code: Arson, Criminal Mischief, and Other Property Damage or Destruction Law Enforcement I.
Texas Penal Code: Sexual Offenses Law Enforcement I.
Copyright © Texas Education Agency, All rights reserved. 1 Production Processes Statistics & Risk Management.
Digital Forensics. Hardware components Motherboard Motherboard System bus System bus CPU CPU ROM ROM RAM RAM HDD HDD Input devices Input devices Output.
FASHION MARKETING MARKETING INFORMATION SYSTEMS COPYRIGHT © TEXAS EDUCATION AGENCY, ALL RIGHTS RESERVED. 1.
Alphabetic Numeric/Symbol Numeric Keypad Function/Command Keys.
Texas Penal Code: Assaultive Offenses Law Enforcement I.
Careers in Financial Planning MONEY MATTERS Copyright © Texas Education Agency, All rights reserved Financial Planning Careers.
Fashion Risks Copyright © Texas Education Agency, All rights reserved.
History, Structure and Function of the American Legal System 1 Court Systems and Practices.
Division of Federal Fiscal Compliance and Reporting Title I, Part A – Comparability of Services Training Module Completing the Comparability Assurance.
General Housekeeping: Forms Practicum in LPSCS. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used.
O*NET Career Exploration Practicum in LPSCS. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with.
PRINCIPLES OF LAW, PUBLIC SAFETY, CORRECTIONS & SECURITY Interagency Partnerships.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Survey Design and Analysis Do you like ice cream?.
Computer Forensics Security Services.
Understanding How Networks Communicate
Class Name, Instructor Name
O*NET Career Exploration
Chapter 18: Computer Forensics 1.
Every Student Succeeds Act (ESSA) Consolidated Federal Grant Application.
Texas Penal Code: Kidnapping, Unlawful Restraint, and Smuggling of Persons Law Enforcement I.
Roles and Functions of Private Security
Roles and Functions of Private Security
Every Student Succeeds Act (ESSA) Consolidated Federal Grant Application.
Trace Evidence: Footwear & Tire impressions
Trace Evidence: Footwear & Tire impressions
Texas Penal Code: Criminal Homicide
Chapter 17 COMPUTER FORENSICS.
Texas Penal Code: Kidnapping, Unlawful Restraint, and Smuggling of Persons Law Enforcement I.
Presentation transcript:

Computer Forensics Security Services

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Copyright and Terms of Service Copyright © Texas Education Agency, These materials are copyrighted © and trademarked ™ as the property of the Texas Education Agency (TEA) and may not be reproduced without the express written permission of TEA, except under the following conditions: 1) Texas public school districts, charter schools, and Education Service Centers may reproduce and use copies of the Materials and Related Materials for the districts’ and schools’ educational use without obtaining permission from TEA. 2) Residents of the state of Texas may reproduce and use copies of the Materials and Related Materials for individual personal use only, without obtaining written permission of TEA. 3) Any portion reproduced must be reproduced in its entirety and remain unedited, unaltered and unchanged in any way. 4) No monetary charge can be made for the reproduced materials or any document containing them; however, a reasonable charge to cover only the cost of reproduction and distribution may be charged. Private entities or persons located in Texas that are not Texas public school districts, Texas Education Service Centers, or Texas charter schools or any entity, whether public or private, educational or non-educational, located outside the state of Texas MUST obtain written approval from TEA and will be required to enter into a license agreement that may involve the payment of a licensing fee or a royalty. Contact TEA Copyrights with any questions you may have.TEA Copyrights 2

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Computer Forensics Introduction Computer forensics – The acquisition, extraction, preservation, and interpretation of computer data – Includes many devices that are capable of storing data Hardware is the physical material that creates a computer Software are the programs and applications that carry out a set of instructions on the hardware 3

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Elements of Hardware Computer Case/Chassis Power Supply Motherboard System Bus Read Only Memory (ROM) Random Access Memory (RAM) Central Processing Unit (CPU) Hard Disk Drive (HDD) Input Devices – Keyboard – Mouse – Joy Stick – Scanner Output Devices – Monitor – Printer – Speakers 4

