SlideShare ist ein Scribd-Unternehmen logo
1 von 44
Downloaden Sie, um offline zu lesen
Workshops on
Born-Digital Materials Workflow

        Peter Chan, Digital Archivist
               Oct. 20, 2011
Week 2 Agenda
• Accessioning
  – virus check;
  – disk imaging;
  – create FTK case;
  – collection summary
  – AT accession record
Virus Check
• Quarantine for 30 days (count from the day
  the media arrive at Stanford)
• Run Sophos
• Remove virus, if any, before creating
  disk/logical image (unless you are capturing
  the disk for a researcher in computer virus!)
Disk / Forensic image
• A complete bit-by-bit copy of a storage
  medium or device, such as a hard drive, SSD
  (solid state drive), tape drive, floppy disk,
  CD/DVD/BD, or flash memory device.
• The image can be stored in one or more files.
• Deleted files, if any, may be copied in this
  process.
Logical image
• A copy of the files in the directory(folder) / directories(folders)
  specified in the copy process.

• The full path of each file is recorded and the files are embedded in
  one or more files in AD1 format.

• Since deleted files and unpartitioned space are not represented in a
  directory, they are not copied in the process.

• The host operating system has to recognize the target directory
  (folder) for the operation. (You cannot perform a logical copy of an
  Apple disk using FTK Imager under Windows perform).
Disk Partition
• Disk partitioning is the act of dividing a
  physical hard disk drive into multiple logical
  storage units.
• The logical units can have different file
  systems so that we can set the same physical
  machine as a Window based PC and/or a Linux
  based PC and/or a Mac PC.
GParted
File System
• Microsoft: FAT12 (File Allocation Table), FAT16, FAT32,
  exFAT (FAT64), NTFS (New Technology File System)

• Apple: Apple ProDOS, HFS (Hierarchical File System),
  HFS+

• CPM file system

• Linux: ext (extended filesystem), ext2, ext3, ext4

• Optical Discs: ISO 9660, UDF (Universal Disk Format)
Computer Management
Capture 5.25 Floppy Diskette
Compare 4 5.25 Floppy Drive Solutions
• https://docs.google.com/document/d/1TLY3
  mn3duadGBLqqb2_XnYoF3jakjmo1hXfzvmWC
  TzE/edit?hl=en_US
Hard Disk Interface
•   SCSI
•   IDE
•   Firewire 1394
•   SATA
•   USB
Internal Write Blocker
Image Log Spreadsheet
• Use the following columns
  – Box#
  – CM#
  – Media Details (3.5, 5.25, single/double sided,
    single/double/high density, etc.)
  – Image Result (successful / unreadable)
  – Note (bad sector, etc.)
  – Manufacturer
  – Earliest modification/creation year of files
  – Folder title (if removed from collection folder)
• Use “Call No. Imaging Log” as file name
FTK Imager
Create Disk Image
•   Physical Drive – hard / flash memory drive
•   Logical Drive – floppy / CD / DVD drive
•   Contents of a Folder – logical image
•   Fernico Device – a device which backs up
    forensic data from network locations or from
    locally attached hard drives, automatically
    spanning the content over a series of discs.
Fernico Device
Create Image




