Computer Forensics

Total Page:16

File Type:pdf, Size:1020Kb

Computer Forensics DIGITAL NOTES ON COMPUTER FORENSICS B.TECH IV YEAR - I SEM (2019-20) DEPARTMENT OF INFORMATION TECHNOLOGY MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY (Autonomous Institution – UGC, Govt. of India) (Affiliated to JNTUH, Hyderabad, Approved by AICTE - Accredited by NBA & NAAC – ‘A’ Grade - ISO 9001:2015 Certified) Maisammaguda, Dhulapally (Post Via. Hakimpet), Secunderabad – 500100, Telangana State, INDIA. MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY UNIT - I Computer Forensics Fundamentals: What is Computer Forensics?,Use of Computer Forensics in Law Enforecement,Computer Forensics Assistance to Human Recources/Employment Proceedings,Computer Forensics Services,Benefits of professional Forensics Methodology,Steps taken by Computer Forensics Specialists. Types of Computer Forensics Technology: - Types of Business Computer Forensic Technology.Types of Military Computer Forensic Technology,Types of Law Enforcement- Computer Forensic Technology,Types of Business Computer Forensic Technology. Computer Forensics Evidence and capture: Data Recovery Defined-Data Back-up and Recovery-The Role of Back -up in Data Recovery-The Data -Recovery Solution. UNIT - II Evidence Collection and Data Seizure: Why Collect Evidence? Collection Options- Obstacles-Types of Evidence-The Rules of Evidence-Volatile Evidence-General Procedure-Collection and Archiving-Methods of Collections-Art facts-Collection Steps -Controlling Contamination: The chain of custody. Duplication and Preservation of Digital Evidence: Preserving the Digital Crime Scene-Computer Evidence processing steps-Legal Aspects of collecting and Preserving Computer forensic Evidence. Computer image Verification and Authentication: Special needs of Evidential Authentication - Practical Consideration-Practical Implementation. UNIT - III Computer forensic analysis and validation: Determining what data to collect and analyze, validating forensic data, addressing data-hiding techniques, performing remote acquisitions Network Forensics: Network forensic overview, performing live acquisitions, developing standar procedures for network forensics, using network tools, examining the honeynet project. Processing crime at incident scenes: Identifying digital evidence, collecting evidence in private-sector incident scenes, processing law enforcement crime scenes, preparing for a search, securing a computer incident or crime scene, seizing digital evidence at the scene, storing digital evidence, obtaining a digital hash, reviewing a case. UNIT - IV Current Computer Forensic Tools: evaluating computer forensic tool needs, computer forensic software tools, computer forensic hardware tools, validating and testing forensic software. E-mail investigations: Exploring the role of email in investigations, exploring the role of client and server in email, investigating email crimes and violations, understanding email servers, using specialized email forensic tools. Cell phone and mobile device forensics: Understanding mobile device forensic, understanding acquisition procedures for cell phones and mobile devices. UNIT - V Working with windows and dos systems: understanding file systems, exploring Microsoft file structures examining NTFS disks, understanding whole disk encryption, windows registry, Microsoft startup tasks, MS Dos startup tasks, virtual machines. TEXT BOOKS: 1. Computer Forensics, Computer Crime Investigation by John R,Vacca, Firewall Media, New Delhi. 2. Computer Forensics and Investigations by Nelson, Phillips Enfinger, Steuart, CENGAGE Learning. REFERENCE BOOKS: 1. Real Digital Forensics by Keith j.Jones, Richard Bejitlich,Curtis W.Rose ,Addison- Wesley Pearson Education 2. Forensic Compiling,A Tractitioneris Guide by Tony Sammes and Brain Jenkinson,Springer International edition. 3. Computer Evidence Collection &Presentation by Chrostopher L.T. Brown,Firewall Media. 4. Homeland Security ,Techniques& Technologies by Jesus Mena,Firewall Media. 5. Software Forensics Collecting Evidence from the Scene of a Digital Crime by Robert M.Slade ,TMH 2005 6. Windows Forensics by chad Steel,Wiley India Edition. MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY INDEX S.NO TOPIC NAME PAGE.NO UNIT-1 1 Computer Forensics Fundamentals 1 2 Types Of Computer Forensic Technology 7 3 Computer Forensics Evidence and capture 14 UNIT-2 4 Evidence Collection and Data Seizure 22 5 Duplication and Preservation of Digital Evidence 31 6 Computer image Verification and Authentication 40 UNIT-3 7 Computer forensic analysis and validation 48 8 Network Forensics 60 9 Processing crime at incident scenes 65 UNIT-4 10 Current Computer Forensic Tools 74 11 E-mail investigations 80 12 Cell phone and mobile device forensics 89 UNIT-5 13 Working with windows and dos systems 94 14 Understanding Whole Disk Encryption 105 15 Virtual Machines 112 MRCET DEPARTMENT OF IT UNIT-1 INTRODUCTION 1.1 WHAT IS COMPUTER FORENSICS? Computer forensics is the process of methodically examining computer media (hard disks, diskettes, tapes, etc.) for evidence. In other words, computer forensics is the collection, preservation, analysis, and presentation of computer-related evidence. Computer forensics also referred to as computer forensic analysis, electronic discovery, electronic evidence discovery, digital discovery, data recovery, data discovery, computer analysis, and computer examination. Computer evidence can be useful in criminal cases, civil disputes, and human resources/ employment proceedings. 