SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
Chapter 18 Computer Forensics
Introduction ,[object Object],[object Object],[object Object],[object Object]
The Basics ,[object Object],[object Object],[object Object],[object Object],[object Object]
Terminology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Terminology ,[object Object],[object Object],[object Object],[object Object],[object Object]
Terminology ,[object Object],[object Object],[object Object]
Terminology ,[object Object],[object Object],[object Object]
Terminology ,[object Object],[object Object],[object Object]
Processing the Electronic CS ,[object Object],[object Object],[object Object],[object Object]
Shutdown vs. Pulling the Plug ,[object Object],[object Object],[object Object],[object Object]
Forensic Image Acquisition ,[object Object],[object Object],[object Object]
Forensic Image Acquisition ,[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Fingerprint ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Visible Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Temporary Files and Swap Space ,[object Object],[object Object],[object Object],[object Object],[object Object]
Latent Data ,[object Object],[object Object],[object Object],[object Object]
Latent Data ,[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Ähnlich wie Fs Ch 18

PC hardware components ppt slide_week2.ppt
PC hardware components ppt slide_week2.pptPC hardware components ppt slide_week2.ppt
PC hardware components ppt slide_week2.pptvimala elumalai
 
Presentation007
Presentation007Presentation007
Presentation007ajaytank
 
Chapter01Introducing Hardware
Chapter01Introducing HardwareChapter01Introducing Hardware
Chapter01Introducing HardwarePatty Ramsey
 
Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Vipin George
 
00 Hardware Of Personal Computer V1 1
00 Hardware Of Personal Computer V1 100 Hardware Of Personal Computer V1 1
00 Hardware Of Personal Computer V1 1Rajan Das
 
Powerpoint comp ed[1][1]56
Powerpoint comp ed[1][1]56Powerpoint comp ed[1][1]56
Powerpoint comp ed[1][1]56Teresa Woods
 
Powerpoint comp ed[1]
Powerpoint comp ed[1]Powerpoint comp ed[1]
Powerpoint comp ed[1]Teresa Woods
 
Android Mind Reading: Android Live Memory Analysis with LiME and Volatility
Android Mind Reading: Android Live Memory Analysis with LiME and VolatilityAndroid Mind Reading: Android Live Memory Analysis with LiME and Volatility
Android Mind Reading: Android Live Memory Analysis with LiME and VolatilityJoe Sylve
 
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...Kaushal Mehta
 
Data recovery with a view of digital forensics
Data recovery with a view of digital forensics Data recovery with a view of digital forensics
Data recovery with a view of digital forensics Ahmed Hashad
 
103ah computerparts
103ah computerparts103ah computerparts
103ah computerpartscsjez
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidencerakesh mishra
 
Basic hardware concept
Basic hardware concept Basic hardware concept
Basic hardware concept Danilo Anos
 
lesson 2 MATERIALS, TOOLS, EQUIPMENT and TESTING DEVICES.pptx
lesson 2 MATERIALS, TOOLS, EQUIPMENT and TESTING DEVICES.pptxlesson 2 MATERIALS, TOOLS, EQUIPMENT and TESTING DEVICES.pptx
lesson 2 MATERIALS, TOOLS, EQUIPMENT and TESTING DEVICES.pptxTerrenceRamirez1
 

Ähnlich wie Fs Ch 18 (20)

Fs Ch 18
Fs Ch 18Fs Ch 18
Fs Ch 18
 
PC hardware components ppt slide_week2.ppt
PC hardware components ppt slide_week2.pptPC hardware components ppt slide_week2.ppt
PC hardware components ppt slide_week2.ppt
 
108week2
108week2108week2
108week2
 
Presentation007
Presentation007Presentation007
Presentation007
 
Chapter01Introducing Hardware
Chapter01Introducing HardwareChapter01Introducing Hardware
Chapter01Introducing Hardware
 
Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation
 
Ch01
Ch01Ch01
Ch01
 
00 Hardware Of Personal Computer V1 1
00 Hardware Of Personal Computer V1 100 Hardware Of Personal Computer V1 1
00 Hardware Of Personal Computer V1 1
 
Powerpoint comp ed[1][1]56
Powerpoint comp ed[1][1]56Powerpoint comp ed[1][1]56
Powerpoint comp ed[1][1]56
 
Powerpoint comp ed[1]
Powerpoint comp ed[1]Powerpoint comp ed[1]
Powerpoint comp ed[1]
 
Android Mind Reading: Android Live Memory Analysis with LiME and Volatility
Android Mind Reading: Android Live Memory Analysis with LiME and VolatilityAndroid Mind Reading: Android Live Memory Analysis with LiME and Volatility
Android Mind Reading: Android Live Memory Analysis with LiME and Volatility
 
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...
 
