Preview

CSS350 IP5

Powerful Essays
Open Document
Open Document
6832 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CSS350 IP5
CSS350-1301A-01 Computer Forensics 1
Key Assignment
David Laurin Jr.
February 11, 2013

Table of contents
Table of contents 2
Introduction to computer forensics 3
Computer forensics defined 3
Situations that might lead to the need for an investigation 4
Digital investigation processes and procedures 7
Collecting and preserving data 11
Investigation methodology and data analysis 16
Reporting the case 29
References 37

Introduction to computer forensics
Computer forensics defined In today’s world it is an indisputable fact that computers and digital devices are a part of our everyday lives. As such they are a part of our society whether they are used for business or for personal reasons. There are many uses for computers. We can use them to track our finances, keep databases of information about our clients, and use them to save pictures and documents. Sometimes computers are used in the commission of a crime like hacking systems for credit card information or launching computer viruses against a target. Sometimes they are used to communicate with others about the details of a crime, plan a crime, or share illegal media like child pornography. Other times computers can be misused and lead to loss or theft of data resulting in system downtime or monetary losses for an organization.
Whichever the case, computer forensics can be used to investigate computer related crime or misconduct. “Computer forensics is the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law” (Rouse, 2007). This means that the information that is gathered must follow strict rules for forensic investigation. These rules may vary from state to state but are at least responsible for strict control over how the evidence is obtained, protected, and documented. “The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened



References: CS. (2010, August 15). Hashing concepts. Retrieved from media.uri.edu: media.uri.edu/cs/Camtasia/Hashing%20Concepts.pptx Farmer, J International Competition Network. (2010, March). Definitions and qualifications. Retrieved from Anti-cartel enforcement manual: http://www.internationalcompetitionnetwork.org/uploads/library/doc627.pdf Landry, B Mason, D. (2010). Overview of "computer forensics". Retrieved from http://www.olemiss.edu/depts/ncjrl/pdf/cp%20Supplemental%20material%20-%20Computer%20Forensics%20overview.pdf Microsoft Rouse, M. (2007, February). Computer forensics (cyberforensics). Retrieved from SearchSecurity.techtarget.com: http://searchsecurity.techtarget.com/definition/computer-forensics Safemode.org SANS. (2012, June). Windows artifact analysis: evidence of... Retrieved from https://blogs.sans.org/computer-forensics/files/2012/06/SANS-Digital-Forensics-and-Incident-Response-Poster-2012.pdf Vacca, J Vijayan, J. (2012, November 15). NASA breach update: stolen laptop had data on 10,000 users. Retrieved from Computerworld.com: http://www.computerworld.com/s/article/9233701/NASA_breach_update_Stolen_laptop_had_data_on_10_000_users whereismydata,

You May Also Find These Documents Helpful

  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    High technology gives criminals the opportunity to obtain valuable information. They are considered a cyber-threat. Criminals usually get illegitimate or legitimate work-related access to a company’s computer resources to sell wanted information.…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    CCJS321 Project 2

    • 1909 Words
    • 5 Pages

    Soloman, M. G., Rudolph, K., Tittel, E., Broom, N., & Barrett, D. (2011). Computer Forensics JumpStart, Second Edition. Retrieved from http://common.books24x7.com.ezproxy.umuc.edu/toc.aspx?bookid=41065…

    • 1909 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The career of a computer Forensics Investigator is that of a specially trained professional who works with various law enforcement agencies as well as private firms to retrieve information from computers and other types of data storage devices. Computers and equipment can often be damaged externally as well as internally corrupted by hacking or viruses. The Computer Forensics Investigator is most well-known for working within the law enforcement industry. They can also be tasked to test the security of a private company 's information systems. The Investigator should have an excellent knowledge of all aspects of the computer including hard drives, networking, and encryption. The Computer Forensics Investigator recovers and examines data from computers and other electronic storage devices in order to use the data as evidence in criminal prosecutions. Following data retrieval, the Investigator writes up technical reports detailing how the computer evidence was discovered and all of the steps taken during the retrieval process. Patience and willingness to work long hours are qualities that are well suited for this profession.…

    • 966 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The exchange of information is taking place every day over the internet. Although this may be convenient for us, it can also pose as an opportunity for criminals. Phishing, corporate fraud, intellectual property disputes, theft, and breach of contract and asset recovery are some of the situations wherein computer forensics can be used.…

