Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Criminal evidence marjie t britz

18/11/2021 Client: muhammad11 Deadline: 2 Day

Computer Forensics and Cyber Crime

CHAPTER

Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Computer Forensics: Terminology and Requirements

10

Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Learning Objectives

Learn some of the problems associated with computer investigation.
Gain insight on how computer disks are structured.
Be able to discuss the means in which computers store data.
Explore the types of data recovery methods which agencies use today.
Develop a working knowledge of FAT and its importance to computer investigation.
Learn the five categories of software that can be used in computer investigation.
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Computer Forensics – An Emerging Discipline

New Police Techniques and Strategies

New Patterns of Criminal Behavior

New Technology

Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Computer Forensics – An Emerging Discipline

Necessary to maintain integrity of evidence
Maintaining a chain of custody
Ensuring that viruses are not introduced to a suspect machine during analysis
Ensuring that evidence remains in an unaltered state
Goal: Protect digital evidence from possible alterations, damage, data corruption, or infection by design or carelessness
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Traditional Problems in Computer Investigations

Many echo problems with criminal investigations in general.
Inadequate resources
For local law enforcement, increased responsibilities and dwindling budgets, decreasing chances of taking advantage of limited educational opportunities
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Traditional Problems in Computer Investigations

Lack of communication and cooperation among agencies
Forced alliances may not achieve much success
Overreliance on automated programs and self-proclaimed experts
Great need equals great expectations for any efforts?
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Traditional Problems in Computer Investigations

Lack of reporting
Due to perception of incompetence of law enforcement, low rate of reporting by victims
Exacerbated by corporate advisors' self-serving, discouraging take on the process
Belief that law enforcement lacks sufficient resources
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Traditional Problems in Computer Investigations

Evidence Corruption – Cardinal Rules of Computer Investigations
Always work from an image, leaving the original hard drive unaltered.
Document, document, document.
Maintain the chain of custody.
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Disk Structure and Digital Evidence

Terms to know:

Operating systems
Hardware
Software
Firmware
Computer
Static memory
Volatile memory (cache, RAM)
Nonvolatile storage
Computer storage
Primary storage
Secondary storage
Floppy disks or diskettes
CD-ROMs
CD-RWs
Hard/fixed disks
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Disk Structure and Digital Evidence

Disk Structure and Data Storage

Drives
Physical: Devices and data at the electronic or machine level
Physical file size: Actual space that the file occupies on a disk
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Disk Structure and Digital Evidence

Logical: Allocated parts of a physical drive that are designated and managed as independent units; most important in computer forensics
Logical file size: The exact size of a file in bytes

Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Disk Structure and Digital Evidence

Terms

Bits
Tracks
Cylinder
Sectors
Shaft
Head
Actuator arm
Platters
Spindle
ASCII
Binary system
Hexadecimal system
Clusters (aka file allocation units)
Compressed files
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Disk Structure and Digital Evidence

Partition Table

File Systems
FAT: File Allocation Table (FAT16, FAT32)
NTFS (creates fragments; may involve an encrypting file system [EFS])
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Disk Structure and Digital Evidence

Firmware – Operating Instructions

Not only hardware

Terms

BIOS (Basic Input/Output System)
Initial commands about bootstrap loader (using boot sector/absolute sector 0)
POST (Power-on self-test)
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Disk Structure and Digital Evidence

Data integrity
Cyclical redundancy checksum (CRC), a tool for validation
MD5-Hash, a verification tool
Hashkeeper, software that lists known files
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Developing Computer Forensic Science Capabilities

Standard Operating Procedure (SOP) are constantly changing due to advances in technology.
Should be clearly articulated and readily available
Consisting of appropriate software, hardware, special investigating procedures
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Housing Requirements

Need to have secure, clean facilities suitable for conducting forensic analysis

Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Hardware Requirements

Lab systems

Basic: Bare-bones equipment
Better: But can handle only single-tasking workloads
Power: Capable of handling larger workloads simultaneously
Dream: The best system available
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Hardware Requirements

Evidence storage drive
Operating system
Display
Uninterruptible power supply
Write blocker
Scanner
Printer
Evidence backup
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Hardware Requirements

Considerations
Type of computer
Processor speed
Memory
Network
I/O interfaces
Optical drive
OS drive
Evidence storage drive
Operating system
Write blocker
Battery
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Software Requirements

Data Preservation, Duplication, and Verification Tools

Critical role played by imaging programs
Pick at least two that are comfortable
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Software Requirements

To comply with NIST standards, this tool ought to:
Be capable of making a bitstream duplicate or an image of an original disk or partition onto fixed or removable media
Not alter the original disk
Be able to access both IDE and SCSI disks
Be able to verify the integrity of a disk image file
Log I/O errors
Provide substantial documentation
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Software Requirements

Data Recovery Extraction Utilities

Physical involves:
Keyword-searching
File-carving
Extraction of the partition table and unused space on the physical drive
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Software Requirements

Logical involves:
Extraction of the file system information to reveal characteristics (i.e., file names, file size, file location, attributes, etc).
Data reduction to identify and eliminate known files through the comparison of calculated hash values to authenticated hash values
Extraction of pertinent files
Recovery of deleted files
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Software Requirements

Extraction of password protected, encrypted, & compressed data
Extraction of file slack
Extraction of unallocated space
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Software Requirements

General categories of data analysis software:
Indexing
Text-searching
viewers
Time frame analysis
Application analysis
Will need to use:
File viewers, often with child pornography cases
Text-searching software for words, phrases, and strings appropriate to a each case
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Software Requirements

Reporting software should generate a report containing the following, at a minimum:
Lab’s name, address, and contact information
Date of report
Name, signature, and address of the investigator and investigative agency
Case number
Case information – Suspect(s), victim(s), alleged offense
Lab case identifier
Evidence Log – Date and receipt of evidence, seizure details, etc.
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Software Requirements