Multimedia Technology
Multimedia TechnologyMultimedia Technology
Multimedia Technology
 
Data recovery with a view of digital forensics
Data recovery with a view of digital forensics Data recovery with a view of digital forensics
Data recovery with a view of digital forensics
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
 
Introduction to Computers
Introduction to ComputersIntroduction to Computers
Introduction to Computers
 
103ah computerparts
103ah computerparts103ah computerparts
103ah computerparts
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Basic hardware concept
Basic hardware concept Basic hardware concept
Basic hardware concept
 
lesson 2 MATERIALS, TOOLS, EQUIPMENT and TESTING DEVICES.pptx
lesson 2 MATERIALS, TOOLS, EQUIPMENT and TESTING DEVICES.pptxlesson 2 MATERIALS, TOOLS, EQUIPMENT and TESTING DEVICES.pptx
lesson 2 MATERIALS, TOOLS, EQUIPMENT and TESTING DEVICES.pptx
 

Mehr von warren142 (20)

Ch 8 fingerprints
Ch 8 fingerprintsCh 8 fingerprints
Ch 8 fingerprints
 
Chapter02
Chapter02Chapter02
Chapter02
 
Ch 7
Ch 7Ch 7
Ch 7
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Ch 6
Ch 6Ch 6
Ch 6
 
Ch 6
Ch 6Ch 6
Ch 6
 
Ch 5
Ch 5Ch 5
Ch 5
 
Cj 101 ch 4
Cj 101 ch 4Cj 101 ch 4
Cj 101 ch 4
 
Criminal justice 101 ch 3
Criminal justice 101 ch 3Criminal justice 101 ch 3
Criminal justice 101 ch 3
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Ch 14
Ch 14Ch 14
Ch 14
 
Ch 15
Ch 15Ch 15
Ch 15
 
Ch 15
Ch 15Ch 15
Ch 15
 
Ch 14
Ch 14Ch 14
Ch 14
 
Ch 13
Ch 13Ch 13
Ch 13
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 

Kürzlich hochgeladen

Resultados 20 KMS "Podebrady" Walking 2024
Resultados 20 KMS "Podebrady" Walking 2024Resultados 20 KMS "Podebrady" Walking 2024
Resultados 20 KMS "Podebrady" Walking 2024Judith Chuquipul
 
PPT on INDIA VS PAKISTAN - A Sports Rivalry
PPT on INDIA VS PAKISTAN - A Sports RivalryPPT on INDIA VS PAKISTAN - A Sports Rivalry
PPT on INDIA VS PAKISTAN - A Sports Rivalryanirbannath184
 
BADMINTON EQUIPMENTS / EQUIPMENTS GROUP9.pptx
BADMINTON EQUIPMENTS / EQUIPMENTS GROUP9.pptxBADMINTON EQUIPMENTS / EQUIPMENTS GROUP9.pptx
BADMINTON EQUIPMENTS / EQUIPMENTS GROUP9.pptxvillenoc6
 
Benifits of Individual And Team Sports-Group 7.pptx
Benifits of Individual And Team Sports-Group 7.pptxBenifits of Individual And Team Sports-Group 7.pptx
Benifits of Individual And Team Sports-Group 7.pptxsherrymieg19
 
DONAL88 >LINK SLOT PG SOFT TERGACOR 2024
DONAL88 >LINK SLOT PG SOFT TERGACOR 2024DONAL88 >LINK SLOT PG SOFT TERGACOR 2024
DONAL88 >LINK SLOT PG SOFT TERGACOR 2024DONAL88 GACOR
 
20240408 Bending Backwards to the Second Step Up.docx
20240408 Bending Backwards to the Second Step Up.docx20240408 Bending Backwards to the Second Step Up.docx
20240408 Bending Backwards to the Second Step Up.docxSharon Liu
 
Clash of Titans_ PSG vs Barcelona (1).pdf
Clash of Titans_ PSG vs Barcelona (1).pdfClash of Titans_ PSG vs Barcelona (1).pdf
Clash of Titans_ PSG vs Barcelona (1).pdfMuhammad Hashim
 
