computer forensics security services. copyright © texas education agency 2012. all rights reserved....

32
Computer Forensi Security Services

Upload: abner-potter

Post on 12-Jan-2016

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

Computer ForensicsSecurity Services

Page 2: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

2Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Copyright and Terms of Service

Copyright © Texas Education Agency, 2011. These materials are copyrighted © and trademarked ™ as the property of the Texas Education Agency (TEA) and may not be reproduced without the express written permission of TEA, except under the following conditions:

1)  Texas public school districts, charter schools, and Education Service Centers may reproduce and use copies of the Materials and Related Materials for the districts’ and schools’ educational use without obtaining permission from TEA.

2)  Residents of the state of Texas may reproduce and use copies of the Materials and Related Materials for individual personal use only, without obtaining written permission of TEA.

3)  Any portion reproduced must be reproduced in its entirety and remain unedited, unaltered and unchanged in any way.

4)  No monetary charge can be made for the reproduced materials or any document containing them; however, a reasonable charge to cover only the cost of reproduction and distribution may be charged.

Private entities or persons located in Texas that are not Texas public school districts, Texas Education Service Centers, or Texas charter schools or any entity, whether public or private, educational or non-educational, located outside the state of Texas MUST obtain written approval from TEA and will be required to enter into a license agreement that may involve the payment of a licensing fee or a royalty.

Contact TEA Copyrights with any questions you may have.

Page 3: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

3Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Computer Forensics Introduction

• Computer forensics– The acquisition, extraction, preservation, and

interpretation of computer data– Includes many devices that are capable of storing

data

• Hardware is the physical material that creates a computer

• Software are the programs and applications that carry out a set of instructions on the hardware

Page 4: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

4Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Elements of Hardware

• Computer Case/Chassis • Power Supply • Motherboard • System Bus • Read Only Memory (ROM) • Random Access Memory

(RAM) • Central Processing Unit (CPU) • Hard Disk Drive (HDD)

• Input Devices – Keyboard – Mouse – Joy Stick – Scanner

• Output Devices – Monitor – Printer – Speakers

Page 5: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

5Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Data Storage and Retrieval

• Examiners must be familiar with the file system they are examining

• Evidence may be found in various computer locations and formats

• There are two categories for data-related evidence:– Visible data– Latent data

• The formatting process initializes portions of the hard drive so that it can store data, and it creates the structure of the file system

Page 6: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

6Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Data Storage and Retrieval (continued)

• Different operating systems map out (partition) HDDs in different manners

• RAM• Sector – the smallest unit of data addressable by

a hard disk drive, generally consisting of 512 bytes (Saferstein, 2009)

• Cluster – a group of sectors in multiples of two, typically the minimum space allocated in a file (Saferstein, 2009)

Page 7: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

7Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Processing the Computerized Crime Scene • Similar to processing a traditional crime scene (i.e.

warrants, documentation, investigation techniques)• Documentation is a significant component in the

computerized crime scene– The scene should be initially documented in as much

detail as possible before any evidence is moved and examined

– Crime scene documentation is accomplished through two actions:• Sketching • Photographing

Page 8: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

8Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Processing the Computerized Crime Scene (continued)

• After documentation is complete, a label should be placed on the cord of each peripheral, with a corresponding label placed on the port to which it is connected

• At a computerized crime scene most, if not all of the equipment will be seized, but before the peripherals are disconnected from the computer, a decision must be made about whether or not a live acquisition of the data is necessary (i.e. shutdown or unplug the computer)

Page 9: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

9Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Forensic Image Acquisition

• After the crime scene has been processed, the computer needs to be analyzed

• All electronic devices will be processed in the same manner

• The examination process that the forensic investigator uses on the computer must be intrusive

• All evidence (data) must be obtained without altering or destroying it

Page 10: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

10Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Forensic Image Acquisition (continued)

• Because booting a HDD to its operating system changes many files and could destroy evidentiary data, the data is generally obtained by removing the HDD from the system and placing it in a laboratory forensic computer so that a forensic image can be created

• Occasionally, in cases with specialized or unique equipment/systems the image of the HDD must be obtained by using the seized computer

• The examiner must be able to extract all forensic data/images and cause no changes to the HDD

Page 11: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

11Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Forensic Image Acquisition (continued)

• A signature or fingerprint of the drive is taken before and after imaging– This fingerprint is created by using a Message Digest 5

(MD5), a Secure Hash Algorithm (SHA) or a similarly validated algorithm

– Before imaging the drive the algorithm is run and a 32-character alphanumeric string is produced based on the drive’s contents

– The same algorithm is then run against the created forensic image which will result in the same alphanumeric string if none of the original content is changed

Page 12: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

12Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Visible Data

• Data from a computer that is openly visible and easily available to users

• Can encompass (from an evidentiary standpoint) any type of user-created data like–Word processing documents – Spreadsheets– Accounting records– Databases– Pictures

Page 13: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

13Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Visible Data (continued)

• Advances in printer technology have made high quality color printing affordable and common, which creates criminal opportunities– Counterfeiting– Check Fraud– Document Fraud

Page 14: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

14Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Visible Data (continued)

• Most criminal cases involving computers relate to financial investigations (or white collar crimes) which require any data related to personal and business finance

• Investigators must become familiar with the various computer applications that are used for criminal activities

• The ability to recognize the data produced by these applications and to display the images is essential to identifying the evidence

Page 15: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

15Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Temporary Files

• Can be valuable as evidence• Can sometimes be recovered during a forensic

examination including some of the data that may have been altered from a previous version

