1. Trang chủ
  2. » Cao đẳng - Đại học

Slide khóa học pháp lý chương 2 understanding computer investigations

56 4 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 56
Dung lượng 1,4 MB

Nội dung

.c om du o ng th an co ng Guide to Computer Forensics and Investigations Fourth Edition cu u Chapter Understanding Computer Investigations CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Objectives cu u du o ng th an co ng • Explain how to prepare a computer investigation • Apply a systematic approach to an investigation • Describe procedures for corporate high-tech investigations • Explain requirements for data recovery workstations and software • Describe how to conduct an investigation • Explain how to complete and critique a case CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om ng co cu u du o ng th an Preparing a Computer Investigation CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Preparing a Computer Investigation ng th an co ng • Role of computer forensics professional is to gather evidence to prove that a suspect committed a crime or violated a company policy • Collect evidence that can be offered in court or at a corporate inquiry cu u du o – Investigate the suspect’s computer – Preserve the evidence on a different computer CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Preparing a Computer Investigation (continued) co ng • Follow an accepted procedure to prepare a case • Chain of custody cu u du o ng th an – Route the evidence takes from the time you find it until the case is closed or goes to court CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om An Overview of a Computer Crime ng • Computers can contain information that helps law enforcement determine: an co – Chain of events leading to a crime – Evidence that can lead to a conviction ng th • Law enforcement officers should follow proper procedure when acquiring the evidence u du o – Digital evidence can be easily altered by an overeager investigator cu • Information on hard disks might be password protected CuuDuongThanCong.com https://fb.com/tailieudientucntt cu u du o ng th an co ng c om Examining a Computer Crime CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om An Overview of a Company Policy Violation an co ng • Employees misusing resources can cost companies millions of dollars • Misuse includes: cu u du o ng th – Surfing the Internet – Sending personal e-mails – Using company computers for personal tasks CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om ng co an cu u du o ng th Taking a Systematic Approach CuuDuongThanCong.com https://fb.com/tailieudientucntt ng • Steps for problem solving c om Taking a Systematic Approach cu u du o ng th an co – Make an initial assessment about the type of case you are investigating – Determine a preliminary design or approach to the case – Create a detailed checklist – Determine the resources you need – Obtain and copy an evidence disk drive CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om ng co cu u du o ng th an Understanding Data Recovery Workstations and Software CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Understanding Data Recovery Workstations and Software ng th an co ng • Investigations are conducted on a computer forensics lab (or data-recovery lab) • Computer forensics and data-recovery are related but different • Computer forensics workstation du o – Specially configured personal computer – Loaded with additional bays and forensics software cu u • To avoid altering the evidence use: – Forensics boot floppy disk OR cd – Write-blocker devices CuuDuongThanCong.com https://fb.com/tailieudientucntt ng co an th cu u du o ng • Connects a hard drive in trusted read-only mode • There are also Linux boot CDs that mount all drives read-only, such as Helix and some Knoppix distributions c om Write Blocker CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Setting Up your Computer for Computer Forensics • Basic requirements ng • Like FTK Imager th an co ng – A workstation running Windows XP or Vista – A write-blocker device – Computer forensics acquisition tool u • Like FTK du o – Computer forensics analysis tool cu – Target drive to receive the source or suspect disk data – Spare PATA or SATA ports – USB ports CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Setting Up your Computer for Computer Forensics (continued) u du o ng th an co Network interface card (NIC) Extra USB ports FireWire 400/800 ports SCSI card Disk editor tool Text editor tool Graphics viewer program Other specialized viewing tools cu – – – – – – – – ng • Additional useful items CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om ng co an cu u du o ng th Conducting an Investigation CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Conducting an Investigation co – – – – – ng • Gather resources identified in investigation plan • Items needed cu u du o ng th an Original storage media Evidence custody form Evidence container for the storage media Bit-stream imaging tool Forensic workstation to copy and examine your evidence – Securable evidence locker, cabinet, or safe CuuDuongThanCong.com https://fb.com/tailieudientucntt u du o ng th an co Meet the IT manager to interview him Fill out the evidence form, have the IT manager sign Place the evidence in a secure container Complete the evidence custody form Carry the evidence to the computer forensics lab Create forensics copies (if possible) Secure evidence by locking the container cu – – – – – – – ng • Avoid damaging the evidence • Steps c om Gathering the Evidence CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Understanding Bit-Stream Copies • Bit-stream copy du o ng th an co ng – Bit-by-bit copy of the original storage medium – Exact copy of the original disk – Different from a simple backup copy • Backup software only copies known files (active data) • Backup software cannot copy deleted files, e-mail messages or recover file fragments cu u • Bit-stream image – File containing the bit-stream copy of all data on a disk or partition – Also known as forensic copy CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Understanding Bit-stream Copies (continued) cu u du o ng th an co ng • Copy image file to a target disk that matches the original disk’s manufacturer, size and model CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Acquiring an Image of Evidence Media • First rule of computer forensics ng – Preserve the original evidence an co • Conduct your analysis only on a copy of the data cu u du o ng th • We’ll skip the ProDiscover section of the textbook, which is on pages 48-58 CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om ng co an cu u du o ng th Completing the Case CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Completing the Case • You need to produce a final report ng – State what you did and what you found ng th an co • Include report generated by your forensic tool to document your work • Repeatable findings du o – Repeat the steps and produce the same result, using different tools cu u • If required, use a report template • Report should show conclusive evidence – Suspect did or did not commit a crime or violate a company policy CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Critiquing the Case ng • Ask yourself the following questions: cu u du o ng th an co – How could you improve your performance in the case? – Did you expect the results you found? Did the case develop in ways you did not expect? – Was the documentation as thorough as it could have been? – What feedback has been received from the requesting source? CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Critiquing the Case (continued) ng • Ask yourself the following questions (continued): cu u du o ng th an co – Did you discover any new problems? If so, what are they? – Did you use new techniques during the case or during research? CuuDuongThanCong.com https://fb.com/tailieudientucntt ... abuse investigations th – To conduct an investigation you need: u du o ng Organization’s Internet proxy server logs Suspect computer? ??s IP address Suspect computer? ??s disk drive Your preferred computer. .. on a computer forensics lab (or data-recovery lab) • Computer forensics and data-recovery are related but different • Computer forensics workstation du o – Specially configured personal computer. .. du o ng th an Preparing a Computer Investigation CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Preparing a Computer Investigation ng th an co ng • Role of computer forensics professional

Ngày đăng: 27/09/2021, 17:26