Preview

CSS350 IP5

Powerful Essays
Open Document
Open Document
6832 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CSS350 IP5
CSS350-1301A-01 Computer Forensics 1
Key Assignment
David Laurin Jr.
February 11, 2013

Table of contents
Table of contents 2
Introduction to computer forensics 3
Computer forensics defined 3
Situations that might lead to the need for an investigation 4
Digital investigation processes and procedures 7
Collecting and preserving data 11
Investigation methodology and data analysis 16
Reporting the case 29
References 37

Introduction to computer forensics
Computer forensics defined In today’s world it is an indisputable fact that computers and digital devices are a part of our everyday lives. As such they are a part of our society whether they are used for business or for personal reasons. There are many uses for computers. We can use them to track our finances, keep databases of information about our clients, and use them to save pictures and documents. Sometimes computers are used in the commission of a crime like hacking systems for credit card information or launching computer viruses against a target. Sometimes they are used to communicate with others about the details of a crime, plan a crime, or share illegal media like child pornography. Other times computers can be misused and lead to loss or theft of data resulting in system downtime or monetary losses for an organization.
Whichever the case, computer forensics can be used to investigate computer related crime or misconduct. “Computer forensics is the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law” (Rouse, 2007). This means that the information that is gathered must follow strict rules for forensic investigation. These rules may vary from state to state but are at least responsible for strict control over how the evidence is obtained, protected, and documented. “The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened



References: CS. (2010, August 15). Hashing concepts. Retrieved from media.uri.edu: media.uri.edu/cs/Camtasia/Hashing%20Concepts.pptx Farmer, J International Competition Network. (2010, March). Definitions and qualifications. Retrieved from Anti-cartel enforcement manual: http://www.internationalcompetitionnetwork.org/uploads/library/doc627.pdf Landry, B Mason, D. (2010). Overview of "computer forensics". Retrieved from http://www.olemiss.edu/depts/ncjrl/pdf/cp%20Supplemental%20material%20-%20Computer%20Forensics%20overview.pdf Microsoft Rouse, M. (2007, February). Computer forensics (cyberforensics). Retrieved from SearchSecurity.techtarget.com: http://searchsecurity.techtarget.com/definition/computer-forensics Safemode.org SANS. (2012, June). Windows artifact analysis: evidence of... Retrieved from https://blogs.sans.org/computer-forensics/files/2012/06/SANS-Digital-Forensics-and-Incident-Response-Poster-2012.pdf Vacca, J Vijayan, J. (2012, November 15). NASA breach update: stolen laptop had data on 10,000 users. Retrieved from Computerworld.com: http://www.computerworld.com/s/article/9233701/NASA_breach_update_Stolen_laptop_had_data_on_10_000_users whereismydata,

You May Also Find These Documents Helpful

  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Better Essays

    CCJS321 Project 2

    • 1909 Words
    • 5 Pages

    Soloman, M. G., Rudolph, K., Tittel, E., Broom, N., & Barrett, D. (2011). Computer Forensics JumpStart, Second Edition. Retrieved from http://common.books24x7.com.ezproxy.umuc.edu/toc.aspx?bookid=41065…

    • 1909 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    The career of a computer Forensics Investigator is that of a specially trained professional who works with various law enforcement agencies as well as private firms to retrieve information from computers and other types of data storage devices. Computers and equipment can often be damaged externally as well as internally corrupted by hacking or viruses. The Computer Forensics Investigator is most well-known for working within the law enforcement industry. They can also be tasked to test the security of a private company 's information systems. The Investigator should have an excellent knowledge of all aspects of the computer including hard drives, networking, and encryption. The Computer Forensics Investigator recovers and examines data from computers and other electronic storage devices in order to use the data as evidence in criminal prosecutions. Following data retrieval, the Investigator writes up technical reports detailing how the computer evidence was discovered and all of the steps taken during the retrieval process. Patience and willingness to work long hours are qualities that are well suited for this profession.…

    • 966 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The exchange of information is taking place every day over the internet. Although this may be convenient for us, it can also pose as an opportunity for criminals. Phishing, corporate fraud, intellectual property disputes, theft, and breach of contract and asset recovery are some of the situations wherein computer forensics can be used.…

    • 570 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    "Computer forensics is the specialized practice of investigating computer media for the purpose of discovering and analyzing available, deleted, or "hidden" information that may serve as useful evidence in a legal matter. " (Steen, Hassell 2004)…