• Can be recovered when created through unsaved means (such as a computer being shut off manually)

Page 16: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

16Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Temporary Files (continued)

• Most programs automatically save a temporary copy of the file in progress

• After working on a file or document, the user can save the changes, which promotes the temporary copy to a saved (or actual) file

Page 17: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

17Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Temporary Files (continued)

• Another type of temporary file valuable to the computer investigator is the printer spool–When a print job is sent to the printer a spooling

process delays the sending of the data so the application can continue to work while the printing takes place in the background

–When the print job occurs, a temporary print spool file is created

– This file contains a copy of all of the data from the printer

Page 18: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

18Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Latent Data

• The areas of files and disks that are typically not apparent to the computer user (and often not to the operating system), but contain data nonetheless (Saferstein, 2009); the data which the operating system has hidden

• One of the reasons a forensic image of the media is created is because a standard copy only captures the logical data (that which the operating system is aware)

• Can be evidentiary data

Page 19: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

19Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Latent Data (continued)

• Includes the data in the– Swap space (used to conserve the valuable RAM

within the computer system)– RAM slack – the area from the end of the logical

file to the end of the sector– File slack – the remaining area from the end of the

final sector containing data to the end of the cluster– Unallocated space – the space on a hard drive that

contains available space; the space may also contain temporary and deleted files

Page 20: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

20Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Defragmenting/Swap File/Swap Space

• Defragmenting a HDD involves reconnecting noncontiguous data

• The HDD has minimum space reservation requirements (i.e. a file might require 100 bytes of space, but the operating system allocates much more)

• If a file grows past the allocated amount, another cluster is required

Page 21: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

21Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Defragmenting/Swap File/Swap Space (continued)

• If a different file occupies the next cluster, the operating system must find another place for the first file on the drive

• The file is said to be fragmented because data for the same file is contained in noncontiguous clusters

• The constant shuffling of data through deletion, defragmentation, swapping, etc., is one of the ways data is orphaned in latent areas

Page 22: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

22Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Defragmenting/Swap File/Swap Space (continued)

• Fragmentation of numerous files can degrade the performance of an HDD, causing the read/write heads to have to traverse the platters to locate the data

• The constant read and write operations of RAM cause a constant change in the swap file or swap space

Page 23: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

23Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Deleted Files

• Another source of latent data to be examined by forensic investigators

• The actions that occur when a file is deleted vary among file systems

• When a user deletes files, the data typically remains behind

• Data will remain in the computer even though attempts are made to delete it

• When files in a Recycle Bin are deleted, the data remains there as well, until it is overwritten

Page 24: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

24Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

The Internet

• A computer network that provides information globally (also called the “information superhighway”)

• Affects all subjects and professions including law enforcement and security services

• Can be considered a series of networks• Includes various methods of connection

– Wire• Modem • Cable lines or DSL telephone lines

– Wireless (Wi-Fi)

• Each computer that connects to the Internet has a unique numerical Internet Provider (IP) address and usually a name

Page 25: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

25Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

The World Wide Web

• The most popular area of the Internet• Considered a depository of information stored

in the computers connected to the Internet across the world

• Web browsers allow the user to search all the information available on the web and retrieve any web pages the viewer wishes to explore

Page 26: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

26Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

The World Wide Web (continued)

• Several directories and indexes on the Internet, known as search engines, are available to assist the user in locating a particular topic from the hundreds of thousands of web sites located on the Internet

• Keywords or phrases entered into a search engine will locate sites on the Internet that are relevant to that subject

• Commercial Internet service providers connect computers to the Internet while offering the user an array of options

Page 27: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

27Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Electronic mail (e-mail)

• The service most commonly used in conjunction with the Internet

• Carries messages across the world in a matter of seconds

Page 28: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

28Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Internet Crimes

• There are more cybercriminals than available law enforcement agents

• Cybercriminals feel safe committing crimes in a “comfort zone” and often from the privacy of their own homes

• Law enforcement faces new challenges with Internet crimes– Most law enforcement officers are not trained in the

technologies– Internet crimes span multiple jurisdictions– There is a need to retrofit new crimes to existing laws

Page 29: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

29Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Internet Crimes (continued)

• Computers are used to commit a variety of crimes– Identity theft – Fraud– Industrial espionage – Child pornography– Harassment– Gambling– Piracy– Computer viruses and spam

Page 30: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

30Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Internet Crimes (continued)

• There are numerous methods and techniques criminals use to hide their crimes and evidence, which include– Deleting files and emails– Hiding files with encryption– Password protection– Embedding information in unrelated files– Using WI-FI networks and cyber cafes to cover

tracks

Page 31: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

31Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Internet Crimes (continued)

• The task of forensic investigators includes– Restoring deleted files and emails– Finding the hidden files through complex

password encryption programs and searching techniques

– Tracking criminals through the digital trail — IP addresses, to ISPs, to the offender

Page 32: Computer Forensics Security Services. Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission

32Copyright © Texas Education Agency 2012. All rights reserved.Images and other multimedia content used with permission. 

Resources

• 0135158494, Forensic Science: From the Crime Scene to the Crime Lab, Richard Saferstein, Prentice Hall, 2008

• 0205592406, Introduction to Private Security: Theory Meets Practice, Cliff Roberson and Michael L. Birzer, Prentice Hall, 2009

• 0750684321, Introduction to Security, Robert J. Fischer and Gion Green, Butterworth-Heinemann, 2008

• Investigator/Officer’s Personal Experience