Slide khóa học pháp lý chương 2 understanding computer investigations

56 4 0
Slide khóa học pháp lý chương 2 understanding computer investigations

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

.c om du o ng th an co ng Guide to Computer Forensics and Investigations Fourth Edition cu u Chapter Understanding Computer Investigations CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Objectives cu u du o ng th an co ng • Explain how to prepare a computer investigation • Apply a systematic approach to an investigation • Describe procedures for corporate high-tech investigations • Explain requirements for data recovery workstations and software • Describe how to conduct an investigation • Explain how to complete and critique a case CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om ng co cu u du o ng th an Preparing a Computer Investigation CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Preparing a Computer Investigation ng th an co ng • Role of computer forensics professional is to gather evidence to prove that a suspect committed a crime or violated a company policy • Collect evidence that can be offered in court or at a corporate inquiry cu u du o – Investigate the suspect’s computer – Preserve the evidence on a different computer CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Preparing a Computer Investigation (continued) co ng • Follow an accepted procedure to prepare a case • Chain of custody cu u du o ng th an – Route the evidence takes from the time you find it until the case is closed or goes to court CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om An Overview of a Computer Crime ng • Computers can contain information that helps law enforcement determine: an co – Chain of events leading to a crime – Evidence that can lead to a conviction ng th • Law enforcement officers should follow proper procedure when acquiring the evidence u du o – Digital evidence can be easily altered by an overeager investigator cu • Information on hard disks might be password protected CuuDuongThanCong.com https://fb.com/tailieudientucntt cu u du o ng th an co ng c om Examining a Computer Crime CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om An Overview of a Company Policy Violation an co ng • Employees misusing resources can cost companies millions of dollars • Misuse includes: cu u du o ng th – Surfing the Internet – Sending personal e-mails – Using company computers for personal tasks CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om ng co an cu u du o ng th Taking a Systematic Approach CuuDuongThanCong.com https://fb.com/tailieudientucntt ng • Steps for problem solving c om Taking a Systematic Approach cu u du o ng th an co – Make an initial assessment about the type of case you are investigating – Determine a preliminary design or approach to the case – Create a detailed checklist – Determine the resources you need – Obtain and copy an evidence disk drive CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om ng co cu u du o ng th an Understanding Data Recovery Workstations and Software CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Understanding Data Recovery Workstations and Software ng th an co ng • Investigations are conducted on a computer forensics lab (or data-recovery lab) • Computer forensics and data-recovery are related but different • Computer forensics workstation du o – Specially configured personal computer – Loaded with additional bays and forensics software cu u • To avoid altering the evidence use: – Forensics boot floppy disk OR cd – Write-blocker devices CuuDuongThanCong.com https://fb.com/tailieudientucntt ng co an th cu u du o ng • Connects a hard drive in trusted read-only mode • There are also Linux boot CDs that mount all drives read-only, such as Helix and some Knoppix distributions c om Write Blocker CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Setting Up your Computer for Computer Forensics • Basic requirements ng • Like FTK Imager th an co ng – A workstation running Windows XP or Vista – A write-blocker device – Computer forensics acquisition tool u • Like FTK du o – Computer forensics analysis tool cu – Target drive to receive the source or suspect disk data – Spare PATA or SATA ports – USB ports CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Setting Up your Computer for Computer Forensics (continued) u du o ng th an co Network interface card (NIC) Extra USB ports FireWire 400/800 ports SCSI card Disk editor tool Text editor tool Graphics viewer program Other specialized viewing tools cu – – – – – – – – ng • Additional useful items CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om ng co an cu u du o ng th Conducting an Investigation CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Conducting an Investigation co – – – – – ng • Gather resources identified in investigation plan • Items needed cu u du o ng th an Original storage media Evidence custody form Evidence container for the storage media Bit-stream imaging tool Forensic workstation to copy and examine your evidence – Securable evidence locker, cabinet, or safe CuuDuongThanCong.com https://fb.com/tailieudientucntt u du o ng th an co Meet the IT manager to interview him Fill out the evidence form, have the IT manager sign Place the evidence in a secure container Complete the evidence custody form Carry the evidence to the computer forensics lab Create forensics copies (if possible) Secure evidence by locking the container cu – – – – – – – ng • Avoid damaging the evidence • Steps c om Gathering the Evidence CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Understanding Bit-Stream Copies • Bit-stream copy du o ng th an co ng – Bit-by-bit copy of the original storage medium – Exact copy of the original disk – Different from a simple backup copy • Backup software only copies known files (active data) • Backup software cannot copy deleted files, e-mail messages or recover file fragments cu u • Bit-stream image – File containing the bit-stream copy of all data on a disk or partition – Also known as forensic copy CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Understanding Bit-stream Copies (continued) cu u du o ng th an co ng • Copy image file to a target disk that matches the original disk’s manufacturer, size and model CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Acquiring an Image of Evidence Media • First rule of computer forensics ng – Preserve the original evidence an co • Conduct your analysis only on a copy of the data cu u du o ng th • We’ll skip the ProDiscover section of the textbook, which is on pages 48-58 CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om ng co an cu u du o ng th Completing the Case CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Completing the Case • You need to produce a final report ng – State what you did and what you found ng th an co • Include report generated by your forensic tool to document your work • Repeatable findings du o – Repeat the steps and produce the same result, using different tools cu u • If required, use a report template • Report should show conclusive evidence – Suspect did or did not commit a crime or violate a company policy CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Critiquing the Case ng • Ask yourself the following questions: cu u du o ng th an co – How could you improve your performance in the case? – Did you expect the results you found? Did the case develop in ways you did not expect? – Was the documentation as thorough as it could have been? – What feedback has been received from the requesting source? CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Critiquing the Case (continued) ng • Ask yourself the following questions (continued): cu u du o ng th an co – Did you discover any new problems? If so, what are they? – Did you use new techniques during the case or during research? CuuDuongThanCong.com https://fb.com/tailieudientucntt ... abuse investigations th – To conduct an investigation you need: u du o ng Organization’s Internet proxy server logs Suspect computer? ??s IP address Suspect computer? ??s disk drive Your preferred computer. .. on a computer forensics lab (or data-recovery lab) • Computer forensics and data-recovery are related but different • Computer forensics workstation du o – Specially configured personal computer. .. du o ng th an Preparing a Computer Investigation CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Preparing a Computer Investigation ng th an co ng • Role of computer forensics professional

Ngày đăng: 27/09/2021, 17:26

Tài liệu cùng người dùng

Tài liệu liên quan