Digital Forensics. Hardware components Motherboard Motherboard System bus System bus CPU CPU ROM ROM RAM RAM HDD HDD Input devices Input devices Output.

Slides:



Advertisements
Similar presentations
Review of Chapter 2. Important concepts – The Internet is a worldwide collection of networks that links millions of businesses, government agencies, educational.
Advertisements

Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
By the end of this section, you will know and understand the hardware and software involved in making a LAN!
Computer Basics I Course Outline 1: What is a computer? 2: What is an operating system? Using a Desktop Computer 3: What are the basic parts of a desktop.
How the Internet Works Course Objectives Introduce the various web browsers Introduce some new terms Explain the basic Internet to PC hookup  ISP  Wired.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
Intro to computers Hardware Operating System, Communication Computers PowerHardware Software OS Application COMMUNICATION.
Computer Hardware.
Using The World Wide Web Information Gathering. TCP/IP Communications protocol  how computers communicate or “talk” How does it work?
Capturing Computer Evidence Extracting Information.
* The Internet’s genesis - Defense Department project to create a network that could survive a nuclear conflict * The first users - Government agencies.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
17-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein COMPUTER FORENSICS.
18-1 ©2011, 2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE: An Introduction, 2 nd ed. By Richard Saferstein COMPUTER FORENSICS.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 6 th Edition Teachers Discovering Computers Integrating Technology.
Objectives Overview Discuss the evolution of the Internet
® Microsoft Office 2010 Essential Computer Concepts.
The Internet. What is the Internet?  The Internet is a network of networks.  It gives users access to a wide variety of information from millions of.
Computers Review Computer Science – Hardware, Systems, and Software.
Lesson 2 — The Internet and the World Wide Web
Technology Hardware Internet & WWW. Outline  Hardware  System Unit  CPU  Memory  Ports  Internet  Internet services  WWW  Types of Sites  E-Commerce.
Making Life and Communication Easier Neka Anyaogu.
Computer Forensics An Intro to Computer Crime. Computer Forensics BTK  The BTK Killer ( B lind, T orture, K ill)  Dennis Rader - Feb 2005 Charged with.
Introduction to Engineering and Technology Concepts Unit Five Chapter Five – Computer and Internet Connections.
The Internet and the World Wide Web Renee Roland, Dan Waters, Amelia Wright.
17- PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ CRIMINALISTICS An Introduction to Forensic Science, 9/E By Richard Saferstein.
IT Introduction to Information Technology. The Internet & World Wide Web Began in 1969 with the ARPANET (Advanced Research Project Agency Network)
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
Web Page Design I Basic Computer Terms “How the Internet & the World Wide Web (www) Works”
CHAPTER 9 Using the World Wide Web. OBJECTIVES 1.Describe the Internet and the World Wide Web 2.Define related Internet terms 3.Explain the components.
Computer Forensics Security Services. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission.
Computer Programming How Computers Work
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
1 IT Investigative Tools Tools and Services for the Forensic Auditor.
Communication, Networks, The internet and the Worldwide Web.
200 pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt 400 pt 500 pt 100 pt 200pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt.
Computer Basic Vocabulary
CJ386-Unit 7 Review A questioned document is any material that contains marks, symbols or signs conveying a meaning or message and whose source or authenticity.
Web Forensics Matthew M. Kimball.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein FORENSIC SCIENCE AND.
Chapter 2 Rheachel, Jessica, Megan, and Cassidy Communications, Networks, the Internet, and the World Wide Web.
Jeopardy Template By Mark Roberts © July 2008 Jeopardy LAN/WAN INTERNET HARDWARE NETHICSTERMINOLOGY
The Internet  Define the internet  Discuss advantages of the internet  List requirement needed to access the internet.
By Ellen Glennie & Bella Pearce. The motherboard The motherboard is the main compartment of the computer. The motherboard is the source that everything.
Keyboarding Definitions. CD-Rom A CD-Rom is a compact disc used as a read- only memory device for a computer system. Read-only means you cannot make any.
By: Jordan Hale, McKenzie Kratts, Victoria Lee, and Lakin Burnett.
BTT 10. What is the internet?  A question to all of you…  how-many-people-use-the-internet- more-than-2-billion-infographic/
18-1 ©2011, 2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE: An Introduction, 2 nd ed. By Richard Saferstein COMPUTER FORENSICS.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
Power Point Vocabulary Suarez, Alejandra Per. 6 10/12/13.
Information Technology Chapter 5. What is Information Technology? Information technology is specifically associated with computer-based communication.
Computer Forensics & the Internet The Good and the Bad.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
COMPUTER FORENSICS Intro video. 2 Digital Forensic Science The scientific examination and analysis of digital evidence in such a way that the information.
Basic Computer Vocabulary #2 Ms. Pape-Media Design.
Computer Forensics Security Services.
Computer and Internet Basics
Class Name, Instructor Name
Chapter 18: Computer Forensics 1.
Chapter 1: Computer Systems
(Discussion and WS – Analysis of Electronic Data)
Introduction to computers
(Discussion – The Internet and the World Wide Web)
Thursday April 19, 2018 (Discussion – Storing and Retrieving Data, Processing the Electronic Crime Scene)
Chapter 18 FORENSIC SCIENCE ON THE INTERNET
Chapter 17 COMPUTER FORENSICS.
Computer Terms 1 Terms Internet Terms 1 Internet Terms 2 Computer
Presentation transcript:

