18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ 07458 FORENSIC SCIENCE An Introduction By Richard Saferstein.

Slides:



Advertisements
Similar presentations
Vocabulary words By: Toyre Jones. Electronic mail which allows individuals with an account to send messages to another person with an account.
Advertisements

The Internet and the Web
® Microsoft Office 2010 Browser and Basics.
BlueRedGreenPurpleOrange.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
The Internet and the World Wide Web. Una DooneyThe Internet and WWWSlide 2 What is the Internet? A collection of networks (LANS and WANS) around the world.
Lesson 19 Internet Basics.
Computer Networks IGCSE ICT Section 4.
The internet and the WWW
* The Internet’s genesis - Defense Department project to create a network that could survive a nuclear conflict * The first users - Government agencies.
With Internet Explorer 8© 2011 Pearson Education, Inc. Publishing as Prentice Hall1 Go! with Internet Explorer 8 Getting Started.
18-1 ©2011, 2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE: An Introduction, 2 nd ed. By Richard Saferstein COMPUTER FORENSICS.
Objectives Overview Discuss the evolution of the Internet
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
The Internet, World Wide Web, and Computer Communication.
The Internet’s Hardware Much of the hardware components that make up the Internet are owned or shared by thousands of private and public organizations.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Chapter 8 The Internet: A Resource for All of Us.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Network Installation. Internet & Intranets Topics to be discussed Internet. Intranet. .
IT Introduction to Information Technology. The Internet & World Wide Web Began in 1969 with the ARPANET (Advanced Research Project Agency Network)
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
Introduction to Internet terms. Topics to Study What is Internet HTTP URL SMS MMS Wi-Fi Video Conferencing Social Webisites.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Forensic and Investigative Accounting Chapter 14 Digital Forensics Analysis © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Communication, Networks, The internet and the Worldwide Web.
Introducing the Internet and The Web Computer Concepts Unit A What Is Internet.
9/4/01Mary Price - The Internet1 9/4/01Mary Price - The Internet 2 T h e I n t e r n e t ? I n t e r n a t i o n a l N e t w o r k.
SETTING UP AN INTERNET NETWORK What you’ll need Your options How does data travel the Internet? Different terminology.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
By Kim Young Jun IGCSE1.  Computer network  Common types of network  Ring, bus, star and tree  Local are networks  Wide are networks  Wireless LANs.
Internet Architecture and Governance
Topic 5: Basic Security.
MSBCS-BCSI-1 Students will identify computer system components MSBCS-BCSIII-8 Students will examine basics of networking Computer Basics & Terminology.
The Internet Teaching Learning Seminar Computer Studies.
XP Browser and Basics COM111 Introduction to Computer Applications.
Networking Basics Objectives: 1. Utilize appropriate vocabulary to communicate effectively in a technological society. 6. Describe uses of a networked.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein FORENSIC SCIENCE AND.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
Ziyad Ibrahim 10DD.  What is Internet? What is Internet?  Who owns the internet? Who owns the internet?  How do you connect to the internet? How do.
THE INTERNET INTRODUCTION TO BUSINESS TECHNOLOGY.
science/internet-intro
The Internet  Define the internet  Discuss advantages of the internet  List requirement needed to access the internet.
Part 2.  Transmission methods used  Bandwidth:  The speed at which Data can be carried.
Computers Are Your Future Eleventh Edition Chapter 6: The Internet and the World Wide Web Copyright © 2011 Pearson Education, Inc. Publishing as Prentice.
Introduction to Networking. What is a Network? Discuss in groups.
18-1 ©2011, 2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE: An Introduction, 2 nd ed. By Richard Saferstein COMPUTER FORENSICS.
Week-3 (Lecture-1). Some Important internet terms: Archie : A program used to search files at FTP sites. There are currently 30 Archie servers in the.
3.1 Types of Servers.
Software Applications for end-users
E-commerce | WWW World Wide Web - Concepts
E-commerce | WWW World Wide Web - Concepts
ICT Communications Lesson 1: Using the Internet and the World Wide Web
Wednesday, September 19, 2018 What Is the Internet?
Modelling the internet
Forensic Science and the Internet Part 1
Modelling the internet
Introduction to Computer Concept
Introduction to computers
(Discussion – The Internet and the World Wide Web)
E-commerce Infrastructure Web Servers / Web Clients / Web Browsers
Chapter 18 FORENSIC SCIENCE ON THE INTERNET
The Internet and Electronic mail
Presentation transcript:

18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein

18-2 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein  The Internet, often referred to as the “information superhighway,” has opened a medium for people to communicate and to access millions of pieces of information from computers located anywhere on the globe.  No subject or profession remains untouched by the Internet, and this is so for forensic science.  A major impact of the Internet will be to bring together forensic scientists from all parts of the world, linking them into one common electronic community.

