an introduction to computer forensics

17
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University

Upload: barney

Post on 14-Jan-2016

35 views

Category:

Documents


2 download

DESCRIPTION

An Introduction to Computer Forensics. Jim Lindsey Western Kentucky University. What are we talking about?. Forensic …. What are we talking about?. Forensic Science is the use of science to investigate and establish facts in criminal and civil cases. What are we talking about?. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: An Introduction to Computer Forensics

An Introduction to Computer Forensics

Jim LindseyWestern Kentucky University

Page 2: An Introduction to Computer Forensics

What are we talking about?

Forensic …

Page 3: An Introduction to Computer Forensics

What are we talking about?

Forensic Science is the use of science to investigate and establish facts in criminal and civil cases.

Fat-Free Muffins Breakeven Analysis

$0.00

$10,000.00

$20,000.00

$30,000.00

$40,000.00

$50,000.00

$60,000.00

0 5,054 10,108 15,161 20,215

Units

Do

llar

s Fixed Cost

Total Cost

Revenue

Page 4: An Introduction to Computer Forensics

What are we talking about?

Computer Forensics is the discovery, collection, and analysis of evidence found on computers and networks.

Page 5: An Introduction to Computer Forensics

Many Hats

Law

Investigative

Skills

Technology

Computer

Forensics

Page 6: An Introduction to Computer Forensics

An Exam May Explain …

Hidden data Most recently used applications Origin of documents Evidence of “wiping” Visited Internet sites

Page 7: An Introduction to Computer Forensics

An Exam May Require …

Cloning Write Blocker MD-5 & SHA-1

Cataloging Recovery of Deleted Files Search for hidden, disguised

or encrypted files Viewing files Analysis of time/date stamps

Page 8: An Introduction to Computer Forensics

Deleted Files

Page 9: An Introduction to Computer Forensics

Deleted Files

Page 10: An Introduction to Computer Forensics

An Examiner Should …

Possess requisite training and equipment

Be able to provide training Be knowledgeable of data relevant

to computer-related crimes Be able to effectively testify as an

expert in a court of law

Page 11: An Introduction to Computer Forensics

What to do?

If the computer is off, do not turn on.

If the computer is on, do not shut down normally – call for instructions.

Do not “browse” the files!

Page 12: An Introduction to Computer Forensics
Page 13: An Introduction to Computer Forensics

What to do?

Document, document, document - W H Y ?

Records chain of custody: Where the evidence came from When it was obtained Who obtained it Who secured it Who has had control of it Where it is stored

Page 14: An Introduction to Computer Forensics

Final Notes

Forensic Examinations Normally 1-2 hours to forensically

image a hard drive Exams can take 4-40 hours,

depending on requests Helpful if “keywords” provided Know what you want to search for…..

Page 15: An Introduction to Computer Forensics

Final Notes Average HD Volume 590 GB* Gigabyte 1,073,741,824 bytes Subtotal 633,507,676,160 bytes Page size 3000 bytes Pages 211,169,225 Ream 500 pages Reams 422,338 Reams Ream height 2” Total height 844,676” Height in feet 70,389 feet Height of Mt Everest 29,029 feet**

Note these figures are conservative!

* http://www.tomshardware.com/news/seagate-hdd-gigabyte-terabyte-quarter-result,13118.html** http://www.teameverest03.org/everest_info/index.html

Page 16: An Introduction to Computer Forensics

Explain what the 'Chain of Custody' is in computer forensics. Furthermore, explain why it is important for forensic examiners to establish 'Chain of Custody' as soon as they arrive on a scene and maintain it throughout the life of a case.

We spent a day discussing computer forensics. How could knowledge of this topic help a human resources manager do their job? How could knowledge of this topic help a police officer do their job?

Page 17: An Introduction to Computer Forensics

Are there any questions?