02 - Types of Computer Forensics Technology
02 - Types of Computer Forensics Technology
02 - Types of Computer Forensics Technology
COMPUTER FORENSICS
UNIT I PART II
Authorized users can securely reopen the DEBs for examination, while automatic audit of all actions ensures the continued integrity of their contents. The teams used other forensic tools and prototypes to collect and analyze specific features of the digital evidence, perform case management and timelining of digital events, automate event link analysis, and perform steganography detection. The results of CFX-2000 verified that the hypothesis was largely correct and that it is possible to ascertain the intent and identity of cyber criminals. As electronic technology continues its explosive growth, researchers need to continue vigorous R&D of cyber forensic technology in preparation for the onslaught of cyber reconnaissance probes and attacks.
CFX-2000 Schematic
1. Preservation of Evidence
Computer evidence is fragile and susceptible to alteration or erasure by any number of occurrences. Computer evidence can be useful in criminal cases, civil disputes, and human resources/ employment proceedings. Black box computer forensics software tools are good for some basic investigation tasks, but they do not offer a full computer forensics solution. SafeBack software overcomes some of the evidence weaknesses inherent in black box computer forensics approaches. SafeBack technology has become a worldwide standard in making mirror image backups since 1990.
PRIMARY USES
Used to create evidence-grade backups of hard disk drives on Intel-based computer systems. Used to exactly restore archived SafeBack images to another computer hard disk drive of equal or larger storage capacity. Used as an evidence preservation tool in law enforcement and civil litigation matters. Used as an intelligence gathering tool by military agencies.
COMPUTER FORENSICS
UNIT I PART II
Duplicate copies of hard disk drives can be made from hard disk to hard disk in direct mode. SafeBack image files can be stored as one large file or separate files of fixed sizes. This feature is helpful in making copies for archive on CDs. Tried and proven evidence-preservation technology with a 10 years legacy of success in government agencies. Does not compress relevant data to avoid legal arguments that the original computer evidence was altered through data compression or software translation. It is fast and efficient. In spite of the extensive mathematical validation, the latest version of SafeBack runs faster than prior versions. Processing speeds are much faster when state-of-the-art computer systems are used to make the backup. Makes copies in either physical or logical mode at the option of the user. Copies and restores multiple partitions containing one or more operating systems. Can be used to accurately copy and restore most hard disk drives including Windows NT, Windows 2000, and Windows XP in a raid configuration. Accuracy is guaranteed in the backup process through the combination of mathematical CRCs that provides a level of accuracy that far exceeds the accuracy provided by 128-bit CRCs (RSA MD5). Writes to SCSI tape backup units or hard disk drives at the option of the user.
FILE SLACK
Slack space in a file is the remnant area at the end of a file in the last assigned disk cluster, that is unused by current file data, but once again, may be a possible site for previously created and relevant evidence. Techniques and automated tools that are used by the experts to capture and evaluate file slack. COMPUTER FORENSICS UNIT I PART II
DATA-HIDING TECHNIQUES
Trade secret information and other sensitive data can easily be secreted using any number of techniques. It is possible to hide diskettes within diskettes and to hide entire computer hard disk drive partitions. Computer forensic experts should understand such issues and tools that help in the identification of such anomalies.
PRIMARY USES
Security reviews of floppy diskettes for storage anomalies Duplication of diskettes that are nonstandard or that involve storage anomalies Editing diskettes at a physical sector level Searching for data on floppy diskettes in traditional and nontraditional storage areas Formatting diskettes in nontraditional ways for training purposes and to illustrate data-hiding techniques
COMPUTER FORENSICS
UNIT I PART II
E-COMMERCE INVESTIGATIONS
Net Threat Analyzer can be used to identify past Internet browsing and email activity done through specific computers. The software analyzes a computers disk drives and other storage areas that are generally unknown to or beyond the reach of most general computer users. Net Threat Analyzer avail-able free of charge to computer crime specialists, school officials, and police.
DUAL-PURPOSE PROGRAMS
Programs can be designed to perform multiple processes and tasks at the same time. Computer forensics experts must have hands-on experience with these programs.
PRIMARY USES
Used to find occurrences of words or strings of text in data stored in files, slack, and unallocated file space Used in exit reviews of computer storage media from classified facilities Used to identify data leakage of classified information on non-classified computer systems Used in internal audits to identify violations of corporate policy Used by Fortune 500 corporations, government contractors, and government agencies in security reviews and security risk assessments Used in corporate due diligence efforts regarding proposed mergers Used to find occurrences of keywords strings of text in data found at a physical sector level Used to find evidence in corporate, civil, and criminal investigations that involve computer-related evidence Used to find embedded text in formatted word processing documents (Word-Perfect and fragments of such documents in ambient data storage areas)
COMPUTER FORENSICS
UNIT I PART II
COMPUTER FORENSICS
UNIT I PART II
PRIMARY USES
Used as an intelligence gathering tool for quick assessments of a Windows swap/page file to identify past communications on a targeted computer Used as a data sampling tool in law enforcement, military, and corporate investigations Used to quickly identify patterns of English language grammar in ambient data sources Used to identify English language communications in erased file space
2. Disk Structure
Computer forensic experts must understand how computer hard disks and floppy diskettes are structured and how computer evidence can reside at various levels within the structure of the disk. They should also demonstrate their knowledge of how to modify the structure and hide data in obscure places on floppy diskettes and hard disk drives.
3. Data Encryption
Computer forensic experts should become familiar with the use of software to crack security associated with the different file structures.
5. Data Compression
Computer forensic experts should become familiar with how compression works and how compression programs can be used to hide and disguise sensitive data and also learn how passwordprotected compressed files can be broken.
6. Erased Files
Computer forensic experts should become familiar with how previously erased files can be recovered by using DOS programs and by manually using data-recovery technique & familiar with cluster chaining.
COMPUTER FORENSICS
UNIT I PART II
PC PHONEHOME
PC PhoneHome is a software application that will track and locate a lost or stolen PC or laptop any-where in the world. It is easy to install. It is also completely transparent to the user. If your PC PhoneHome-protected computer is lost or stolen, all you need to do is make a report to the local police and call CDs 24-hour command center. CDs recovery specialists will assist local law enforcement in the recovery of your property.
COMPUTER FORENSICS
UNIT I PART II
10
online activity, finding and recovering hidden and deleted data, locating stolen computers, creating trackable files, identifying software pirates, and so on.
Source:
COMPUTER FORENSICS
UNIT I PART II
11