Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Criminal evidence marjie t britz

18/11/2021 Client: muhammad11 Deadline: 2 Day

Computer Forensics and Cyber Crime

CHAPTER

Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Computer Forensics: Terminology and Requirements

10

Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Learning Objectives

Learn some of the problems associated with computer investigation.
Gain insight on how computer disks are structured.
Be able to discuss the means in which computers store data.
Explore the types of data recovery methods which agencies use today.
Develop a working knowledge of FAT and its importance to computer investigation.
Learn the five categories of software that can be used in computer investigation.
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Computer Forensics – An Emerging Discipline

New Police Techniques and Strategies

New Patterns of Criminal Behavior

New Technology

Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Computer Forensics – An Emerging Discipline

Necessary to maintain integrity of evidence
Maintaining a chain of custody
Ensuring that viruses are not introduced to a suspect machine during analysis
Ensuring that evidence remains in an unaltered state
Goal: Protect digital evidence from possible alterations, damage, data corruption, or infection by design or carelessness
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Traditional Problems in Computer Investigations

Many echo problems with criminal investigations in general.
Inadequate resources
For local law enforcement, increased responsibilities and dwindling budgets, decreasing chances of taking advantage of limited educational opportunities
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Traditional Problems in Computer Investigations

Lack of communication and cooperation among agencies
Forced alliances may not achieve much success
Overreliance on automated programs and self-proclaimed experts
Great need equals great expectations for any efforts?
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Traditional Problems in Computer Investigations

Lack of reporting
Due to perception of incompetence of law enforcement, low rate of reporting by victims
Exacerbated by corporate advisors' self-serving, discouraging take on the process
Belief that law enforcement lacks sufficient resources
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Traditional Problems in Computer Investigations

Evidence Corruption – Cardinal Rules of Computer Investigations
Always work from an image, leaving the original hard drive unaltered.
Document, document, document.
Maintain the chain of custody.
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Disk Structure and Digital Evidence

Terms to know:

Operating systems
Hardware
Software
Firmware
Computer
Static memory
Volatile memory (cache, RAM)
Nonvolatile storage
Computer storage
Primary storage
Secondary storage
Floppy disks or diskettes
CD-ROMs
CD-RWs
Hard/fixed disks
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Disk Structure and Digital Evidence

Disk Structure and Data Storage

Drives
Physical: Devices and data at the electronic or machine level
Physical file size: Actual space that the file occupies on a disk
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Disk Structure and Digital Evidence

Logical: Allocated parts of a physical drive that are designated and managed as independent units; most important in computer forensics
Logical file size: The exact size of a file in bytes

Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Disk Structure and Digital Evidence

Terms

Bits
Tracks
Cylinder
Sectors
Shaft
Head
Actuator arm
Platters
Spindle
ASCII
Binary system
Hexadecimal system
Clusters (aka file allocation units)
Compressed files
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Disk Structure and Digital Evidence

Partition Table

File Systems
FAT: File Allocation Table (FAT16, FAT32)
NTFS (creates fragments; may involve an encrypting file system [EFS])
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Disk Structure and Digital Evidence

Firmware – Operating Instructions

Not only hardware

Terms

BIOS (Basic Input/Output System)
Initial commands about bootstrap loader (using boot sector/absolute sector 0)
POST (Power-on self-test)
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Disk Structure and Digital Evidence

Data integrity
Cyclical redundancy checksum (CRC), a tool for validation
MD5-Hash, a verification tool
Hashkeeper, software that lists known files
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Developing Computer Forensic Science Capabilities

Standard Operating Procedure (SOP) are constantly changing due to advances in technology.
Should be clearly articulated and readily available
Consisting of appropriate software, hardware, special investigating procedures
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Housing Requirements

Need to have secure, clean facilities suitable for conducting forensic analysis

Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Hardware Requirements

Lab systems

Basic: Bare-bones equipment
Better: But can handle only single-tasking workloads
Power: Capable of handling larger workloads simultaneously
Dream: The best system available
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Hardware Requirements

Evidence storage drive
Operating system
Display
Uninterruptible power supply
Write blocker
Scanner
Printer
Evidence backup
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Hardware Requirements

Considerations
Type of computer
Processor speed
Memory
Network
I/O interfaces
Optical drive
OS drive
Evidence storage drive
Operating system
Write blocker
Battery
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Software Requirements

Data Preservation, Duplication, and Verification Tools

Critical role played by imaging programs
Pick at least two that are comfortable
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Software Requirements

To comply with NIST standards, this tool ought to:
Be capable of making a bitstream duplicate or an image of an original disk or partition onto fixed or removable media
Not alter the original disk
Be able to access both IDE and SCSI disks
Be able to verify the integrity of a disk image file
Log I/O errors
Provide substantial documentation
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Software Requirements

Data Recovery Extraction Utilities

Physical involves:
Keyword-searching
File-carving
Extraction of the partition table and unused space on the physical drive
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Software Requirements

Logical involves:
Extraction of the file system information to reveal characteristics (i.e., file names, file size, file location, attributes, etc).
Data reduction to identify and eliminate known files through the comparison of calculated hash values to authenticated hash values
Extraction of pertinent files
Recovery of deleted files
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Software Requirements

Extraction of password protected, encrypted, & compressed data
Extraction of file slack
Extraction of unallocated space
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Software Requirements

General categories of data analysis software:
Indexing
Text-searching
viewers
Time frame analysis
Application analysis
Will need to use:
File viewers, often with child pornography cases
Text-searching software for words, phrases, and strings appropriate to a each case
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Software Requirements