    • 570 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Digital forensics uses scientific methods of extracting evidence from computers or other digital devices. It simples involves retrieving data from existing or deleted files, interpreting there meaning and putting it all together in context of an investigation. Digital forensics is a scientific process that uses analysis tools, methods and documentation to discover electronic evidence. Where other forensic sciences may alter the original media digital forensics strives to maintain the integrity of the original media and make sure it is not altered in any way. The methods used to create forensic copies of media and data keeps the integrity of the original intact. McKemmish defines…

    • 1084 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Because the wide world of technology has developed at such an astounding pace, there are many problems for victims as well as investigators of cyber crime and computer-related crimes. First, we must familiarize ourselves with the definitions of cyber crime and computer-related crime. For this paper, we will define cyber crime as the use of a computer as a tool to commit a crime or as a crime committed where a computer is the target. We will define computer-related crime as a traditional crime where a computer is used to carry out, record actions, or provide evidence of a crime. The beginnings of the problem of investigating cyber crime come in the form of reporting. For many reasons cyber crimes tend to go unreported or severely underreported. Another problem is that law enforcement officials (as well as parents and their children) do not have adequate training, allocation of funds, coordination with other agencies, or proper understanding of applicable laws that pertain to cyber crime. From all angles cyber crime is a difficult problem to tackle, and there is a definite need for law enforcement to catch up with the technology of cyber space, which is quickly becoming a feeding ground for illegal and illicit activity.…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Forensics

    • 3335 Words
    • 13 Pages

    The purpose of computer forensics techniques is to search, preserve and analyze information on computer systems to find potential evidence for a trial. Many of the techniques detectives use in crime scene investigations have digital counterparts, but there are also some unique aspects to computer investigations.…

    • 3335 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Data Breach

    • 3998 Words
    • 16 Pages

    In today’s digital world, most Americans leave long electronic trails of private information wherever they go. But too often, that data is compromised. When they shop—whether online or at brick and mortar stores—retailers gain access to their credit card numbers. Medical institutions maintain patient records, which are increasingly electronic. Corporations store copious customer lists and employee Social Security numbers. These types of data frequently get loose. Hackers gain entry to improperly protected networks, thieves steal employee laptops or disgruntled workers pilfer company information.…

    • 3998 Words
    • 16 Pages
    Better Essays
  • Good Essays

    Despite the thousands of benefits to using computers and technology in our everyday lives, there are also a number of reasons as to why we shouldn’t be so dependent on them and even why we should be suspicious of them and the…

    • 8385 Words
    • 34 Pages
    Good Essays
  • Powerful Essays

    The improvement in technology is one of the concerns that is both an advantage and an adversity if it lies on the wrong hands in the current and contemporary world. Over the years, the solution to ensuring maximum supervision and regulation to avoid its application in the infringement of individual rights has been debated across numerous legal conferences globally. This understanding brought…

    • 1025 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    References: [1] Cloud computing: Business benefits with security, governance and assurance perspectives. Technical report, ISACA, 2009. [2] R. A. Bares. Hiding in a virtual world: using unconventionally installed operating systems. In ISI’09: Proceedings of the 2009 IEEE international conference on Intelligence and security informatics, pages 276–284, Piscataway, NJ, USA, 2009. IEEE Press. [3] D. Barrett and G. Kipper. Virtualization and Forensics: A Digital Forensic Investigator’s Guide to Virtual Environments. Syngress, 6 2010. [4] N. Beebe. Digital forensic research: The good, the bad and the unaddressed. Advances in Digital Forensics V, pages 17–36, 2009. [5] D. Bem. Virtual machine for computer forensics - the open source perspective. In E. Huebner and S. Zanero, editors, Open Source Software for Digital Forensics, pages 25–42. Springer US, 2010. [6] D. Bem and E. Huebner. Computer forensic analysis in a virtual environment. International Journal of Digital Evidence, 6(2), 2007. [7] D. Brezinski and T. Killalea. Guidelines for evidence collection and archiving, 2002. [8] V. Corey, C. Peterman, S. Shearin, M. Greenberg, and J. Van Bokkelen. Network forensics analysis. IEEE Internet Computing, 6(6):60–66, 2002. [9] EC-Council. Computer Forensics: Investigating Network Intrusions and Cyber Crime (Ec-Council Press Series: Computer Forensics). Course Technology, 1 edition, 9 2009. [10] B. Hay and K. Nance. Forensics examination of volatile system data using virtual introspection. SIGOPS Oper. Syst. Rev., 42:74–82, April 2008. [11] A. Juels and B. S. Kaliski. Pors: proofs of retrievability for large files. In In CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security, pages 584–597.…

    • 3967 Words
    • 16 Pages
    Best Essays