DIGITAL NOTES ON COMPUTER FORENSICS B.TECH IV YEAR - I SEM (2019-20) DEPARTMENT OF INFORMATION TECHNOLOGY MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY (Autonomous Institution – UGC, Govt. of India) (Affiliated to JNTUH, Hyderabad, Approved by AICTE - Accredited by NBA & NAAC – ‘A’ Grade - ISO 9001:2015 Certified) Maisammaguda, Dhulapally (Post Via. Hakimpet), Secunderabad – 500100, Telangana State, INDIA. MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY UNIT - I Computer Forensics Fundamentals: What is Computer Forensics?,Use of Computer Forensics in Law Enforecement,Computer Forensics Assistance to Human Recources/Employment Proceedings,Computer Forensics Services,Benefits of professional Forensics Methodology,Steps taken by Computer Forensics Specialists. Types of Computer Forensics Technology: - Types of Business Computer Forensic Technology.Types of Military Computer Forensic Technology,Types of Law Enforcement- Computer Forensic Technology,Types of Business Computer Forensic Technology. Computer Forensics Evidence and capture: Data Recovery Defined-Data Back-up and Recovery-The Role of Back -up in Data Recovery-The Data -Recovery Solution. UNIT - II Evidence Collection and Data Seizure: Why Collect Evidence? Collection Options- Obstacles-Types of Evidence-The Rules of Evidence-Volatile Evidence-General Procedure-Collection and Archiving-Methods of Collections-Art facts-Collection Steps -Controlling Contamination: The chain of custody. Duplication and Preservation of Digital Evidence: Preserving the Digital Crime Scene-Computer Evidence processing steps-Legal Aspects of collecting and Preserving Computer forensic Evidence. Computer image Verification and Authentication: Special needs of Evidential Authentication - Practical Consideration-Practical Implementation. UNIT - III Computer forensic analysis and validation: Determining what data to collect and analyze, validating forensic data, addressing data-hiding techniques, performing remote acquisitions Network Forensics: Network forensic overview, performing live acquisitions, developing standar procedures for network forensics, using network tools, examining the honeynet project. Processing crime at incident scenes: Identifying digital evidence, collecting evidence in private-sector incident scenes, processing law enforcement crime scenes, preparing for a search, securing a computer incident or crime scene, seizing digital evidence at the scene, storing digital evidence, obtaining a digital hash, reviewing a case. UNIT - IV Current Computer Forensic Tools: evaluating computer forensic tool needs, computer forensic software tools, computer forensic hardware tools, validating and testing forensic software. E-mail investigations: Exploring the role of email in investigations, exploring the role of client and server in email, investigating email crimes and violations, understanding email servers, using specialized email forensic tools. Cell phone and mobile device forensics: Understanding mobile device forensic, understanding acquisition procedures for cell phones and mobile devices. UNIT - V Working with windows and dos systems: understanding file systems, exploring Microsoft file structures examining NTFS disks, understanding whole disk encryption, windows registry, Microsoft startup tasks, MS Dos startup tasks, virtual machines. TEXT BOOKS: 1. Computer Forensics, Computer Crime Investigation by John R,Vacca, Firewall Media, New Delhi. 2. Computer Forensics and Investigations by Nelson, Phillips Enfinger, Steuart, CENGAGE Learning. REFERENCE BOOKS: 1. Real Digital Forensics by Keith j.Jones, Richard Bejitlich,Curtis W.Rose ,Addison- Wesley Pearson Education 2. Forensic Compiling,A Tractitioneris Guide by Tony Sammes and Brain Jenkinson,Springer International edition. 3. Computer Evidence Collection &Presentation by Chrostopher L.T. Brown,Firewall Media. 4. Homeland Security ,Techniques& Technologies by Jesus Mena,Firewall Media. 5. Software Forensics Collecting Evidence from the Scene of a Digital Crime by Robert M.Slade ,TMH 2005 6. Windows Forensics by chad Steel,Wiley India Edition. MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY INDEX S.NO TOPIC NAME PAGE.NO UNIT-1 1 Computer Forensics Fundamentals 1 2 Types Of Computer Forensic Technology 7 3 Computer Forensics Evidence and capture 14 UNIT-2 4 Evidence Collection and Data Seizure 22 5 Duplication and Preservation of Digital Evidence 31 6 Computer image Verification and Authentication 40 UNIT-3 7 Computer forensic analysis and validation 48 8 Network Forensics 60 9 Processing crime at incident scenes 65 UNIT-4 10 Current Computer Forensic Tools 74 11 E-mail investigations 80 12 Cell phone and mobile device forensics 89 UNIT-5 13 Working with windows and dos systems 94 14 Understanding Whole Disk Encryption 105 15 Virtual Machines 112 MRCET DEPARTMENT OF IT UNIT-1 INTRODUCTION 1.1 WHAT IS COMPUTER FORENSICS? Computer forensics is the process of methodically examining computer media (hard disks, diskettes, tapes, etc.) for evidence. In other words, computer forensics is the collection, preservation, analysis, and presentation of computer-related evidence. Computer forensics also referred to as computer forensic analysis, electronic discovery, electronic evidence discovery, digital discovery, data recovery, data discovery, computer analysis, and computer examination. Computer evidence can be useful in criminal cases, civil disputes, and human resources/ employment proceedings. 