This preview shows page 1-2-3-23-24-25-26-47-48-49 out of 49 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 49 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 49 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 49 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 49 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 49 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 49 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 49 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 49 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 49 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 49 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 49 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Digital ForensicsData AcquisitionTypes of AcquisitionDigital Evidence Storage FormatsAcquisition MethodsCompression MethodsContingency PlanningStorage Area Network Security SystemsNetwork Disaster Recovery SystemsUsing Acquisition ToolsUsing Acquisition Tools - 2Validating Data AcquisitionSlide 13RAID Acquisition MethodsRemote Network Acquisition ToolsSome Forensics ToolsProcessing Crime and Incident ScenesSecuring EvidenceGathering EvidenceAnalyzing EvidenceUnderstanding the Rules of EvidencePrivate sector incident scenesLaw Enforcement crime ScenesSteps to processing crime and incident scenesCase StudyDigital Forensics AnalysisDigital Evidence Examination and Analysis TechniquesSearch TechniquesSlide 29Slide 30Slide 31Slide 32Slide 33Event ReconstructionSlide 35Slide 36Slide 37Slide 38Slide 39Slide 40Slide 41Slide 42Slide 43Slide 44What is Lazarus?Time AnalysisSlide 47ConclusionLinksDigital ForensicsDr. Bhavani ThuraisinghamThe University of Texas at DallasData Acquisition, Processing Crime Scenes and Digital Forensics AnalysisJuly 2011Data AcquisitionTypes of acquisitionDigital evidence storage formatsAcquisition methodsContingency planningUsing acquisition toolsValidating data acquisitionRAID acquisition methodsRemote network acquisition toolsSome forensics toolsTypes of AcquisitionStatic Acquisition-Acquire data from the original media-The data in the original media will not changeLive Acquisition-Acquire data while the system is running-A second live acquisition will not be the sameWill focus on static acquisitionDigital Evidence Storage FormatsRaw formats-Bit by bit copying of the data from the disk-Many tools could be usedProprietary formats-Vendors have special formatsStandards-XML based formats for digital evidence-Digital Evidence Markup Language (Funded by National Institute of Justice)-Experts have argued that technologies that allow disparate law enforcement jurisdictions to share crime-related information will greatly facilitate fighting crime. One of these technologies is the Global Justice XML Data Model (GJXDM).-http://ncfs.ucf.edu/digital_evd.htmlAcquisition MethodsDisk to Image FileDisk to Disk Logical acquisition-Acquire only certain files if the disk is too largeSparse acquisition-Similar to logical acquisition but also collects fragments of unallocated (i.e. deleted) dataCompression MethodsCompression methods are used for very large data storage-E.g., Terabytes/Petabytes storageLossy vs Lossless compression-Lossless data compression is a class of data compression algorithms that allows the exact original data to be reconstructed from the compressed data. The term lossless is in contrast to lossy data compression, which only allows an approximation of the original data to be reconstructed, in exchange for better compression rates.Contingency PlanningFailure occurs during acquisition-Recovery methodsMake multiple copies-At least 2 copiesEncryption decryption techniques so that the evidence is not corruptedStorage Area Network Security SystemsHigh performance networks that connects all the storage systems-After as disaster such as terrorism or natural disaster (9/11 or Katrina), the data has to be availability-Database systems is a special kind of storage systemBenefits include centralized management, scalability reliability, performanceSecurity attacks on multiple storage devices-Secure storage is being investigatedNetwork Disaster Recovery SystemsNetwork disaster recovery is the ability to respond to an interruption in network services by implementing a disaster recovery palmPolicies and procedures have to be defined and subsequently enforcedWhich machines to shut down, determine which backup servers to use, When should law enforcement be notifiedUsing Acquisition ToolsAcquisition tools have been developed for different operating systems including Windows, Linux, Mac It is important that the evidence drive is write protectedExample acquisition method:-Document the chain of evidence for the drive to be acquired-Remove drive from suspect’s computer-Connect the suspect drive to USB or Firewire write-blocker device (if USB, write protect it via Registry write protect feature)-Create a storage folder on the target driveUsing Acquisition Tools - 2Example tools include ProDiscover, Access Data FTK ImagerClick on All programs and click on specific took (e.g., ProDiscoverPerform the commands -E.g. Capture ImageFor additional security, use passwordsValidating Data AcquisitionCreate hash values-CRC-32 (older methods), MD5, SHA seriesLinux validation-Hash algorithms are included and can be executed using special commandsWindows validation-No hash algorithms built in, but works with 3rd party programsMhX(Author)=h(h(Author)||h(Author.value))MhX(title)=h(h(title)||h(title.value))titletitleAuthorAuthorparagraphPolitic_pageLiterary_pageParagraphstitledatetitleAuthortitleAuthortopictitleAuthortopictitleAuthortopictitleAuthortopicArticleNewspaperFrontpageLeadingSport_pagenews newsPoliticparagraphMhX(paragraph)=h(h(paragraph)||h(paragraph.content)|| MhX(Author)||MhX(title))Merkle Hash Signature ExampleRAID Acquisition MethodsRAID: Redundant array of independent disksRAID storage is used for large files and to support replicationData is stored using multiple methods-E.g, StripingWhen RAID is acquired, need special tools to be used depending on the way the data is storedRemote Network Acquisition ToolsPreview suspects file remotely while its being used or powered onPerform live acquisition while the suspect’s computer ism powered onEncrypt the connection between the suspect’s computer and the examiner’s computerCopy the RAM while the computer is powered onUse stealth mode to hide the remote connection from the suspect’s computerVariation for the individual tools (ProDiscover, EnCase)Some Forensics ToolsProDiscover-http://www.techpathways.com/prodiscoverdft.htm-http://www.techpathways.com/DesktopDefault.aspxEnCase-http://www.guidancesoftware.com/-http://www.guidancesoftware.com/products/ef_index.aspNTI Safeback-http://www.forensics-intl.com/safeback.htmlProcessing Crime and Incident ScenesTopics-Securing evidence -Gathering evidence -Analyzing evidence-Understanding the rules of evidence-Collecting evidence in private-sector incident scenes-Processing law enforcement crime scenes-Steps to Processing Crime


View Full Document

UTD CS 6V81 - LECTURE NOTES

Documents in this Course
Botnets

Botnets

33 pages

Privacy

Privacy

27 pages

Privacy

Privacy

27 pages

Load more
Download LECTURE NOTES
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view LECTURE NOTES and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view LECTURE NOTES 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?