170 likes | 277 Vues
This resource, based on the 2011 EDRM event, explores the complexities of collecting and processing electronic information. It covers critical players, devices, and types of networks involved, as well as corporate versus personal issues. Key topics include traditional collection methods, password recovery, forensic imaging, and geographic considerations. The guide addresses challenges associated with different media types, including mobile devices, cloud computing, and social media. Strategies for ensuring data integrity and managing chain of custody are also discussed, providing valuable insights for professionals in the field.
E N D
Collection & Processing of Electronic Information 25th, January; 2011
Know Your Landscape • Questions: • Who are the “Players”? • Secretaries/Executive Assistants? • Network type • Devices/Media • Corporate Issue vs. Personal?
Collection Traditional Password Recovery Bit-stream Imaging HASH Original HD Forensic Copy Signature Analysis Extraction History Email Internet History Passwords
Network • Examples: • File Servers • Server Farms • Issues: • Dynamic • Geographical Locations • Size • Use
Archival Media • Examples: • Tapes • Hard Drives • Issues: • Reliability • Archival Schemes • Costs
Mobile Devices • Examples: • Cellular Phones • Tablets • GPS • Issues: • Ownership • Channels
Cloud Computing • Examples: • Google Mail • Google Docs • MS Office Web Apps • Issues: • Ownership • Geographical • Collection
Social Media • Examples: • Facebook • Twitter • LinkedIn • Issues: • Ownership • Geographical • Collection
Forensic Imaging • Forensic Imaging: • the entire drive contents are imaged to a file and checksum values are calculated to verify the integrity (in court cases) of the image file (often referred to as a “hash value”). • Forensic images are acquired with the use of software tools. (Some hardware cloning tools have added forensic functionality.) – EnCase, FTK, DD, etc. • HASH – MD5 or SHA
Forensic Imaging Data are stored in “bucket” like storage Empty Data Data Empty Data Data Empty Data UA Space Data
Collection • Covert vs. Office Hour • Forensic Imaging vs. Logical File Imaging vs. Manual Collection • Chain of Custody
Q&A Kevin Lo Email: klo@ffpl.ca Twitter: kevin_lo Phone: +1 (416) 926-4215