Tick “Verify images after they are created”
Tick “Create directory listings of all files in the image after they are created” if you
need one.
Image Type
Image Type
• Raw (dd) – commonly used disk image format
  created by the UNIX command dd
• SMART – proprietary disk image format created by
  ASR Data.
• E01 – proprietary disk image format created by
  EnCase.
• AFF – an open source disk image format, allow
  encryption of disk image
• AD1 - proprietary logical disk image format created
  by AccessData.
Evidence Item Information
Evidence Item Information
•   Use “Raw (dd)” as image type
•   Use call no. as “Case Number”
•   Use CMxxx as “Evidence Number”
•   Put your name as “Examiner”
•   Use the following in the “Notes” field:
     – 3.5 inch floppy disk; 5.25 inch floppy disk; Zip
       disk;
     – External hard disk; Internal hard disk;
     – Optical Disk
Select Image Destination
Select Image Destination
• Store all files under “Disk Image” folder in Desktop
• Use “Case No.” + CMxxx as Image Filename for disk
  image
• Default Image Fragment Size = 1500 MB
• To save images segments that can be burned to a CD,
  specify 650 MB.
• To save image segments that can be burned to a DVD,
  specify 4000 MB.
• Selecting 0 (zero) produces the largest file, with no
  compression.
Storage Locations for Files
Create New Case in AccessData FTK
• Copy image files to network before creating
  new case.
• Use call no. as Case Name
• Store case in Drive:FTKFTK Case
• Field Mode: bypasses file signature analysis
  and detailed options in order to vastly speed
  the processing. (for people to analysis the case
  in the field)
Evidence Processing
• Detailed Options
  – Evidence Processing - "√" Flag Duplicate Files; "√"
    MD-5 Hash, SHA-1 Hash; "√" Expand Compound
    Files; under “Expansion Options” "√" BZIP2, GZIP,
    RAR, TAR, ZIP; "√“ dtSearch Text Index; "√“ Create
    Thumbnails for Graphics (save as default)
  – Evidence Refinement (Advanced) - remove "√"
    Include File Slack, Include Free Space (save as
    default)
Evidence Processing
• KFF - Using a database of hashes from known files, this
  option flags insignificant files as ignorable files and
  flags known illicit or dangerous files as alert files,
  alerting the examiner to their presence in the case.
• Fuzzy hashing - A tool which provides the ability to
  compare two distinctly different files and determine a
  fundamental level of similarity. This similarity is
  expressed as score from 0-100. The higher the score
  reported the more similar the two pieces of data. A
  score of 100 would indicate that the files are close to
  identical. Alternatively a score of 0 would indicate no
  meaningful common sequence of data between the
  two files.
Evidence – Add/Remove
Use “All Images of a Directory” at the
    Network Forensic Lab Folder




                                         35
Images Files Identified




                          36
Choose Appropriate Time Zone




                               37
Processing Status of Each Image File




                                       38
File - Report
Report Output
• Report Folder – Drive:FTKFTK ReportCall#
• Formats – PDF
• Don’t check “Use object identification number
  for filename” and “Append extension to
  filename if bad/absent”
• Rename “Report” to Call# FTK Collection
  Summary
• Copy the report to sul-wallabySpecial
  CollectionsManuscriptsCollectionsCall#
AT Accession Record
  Alternate Extent
AT Accession Record
  Alternate Extent
AT Accession Record
External Documents
External Documents Location
• sul-wallabySpecial
  CollectionsManuscriptsCollectionsM1437
  Gould

• M1437 FTK Accession Report

• M1437 Computer Media Imaging Log

Weitere ähnliche Inhalte

Was ist angesagt?

Mac Forensics
Mac ForensicsMac Forensics
Mac ForensicsCTIN
 
Memory Forensic - Investigating Memory Artefact
Memory Forensic - Investigating Memory ArtefactMemory Forensic - Investigating Memory Artefact
Memory Forensic - Investigating Memory ArtefactSatria Ady Pradana
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3CTIN
 
File system of windows xp
File system of windows xpFile system of windows xp
File system of windows xpEhtisham Ali
 
File system performance
File system performanceFile system performance
File system performanceVijay Yadav
 
44CON London 2015: Old Dog, New Tricks: Forensics with PowerShell
44CON London 2015: Old Dog, New Tricks: Forensics with PowerShell44CON London 2015: Old Dog, New Tricks: Forensics with PowerShell
44CON London 2015: Old Dog, New Tricks: Forensics with PowerShellJared Atkinson
 
Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7Prannay Shahi
 
File system security
File system securityFile system security
File system securityAmmAr mobark
 
Examining Linux File Structures
Examining Linux File StructuresExamining Linux File Structures
Examining Linux File Structuresprimeteacher32
 
Digital Forensics in the Archive
Digital Forensics in the ArchiveDigital Forensics in the Archive
Digital Forensics in the ArchiveGarethKnight
 

Was ist angesagt? (18)

Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Memory Forensic - Investigating Memory Artefact
Memory Forensic - Investigating Memory ArtefactMemory Forensic - Investigating Memory Artefact
Memory Forensic - Investigating Memory Artefact
 