PGC _ 3.1 _ Powerpoint (2024) scorm ready.pptx
PGC _ 3.1 _ Powerpoint (2024) scorm ready.pptxPGC _ 3.1 _ Powerpoint (2024) scorm ready.pptx
PGC _ 3.1 _ Powerpoint (2024) scorm ready.pptxaleonardes
 
JORNADA 2 LIGA MUROBASQUETBOL1 2024.docx
JORNADA 2 LIGA MUROBASQUETBOL1 2024.docxJORNADA 2 LIGA MUROBASQUETBOL1 2024.docx
JORNADA 2 LIGA MUROBASQUETBOL1 2024.docxArturo Pacheco Alvarez
 
Project & Portfolio, Market Analysis: WWE
Project & Portfolio, Market Analysis: WWEProject & Portfolio, Market Analysis: WWE
Project & Portfolio, Market Analysis: WWEDeShawn Ellis
 

Kürzlich hochgeladen (10)

Resultados 20 KMS "Podebrady" Walking 2024
Resultados 20 KMS "Podebrady" Walking 2024Resultados 20 KMS "Podebrady" Walking 2024
Resultados 20 KMS "Podebrady" Walking 2024
 
PPT on INDIA VS PAKISTAN - A Sports Rivalry
PPT on INDIA VS PAKISTAN - A Sports RivalryPPT on INDIA VS PAKISTAN - A Sports Rivalry
PPT on INDIA VS PAKISTAN - A Sports Rivalry
 
BADMINTON EQUIPMENTS / EQUIPMENTS GROUP9.pptx
BADMINTON EQUIPMENTS / EQUIPMENTS GROUP9.pptxBADMINTON EQUIPMENTS / EQUIPMENTS GROUP9.pptx
BADMINTON EQUIPMENTS / EQUIPMENTS GROUP9.pptx
 
Benifits of Individual And Team Sports-Group 7.pptx
Benifits of Individual And Team Sports-Group 7.pptxBenifits of Individual And Team Sports-Group 7.pptx
Benifits of Individual And Team Sports-Group 7.pptx
 
DONAL88 >LINK SLOT PG SOFT TERGACOR 2024
DONAL88 >LINK SLOT PG SOFT TERGACOR 2024DONAL88 >LINK SLOT PG SOFT TERGACOR 2024
DONAL88 >LINK SLOT PG SOFT TERGACOR 2024
 
20240408 Bending Backwards to the Second Step Up.docx
20240408 Bending Backwards to the Second Step Up.docx20240408 Bending Backwards to the Second Step Up.docx
20240408 Bending Backwards to the Second Step Up.docx
 
Clash of Titans_ PSG vs Barcelona (1).pdf
Clash of Titans_ PSG vs Barcelona (1).pdfClash of Titans_ PSG vs Barcelona (1).pdf
Clash of Titans_ PSG vs Barcelona (1).pdf
 
PGC _ 3.1 _ Powerpoint (2024) scorm ready.pptx
PGC _ 3.1 _ Powerpoint (2024) scorm ready.pptxPGC _ 3.1 _ Powerpoint (2024) scorm ready.pptx
PGC _ 3.1 _ Powerpoint (2024) scorm ready.pptx
 
JORNADA 2 LIGA MUROBASQUETBOL1 2024.docx
JORNADA 2 LIGA MUROBASQUETBOL1 2024.docxJORNADA 2 LIGA MUROBASQUETBOL1 2024.docx
JORNADA 2 LIGA MUROBASQUETBOL1 2024.docx
 
Project & Portfolio, Market Analysis: WWE
Project & Portfolio, Market Analysis: WWEProject & Portfolio, Market Analysis: WWE
Project & Portfolio, Market Analysis: WWE
 

