CSE 469: Computer and Network Forensics
CSE 469: Computer and Network Forensics
- Dr. Mike Mabey | Spring 2019
CSE 469: Computer and Network Forensics Topic 1: Forensics Intro - - PowerPoint PPT Presentation
CSE 469: Computer and Network Forensics Topic 1: Forensics Intro Dr. Mike Mabey | Spring 2019 CSE 469: Computer and Network Forensics General Forensic Science CSE 469: Computer and Network Forensics Definition Forensic Science is the
CSE 469: Computer and Network Forensics
CSE 469: Computer and Network Forensics
CSE 469: Computer and Network Forensics
3
CSE 469: Computer and Network Forensics
4
CSE 469: Computer and Network Forensics
5
CSE 469: Computer and Network Forensics
6
CSE 469: Computer and Network Forensics
7
CSE 469: Computer and Network Forensics
8
CSE 469: Computer and Network Forensics
9
CSE 469: Computer and Network Forensics
10
CSE 469: Computer and Network Forensics
11
CSE 469: Computer and Network Forensics
12
CSE 469: Computer and Network Forensics
13
CSE 469: Computer and Network Forensics
CSE 469: Computer and Network Forensics
technology plays an important, and ofuen a necessary, part.
computer?
criminal activity
pornography
sniffers, unauthorized access
traffickers
15
CSE 469: Computer and Network Forensics
16
CSE 469: Computer and Network Forensics
17
CSE 469: Computer and Network Forensics
18
CSE 469: Computer and Network Forensics
February of 2011 and July of 2013, the FBI says, earning Dread Pirate Roberts $79.8 million in commissions using current Bitcoin rates.
Road Marketplace, arrested by the FBI on Oct 1, 2013.
19
CSE 469: Computer and Network Forensics
Other Underground Markets Fake IDs Rent-A-Botnet Ads
20
CSE 469: Computer and Network Forensics
21
From Gary Kessler at Champlain College
CSE 469: Computer and Network Forensics
breached information be used against:
22
CSE 469: Computer and Network Forensics
23
CSE 469: Computer and Network Forensics
24
much.
Source: Simson Garfinkel’s slides for his paper “Digital Forensics Research: The Next 10 Years”, available on the DFRWS website.
CSE 469: Computer and Network Forensics
incomplete and ofuen flawed
codes to define crimes that involve computers
25
CSE 469: Computer and Network Forensics
26
XP
to a single subject
The Golden Age of Digital Forensics: 1999-2007
Source: Simson Garfinkel’s slides for his paper “Digital Forensics Research: The Next 10 Years”, available on the DFRWS website.
CSE 469: Computer and Network Forensics
27
The Golden Age of Digital Forensics: 1999-2007
Source: Simson Garfinkel’s slides for his paper “Digital Forensics Research: The Next 10 Years”, available on the DFRWS website.
CSE 469: Computer and Network Forensics
28
services with important data.
data, RAM-based malware, and new legal challenges.
Source: Simson Garfinkel’s slides for his paper “Digital Forensics Research: The Next 10 Years”, available on the DFRWS website.
CSE 469: Computer and Network Forensics
29
to validate tools against thousands of phones or millions of apps, no standard extraction protocols.
RAID controllers, GPU, motherboard...
Source: Simson Garfinkel’s slides for his paper “Digital Forensics Research: The Next 10 Years”, available on the DFRWS website.
CSE 469: Computer and Network Forensics
CSE 469: Computer and Network Forensics
NOTE: The data might be
file structure
31
CSE 469: Computer and Network Forensics
collection of computer evidence for judicial purposes.
identification, extraction, documentation and interpretation of computer data.
Essentials
32
CSE 469: Computer and Network Forensics
to the U.S. Constitution
residence, and property from search and seizure.
33
CSE 469: Computer and Network Forensics
34
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
CSE 469: Computer and Network Forensics
35
CSE 469: Computer and Network Forensics
36
CSE 469: Computer and Network Forensics
37
CSE 469: Computer and Network Forensics
system.
space.
38
CSE 469: Computer and Network Forensics
39
available for reuse
CSE 469: Computer and Network Forensics
40
CSE 469: Computer and Network Forensics
41
CSE 469: Computer and Network Forensics
CSE 469: Computer and Network Forensics
CSE 469: Computer and Network Forensics
local city, county, tribal, state/province, and federal.