Physical description of items evaluated
Methods, procedures, products, and/or software used in the analysis
Results of the examination
Conditions affecting the results, where applicable
Basis of opinions and interpretations of results, where applicable
Case-specific information requested by investigator
Statement of compliance or noncompliance with certain specifications or other requirements (as applicable to interpretations)
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Minimum Software Requirements

Miscellaneous software
Presentation applications (i.e., PowerPoint, etc.)
Word processing applications
Spreadsheet applications
Wiping software
Antivirus software
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

A Sampling of Popular Forensic Software

Guidance Software (EnCase Forensic), especially version with password crackers
Also makes an imaging/verification hardware device: FastBloc
Access Data (Ultimate Toolkit), compatible with EnCase, Snapback and Safeback
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

A Sampling of Popular Forensic Software

Other forensic utilities
Imaging & verification: ByteBack, Safeback
Wiping programs: Maresware’s DECLASFY, Access Data’s WipeDrive – both meet Department of Defense's rigorous standards
Unix: Data Dumper (dd), Grep, The Coroner’s Toolkit
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Conclusions

Guarding against poorly run investigations, due in part to administrative apathy and inadequate resources, lack of appropriate training
Need to satisfy forensic computer science capabilities
Aim for collaboration with civilian experts and corporate entities, when appropriate
Need to meet certain minimum requirements, including equipment and housing

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Calculation Guru
Best Coursework Help
Professional Coursework Help
Assignment Solver
Top Essay Tutor
Online Assignment Help
Writer Writer Name Offer Chat
Calculation Guru

ONLINE

Calculation Guru

I am an experienced researcher here with master education. After reading your posting, I feel, you need an expert research writer to complete your project.Thank You

$42 Chat With Writer
Best Coursework Help

ONLINE

Best Coursework Help

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$44 Chat With Writer
Professional Coursework Help

ONLINE

Professional Coursework Help

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$25 Chat With Writer
Assignment Solver

ONLINE

Assignment Solver

I have done dissertations, thesis, reports related to these topics, and I cover all the CHAPTERS accordingly and provide proper updates on the project.

$39 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$39 Chat With Writer
Online Assignment Help

ONLINE

Online Assignment Help

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$24 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Snagit not recording microphone - Chapter 2 - Kitchen equipment word search - Exploring language 13th edition pdf - Read and write - Angular speed to linear speed - What is modular growth in plants - Healthcare gov project management case study - Police and Patrol paper - Ancestors poem peter skrzynecki - What is a teel paragraph - Through _____, marketers ascertain the need for new goods and services. - Mkt 421 perceptual map presentation - Rocky mountain chocolate factory case solution - Write answer without negative exponents - What is an epiphany moment - Compute the required sales in dollars to break even - Followership and servant leadership compare and contrast - TOPIC: Atrial Fibrillation disease detection using Convolutional neural networks - What is the south african government providing and to whom - I am dragon english subtitles - Human resource - Civil Aviation Security - Timken bearing damage analysis poster - Financial Statements, Financial Statement Analysis & Break-even, Financial and Operating Leverages - Adult education and the social media revolution - Generalized Anxiety Disorder - Run lola run film analysis - Terminology of informative essays answer key - Special right triangles find the missing side lengths - Please help with paper - Cold war yahoo answers - Kinetic bike trainer maintenance - Comparing the articles of confederation and the constitution - Type out what I need to say on the video - Bergerac systems - If one root of 5x2 13x k 0 is reciprocal - Beer lambert equation units - Words that start with od - Pride and prejudice marriage scene - Jack welch transformational leadership style - I have read and acknowledge example - Секретная служба санта клауса на английском - City west homes lisson green - 18181 n 59th ln glendale az 85308 - Winter solstice hilda morley analysis - Types of control feedforward concurrent feedback - Minimal pairs l and r final position - Country of origin codes - Ethos in the gettysburg address - SPEECH - Tesco aims and objectives - Sap new dimensional products - World civilizations the global experience 7th edition outlines - Contemporary asian america a multidisciplinary reader pdf - Wentworth kitchens sutton coldfield - Management finance - Miles converted into kilometers - St francis rc church maidstone - Prismaflex crrt return blood - American government - Ikea invades america case study pdf - How cultures affect team management ppt - Managing operations across the supply chain pdf download - Architecture scholarship essay - Rutherford scattering simulation answers - The jilting of granny weatherall theme - Www cut the knot org pythagoras pentagon construction - WOMEN’S CLINIC +27717852514 % ABORTION PILLS FOR SALE IN, PRETORIA, SHOSHANGUVE, ATTERIDGEVILLE, PRETORIA WEST, LAUDIUM, WITBANK - compare and contrast methods for evaluating evidence - Two years are better than four - Help - Conveyor pulley diameter calculation - John lesa and tabir form a limited liability company - Postulates and theorems of boolean algebra - Andrew jackson's letter to the cherokee - Embraced by the needle outline - Nurses and policy evaluation - Viavi onx 620 manual - Sex matters 4th edition pdf - Applicant self service cambridge - Equation of diameter of parabola - Cerium sulfate solubility curve - Edfenergy com myaccount sme - Atlas steel carbon steel pipe - Midterm - Accenture application delivery approaches - Goodnight mister tom characters - Business process manual template - Goldair 10l evaporative cooler - Six Minute speech - Deputy principal salary nsw - Western gazette yeovil obituaries - Drexel university abbreviation - Holy communion for the dying crossword clue 7 letters - Assignment(Operations management in supply chain - What is the theme of a sorrowful woman - Bras for charity freepost - Project Management Paper - 4 pages - Data Science and Big Data