Fs Ch 18

Hinweis der Redaktion

  1. Computers have permeated society and are used in countless ways with innumerable applications. Similarly, the role of electronic data in investigative work has realized exponential growth in the last decade. The usage of computers and other electronic data storage devices leaves the footprints and data trails of their users. Computer forensics involves the preservation, acquisition, extraction, and interpretation of computer data. In today’s world of technology, many devices are capable of storing data and could thus be grouped into the field of computer forensics.
  2. Before getting into the nuts and bolts of computers, the important distinction between hardware and software must be established. Hardware comprises the physical and tangible components of the computer. Software, conversely, is a set of instructions compiled into a program that performs a particular task. Software are those programs and applications that carries out a set of instructions on the hardware.
  3. Computer Case/Chassis: This is the physical box holding the fixed internal computer components in place. Power Supply: PC’s power supply converts the power it gets from the wall outlet to a useable format for the computer and its components. Motherboard: The main circuit board contained within a computer (or other electronic devices) is referred to as the motherboard. System Bus: Contained on the motherboard, the system bus is a vast complex network of wires that serves to carry data from one hardware device to another.
  4. Read Only Memory (ROM): ROM chips store programs called firmware, used to start the boot process and configure a computer’s components. Random Access Memory (RAM): RAM serves to take the burden off of the computer’s processor and Hard Disk Drive (HDD). The computer, aware that it may need certain data at a moments notice, stores the data in RAM. RAM is referred to as volatile memory because it is not permanent; its contents undergo constant change and are forever lost once power is taken away from the computer.
  5. Central Processing Unit (CPU): The CPU, also referred to as a processor, is essentially the brains of the computer. Input Devices: These devices are used to get data into the computer To name a few: Keyboard Mouse Joy Stick Scanner
  6. Output Devices: Equipment through which data is obtained from the computer. To name a few: Monitor Printer Speakers The Hard Disk Drive (HDD) is typically the primary location of data storage within the computer.
  7. Different operating systems map out (partition) HDDs in different manners. Examiners must be familiar with the file system they are examining. Evidence exists in many different locations and in numerous forms on a HDD. The type of evidence can be grouped under two major sub-headings: visible and latent data.
  8. Processing the electronic crime scene has a lot in common with processing a traditional crime scene. Warrants Documentation Good Investigation Techniques At this point, a decision must be made as to whether a live acquisition of the data is necessary.
  9. Several factors influence the systematic shutdown vs. pulling the plug decision. For example, if encryption is being used and pulling the plug will encrypt the data rendering it unreadable without a password or key, therefore pulling the plug would not be prudent. Similarly, if crucial evidentiary data exists in RAM and has not been saved to the HDD and thus will be lost with discontinuation of power to the system, another option must be considered. Regardless, the equipment will most likely be seized.
  10. Now that the items have been seized, the data needs to be obtained for analysis. The computer Hard Disk Drive will be used as an example, but the same “best practices” principals apply for other electronic devices as well. Throughout the entire process, the computer forensic examiner must adopt the method that is least intrusive. The goal with obtaining data from a HDD is to do so with out altering even one bit of data.
  11. Because booting a HDD to its operating system changes many files and could potentially destroy evidentiary data, obtaining data is generally accomplished by removing the HDD from the system and placing it in a laboratory forensic computer so that a forensic image can be created. Occasionally, in cases of specialized or unique equipment or systems the image of the HDD must be obtained utilizing the seized computer. Regardless, the examiner needs to be able to prove that the forensic image he/she obtained includes every bit of data and caused no changes (writes) to the HDD.
  12. To this end, a sort of fingerprint of the drive is taken before and after imaging. This fingerprint is accomplished through the use of a Message Digest 5 (MD5), Secure Hash Algorithm (SHA) or similar validated algorithm. Before imaging the drive the algorithm is run and a 32 character alphanumeric string is produced based on the drive’s contents. It then is run against the resulting forensic image and if nothing changed the same alphanumeric string will be produced thus demonstrating that the image is all-inclusive of the original contents and that nothing was altered in the process
  13. Visible data is that data which the operating system is aware of. Consequently this data is easily accessible to the user. From an evidentiary standpoint, it can encompass any type of user created data like: word processing documents spread sheets accounting records databases pictures
  14. Temporary files, created by programs as a sort of “back up on the fly” can also prove valuable as evidence. Finally, data in the swap space (utilized to conserve the valuable RAM within the computer system) can yield evidentiary data. Latent data, on the other hand, is that data which the operating system is not aware of.
  15. Evidentiary latent data can exist in both RAM and file slack. RAM slack is the area from the end of the logical file to the end of the sector. File slack is the remaining area from the end of the final sector containing data to the end of the cluster. Another area where latent data might be found is in unallocated space. Unallocated space is that space on a HDD the operating system sees as empty and ready for data.
  16. The constant shuffling of data through deletion, defragmentation, swapping, etc., is one of the ways data is orphaned in latent areas. Finally, when a user deletes files the data typically remains behind. Deleted files are therefore another source of latent data to be examined during forensic analysis.