1.2 USE OF COMPUTER FORENSICS IN LAW ENFORCEMENT Computer forensics assists in Law Enforcement. This can include: Recovering deleted files such as documents, graphics, and photos. Searching unallocated space on the hard drive, places where an abundance of data often resides. Tracing artifacts, those tidbits of data left behind by the operating system. Our experts know how to find these artifacts and, more importantly, they know how to evaluate the value of the information they find. Processing hidden files — files that are not visible or accessible to the user — that contain past usage information. Often, this process requires reconstructing and analyzing the date codes for each file and determining when each file was created, last modified, last accessed and when deleted. Running a string-search for e-mail, when no e-mail client is obvious. COMPUTER FORENSICS Page 1 MRCET DEPARTMENT OF IT 1.3 COMPUTER FORENSICS ASSISTANCE TO HUMAN RESOURCES / EMPLOYMENT PROCEEDINGS Computers can contain evidence in many types of human resources proceedings, including sexual harassment suits, allegations of discrimination, and wrongful termination claims. Evidence can be found in electronic mail systems, on network servers, and on individual employee’s computers. EMPLOYER SAFEGUARD PROGRAM Employers must safeguard critical business information. An unfortunate concern today is the possibility that data could be damaged, destroyed, or misappropriated by a discontented individual. Before an individual is informed of their termination, a computer forensic specialist should come on-site and create an exact duplicate of the data on the individual’s computer. In this way, should the employee choose to do anything to that data before leaving, the employer is protected. Damaged or deleted data can be re-placed, and evidence can be recovered to show what occurred. This method can also be used to bolster an employer’s case by showing the removal of proprietary information or to protect the employer from false charges made by the employee. You should be equipped to find and interpret the clues that have been left behind. This includes situations where files have been deleted, disks have been reformatted, or other steps have been taken to conceal or destroy the evidence. For example, did you know? What Web sites have been visited? What files have been downloaded? When files were last accessed? Of attempts to conceal or destroy evidence? Of attempts to fabricate evidence? That the electronic copy of a document can contain text that was removed from the final printed version? That some fax machines can contain exact duplicates of the last several hundred pages received? COMPUTER FORENSICS Page 2 MRCET DEPARTMENT OF IT That faxes sent or received via computer may remain on the computer indefinitely? That email is rapidly becoming the communications medium of choice for businesses? That people tend to write things in email that they would never consider writing in a memorandum or letter? That email has been used successfully in criminal cases as well as in civil litigation? That email is often backed up on tapes that are generally kept for months or years? That many people keep their financial records, including investments, on computers? 1.4 COMPUTER FORENSICS SERVICES Computer forensics professionals should be able to successfully perform complex evidence recovery procedures with the skill and expertise that lends credibility to your case. For example, they should be able to perform the following services: 1. DATA SEIZURE Following federal guidelines, computer forensics experts should act as the representative, using their knowledge of data storage technologies to track down evidence. The experts should also be able to assist officials during the equipment seizure process. 2. DATA DUPLICATION/PRESERVATION When one party must seize data from another, two concerns must be addressed: the data must not be altered in any way the seizure must not put an undue burden on the responding
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages118 Page
-
File Size-