18-3 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein  The Internet is often described as a “network of networks”  The Internet connects thousands of networks through a modem.  A modem is a device that allows computers to exchange information through telephone lines.  Cable lines help with higher speed connections

18-4 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein  Computers can be linked or networked through wire or wireless (WI-Fi) connections.  Computers that participate in the Internet have a unique numerical Internet Provider (IP) address and usually a name.

18-5 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein  The World Wide Web is a collection of pages stored in the computers.  Each page has a specific web browser that makes his accessible to the public. (They also have a specific URL)  Many web pages can be found by using search engines.  You can search thousands of topics by typing in keywords.

18-6 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein  The service that is most commonly used in conjunction with the Internet is electronic mail ( ).  This communication system can transport messages across the world in a matter of seconds.  In order to send and receive s, you must have an address.

18-7 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein  ž It is important from the investigative standpoint to be familiar with the evidence left behind from a user’s Internet activity.  žA forensic examination of a computer system will reveal quite a bit of data about a user’s Internet activity.

18-8 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein  Evidence of Internet web browsing exists in abundance on the user’s computer.  žThis web browsing Internet cache is a potential source of evidence for the computer investigator.  Even if the files have been deleted, they can still be recovered.  Allows investigators to recreate some or all of a visited webpage.

18-9 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein  žCookies are placed on the local hard disk drive by the web site the user has visited. (only if the website is set up to allow them to be placed.)  žA cookie is used by the web site to track certain information about its visitors.  žThey can store history of visits or purchasing habits, to passwords and personal information used for later visits.

18-10 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein  Most web browsers track the history of web page visits for the computer user.  ž žThe internet history creates a list of websites most recently visited, some storing weeks worth of visits.  ž žThe history file can be located and read with most popular computer forensic software packages.

18-11 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein  ž Another way users can access websites quickly is to store them in their “bookmarks” or “favorite places.”  A bookmark can reveal a person’s interests or hobbies.  It can also reveal any criminal activity that they have saved.

18-12 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein  Computer investigations often begin or are centered around Internet communication.  It may be: › a chat conversation amongst many people, › an instant message conversation between just two individuals, › or the back and forth of an exchange.

18-13 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein  in order to communicate on the Internet a device needs to be assigned an Internet Protocol (IP) address.  žThe IP address is provided by the Internet Service provider from which the device accesses the Internet.  žThis means that the IP address might lead to the identity one specific person, making them valuable to computer investigators everywhere.

18-14 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein  žIP addresses are not always found in the same place.  They may not be seen right away, and it may take some searching to reveal it.  žIn the case of an Instant Message or Chat session, the particular provider would be contacted to provide the users IP address. (an IP address comes in a sequence of numbers. The numbers can be any number from 0 to 255. ex: )

18-15 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein  ž Finding IP addresses may be difficult.  › can be read through a number of clients or software programs.  ›Often the majority of chat and instant message conversations are not saved by the parties involved.  žEach application needs to be researched and the computer forensic examination guided by an expert with an understanding of how it functions.

18-16 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein  Hacking is penetrating another person’s computer without authorization.  A hacker may have many motives:  In some cases the hacker wants information, and other times it’s merely to show off skills.  An employee may also hack a network to do some form of damage to a company

18-17 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein  Generally speaking, when investigating an unauthorized computer intrusion, investigators will concentrate their efforts in three locations: › log files › volatile memory › network traffic

18-18 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein  žLogs will typically document the IP address of the computer that made the connection.  žMost servers that exist on the Internet track connections made to them through the use of logs.  Firewalls might contain logs of who was allowed access to that specific network.  The router might hold log files of connections

18-19 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein  The technique that the computer is hacked with might lead to an identity.  When intruding, the intruder might have to capture volatile data(located in RAM), providing clues to their identity  Data only stores in RAM if connected to power, so pulling the plug could erase all data in RAM.  Data from instant messages may possibly remain.

18-20 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein  An investigator can also document all installed and running programs.  This may lead to discovery of malicious software used to hack the system.  This process involves using special software designed to document these items

18-21 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein  Live network traffic travels in “data packets” and also contain the source and destination IP address.  This is useful if the attack required two way communication.  (ex: A hacker steals data that needs to be transmitted back to his/her computer.)

18-22 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein  To get there, the destination IP address is needed.  Once this is learned, the investigation can focus on that system.  Moreover, the type of data that is being transmitted on the network may be a clue as to what type of attack is being launched, if any important data is being stolen, or types of malicious software, if any, that are involved in the attack.