1.2 USE OF COMPUTER FORENSICS IN LAW ENFORCEMENT Computer forensics assists in Law Enforcement. This can include: Recovering deleted files such as documents, graphics, and photos. Searching unallocated space on the hard drive, places where an abundance of data often resides. Tracing artifacts, those tidbits of data left behind by the operating system. Our experts know how to find these artifacts and, more importantly, they know how to evaluate the value of the information they find. Processing hidden files — files that are not visible or accessible to the user — that contain past usage information. Often, this process requires reconstructing and analyzing the date codes for each file and determining when each file was created, last modified, last accessed and when deleted. Running a string-search for e-mail, when no e-mail client is obvious. COMPUTER FORENSICS Page 1 MRCET DEPARTMENT OF IT 1.3 COMPUTER FORENSICS ASSISTANCE TO HUMAN RESOURCES / EMPLOYMENT PROCEEDINGS Computers can contain evidence in many types of human resources proceedings, including sexual harassment suits, allegations of discrimination, and wrongful termination claims. Evidence can be found in electronic mail systems, on network servers, and on individual employee’s computers. EMPLOYER SAFEGUARD PROGRAM Employers must safeguard critical business information. An unfortunate concern today is the possibility that data could be damaged, destroyed, or misappropriated by a discontented individual. Before an individual is informed of their termination, a computer forensic specialist should come on-site and create an exact duplicate of the data on the individual’s computer. In this way, should the employee choose to do anything to that data before leaving, the employer is protected. Damaged or deleted data can be re-placed, and evidence can be recovered to show what occurred. This method can also be used to bolster an employer’s case by showing the removal of proprietary information or to protect the employer from false charges made by the employee. You should be equipped to find and interpret the clues that have been left behind. This includes situations where files have been deleted, disks have been reformatted, or other steps have been taken to conceal or destroy the evidence. For example, did you know? What Web sites have been visited? What files have been downloaded? When files were last accessed? Of attempts to conceal or destroy evidence? Of attempts to fabricate evidence? That the electronic copy of a document can contain text that was removed from the final printed version? That some fax machines can contain exact duplicates of the last several hundred pages received? COMPUTER FORENSICS Page 2 MRCET DEPARTMENT OF IT That faxes sent or received via computer may remain on the computer indefinitely? That email is rapidly becoming the communications medium of choice for businesses? That people tend to write things in email that they would never consider writing in a memorandum or letter? That email has been used successfully in criminal cases as well as in civil litigation? That email is often backed up on tapes that are generally kept for months or years? That many people keep their financial records, including investments, on computers? 1.4 COMPUTER FORENSICS SERVICES Computer forensics professionals should be able to successfully perform complex evidence recovery procedures with the skill and expertise that lends credibility to your case. For example, they should be able to perform the following services: 1. DATA SEIZURE Following federal guidelines, computer forensics experts should act as the representative, using their knowledge of data storage technologies to track down evidence. The experts should also be able to assist officials during the equipment seizure process. 2. DATA DUPLICATION/PRESERVATION When one party must seize data from another, two concerns must be addressed: the data must not be altered in any way the seizure must not put an undue burden on the responding
Recommended publications
  • Part 1 Digital Forensics Module Jaap Van Ginkel Silvio Oertli
    Part 1 Digital Forensics Module Jaap van Ginkel Silvio Oertli July 2016 Agenda • Part 1: Introduction – Definitions / Processes • Part 2: Theory in Practice – From planning to presentation • Part 3: Live Forensics – How to acquire a memory image – Investigate the image • Part 4: Advanced Topics – Tools – Where to go from here – And more 2 Disclaimer§ • A one or two-day course on forensics will not make you a forensics expert. – Professionals spend most of their working time performing forensic analysis and thus become an expert. • All we can offer is to shed some light on a quickly developing and broad field and a chance to look at some tools. • We will mostly cover Open Source Forensic Tools. 3 Introduction Forensics in History 4 Forensics – History 2000 BC 1200 BC 5 Introduction Definitions / Processes 6 Forensics – The Field digital forensics Computer Forensics Disk Forensics Mobil Forensics Memory Forensics Datenbase Forensics Live Forensics Network Forensics 7 Forensics - Definition • Digital Forensics [1]: – Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. • Computer Forensics [2]: – Computer forensics (sometimes known as computer forensic science) is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information. 8 Forensics - Definitions • Network Forensics [3]: – Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection.[1] Unlike other areas of digital forensics, network investigations deal with volatile and dynamic information.