Unix Administration 4
Unix Administration 4Unix Administration 4
Unix Administration 4
 
Backup tools
Backup toolsBackup tools
Backup tools
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Windows file system
Windows file systemWindows file system
Windows file system
 
File system of windows xp
File system of windows xpFile system of windows xp
File system of windows xp
 
File system performance
File system performanceFile system performance
File system performance
 
44CON London 2015: Old Dog, New Tricks: Forensics with PowerShell
44CON London 2015: Old Dog, New Tricks: Forensics with PowerShell44CON London 2015: Old Dog, New Tricks: Forensics with PowerShell
44CON London 2015: Old Dog, New Tricks: Forensics with PowerShell
 
Storage devices
Storage devicesStorage devices
Storage devices
 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
 
Operating system
Operating systemOperating system
Operating system
 
Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7
 
Cos413day3
Cos413day3Cos413day3
Cos413day3
 
File system security
File system securityFile system security
File system security
 
Examining Linux File Structures
Examining Linux File StructuresExamining Linux File Structures
Examining Linux File Structures
 
Digital Forensics in the Archive
Digital Forensics in the ArchiveDigital Forensics in the Archive
Digital Forensics in the Archive
 

Andere mochten auch

Born digital collection work flow2
Born digital collection work flow2Born digital collection work flow2
Born digital collection work flow2peterchanws
 
Workshop 1 revised
Workshop 1 revisedWorkshop 1 revised
Workshop 1 revisedpeterchanws
 
SCA Accessioning Born-Digital Materials Workshop, Nov. 8, 2012
SCA Accessioning Born-Digital Materials Workshop, Nov. 8, 2012SCA Accessioning Born-Digital Materials Workshop, Nov. 8, 2012
SCA Accessioning Born-Digital Materials Workshop, Nov. 8, 2012peterchanws
 
Cutting Edge Technology used in ePADD
Cutting Edge Technologyused in ePADDCutting Edge Technologyused in ePADD
Cutting Edge Technology used in ePADDpeterchanws
 
cross-media publishing in global media conglomerate
cross-media publishing in global media conglomeratecross-media publishing in global media conglomerate
cross-media publishing in global media conglomeratedaring522
 

Andere mochten auch (8)

Netdefender
NetdefenderNetdefender
Netdefender
 
Born digital collection work flow2
Born digital collection work flow2Born digital collection work flow2
Born digital collection work flow2
 
Workshop 1 revised
Workshop 1 revisedWorkshop 1 revised
Workshop 1 revised
 
MUSE
MUSEMUSE
MUSE
 
Carnaval Bien
Carnaval BienCarnaval Bien
Carnaval Bien
 
SCA Accessioning Born-Digital Materials Workshop, Nov. 8, 2012
SCA Accessioning Born-Digital Materials Workshop, Nov. 8, 2012SCA Accessioning Born-Digital Materials Workshop, Nov. 8, 2012
SCA Accessioning Born-Digital Materials Workshop, Nov. 8, 2012
 
Cutting Edge Technology used in ePADD
Cutting Edge Technologyused in ePADDCutting Edge Technologyused in ePADD
Cutting Edge Technology used in ePADD
 
cross-media publishing in global media conglomerate
cross-media publishing in global media conglomeratecross-media publishing in global media conglomerate
cross-media publishing in global media conglomerate
 

Ähnlich wie Workshops on Born-Digital Materials Workflow

CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationSam Bowne
 
Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...GarethKnight
 
CNIT 152 8. Forensic Duplication
CNIT 152 8. Forensic DuplicationCNIT 152 8. Forensic Duplication
CNIT 152 8. Forensic DuplicationSam Bowne
 
kbrgwillis.pdf
kbrgwillis.pdfkbrgwillis.pdf
kbrgwillis.pdfKblblkb
 
AntiForensics - Leveraging OS and File System Artifacts.pdf
AntiForensics - Leveraging OS and File System Artifacts.pdfAntiForensics - Leveraging OS and File System Artifacts.pdf
AntiForensics - Leveraging OS and File System Artifacts.pdfekobelasting
 