Digital Forensics

Hardware components Motherboard Motherboard System bus System bus CPU CPU ROM ROM RAM RAM HDD HDD Input devices Input devices Output devices Output devices

Storing and Retrieving Data OS OS Formatting and Partitioning the HDD Formatting and Partitioning the HDD Mapping the HDD Mapping the HDD Sectors Sectors Clusters Clusters Tracks Tracks Cylinders Cylinders

Documenting the Electronic Crime Scene Document the scene Document the scene Photograph overall layout Photograph overall layout Photograph all connections Photograph all connections Decide on data acquisition method Decide on data acquisition method Forensic Image Acquisition Forensic Image Acquisition Must not alter data in anyway Must not alter data in anyway Can’t just boot up or will alter HDD Can’t just boot up or will alter HDD Remove HDD and place in forensic computer Remove HDD and place in forensic computer Use MD5 or SHA algorithms to fingerprint disk Use MD5 or SHA algorithms to fingerprint disk

Analysis of Electronic Data Visible data Visible data Data/Work product files Data/Work product files Swap file data Swap file data Temporary files Temporary files Latent Data Latent Data Slack space Slack space RAM slack RAM slack File slack File slack Unallocated space Unallocated space Defragmenting Defragmenting Swap files/swap space Swap files/swap space Deleted files Deleted files

The Internet Browsers Browsers URL URL Hypertext Hypertext Bookmark Bookmark Search engines Search engines Mailing lists Mailing lists Newsgroups Newsgroups

The World-Wide Web Internet cache Internet cache Cookies Cookies Internet history Internet history Bookmarks/Favorites Bookmarks/Favorites

Forensic Analysis of Internet Data IP addresses IP addresses , Chat and IM , Chat and IM Hacking Hacking Firewall Firewall

Forensic Investigation of Internet Communications Connections Connections Modem Modem Broadband Broadband DSL DSL Wi-Fi Wi-Fi Routers Routers VoIP VoIP ISPs ISPs IP IP Domains Domains

Forensic Psychiatry/Psychology Psychological testing Psychological testing Rorschach Rorschach Thematic-Apperception Test Thematic-Apperception Test Personality Inventories Personality Inventories Intellectual and Cognitive Assessment Intellectual and Cognitive Assessment Altered State Interviews Altered State Interviews