    [Show full text]
  • Guidelines on Mobile Device Forensics
    NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Sam Brothers Wayne Jansen http://dx.doi.org/10.6028/NIST.SP.800-101r1 NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Software and Systems Division Information Technology Laboratory Sam Brothers U.S. Customs and Border Protection Department of Homeland Security Springfield, VA Wayne Jansen Booz Allen Hamilton McLean, VA http://dx.doi.org/10.6028/NIST.SP. 800-101r1 May 2014 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. § 3541 et seq., Public Law (P.L.) 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for Federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate Federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in Circular A- 130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in Circular A- 130, Appendix III, Security of Federal Automated Information Resources. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on Federal agencies by the Secretary of Commerce under statutory authority.
    [Show full text]
  • Digital Forensics Concentration
    DIGITAL FORENSICS CONCENTRATION The Digital Forensic concentration is available to students Why Enroll in the at Hilbert College who are interested in learning more about Digital Forensics computer-based information applied to legal matters. The concentration is comprised of three computer courses and 2 Concentration? digital forensic courses, some held in Hilbert’s new, modern Low student/teacher computer laboratory classroom. Together these five courses will ratio in all classes provide more in depth exposure to fundamental principles in the Access to all new l use of computers in legal investigations. This concentration is equipment and available to students in all majors, though it is likely of particular instrumentation interest to students in the Forensic Science/CSI department who Unmatched personal wish to obtain a stronger computer-based foundation than what attention to academic is required for their major. advisement Coursework includes one semester of computer systems Opportunity to learn (covering computer architecture and operating systems), one from top-notch semester of computer networking, one semester of computer professors who have crime investigation (covering procedures and techniques of data real-world experience in a digital forensic recovery involved in criminal investigations), one semester of setting computer forensics (covering data seizure, imaging and analysis) Job search guidance and one semester of Advanced Mobile Device Forensics. All in the profession courses in the concentration are three credits. Additionally, the Expanded job courses in the concentration do not require prior exposure to opportunities after graduation: computers as they are designed to be taken sequentially: initially “According to the introducing students to foundational concepts and material and Department of Labor, progressing to more advanced applications of concepts in later demand is expected to grow 22% over the courses.
    [Show full text]
  • Digital Forensics Based Analysis of Mobile Phones
    Journal of Android and IOS Applications and Testing Volume 4 Issue 3 Digital Forensics Based Analysis of Mobile Phones Pooja V Chavan PG Student, Department of Computer Engineering, K. J. Somaiya College of Engineering, Mumbai, Maharashtra, India Email: [email protected] DOI: Abstract Now-a-day’s ratio of mobile phone is increasing day by day. Digital forensics methodology is use to recover and investigate data that found in a digital devices. Mobile phone usage is more that’s why not only judicial events occurred but also mobile forensics and subdivision of digital forensics are emerged. Some hardware and software are used for mobile phone investigations. Keywords: Digital forensics, digital devices, mobile phone INTRODUCTION because electronic device have a variety of Forensic science’s subdivision is a digital different operating system, technology, forensic, is a one type of process. The storage structure, Features. First identify main objective of this process to find the crime after that digital forensic work evidence in digital devices [1]. Digital on four important steps (Figure 1): forensics are used for the analysis of data, such as audio, video, pictures, etc. After • Collection: The collected of evidence the analysis of electronic devices data that like fingerprints, broken fingernails help for legal process. The usage of blood and body fluids. advanced technology is increasing rapidly. • Examination: The examination of Electronic device have a variety of product process is depending on evidence. like tablet, flash memory, memory card, • Analysis: The crime scenes obtain SD card, etc. When forensic analysis is different digital evidence, analysis is performed at that time data should be done on storage evidence this secure.