Working of Volatile and Non-Volatile memory
Working of Volatile and Non-Volatile memoryWorking of Volatile and Non-Volatile memory
Working of Volatile and Non-Volatile memoryDon Caeiro
 
De-Anonymizing Live CDs through Physical Memory Analysis
De-Anonymizing Live CDs through Physical Memory AnalysisDe-Anonymizing Live CDs through Physical Memory Analysis
De-Anonymizing Live CDs through Physical Memory AnalysisAndrew Case
 
Disk forensics for the lazy and the smart
Disk forensics for the lazy and the smartDisk forensics for the lazy and the smart
Disk forensics for the lazy and the smartJeff Beley
 
DracOs Forensic Flavor - Workshop
DracOs Forensic Flavor - WorkshopDracOs Forensic Flavor - Workshop
DracOs Forensic Flavor - WorkshopSatria Ady Pradana
 
Windows Forensics- Introduction and Analysis
Windows Forensics- Introduction and AnalysisWindows Forensics- Introduction and Analysis
Windows Forensics- Introduction and AnalysisDon Caeiro
 
2nd unit part 1
2nd unit  part 12nd unit  part 1
2nd unit part 1Pavan Illa
 
Digital Forensic tools - Application Specific
Digital Forensic tools - Application SpecificDigital Forensic tools - Application Specific
Digital Forensic tools - Application Specificideaflashed
 
Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.guestcf6f5b
 
Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Vipin George
 

Ähnlich wie Workshops on Born-Digital Materials Workflow (20)

Workshop 3
Workshop 3Workshop 3
Workshop 3
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
 
Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...
 
CNIT 152 8. Forensic Duplication
CNIT 152 8. Forensic DuplicationCNIT 152 8. Forensic Duplication
CNIT 152 8. Forensic Duplication
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
kbrgwillis.pdf
kbrgwillis.pdfkbrgwillis.pdf
kbrgwillis.pdf
 
Module 02 ftk imager
Module 02 ftk imagerModule 02 ftk imager
Module 02 ftk imager
 
AntiForensics - Leveraging OS and File System Artifacts.pdf
AntiForensics - Leveraging OS and File System Artifacts.pdfAntiForensics - Leveraging OS and File System Artifacts.pdf
AntiForensics - Leveraging OS and File System Artifacts.pdf
 
Working of Volatile and Non-Volatile memory
Working of Volatile and Non-Volatile memoryWorking of Volatile and Non-Volatile memory
Working of Volatile and Non-Volatile memory
 
De-Anonymizing Live CDs through Physical Memory Analysis
De-Anonymizing Live CDs through Physical Memory AnalysisDe-Anonymizing Live CDs through Physical Memory Analysis
De-Anonymizing Live CDs through Physical Memory Analysis
 
Disk forensics for the lazy and the smart
Disk forensics for the lazy and the smartDisk forensics for the lazy and the smart
Disk forensics for the lazy and the smart
 
DracOs Forensic Flavor - Workshop
DracOs Forensic Flavor - WorkshopDracOs Forensic Flavor - Workshop
DracOs Forensic Flavor - Workshop
 
File Carving
File CarvingFile Carving
File Carving
 
Windows Forensics- Introduction and Analysis
Windows Forensics- Introduction and AnalysisWindows Forensics- Introduction and Analysis
Windows Forensics- Introduction and Analysis
 
Unix File System
Unix File SystemUnix File System
Unix File System
 
2nd unit part 1
2nd unit  part 12nd unit  part 1
2nd unit part 1
 
Digital Forensic tools - Application Specific
Digital Forensic tools - Application SpecificDigital Forensic tools - Application Specific
Digital Forensic tools - Application Specific
 
Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.
 