Reporting software should generate a report containing the following, at a minimum:
Lab’s name, address, and contact information
Date of report
Name, signature, and address of the investigator and investigative agency
Case number
Case information – Suspect(s), victim(s), alleged offense
Lab case identifier
Evidence Log – Date and receipt of evidence, seizure details, etc.
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Software Requirements

Physical description of items evaluated
Methods, procedures, products, and/or software used in the analysis
Results of the examination
Conditions affecting the results, where applicable
Basis of opinions and interpretations of results, where applicable
Case-specific information requested by investigator
Statement of compliance or noncompliance with certain specifications or other requirements (as applicable to interpretations)
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Software Requirements

Miscellaneous software
Presentation applications (i.e., PowerPoint, etc.)
Word processing applications
Spreadsheet applications
Wiping software
Antivirus software
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

A Sampling of Popular Forensic Software

Guidance Software (EnCase Forensic), especially version with password crackers
Also makes an imaging/verification hardware device: FastBloc
Access Data (Ultimate Toolkit), compatible with EnCase, Snapback and Safeback
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

A Sampling of Popular Forensic Software

Other forensic utilities
Imaging & verification: ByteBack, Safeback
Wiping programs: Maresware’s DECLASFY, Access Data’s WipeDrive – both meet Department of Defense's rigorous standards
Unix: Data Dumper (dd), Grep, The Coroner’s Toolkit
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Conclusions

Guarding against poorly run investigations, due in part to administrative apathy and inadequate resources, lack of appropriate training
Need to satisfy forensic computer science capabilities
Aim for collaboration with civilian experts and corporate entities, when appropriate
Need to meet certain minimum requirements, including equipment and housing

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Calculation Guru
Best Coursework Help
Professional Coursework Help
Assignment Solver
Top Essay Tutor
Online Assignment Help
Writer Writer Name Offer Chat
Calculation Guru

ONLINE

Calculation Guru

I am an experienced researcher here with master education. After reading your posting, I feel, you need an expert research writer to complete your project.Thank You

$42 Chat With Writer
Best Coursework Help

ONLINE

Best Coursework Help

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$44 Chat With Writer
Professional Coursework Help

ONLINE

Professional Coursework Help

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$25 Chat With Writer
Assignment Solver

ONLINE

Assignment Solver

I have done dissertations, thesis, reports related to these topics, and I cover all the CHAPTERS accordingly and provide proper updates on the project.

$39 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$39 Chat With Writer
Online Assignment Help

ONLINE

Online Assignment Help

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$24 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Cmv colitis treatment uptodate - ?? same-day +27833173182 QACHA'S NEK ABORTION CLINIC // PILLS,,,, - Brownson evidence based public health - HomeWork and Project - Eco 550 week 5 problem set - Main events in the story into thin air - Conflict Resolution Case Study - Access control procedure guide - Compare the market simples lab - Grim reaper skulls and pentagrams hourglass sand timer - Beaconsfield road surgery widnes - 1000base sx has a maximum throughput of ____ - Net working capital increases when - Project - Adulteration in chilli powder project - Blue eyes brown eyes experiment psychology - Handbook of informatics for nurses & healthcare professionals pdf - Comcast new channel lineup - Disturbed family process care plan - Migi-hidari artist of the floating world - Write a discussion- Ensuring Public Safety - Rookwood v for vendetta - Mary ann hoberman poems - Moody corporation uses a job order costing system - Data information knowledge wisdom in nursing informatics - Absolute power to control the internet and its content - Guyan machinery a west virginia manufacturing corporation - Can starch pass through dialysis tubing - Work place violence - Business - Bobby jorgenson the things they carried - Assignment on financial statement ratio analysis - Ibm rational doors training ppt - Vnxe3200 latest firmware version - Discussion Questions - Discussion - MATH MID TERM HELP ASAP **DUE IN 2 HOURS** - Nau mai ki te ao - WK 9 Assignment - 3000 ml in litres - MAJOR MINERALS AND WATER - Royal holloway personal statement - Business management ee examples - Msc in economics and policy of energy and the environment - Fredholm alternative linear algebra - Please watch the following video and comment. - Park crescent surgery brighton - Common body parts of animals - Mcdonald's recently made productivity gains by cutting the - Shamoo and resnik 2003 - 5 elements of management - Ethical Decision Making Paper - Social learning - What is sub saharan africa's largest lake - Failing a class at gcu - Mutual agency implies that each partner in a partnership - Woolworths my driver induction - Carnival corporation & plc swot analysis - Vigyan prasar radio serial - Hp alm client registration - Critical thinking activities - Foreign sales agents film - Challenger sales methodology wikipedia - Public Admistration - 6 skill related components of fitness - D3 - Toole - University of bradford referencing - Aircraft safety wire procedures - Irobot case study - The great elephant census video - Conservation of energy in charge interactions - Nick and the candlestick - Stage left and right - Metal pegs home depot - Information Technology Importance in Strategic Planning - Rkbgrkbrt - Ib areas of interaction - ESSAY - Nur340vulnerable populationchoice - I sing because you are good - Similarities between academic and business writing - Week 4 - Blocking between roof rafters - Security+ guide to network security fundamentals fourth edition answers - Elements of business letter - How is imago dei relevant to health care - Portable gaming devices 2017 - Wide range achievement test iv - Metropolis tokyo free magazine - The ksp of calcium hydroxide lab - ORG THEORY Journal Article Summary 5# - Journal Reflection - 3 weaknesses of the articles of confederation - Diatribe of bilge meaning - Qualitative analysis of cations and anions answers - Example of a ballad - Organizational needs and strengths assessment - Discussion 7 - Sex without love summary