    [Show full text]
  • Application of Network Forensics in Identification of Network Traffic
    Published by : International Journal of Engineering Research & Technology (IJERT) http://www.ijert.org ISSN: 2278-0181 Vol. 7 Issue 07, July-2018 Application of Network Forensics in Identification of Network Traffic 1Ajay Sehrawat, 2Neha Shankar Das and 3Praveen Mishra 1 Software Engineer (IT), Regional Centre for Biotechnology, 2M.Tech, GGSIPU, 3Additional Director, ERNET India, Abstract - With the development of the latest technology The use of Network Traffic Analysis can also be seen in interventions in the field of networking, cyber- crimes are security domain. It includes management and monitoring of increasing at a gradual rate. It has led to increase in online packets from source IP address to destination IP port crimes and attacks in which malicious packets are being sent to number. It takes amount of packets sent in consideration to other hosts. Network Traffic Analysis comes under Network check flow of consistency in network. Network forensics is Forensics which is one of the classifications of Cyber Forensics that deals with capturing, recording, monitoring and analysis defined in [11] as “capturing, monitoring and scrutiny of of network traffic. Keeping this in view, the paper describes the network events in order to determine the cause of security need of network forensics and its aspects. The paper proposes a attacks and other problem incidents”. It can be said that model for network traffic analysis which is useful for detecting Network Forensics is a branch of digital forensics which is malicious packets received from intruders. studied to examine the network traffic so that attacks and malicious activities can be discovered. There is difference Keywords: Network Forensics, Network Monitoring and Network between computer forensics and digital forensics.
    [Show full text]
  • Current and Future Trends in Mobile Device Forensics: a Survey
    Current and Future Trends in Mobile Device Forensics: A Survey KONSTANTIA BARMPATSALOU, TIAGO CRUZ, EDMUNDO MONTEIRO, and PAULO SIMOES, Centre for Informatics and Systems of the University of Coimbra, Department of Informatics (CISUC/DEI), University of Coimbra, Portugal Contemporary mobile devices are the result of an evolution process, during which computational and networking capabilities have been continuously pushed to keep pace with the constantly growing workload requirements. This has allowed devices such as smartphones, tablets and Personal Digital Assistants (PDAs) to perform increasingly complex tasks, up to the point of efficiently replacing traditional options such as desktop computers and notebooks. However, due to their portability and size, these devices are more prone to theft, to become compromised or to be exploited for attacks and other malicious activity. The need for investigation of the aforementioned incidents resulted in the creation of the Mobile Forensics (MF) discipline. MF, a sub-domain of Digital Forensics (DF), is specialized in extracting and processing evidence from mobile devices in such a way that attacking entities and actions are identified and traced. Beyond its primary research interest on evidence acquisition from mobile devices, MF has recently expanded its scope to encompass the organized and advanced evidence representation and analysis of future malicious entity behavior. Nonetheless, data acquisition still remains its main focus. While the field is under continuous research activity, new concepts such as the involvement of Cloud Computing in the MF ecosystem and the evolution of enterprise mobile solutions – particularly Mobile Device Management (MDM) and Bring Your Own Device (BYOD) – bring new opportunities and issues to the discipline.