Deft
DeftDeft
Deft
 
Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation
 

Mehr von peterchanws

How can the cultural heritage community best meet the challenges of email arc...
How can the cultural heritage community best meet the challenges of email arc...How can the cultural heritage community best meet the challenges of email arc...
How can the cultural heritage community best meet the challenges of email arc...peterchanws
 
Video game controlled vocabulary in wikidata
Video game controlled vocabulary in wikidataVideo game controlled vocabulary in wikidata
Video game controlled vocabulary in wikidatapeterchanws
 
Digital game preservation conference 12 25-2018
Digital game preservation conference   12 25-2018Digital game preservation conference   12 25-2018
Digital game preservation conference 12 25-2018peterchanws
 
Potential Future Directions for ePADD
Potential Future Directions for ePADDPotential Future Directions for ePADD
Potential Future Directions for ePADDpeterchanws
 
Imaging 5.25 Floppy Disks
Imaging 5.25 Floppy DisksImaging 5.25 Floppy Disks
Imaging 5.25 Floppy Diskspeterchanws
 
Why We Want to Publish Controlled Vocabulary in SKOS?
Why We Want to Publish Controlled Vocabulary in SKOS?Why We Want to Publish Controlled Vocabulary in SKOS?
Why We Want to Publish Controlled Vocabulary in SKOS? peterchanws
 

Mehr von peterchanws (7)

How can the cultural heritage community best meet the challenges of email arc...
How can the cultural heritage community best meet the challenges of email arc...How can the cultural heritage community best meet the challenges of email arc...
How can the cultural heritage community best meet the challenges of email arc...
 
Video game controlled vocabulary in wikidata
Video game controlled vocabulary in wikidataVideo game controlled vocabulary in wikidata
Video game controlled vocabulary in wikidata
 
Digital game preservation conference 12 25-2018
Digital game preservation conference   12 25-2018Digital game preservation conference   12 25-2018
Digital game preservation conference 12 25-2018
 
Potential Future Directions for ePADD
Potential Future Directions for ePADDPotential Future Directions for ePADD
Potential Future Directions for ePADD
 
Imaging 5.25 Floppy Disks
Imaging 5.25 Floppy DisksImaging 5.25 Floppy Disks
Imaging 5.25 Floppy Disks
 
ePADD
ePADDePADD
ePADD
 
Why We Want to Publish Controlled Vocabulary in SKOS?
Why We Want to Publish Controlled Vocabulary in SKOS?Why We Want to Publish Controlled Vocabulary in SKOS?
Why We Want to Publish Controlled Vocabulary in SKOS?
 

Kürzlich hochgeladen

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Workshops on Born-Digital Materials Workflow