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Data Storage and Retrieval Examiners must be familiar with the file system they are examining Evidence may be found in various computer locations and formats There are two categories for data-related evidence: – Visible data – Latent data The formatting process initializes portions of the hard drive so that it can store data, and it creates the structure of the file system 5

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Data Storage and Retrieval (continued) Different operating systems map out (partition) HDDs in different manners RAM Sector – the smallest unit of data addressable by a hard disk drive, generally consisting of 512 bytes (Saferstein, 2009) Cluster – a group of sectors in multiples of two, typically the minimum space allocated in a file (Saferstein, 2009) 6

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Processing the Computerized Crime Scene Similar to processing a traditional crime scene (i.e. warrants, documentation, investigation techniques) Documentation is a significant component in the computerized crime scene – The scene should be initially documented in as much detail as possible before any evidence is moved and examined – Crime scene documentation is accomplished through two actions: Sketching Photographing 7

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Processing the Computerized Crime Scene (continued) After documentation is complete, a label should be placed on the cord of each peripheral, with a corresponding label placed on the port to which it is connected At a computerized crime scene most, if not all of the equipment will be seized, but before the peripherals are disconnected from the computer, a decision must be made about whether or not a live acquisition of the data is necessary (i.e. shutdown or unplug the computer) 8

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Forensic Image Acquisition After the crime scene has been processed, the computer needs to be analyzed All electronic devices will be processed in the same manner The examination process that the forensic investigator uses on the computer must be intrusive All evidence (data) must be obtained without altering or destroying it 9

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Forensic Image Acquisition (continued) Because booting a HDD to its operating system changes many files and could destroy evidentiary data, the data is generally obtained by removing the HDD from the system and placing it in a laboratory forensic computer so that a forensic image can be created Occasionally, in cases with specialized or unique equipment/systems the image of the HDD must be obtained by using the seized computer The examiner must be able to extract all forensic data/images and cause no changes to the HDD 10

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Forensic Image Acquisition (continued) A signature or fingerprint of the drive is taken before and after imaging – This fingerprint is created by using a Message Digest 5 (MD5), a Secure Hash Algorithm (SHA) or a similarly validated algorithm – Before imaging the drive the algorithm is run and a 32- character alphanumeric string is produced based on the drive’s contents – The same algorithm is then run against the created forensic image which will result in the same alphanumeric string if none of the original content is changed 11

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Visible Data Data from a computer that is openly visible and easily available to users Can encompass (from an evidentiary standpoint) any type of user-created data like – Word processing documents – Spreadsheets – Accounting records – Databases – Pictures 12

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Visible Data (continued) Advances in printer technology have made high quality color printing affordable and common, which creates criminal opportunities – Counterfeiting – Check Fraud – Document Fraud 13

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Visible Data (continued) Most criminal cases involving computers relate to financial investigations (or white collar crimes) which require any data related to personal and business finance Investigators must become familiar with the various computer applications that are used for criminal activities The ability to recognize the data produced by these applications and to display the images is essential to identifying the evidence 14

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Temporary Files Can be valuable as evidence Can sometimes be recovered during a forensic examination including some of the data that may have been altered from a previous version Can be recovered when created through unsaved means (such as a computer being shut off manually) 15

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Temporary Files (continued) Most programs automatically save a temporary copy of the file in progress After working on a file or document, the user can save the changes, which promotes the temporary copy to a saved (or actual) file 16

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Temporary Files (continued) Another type of temporary file valuable to the computer investigator is the printer spool – When a print job is sent to the printer a spooling process delays the sending of the data so the application can continue to work while the printing takes place in the background – When the print job occurs, a temporary print spool file is created – This file contains a copy of all of the data from the printer 17

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Latent Data The areas of files and disks that are typically not apparent to the computer user (and often not to the operating system), but contain data nonetheless (Saferstein, 2009); the data which the operating system has hidden One of the reasons a forensic image of the media is created is because a standard copy only captures the logical data (that which the operating system is aware) Can be evidentiary data 18