    [Show full text]
  • A User-Oriented Network Forensic Analyser: the Design of a High- Level Protocol Analyser
    Edith Cowan University Research Online Australian Digital Forensics Conference Conferences, Symposia and Campus Events 2014 A user-oriented network forensic analyser: The design of a high- level protocol analyser D Joy Plymouth University F Li Plymouth University N L. Clarke Edith Cowan University S M. Furnell Edith Cowan University Follow this and additional works at: https://ro.ecu.edu.au/adf Part of the Computer Engineering Commons, and the Information Security Commons DOI: 10.4225/75/57b3e511fb87f 12th Australian Digital Forensics Conference. Held on the 1-3 December, 2014 at Edith Cowan University, Joondalup Campus, Perth, Western Australia. This Conference Proceeding is posted at Research Online. https://ro.ecu.edu.au/adf/135 A USER-ORIENTED NETWORK FORENSIC ANALYSER: THE DESIGN OF A HIGH-LEVEL PROTOCOL ANALYSER D. Joy1, F. Li1, N.L. Clarke1,2 and S.M. Furnell1,2 1Centre for Security, Communications and Network Research (CSCAN) Plymouth University, Plymouth, United Kingdom 2Security Research Institute, Edith Cowan University, Western Australia [email protected] Abstract Network forensics is becoming an increasingly important tool in the investigation of cyber and computer- assisted crimes. Unfortunately, whilst much effort has been undertaken in developing computer forensic file system analysers (e.g. Encase and FTK), such focus has not been given to Network Forensic Analysis Tools (NFATs). The single biggest barrier to effective NFATs is the handling of large volumes of low-level traffic and being able to exact and interpret forensic artefacts and their context – for example, being able extract and render application-level objects (such as emails, web pages and documents) from the low-level TCP/IP traffic but also understand how these applications/artefacts are being used.
    [Show full text]
  • Hacking Exposed Computer Forensics, Second Edition, Delivers the Most Valuable Insight on the Market
    HACKING EXPOSED™ COMPUTER FORENSICS SECOND EDITION REVIEWS “This book provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties all the complex pieces together with real-world case studies. With so many books on the topic of computer forensics, Hacking Exposed Computer Forensics, Second Edition, delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic investigations.” —Brian H. Karney, COO, AccessData Corporation “Hacking Exposed Computer Forensics is a ‘must-read’ for information security professionals who want to develop their knowledge of computer forensics.” —Jason Fruge, Director of Consulting Services, Fishnet Security 00-FM.indd i 8/23/2009 3:54:42 AM “Computer forensics has become increasingly important to modern incident responders attempting to defend our digital castles. Hacking Exposed Computer Forensics, Second Edition, picks up where the first edition left off and provides a valuable reference, useful to both beginning and seasoned forensic professionals. I picked up several new tricks from this book, which I am already putting to use.” —Monty McDougal, Raytheon Information Security Solutions, and author of the Windows Forensic Toolchest (WFT) (www.foolmoon.net) “Hacking Exposed Computer Forensics, Second Edition, is an essential reference for both new and seasoned investigators. The second edition continues to provide valuable information in a format that is easy to understand and reference.” —Sean Conover, CISSP, CCE, EnCE “This book is an outstanding point of reference for computer forensics and certainly a must-have addition to your forensic arsenal.” —Brandon Foley, Manager of Enterprise IT Security, Harrah’s Operating Co.
    [Show full text]
  • Purpose of Computer and Network Forensics
    Purpose of Computer and Network Forensics Table of Contents Purpose of Computer and Network Forensics ................................................................................ 2 What Is Digital Forensics? ............................................................................................................... 3 Need for Digital Forensics -1 ........................................................................................................... 4 Need for Digital Forensics -2 ........................................................................................................... 6 Purpose of Digital Forensics ............................................................................................................ 8 Notices .......................................................................................................................................... 12 Page 1 of 12 Purpose of Computer and Network Forensics Purpose of Computer and Network Forensics 4 **004 Okay. So we'll start out with the purpose of computer and network forensics. Page 2 of 12 What Is Digital Forensics? What Is Digital Forensics? As defined in NIST Guide to Integrating Forensic Techniques into Incident Response: “Application of science to the identification, collection, examination, and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody for the data” Also known as or called computer forensics and network forensics, and includes mobile device forensics All better called one term: Digital
    [Show full text]
  • Winter 2016 E-Newsletter
    WINTER 2016 E-NEWSLETTER At Digital Mountain we assist our clients with their e-discovery, computer forensics and cybersecurity needs. With increasing encryption usage and the recent news of the government requesting Apple to provide "backdoor" access to iPhones, we chose to theme this E-Newsletter on the impact data encryption has on attorneys, litigation support professionals and investigators. THE SHIFTING LANDSCAPE OF DATA ENCRYPTION TrueCrypt, a free on-the-fly full disk encryption product, was the primary cross-platform solution for practitioners in the electronic discovery and computer forensics sector. Trusted and widely adopted, TrueCrypt’s flexibility to perform either full disk encryption or encrypt a volume on a hard drive was an attractive feature. When TrueCrypt encrypted a volume, a container was created to add files for encryption. As soon as the drive was unmounted, the data was protected. The ability to add a volume to the original container, where any files or the folder structure could be hidden within an encrypted volume, provided an additional benefit to TrueCrypt users. However, that all changed in May 2014 when the anonymous team that developed TrueCrypt decided to retire support for TrueCrypt. The timing of TrueCrypt’s retirement is most often credited to Microsoft’s ending support of Windows XP. The TrueCrypt team warned users that without support for Windows XP, TrueCrypt was vulnerable. Once support for TrueCrypt stopped, trust continued to erode as independent security audits uncovered specific security flaws. In the wake of TrueCrypt’s demise, people were forced to look for other encryption solutions. TrueCrypt’s website offered instructions for users to migrate to BitLocker, a full disk encryption program available in certain editions of Microsoft operating systems beginning with Windows Vista.
