DOC PREVIEW
UTD CS 4398 - Lecture #5 Technology and Services

This preview shows page 1-2-3-25-26-27 out of 27 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 27 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 27 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 27 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 27 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 27 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 27 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 27 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Digital ForensicsReview of LecturesAssignment #1OutlineIntroductionMilitary ForensicsLaw Enforcement ForensicsBusiness ForensicsForensics TechniquesFinding Hidden DataSpyware/AdwareEncryptionInternet/Web TracingWireless Technology ForensicsWireless Technology Forensics - 2Firewall ForensicsBiometrics Forensics: Richard Vorder BrueggeSlide 18Technologies: ConclusionTypes of Computer Forensics SystemsCyber CrimeCyber DetectiveRisk ManagementForensic ServicesInvestigative services examplesProcess Improvement: ToolsLinksDigital ForensicsDr. Bhavani ThuraisinghamThe University of Texas at DallasLecture #5Technology and ServicesSeptember 9, 2009Review of LecturesPart 1 of the Course-Reference: Part 1 of the Book + Links given in Lectures-Lecture 1: Introduction to Digital Forensics-Lecture 2: Background on Cyber Security-Lecture 3: Data Recovery and Evidence Collection-Lecture 4: Malicious Code Detection: How do you detect that the problem has occurred?-Lecture 5: Forensics Technologies and ServicesPart 2 of the Course-Part 2 of the Book-Lecture 6: Data Acquisition Details (September 14, 2009)Assignment #1Text Book-Hands-on Project 2.1-Hands-on Project 2.2-Chapter 2-Page 68-69-Due: Wednesday September 23, 2009OutlineForensics Technologies-Forensics TechnologyMilitary, Law Enforcement, Business Forensics -Forensics TechniquesFinding Hidden Data, Spyware, Encryption, Data Protection, Tracing, Data Mining-Security TechnologiesWireless, Firewalls, BiometricsServices-Cyber crime, Cyber detective, Risk Managemen, Investigative services, Process improvementIntroductionDigital forensics includes computer forensics and network forensicsComputer forencis -gathers evidence from computer media seized at crime scene-Issues involve imaging storage media, recovering deleted files, searching slack and free space, preserving the collected information for litigationNetwork forencis -Analysis of computer network intrusion evidenceMilitary ForensicsCFX-2000: Computer Forencis Experiment 2000-Information Directorate (AFRL) partnership with NIJ/NLECTC-Hypothesis: possible to determine the motives, intent, targets, sophistication, identity and location of cyber terrorists by deploying an integrated forensics analysis framework-Tools included commercial products and research prototypes-http://www.afrlhorizons.com/Briefs/June01/IF0016.html-http://rand.org/pubs/monograph_reports/MR1349/MR1349.appb.pdfLaw Enforcement ForensicsCommonly examined systems: Windows NT, Windows 2000, XP and 2003Preserving evidence-Mirror image backups: Safe Back technology from New Technologies Inc.Tools to handle-Trojan Horse programs / File slacks-Data Hiding TechniquesAnaDisk analyzes diskettesCOPYQM duplicates diskettes-E-Commerce investigation: Net Threat Analyzer-Text search: TextSearch Plus tool-Fuzzy logic/data mining tools to identify unknown textIntelligent Forensics FilterBusiness ForensicsRemote monitoring of target computers-Data Interception by Remote Transmission (DIRT) from Codex Data SystemsCreating trackable electronic documentsTheft recovery software for laptops and PCs-PC Phonehome tool-RFID technologyForensics TechniquesTechniques for finding, preserving and preparing evidenceFinding evidence is a complex process as the forensic expert has to determine where the evidence resides -Evidence may be in files, evidence may be in disks, evidence may be on paper. Need to track all types of evidencePreserving evidence includes ensuring that the evidence is not tampered with-Involves pre-incident planning and training in incident discovery procedures’ If the machine is turned on, leave it on; do not run programs on that particular computerPreparing evidence will include data recovery, documentation, etc.Finding Hidden DataWhen files are deleted, usually they can be recoveredThe files are marked as deleted, but they are still residing in the disk until they are overwrittenFiles may also be hidden in different parts of the diskThe challenge is to piece the different part of the file together to recover the original fileThere is research on using statistical methods for file recoveryhttp://www.cramsession.com/articles/files/finding-hidden-data---how-9172003-1401.asphttp://www.devtarget.org/downloads/ca616-seufert-wolfgarten-assignment2.pdfSpyware/AdwareSpyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent. -http://en.wikipedia.org/wiki/SpywareSpyware is mostly advertising supported software (adware)Shareware authors place ads from media company and get a piece if the revenuePC surveillance tools that allow a user to nominate computer activity-Keystroke capture, snapshots, email logging, chats etc.Privacy concerns with spywareEncryptionPopular Encryption techniques-Public key/ Private KeyOwner of the data encrypts with the public key of the receiver; Receiver decrypts with his private keyIn some cases owner may encrypt with his private key for multiple receiver. Receiver will decrypt with the owner’s public keyMerkle Hash is a popular method to hash documents; one way hash functionChallenge is to generate unique keysIssues: Trusted authority to generate keys and credentialsInternet/Web TracingWhere has the email come from-Check IP address-Sender may use fake address by changing fields; sending server may not check this and so the mail is sentTracing web activityWho has logged into the system say from a public web site and modified accounts and grades?Web/email tracking tools-http://www.cryer.co.uk/resources/websitetracking.htm-http://www.visualware.com/resources/tutorials/email.htmlWireless Technology ForensicsForensic Examination of a RIM (BlackBerry) Wireless Device http://www.rh-law.com/ediscovery/Blackberry.pdf-“There are two types of RIM devices within each model class. The Exchange Edition is meant for use in a corporate environment while the Internet Edition works with standard POP email accounts. The Exchange Edition employs Triple-DES encryption to send and receive but the Internet Edition communicates in clear text. Neither employs an encrypted files system”Relevance of RIM forensics -“The RIM device shares the same evidentiary value as any other Personal Digital Assistant (PDA). As the investigator may suspect


View Full Document

UTD CS 4398 - Lecture #5 Technology and Services

Documents in this Course
Botnets

Botnets

33 pages

Botnets

Botnets

33 pages

Load more
Download Lecture #5 Technology and Services
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture #5 Technology and Services and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture #5 Technology and Services 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?