170 likes | 289 Vues
This document outlines the agenda for Day 5 of the COS/PSA 413 course, including due dates for assignments and quizzes. Key dates are highlighted: Assignment 2 and 3 are due on September 26 by 3:35 PM, and Quiz 1 will be held on September 30 covering chapters 1-5. Additionally, instructions for lab write-ups and the importance of proper digital evidence handling are emphasized. Students are guided through various stages of computer forensics investigations, including acquiring evidence with AccessData FTK and ensuring the integrity of digital data.
E N D
COS/PSA 413 Day 5
Agenda • Questions? • Assignment 2 Redo • Due September 26 @ 3:35 PM • Assignment 3 posted • Due September 26 @ 3:35 PM • Quiz 1 on September 30 • Chaps 1-5, Open book, Open notes • 20 M/C and 5 essays • Lab 1 corrected • 2 B’s, 6 C’s and 1 F • RTDQ! • Lab 2 write-ups due • Finish Discussion Processing Crime and incident Scenes • Lab 3 in N105 • Hands-on project 5-4 and 5-5 • Follow instructions in
Lab 1 • 2-1 • File listing , contents & memo • Just the facts>>no bias and no conclusions • 2-2 • Memo – 25 clusters hits • 2-3 • Memo • 4 files, 30 clusters for BOOK • 1 image files name and where found • 2-4 • File listing • 2-5 • Prodiscover resport with “deleted and file type” • 2-6 • Prodiscover report with proper comments • 3 files with the 3 words (one file each) Guide to Computer Forensics and Investigations
Reviewing Background Information for a Case • Company called Superior Bicycles • Specializes in creating new and inventive modes of human-driven transportation • Two employees, Chris Murphy and Nau Tjeriko, have been missing for several days • A USB thumb drive has been recovered from Chris’s office with evidence that he had been conducting a side business using company computers Guide to Computer Forensics and Investigations
Identifying the Case Requirements • Identify requirements such as: • Nature of the case • Suspect’s name • Suspect’s activity • Suspect’s hardware and software specifications Guide to Computer Forensics and Investigations
Planning Your Investigation • List what you can assume or know • Several incidents may or may not be related • Suspect’s computer can contain information about the case • If someone else has used suspect’s computer • Make an image of suspect’s computer disk drive • Analyze forensics copy • \\Wallagrass\Software for N105 lab\COS413 Software\Chap05\InChap05 Guide to Computer Forensics and Investigations
Conducting the Investigation: Acquiring Evidence with AccessData FTK • Functions • Extract the image from a bit-stream image file • Analyze the image Guide to Computer Forensics and Investigations
Conducting the Investigation: Acquiring Evidence with AccessData FTK (continued) Guide to Computer Forensics and Investigations
Conducting the Investigation: Acquiring Evidence with AccessData FTK (continued) Guide to Computer Forensics and Investigations
Conducting the Investigation: Acquiring Evidence with AccessData FTK (continued) Guide to Computer Forensics and Investigations
Summary • Digital evidence is anything stored or transmitted on electronic or optical media • Private sector • Contained and controlled area • Publish right to inspect computer assets policy • Private and public sectors follow same computing investigation rules • Criminal cases • Require warrants Guide to Computer Forensics and Investigations
Summary (continued) • Protect your safety and health as well as the integrity of the evidence • Follow guidelines when processing an incident or crime scene • Security perimeter • Video recording • As you collect digital evidence, guard against physically destroying or contaminating it • Forensic hash values verify that data or storage media have not been altered Guide to Computer Forensics and Investigations
Summary (continued) • To analyze computer forensics data, learn to use more than one vendor tool • You must handle all evidence the same way every time you handle it • After you determine that an incident scene has digital evidence, identify the digital information or artifacts that can be used as evidence Guide to Computer Forensics and Investigations