  • 1. Workshops on Born-Digital Materials Workflow Peter Chan, Digital Archivist Oct. 20, 2011
  • 2. Week 2 Agenda • Accessioning – virus check; – disk imaging; – create FTK case; – collection summary – AT accession record
  • 3. Virus Check • Quarantine for 30 days (count from the day the media arrive at Stanford) • Run Sophos • Remove virus, if any, before creating disk/logical image (unless you are capturing the disk for a researcher in computer virus!)
  • 4. Disk / Forensic image • A complete bit-by-bit copy of a storage medium or device, such as a hard drive, SSD (solid state drive), tape drive, floppy disk, CD/DVD/BD, or flash memory device. • The image can be stored in one or more files. • Deleted files, if any, may be copied in this process.
  • 5. Logical image • A copy of the files in the directory(folder) / directories(folders) specified in the copy process. • The full path of each file is recorded and the files are embedded in one or more files in AD1 format. • Since deleted files and unpartitioned space are not represented in a directory, they are not copied in the process. • The host operating system has to recognize the target directory (folder) for the operation. (You cannot perform a logical copy of an Apple disk using FTK Imager under Windows perform).
  • 6.
  • 7.
  • 8. Disk Partition • Disk partitioning is the act of dividing a physical hard disk drive into multiple logical storage units. • The logical units can have different file systems so that we can set the same physical machine as a Window based PC and/or a Linux based PC and/or a Mac PC.
  • 10. File System • Microsoft: FAT12 (File Allocation Table), FAT16, FAT32, exFAT (FAT64), NTFS (New Technology File System) • Apple: Apple ProDOS, HFS (Hierarchical File System), HFS+ • CPM file system • Linux: ext (extended filesystem), ext2, ext3, ext4 • Optical Discs: ISO 9660, UDF (Universal Disk Format)
  • 12.
  • 14. Compare 4 5.25 Floppy Drive Solutions • https://docs.google.com/document/d/1TLY3 mn3duadGBLqqb2_XnYoF3jakjmo1hXfzvmWC TzE/edit?hl=en_US
  • 15. Hard Disk Interface • SCSI • IDE • Firewire 1394 • SATA • USB
  • 17. Image Log Spreadsheet • Use the following columns – Box# – CM# – Media Details (3.5, 5.25, single/double sided, single/double/high density, etc.) – Image Result (successful / unreadable) – Note (bad sector, etc.) – Manufacturer – Earliest modification/creation year of files – Folder title (if removed from collection folder) • Use “Call No. Imaging Log” as file name
  • 19. Create Disk Image • Physical Drive – hard / flash memory drive • Logical Drive – floppy / CD / DVD drive • Contents of a Folder – logical image • Fernico Device – a device which backs up forensic data from network locations or from locally attached hard drives, automatically spanning the content over a series of discs.
  • 21. Create Image Tick “Verify images after they are created” Tick “Create directory listings of all files in the image after they are created” if you need one.
  • 23. Image Type • Raw (dd) – commonly used disk image format created by the UNIX command dd • SMART – proprietary disk image format created by ASR Data. • E01 – proprietary disk image format created by EnCase. • AFF – an open source disk image format, allow encryption of disk image • AD1 - proprietary logical disk image format created by AccessData.
  • 25. Evidence Item Information • Use “Raw (dd)” as image type • Use call no. as “Case Number” • Use CMxxx as “Evidence Number” • Put your name as “Examiner” • Use the following in the “Notes” field: – 3.5 inch floppy disk; 5.25 inch floppy disk; Zip disk; – External hard disk; Internal hard disk; – Optical Disk
  • 27. Select Image Destination • Store all files under “Disk Image” folder in Desktop • Use “Case No.” + CMxxx as Image Filename for disk image • Default Image Fragment Size = 1500 MB • To save images segments that can be burned to a CD, specify 650 MB. • To save image segments that can be burned to a DVD, specify 4000 MB. • Selecting 0 (zero) produces the largest file, with no compression.
  • 29.
  • 30. Create New Case in AccessData FTK • Copy image files to network before creating new case. • Use call no. as Case Name • Store case in Drive:FTKFTK Case • Field Mode: bypasses file signature analysis and detailed options in order to vastly speed the processing. (for people to analysis the case in the field)
  • 31.
  • 32. Evidence Processing • Detailed Options – Evidence Processing - "√" Flag Duplicate Files; "√" MD-5 Hash, SHA-1 Hash; "√" Expand Compound Files; under “Expansion Options” "√" BZIP2, GZIP, RAR, TAR, ZIP; "√“ dtSearch Text Index; "√“ Create Thumbnails for Graphics (save as default) – Evidence Refinement (Advanced) - remove "√" Include File Slack, Include Free Space (save as default)
  • 33. Evidence Processing • KFF - Using a database of hashes from known files, this option flags insignificant files as ignorable files and flags known illicit or dangerous files as alert files, alerting the examiner to their presence in the case. • Fuzzy hashing - A tool which provides the ability to compare two distinctly different files and determine a fundamental level of similarity. This similarity is expressed as score from 0-100. The higher the score reported the more similar the two pieces of data. A score of 100 would indicate that the files are close to identical. Alternatively a score of 0 would indicate no meaningful common sequence of data between the two files.
  • 35. Use “All Images of a Directory” at the Network Forensic Lab Folder 35
  • 38. Processing Status of Each Image File 38
  • 40. Report Output • Report Folder – Drive:FTKFTK ReportCall# • Formats – PDF • Don’t check “Use object identification number for filename” and “Append extension to filename if bad/absent” • Rename “Report” to Call# FTK Collection Summary • Copy the report to sul-wallabySpecial CollectionsManuscriptsCollectionsCall#
  • 41. AT Accession Record Alternate Extent
  • 42. AT Accession Record Alternate Extent
  • 44. External Documents Location • sul-wallabySpecial CollectionsManuscriptsCollectionsM1437 Gould • M1437 FTK Accession Report • M1437 Computer Media Imaging Log