DOC PREVIEW
UTD CS 4398 - Data Acquisition, Processing Crime Scenes and Digital Forensics Analysis

This preview shows page 1-2-3-24-25-26-27-48-49-50 out of 50 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 50 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 50 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 50 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 50 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 50 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 50 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 50 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 50 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 50 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 50 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 50 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Digital ForensicsChapters 1-3 of TextbookData Acquisition: Chapter 4Types of AcquisitionDigital Evidence Storage FormatsAcquisition MethodsCompression MethodsContingency PlanningStorage Area Network Security SystemsNetwork Disaster Recovery SystemsUsing Acquisition ToolsUsing Acquisition Tools - 2Validating Data AcquisitionSlide 14RAID Acquisition MethodsRemote Network Acquisition ToolsSome Forensics ToolsProcessing Crime and Incident Scenes: Chapter 5Securing EvidenceGathering EvidenceAnalyzing EvidenceUnderstanding the Rules of EvidencePrivate sector incident scenesLaw Enforcement crime ScenesSteps to processing crime and incident scenesCase Study (Chapter 5)Digital Forensics AnalysisDigital Evidence Examination and Analysis TechniquesSearch TechniquesSlide 30Slide 31Slide 32Slide 33Slide 34Event ReconstructionSlide 36Slide 37Slide 38Slide 39Slide 40Slide 41Slide 42Slide 43Slide 44Slide 45What is Lazarus?Time AnalysisSlide 48ConclusionLinksDigital ForensicsDr. Bhavani ThuraisinghamThe University of Texas at DallasLecture #4Data Acquisition, Processing Crime Scenes and Digital Forensics AnalysisSeptember 3, 2010Chapters 1-3 of TextbookChapter 1: Understanding digital forensics-What is digital forensics, conducting investigation, case law (fourth amendment)Chapter 2: Understanding investigations-Steps for an investigation: systematic approach-Evidence collections and analysis-Report writingChapter 3: Forensics Laboratory-Physical requirements, Workstation requirements, Making a case to build a labData Acquisition: Chapter 4Types of acquisitionDigital evidence storage formatsAcquisition methodsContingency planningUsing acquisition toolsValidating data acquisitionRAID acquisition methodsRemote network acquisition toolsSome forensics toolsTypes of AcquisitionStatic Acquisition-Acquire data from the original media-The data in the original media will not changeLive Acquisition-Acquire data while the system is running-A second live acquisition will not be the sameWill focus on static acquisitionDigital Evidence Storage FormatsRaw formats-Bit by bit copying of the data from the disk-Many tools could be usedProprietary formats-Vendors have special formatsStandards-XML based formats for digital evidence-Digital Evidence Markup Language (Funded by National Institute of Justice)-Experts have argued that technologies that allow disparate law enforcement jurisdictions to share crime-related information will greatly facilitate fighting crime. One of these technologies is the Global Justice XML Data Model (GJXDM).-http://ncfs.ucf.edu/digital_evd.htmlAcquisition MethodsDisk to Image FileDisk to Disk Logical acquisition-Acquire only certain files if the disk is too largeSparse acquisition-Similar to logical acquisition but also collects fragments of unallocated (i.e. deleted) dataCompression MethodsCompression methods are used for very large data storage-E.g., Terabytes/Petabytes storageLossy vs Lossless compression-Lossless data compression is a class of data compression algorithms that allows the exact original data to be reconstructed from the compressed data. The term lossless is in contrast to lossy data compression, which only allows an approximation of the original data to be reconstructed, in exchange for better compression rates.Contingency PlanningFailure occurs during acquisition-Recovery methodsMake multiple copies-At least 2 copiesEncryption decryption techniques so that the evidence is not corruptedStorage Area Network Security SystemsHigh performance networks that connects all the storage systems-After as disaster such as terrorism or natural disaster (9/11 or Katrina), the data has to be availability-Database systems is a special kind of storage systemBenefits include centralized management, scalability reliability, performanceSecurity attacks on multiple storage devices-Secure storage is being investigatedNetwork Disaster Recovery SystemsNetwork disaster recovery is the ability to respond to an interruption in network services by implementing a disaster recovery palmPolicies and procedures have to be defined and subsequently enforcedWhich machines to shut down, determine which backup servers to use, When should law enforcement be notifiedUsing Acquisition ToolsAcquisition tools have been developed for different operating systems including Windows, Linux, Mac It is important that the evidence drive is write protectedExample acquisition method:-Document the chain of evidence for the drive to be acquired-Remove drive from suspect’s computer-Connect the suspect drive to USB or Firewire write-blocker device (if USB, write protect it via Registry write protect feature)-Create a storage folder on the target driveUsing Acquisition Tools - 2Example tools include ProDiscover, Access Data FTK ImagerClick on All programs and click on specific took (e.g., ProDiscoverPerform the commands -E.g. Capture ImageFor additional security, use passwordsValidating Data AcquisitionCreate hash values-CRC-32 (older methods), MD5, SHA seriesLinux validation-Hash algorithms are included and can be executed using special commandsWindows validation-No hash algorithms built in, but works with 3rd party programsMhX(Author)=h(h(Author)||h(Author.value))MhX(title)=h(h(title)||h(title.value))titletitleAuthorAuthorparagraphPolitic_pageLiterary_pageParagraphstitledatetitleAuthortitleAuthortopictitleAuthortopictitleAuthortopictitleAuthortopicArticleNewspaperFrontpageLeadingSport_pagenews newsPoliticparagraphMhX(paragraph)=h(h(paragraph)||h(paragraph.content)|| MhX(Author)||MhX(title))Merkle Hash Signature ExampleRAID Acquisition MethodsRAID: Redundant array of independent disksRAID storage is used for large files and to support replicationData is stored using multiple methods-E.g, StripingWhen RAID is acquired, need special tools to be used depending on the way the data is storedRemote Network Acquisition ToolsPreview suspects file remotely while its being used or powered onPerform live acquisition while the suspect’s computer ism powered onEncrypt the connection between the suspect’s computer and the examiner’s computerCopy the RAM while the computer is powered onUse stealth mode to hide the remote connection from the suspect’s computerVariation for the individual tools (ProDiscover, EnCase)Some Forensics


View Full Document

UTD CS 4398 - Data Acquisition, Processing Crime Scenes and Digital Forensics Analysis

Documents in this Course
Botnets

Botnets

33 pages

Botnets

Botnets

33 pages

Load more
Download Data Acquisition, Processing Crime Scenes and Digital Forensics Analysis
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Data Acquisition, Processing Crime Scenes and Digital Forensics Analysis and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Data Acquisition, Processing Crime Scenes and Digital Forensics Analysis 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?