    [Show full text]
  • Truecrypt Containers Is No Longer Hidden As Passware Kit Now Detects Hard Disk Images
    Contact: Nataly Koukoushkina Passware Inc. +1 (650) 472-3716 ext. 101 [email protected] Data Inside TrueCrypt Containers is No Longer Hidden as Passware Kit Now Detects Hard Disk Images The new Passware Kit scans computers and finds all encrypted containers and hard disk images, such as TrueCrypt, BitLocker, and PGP Mountain View, Calif. (May 20, 2013) – Passware, Inc., a provider of password recovery, decryption, and electronic evidence discovery software for computer forensics, law enforcement organizations, government agencies, and private investigators, announces that Passware Kit Forensic v.12.5 can now recognize hard disk images and containers, such as TrueCrypt, BitLocker, PGP, etc. during a computer scan. For a computer forensic professional this means that no evidence is hidden inside a volume. During a computer scan, which typically takes less than an hour, Passware Kit Forensic displays all encrypted files and hard disk partition images. Previously, there was no way to identify quickly an encrypted container on a file system where important data could be hidden. “One of the major obstacles in any digital investigation is the ability to examine the contents of password-protected files and hard disks,” said Dmitry Sumin, CEO of Passware, Inc. “Today more than ever, digital evidence plays an important role in many criminal investigations and Passware is often the password recovery and decryption software of choice. We allow computer forensic professionals to conduct a thorough investigation by easily identifying, detecting, and decrypting hidden files. The latest version of Passware Kit Forensic extends the success of such investigations with the ability to find all encrypted volumes on a suspect’s computer.” The latest release of Passware Kit Forensic now ensures that no evidence is hidden, as it provides users with a list of all encrypted containers, hard disk partition images, and files that look similar to containers.
    [Show full text]
  • Graduate Prospectus2014 Institute of Space Technology
    Graduate Prospectus2014 Institute of Space Technology we HELP YOU ACHIEVE YOUR AMBITIONS P R O S P E C T U S 2 141 INSTITUTE OF SPACE TECHNOLOGY w w w . i s t . e d u . p k To foster intellectual and economic vitality through teaching, research and outreach in the field of Space Science & Technology with a view to improve quality of life. www.ist.edu.pk 2 141 P R O S P E C T U S INSTITUTE OF SPACE TECHNOLOGY CONTENTS Welcome 03 Location 04 Introduction 08 The Institute 09 Facilities 11 Extra Curricular Activities 11 Academic Programs 15 Department of Aeronautics and Astronautics 20 Local MS Programs 22 Linked Programs with Beihang University 31 Linked Programs with Northwestern Polytechnic University 49 Department of Electrical Engineering 51 Local MS Programs 53 Linked Programs with University of Surrey 55 Department of Materials Science & Engineering 72 Department of Mechanical Engineering 81 Department of Remote Sensing & Geo-information Science 100 w w w . i s t . e d u . p k Department of Space Science 106 ORIC 123 Admissions 125 Fee Structure 127 Academic Regulations 130 Faculty 133 Administration 143 Location Map 145 1 20 P R O S P E C T U S 2 141 INSTITUTE OF SPACE TECHNOLOGY w w w . i s t . e d u . p k 2 141 P R O S P E C T U S INSTITUTE OF SPACE TECHNOLOGY Welcome Message Vice Chancellor The Institute of Space Technology welcomes all the students who aspire to enhance their knowledge and specialize in cutting edge technologies.
    [Show full text]