44
CSE 469: Computer and Network Forensics
incomplete and ofuen flawed.
criminal codes to define crimes that involve computers.
45
CSE 469: Computer and Network Forensics
case.
46
CSE 469: Computer and Network Forensics
47
CSE 469: Computer and Network Forensics
by criminal law or the Fourth Amendment...
behavior and conduct in the workplace.
48
CSE 469: Computer and Network Forensics
the investigation.
49
CSE 469: Computer and Network Forensics
systems.
company property.
50
CSE 469: Computer and Network Forensics
51
CSE 469: Computer and Network Forensics
CSE 469: Computer and Network Forensics
53
CSE 469: Computer and Network Forensics
54
CSE 469: Computer and Network Forensics
55
CSE 469: Computer and Network Forensics
circumstances, setting the context for the events being examined so as to avoid “any confusion or wrongful impression.”
may require introduction of additional evidence “to be considered contemporaneously with the [evidence]
Information Institute at Cornell University Law School. URL: https://www.law.cornell.edu/wex/doctrine_of_completeness.
56
CSE 469: Computer and Network Forensics
57
CSE 469: Computer and Network Forensics
58
CSE 469: Computer and Network Forensics
(e.g., owner, group, file permission, or access privilege settings).
59
CSE 469: Computer and Network Forensics
CSE 469: Computer and Network Forensics
the original data or scene.
the original data.
61
CSE 469: Computer and Network Forensics
62
CSE 469: Computer and Network Forensics
63
CSE 469: Computer and Network Forensics
What?
Relationships Issues
Systems
64
CSE 469: Computer and Network Forensics
understand.
Note: The textbook has an entire chapter (14) dedicated to report writing... that’s how important it is!
65
CSE 469: Computer and Network Forensics
the original data or scene.
same as the original data.
66
CSE 469: Computer and Network Forensics
67
CSE 469: Computer and Network Forensics
68
CSE 469: Computer and Network Forensics
69
CSE 469: Computer and Network Forensics
70
CSE 469: Computer and Network Forensics
71
CSE 469: Computer and Network Forensics
72
Initial Assessment Planning Resource Determination Evidence Acquisition & Authentication Risk Management & Investigation Reporting & Evaluation
CSE 469: Computer and Network Forensics
73
Initial Assessment Planning Resource Determination Evidence Acquisition & Authentication Risk Management & Investigation Reporting & Evaluation
CSE 469: Computer and Network Forensics
74
CSE 469: Computer and Network Forensics
75
employer’s computer
he’s been spending too much time on his own business and not performing his assigned work duties …
the employee’s assigned computer
CSE 469: Computer and Network Forensics
76
Initial Assessment Planning Resource Determination Evidence Acquisition & Authentication Risk Management & Investigation Reporting & Evaluation
CSE 469: Computer and Network Forensics
77
custody
container
CSE 469: Computer and Network Forensics
78
CSE 469: Computer and Network Forensics
79
Single-Evidence Form
CSE 469: Computer and Network Forensics
Chain-of- Evidence Form
CSE 469: Computer and Network Forensics
81
CSE 469: Computer and Network Forensics
82
Initial Assessment Planning
Resource Determination
Evidence Acquisition & Authentication Risk Management & Investigation Reporting & Evaluation
CSE 469: Computer and Network Forensics
83
bag)
CSE 469: Computer and Network Forensics
84
Initial Assessment Planning Resource Determination
Evidence Acquisition & Authentication
Risk Management & Investigation Reporting & Evaluation
CSE 469: Computer and Network Forensics
85
CSE 469: Computer and Network Forensics
86
Initial Assessment Planning Resource Determination Evidence Acquisition & Authentication Risk Management & Investigation Reporting & Evaluation
CSE 469: Computer and Network Forensics
87
Investigation: Discovery, Extraction, and Analysis
saved on the same physical location
CSE 469: Computer and Network Forensics
88
Initial Assessment Planning Resource Determination Evidence Acquisition & Authentication Risk Management & Investigation Reporting & Evaluation
CSE 469: Computer and Network Forensics
89
company policy
CSE 469: Computer and Network Forensics
90
Initial Assessment Planning Resource Determination Evidence Acquisition & Authentication Risk Management & Investigation Reporting & Evaluation