CSN11121/CSN11122 System Administration and Forensics
Introduction to Digital Forensic 20/10/2011
r.ludwiniak@napier.ac.uk
CSN11121/CSN11122 System Administration and Forensics Introduction - - PowerPoint PPT Presentation
CSN11121/CSN11122 System Administration and Forensics Introduction to Digital Forensic 20/10/2011 r.ludwiniak@napier.ac.uk Lecture Objectives 1. History and definition of Digital Forensics 2. Context for an investigation 3. An overview of
r.ludwiniak@napier.ac.uk
The use of scientifically derived and proven methods towards the preservation, collection, validation, identification, analysis, interpretation, documentation, and presentation of digital evidence derived from the digital sources for the purpose
facilitation
furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations.
Primary Objectives Secondary Objectives Environment Law Enforcement Prosecution Post-Mortem Military IW Ops Continuity of Operations Prosecution Real-Time/Post- Mortem Business and Industry Continuity of Service Prosecution Real-Time/Post- Mortem
A digital investigation is a process where we develop and test hypotheses that answer questions about digital events. This is done using the scientific method where we develop a hypothesis using evidence that we find and then test the hypothesis by looking for additional evidence that shows the hypothesis is impossible. Digital Evidence is a digital object that contains reliable information that supports or refutes a hypothesis.
File System Forensic Analysis,
cc by-sa, Cambridge Cat/Anna, flickr.com
Platters Spindle Head Actuator Arm
Track Sector (512bytes)
/
2 3
Track #0 Track #1, Sector #7
– Non-Volatile – Volatile
– Read/Write – Read Only – Slow Write, Fast Read Storage
– Random Access – Sequential Access
– Location – File – Content
LBA = (((CYLINDER * heads_per_cylinder) * HEAD) * sectors_per_track) + SECTOR -1 E.g. CHS 0,0,1 = LBA 0
Partition 1 Partition 2
Partition 1 Partition 2 Partition 1 Partition 2
B Carrier, File System Forensic Analysis, pp75
B Carrier, File System Forensic Analysis, pp76
B Carrier, File System Forensic Analysis, pp 83
B Carrier, File System Forensic Analysis, pp 94
B Carrier, File System Forensic Analysis, pp 94
B Carrier, File System Forensic Analysis, pp 94
B Carrier, File System Forensic Analysis, pp 94
B Carrier, File System Forensic Analysis, pp 94
B Carrier, File System Forensic Analysis, pp 94
B Carrier, File System Forensic Analysis, pp 94