DOC PREVIEW
UTD CS 4398 - Lecture #10 Forensics Tools and Standards

This preview shows page 1-2-20-21 out of 21 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Digital ForensicsOutlineReviewForensics ToolsFunctions of Forensics ToolsFunctions of Forensics Tools - 2Functions of Forensics Tools - 3Software ToolsHardware ToolsValidating Forensics ToolsNIST StandardsNSRLSlide 13CFTTCFReDSSlide 16International StandardsMacintosh Operating System (MAC OS X)Unix/Linux Operating SystemSummary of Lectures 8 and 9ReferencesDigital ForensicsDr. Bhavani ThuraisinghamThe University of Texas at DallasLecture #10Forensics Tools and StandardsSeptember 24, 2008OutlineReviewForensics ToolsStandardsFile Systems (Unix, Linux)Reference: Chapters 7 and 8 of Textbookhttp://www.cftt.nist.gov/NISTIR_7490.pdfReviewPart 2:-Lecture 8: Windows File System and Forensics -Lecture #9: Forensics ToolsForensics ToolsHardware Forensics Tools-Range from single purpose components (e.g., devices) to complete systems (forensics workstations)Software Forensics Tools-Analysis tools such ProDiscover and EnCaseFunctions of Forensics ToolsAcquisitionValidation and DiscriminationExtractionReconstructionReportingComparison of some forensics tools are given on page 277 of Textbook (ProDiscover, AccessData, EnCase)Functions of Forensics Tools - 2Acquisition-Tools for data acquisition-Physical data copy, logical data copy, data acquiring format, GUI acquisitionValidation and Discrimination-Integrity of the data, Also includes hashing, filtering, analyzing file headersExtraction-Recovery task-Data viewing, Keyword searching, DecompressingReconstructionReportingFunctions of Forensics Tools - 3Reconstruction-Recreate the crime scene (suspect drive)-Disk to disk copy, Image to disk copy, etc.Reporting-Reporting generation tools help the examiner the prepare report-Also helps to log reportsSoftware ToolsCommand line forensics toolsUnix/Linux forensics tools-SMART, Helix, Autopsy and Sleuth KitGUI Forensics Tools-Visualizing the data is important to understand the dataHardware ToolsForensics workstations-How to build a workstation-What are the components-How are the workstations connected in a lab-How can distributed forensics be carried outWrite Blockers-Write blocker devoices to protect evidence disks (see the discussion in Chapter 4 under data acquisition)Validating Forensics ToolsNIST (National Institute of Standards and Technology) is coming up with standards for validation (will be discussed under standards)-Establish categories for forensics tools, Identify forensics category requirements, Develop test assertions-Identify test cases-Establish test method-Report test results-NIST (National Institute of Standards and Technology) is coming up with standards for validation (will be discussed under standardsChapter 7 discusses validation protocols as well as some examination protocolsNIST StandardsThere are three digital forensics projects at the National Institute of Standards and Technology (NIST).These projects are supported by the U.S. Department of Justice's National Institute of Justice (NIJ), federal, state, and local law enforcement, and the National Institute of Standards and Technology Office of Law Enforcement Standards (OLES) to promote efficient and effective use of computer technology in the investigation of crimes involving computers. These projects are the following:-• National Software Reference Library (NSRL)-• Computer Forensic Tool Testing (CFTT)-• Computer Forensic Reference Data Sets (CFReDS)NSRLThe NSRL is designed to collect software from various sources and incorporate file profiles computed from this software into a Reference Data Set (RDS) including hashes of known files created when software is installed on a computer. The law enforcement community approached NIST requesting a software library and signature database that meets four criteria:-• The organizations involved in the implementation of the file profiles must be unbiased and neutral.-• Control over the quality of data provided by the database must be maintained.-• A repository of original software must be made available from which data can be reproduced.-• The database must provide a wide range of capabilities with respect to the information that can be obtained from file systems under investigation.NSRLThe primary focus of the NSRL is to aid computer forensics examiners in their investigations of computer systems. The majority of stakeholders are in federal, state and local law enforcement in the United States and internationally. These organizations typically use the NSRL data to aid in criminal investigations.CFTTThe goal of the CFTT project at NIST is to establish a methodology for testing computer forensic software tools through the development of general tool specifications, test procedures, test criteria, test sets, and test hardware. The results provide the information necessary for toolmakers to improve tools, for users to make informed choices about acquiring and using computer forensics tools, and for interested parties to understand the tools capabilities.The testing methodology developed by NIST is functionality driven. The activities of forensic investigations are separated into discrete functions, such as hard disk write protection, disk imaging, string searching, etc. A test methodology is then developed for each category. After a test methodology is developed it is posted to the web.CFReDSThe Computer Forensic Reference Data Sets (CFReDS) provide to an investigator documented sets of simulated digital evidence for examination. Since CFReDS has documented contents, such as target search strings seeded in known locations, investigators can compare the results of searches for the target strings with the known placement of the strings. Investigators can use CFReDS in several ways including validating the software tools used in their investigations, equipment check out, training investigators, and proficiency testing of investigators as part of laboratory accreditation.The CFReDS site is a repository of images. Some images are produced by NIST, often from the CFTT (tool testing) project, and some are contributed by other organizations.CFReDSIn addition to test images, the CFReDS site contains resources to aid in creating test images.These creation aids are in the form of interesting data files, useful software tools and procedures for specific tasks. The CFReDS web site is http://www.cfreds.nist.gov.International StandardsThe Scientific


View Full Document

UTD CS 4398 - Lecture #10 Forensics Tools and Standards

Documents in this Course
Botnets

Botnets

33 pages

Botnets

Botnets

33 pages

Load more
Download Lecture #10 Forensics Tools and Standards
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture #10 Forensics Tools and Standards and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture #10 Forensics Tools and Standards 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?