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Latent Data (continued) Includes the data in the – Swap space (used to conserve the valuable RAM within the computer system) – RAM slack – the area from the end of the logical file to the end of the sector – File slack – the remaining area from the end of the final sector containing data to the end of the cluster – Unallocated space – the space on a hard drive that contains available space; the space may also contain temporary and deleted files 19

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Defragmenting/Swap File/Swap Space Defragmenting a HDD involves reconnecting noncontiguous data The HDD has minimum space reservation requirements (i.e. a file might require 100 bytes of space, but the operating system allocates much more) If a file grows past the allocated amount, another cluster is required 20

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Defragmenting/Swap File/Swap Space (continued) If a different file occupies the next cluster, the operating system must find another place for the first file on the drive The file is said to be fragmented because data for the same file is contained in noncontiguous clusters The constant shuffling of data through deletion, defragmentation, swapping, etc., is one of the ways data is orphaned in latent areas 21

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Defragmenting/Swap File/Swap Space (continued) Fragmentation of numerous files can degrade the performance of an HDD, causing the read/write heads to have to traverse the platters to locate the data The constant read and write operations of RAM cause a constant change in the swap file or swap space 22

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Deleted Files Another source of latent data to be examined by forensic investigators The actions that occur when a file is deleted vary among file systems When a user deletes files, the data typically remains behind Data will remain in the computer even though attempts are made to delete it When files in a Recycle Bin are deleted, the data remains there as well, until it is overwritten 23

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. The Internet A computer network that provides information globally (also called the “information superhighway”) Affects all subjects and professions including law enforcement and security services Can be considered a series of networks Includes various methods of connection – Wire Modem Cable lines or DSL telephone lines – Wireless (Wi-Fi) Each computer that connects to the Internet has a unique numerical Internet Provider (IP) address and usually a name 24

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. The World Wide Web The most popular area of the Internet Considered a depository of information stored in the computers connected to the Internet across the world Web browsers allow the user to search all the information available on the web and retrieve any web pages the viewer wishes to explore 25

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. The World Wide Web (continued) Several directories and indexes on the Internet, known as search engines, are available to assist the user in locating a particular topic from the hundreds of thousands of web sites located on the Internet Keywords or phrases entered into a search engine will locate sites on the Internet that are relevant to that subject Commercial Internet service providers connect computers to the Internet while offering the user an array of options 26

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Electronic mail ( ) The service most commonly used in conjunction with the Internet Carries messages across the world in a matter of seconds 27

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Internet Crimes There are more cybercriminals than available law enforcement agents Cybercriminals feel safe committing crimes in a “comfort zone” and often from the privacy of their own homes Law enforcement faces new challenges with Internet crimes – Most law enforcement officers are not trained in the technologies – Internet crimes span multiple jurisdictions – There is a need to retrofit new crimes to existing laws 28

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Internet Crimes (continued) Computers are used to commit a variety of crimes – Identity theft – Fraud – Industrial espionage – Child pornography – Harassment – Gambling – Piracy – Computer viruses and spam 29

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Internet Crimes (continued) There are numerous methods and techniques criminals use to hide their crimes and evidence, which include – Deleting files and s – Hiding files with encryption – Password protection – Embedding information in unrelated files – Using WI-FI networks and cyber cafes to cover tracks 30

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Internet Crimes (continued) The task of forensic investigators includes – Restoring deleted files and s – Finding the hidden files through complex password encryption programs and searching techniques – Tracking criminals through the digital trail — IP addresses, to ISPs, to the offender 31

Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Resources , Forensic Science: From the Crime Scene to the Crime Lab, Richard Saferstein, Prentice Hall, , Introduction to Private Security: Theory Meets Practice, Cliff Roberson and Michael L. Birzer, Prentice Hall, , Introduction to Security, Robert J. Fischer and Gion Green, Butterworth-Heinemann, 2008 Investigator/Officer’s Personal Experience 32