    • 333 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Digital forensics uses scientific methods of extracting evidence from computers or other digital devices. It simples involves retrieving data from existing or deleted files, interpreting there meaning and putting it all together in context of an investigation. Digital forensics is a scientific process that uses analysis tools, methods and documentation to discover electronic evidence. Where other forensic sciences may alter the original media digital forensics strives to maintain the integrity of the original media and make sure it is not altered in any way. The methods used to create forensic copies of media and data keeps the integrity of the original intact. McKemmish defines…

    • 1084 Words
    • 5 Pages
    Better Essays
  • Good Essays

    FINAL DRAFT CYBERCRIME CJ

    • 667 Words
    • 3 Pages

    References: Britz, M. T. (2013). Computer Forensic and Cyber Crime: An Introduction. Clemson University, SC: Pearson Education…

    • 667 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Forensics

    • 3335 Words
    • 13 Pages

    The purpose of computer forensics techniques is to search, preserve and analyze information on computer systems to find potential evidence for a trial. Many of the techniques detectives use in crime scene investigations have digital counterparts, but there are also some unique aspects to computer investigations.…

    • 3335 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    References: Britz, Marjie T. (2003). Traditional Problems in Computer Investigations. Computer Forensics and Cyber Crime: An Introduction, 144. New Jersey: Pearson Education, Inc.…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Digital Fornesics

    • 3973 Words
    • 16 Pages

    Computer forensics itself is based upon applying various analytical techniques on digital media, usually when a computer security incident has been detected. The goal of computer forensics is to determine the scope of the security breach, and who the perpetrator was through an investigation, just as in a real, physical crime scene. The actual forensic investigation encompasses a multitude of areas of computer security, including internet abuse, pornographic websites, hacking, and fraud schemes. In addition, it also includes data alterations, both intentional and accidental.…

    • 3973 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    Despite the thousands of benefits to using computers and technology in our everyday lives, there are also a number of reasons as to why we shouldn’t be so dependent on them and even why we should be suspicious of them and the…

    • 8385 Words
    • 34 Pages
    Good Essays
  • Better Essays

    Data Breach

    • 3998 Words
    • 16 Pages

    In today’s digital world, most Americans leave long electronic trails of private information wherever they go. But too often, that data is compromised. When they shop—whether online or at brick and mortar stores—retailers gain access to their credit card numbers. Medical institutions maintain patient records, which are increasingly electronic. Corporations store copious customer lists and employee Social Security numbers. These types of data frequently get loose. Hackers gain entry to improperly protected networks, thieves steal employee laptops or disgruntled workers pilfer company information.…

    • 3998 Words
    • 16 Pages
    Better Essays
  • Best Essays

    References: [1] Cloud computing: Business benefits with security, governance and assurance perspectives. Technical report, ISACA, 2009. [2] R. A. Bares. Hiding in a virtual world: using unconventionally installed operating systems. In ISI’09: Proceedings of the 2009 IEEE international conference on Intelligence and security informatics, pages 276–284, Piscataway, NJ, USA, 2009. IEEE Press. [3] D. Barrett and G. Kipper. Virtualization and Forensics: A Digital Forensic Investigator’s Guide to Virtual Environments. Syngress, 6 2010. [4] N. Beebe. Digital forensic research: The good, the bad and the unaddressed. Advances in Digital Forensics V, pages 17–36, 2009. [5] D. Bem. Virtual machine for computer forensics - the open source perspective. In E. Huebner and S. Zanero, editors, Open Source Software for Digital Forensics, pages 25–42. Springer US, 2010. [6] D. Bem and E. Huebner. Computer forensic analysis in a virtual environment. International Journal of Digital Evidence, 6(2), 2007. [7] D. Brezinski and T. Killalea. Guidelines for evidence collection and archiving, 2002. [8] V. Corey, C. Peterman, S. Shearin, M. Greenberg, and J. Van Bokkelen. Network forensics analysis. IEEE Internet Computing, 6(6):60–66, 2002. [9] EC-Council. Computer Forensics: Investigating Network Intrusions and Cyber Crime (Ec-Council Press Series: Computer Forensics). Course Technology, 1 edition, 9 2009. [10] B. Hay and K. Nance. Forensics examination of volatile system data using virtual introspection. SIGOPS Oper. Syst. Rev., 42:74–82, April 2008. [11] A. Juels and B. S. Kaliski. Pors: proofs of retrievability for large files. In In CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security, pages 584–597.…

    • 3967 Words
    • 16 Pages
    Best Essays
  • Powerful Essays

    The improvement in technology is one of the concerns that is both an advantage and an adversity if it lies on the wrong hands in the current and contemporary world. Over the years, the solution to ensuring maximum supervision and regulation to avoid its application in the infringement of individual rights has been debated across numerous legal conferences globally. This understanding brought…

    • 1025 Words
    • 5 Pages
    Powerful Essays