Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
79 views
CSDF (TechKnowledge)
Uploaded by
Garja
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save CSDF (TechKnowledge) For Later
Download
Save
Save CSDF (TechKnowledge) For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
79 views
CSDF (TechKnowledge)
Uploaded by
Garja
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save CSDF (TechKnowledge) For Later
Carousel Previous
Carousel Next
Save
Save CSDF (TechKnowledge) For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 78
Search
Fullscreen
| 3 Introduction to Digital Forensics = use e — Forensics in Law Enforcement, Compute, Forensics | What is Computer Proceedings, Computer Forensics s/Employment | Forensics Assistance to Human Resources | services, Benefits of Professional Forensics Methodology, Steps taken by Computer Forensics | specialists Types of Computer Forensics Technology : Types of Military Computer Forensic | Technology, Types of Law Enforcement — Computer Forensic Technology, Types of Business Computer Forensic Technology Computer Forensics Evidence and Capture: Data Recovery Defined, Data Back-up and Recovery, The Role of Back-up in Data Recovery, The Data. | | Recovery Solution. 3.1 _ What is Computer Forensics ? «The methodical examination of computer media (hard discs, diskettes, cassettes, etc.) for evidence is known as computer forensics. In other words, computer forensics involves gathering, preserving, analysing, and presenting data relating to computers. * Computer forensics also go by the name's electronic discovery, computer analysis, an¢ computer inspection. They also go by the name's digital discovery, data recovery, and data discovery. Criminal cases, civil lawsuits, and human resources/employment hearings can all benefit from computer evidence. 3.2__ Use of Computer Forensics in Law Enforcement The field of computer forensics benefits law enforcement in following ways: * Recovery of deletad files : It helps to recoverdeleted fil 4 les, such a aphics, an images, is one example of this peso * Search for unallocated spaces : Looking throu: igh unallocated s; isc, which is generally where there is a lot of data. Pace-on the hard cssa sor security & Datel Forensics SPPU) 3-2 + Introd Introduction to Digital Forensics gefacts : Tracing arte: ‘acts, those traces of information the operating system I ing system leaves fo trac +7 ind Our specialists are skilled in locating these artefact cts, aniticance ofthe data they uncerer but more crucially, they are adept graetermining the s! idden files: It i ; roproes nfs 's used to process hidden files, which are files that the ee user cannot woe or access BU ns lata about previous usage. This method frequently entails rebi a ae ails rebuildin and examining each fi 's date code to discover when it was created, last edited, last — nd when it was destroyed. hes : i oun string searches : Searching for email using a string when there isnt a clear email client Computer Forensics Assistance to Human Resources/Employment 33 cS Proceedings wuters may be used as evidence in a variety of human resources cases, inciuding ation, and wrongful termination, Electronic mail systems, accusat network servers, tmployer safeguard program employers are required to protect sensitive company information and individual staff PCs all contain evidence. «The regrettable prospect that data may be harmed, deleted, or stolen by @ disgruntled person is a worry today. told of their termination, a computer forensic expert should visit the location py of the data on the person's computer. se the employee decides to alter such data in Before a person and make an exact cof + The employer is safeguarded in this way in cai any way before quitting. ced, and information about what «Data that has been damaged or destroyed can be repla happened can be restored accusations made by nd the employer against untrue he removal of * This technique can also be utilised to defer ase by demonstrating t the employee or to strengthen the company's ¢ confidential information. tances in ind hints. This covers circumst and decipher the left-behi 3 en scs have been formatted, been tal did you know ? * You have to be able to locate which data has been removed, di to obliterate or hide the evidence. or other measures have For illustration, © Which websites were accessed? Techtinoedst What documents were downloadeIntroduction to Digital p, or, W cyber Security & Digital Forensics (SPPU) hy 3 When were the files last accessed? f 0 _ Ofefforts to hide or destroy evidence? idence? Of efforts to create false evi _ ° hat was deleted from the final printed edition may app, © That text from a document tha iy the electronic copy of the document? Sew i jost recent few hund «That some fax machines save duplicate copies of the mi red ag. received? That computer-based faxes may be issued or received and stored there indefinitely? ° © That email is quickly replacing other forms of communication for businesses? © That individuals frequently express opinions via email that they would never express ji, memo or letter? © That email has been effectively utilised in both civil and criminal proceedings? © That email is frequently archived on cassettes, which are typically retained for months years? © How many people maintain digital records of their finances, including their investments? 3.4 Computer Forensics Services ' Computer forensics experts should be able to carry out difficult evidence recovery processes effectively and with the knowledge and proficiency that supports your case. They should, for instance, be able to offer the following services: 1. Data seizure In accord: it "dance with federal regulations, computer forensics specialists should serve as the representative and locate evid ilisi i sj canal ence utilising their understanding of data storage technologi pr nals Ought to be able to help the authorities seize the equipment. 2. Data duplication/preservation The com Puter forensics professionals should handle both of th ting 2 identical copy of the required data This will ese issues by crea! ill ensuy that the seizure does not place an re that the data is not altered in any wey 3 excessive strain on th the original data is maintained while specialists responding party.The integrity of Operate on the duplicate dataSS Vig hs or ts? Ses pore inact bl “enage stems enables the recovery of lost evidence ment Seé ches 4 my a discovery process is simplified and less invasive forall part al Parties as a result of the speed and hese searches, which allow computer for ens of tl ficiency sicS professionals to quickly search trough more than 200,000 electronic documents rather pe indexed han having to wait hours for them to ‘ media conversion professionals in computer forensics should remove pertinent data fi d : rom outdated and readable devices, convert it into usable form um 's, and transfer it to fresh storage media for eamination. 6, Expert witness services Computer forensics professionals should be able to describe complicated technological procedures in a way that is easy for judges and jurors to grasp. This should assist them understand how computer evidence is discovered, what it consists of, and how it is relevant to a particular circumstance. 7. Computer evidence service options Computer forensics specialists ought to provide a range of services, each tailored to your particular investigation requirements. They should, for instance, be able to provide the following services : * Standard service : Until your vital electronic professionals should be able to work on your case evidence is located, computer forensics during regular business hours. visit to your place and s should be able to mn while they are on- * On-site service : Experts in computer forensics should be able to provide full-service digital evidence management. The specialist Promptly make accurate copies of the data storage media in concert site, rensics nt_on your computer for i ‘mitted to Professionals to give your case top attention in their labs. They should be per is are achieved. Continue working on it unhindered un' | your evidentiary goal TecaKnouedse Emergency assistance : You should be able to couIntroduction to p, 35 : W cyber Security & Digital Foren (sPPu)
ee > Examination » Analysis »y Reporting » ‘hrensic con “Stetcate th Media Data —————+ Information ——__» Evidence Fig. 4.12.1 1. Data collection : Its the first step in the chain of custody process, It entails the identification labelling, recording, and acquisition of data from all relevant sources while maintaining the data and evidence's integrity, 2. Examination : During this step, the chain of custody i , ly information is docu the ee mented, as well as forensic procedure that was followed. It's critical to take screenshots through he 55 tO demonstrate the ta: roughout the proce: rate the tasks that have been completed and the evidence that has been discovered s been discovEEE xr Security & Digital Forensics (SPPU) Evidence Collection and Data Seizure wo analysis: The result of the exa ination stage is the analysis stage. In the Analysis stage, legally justifiable methods and techniques are used to gather useful information in order to respond to the questions posed in the case 3. reporting = In the Examination and Analysis stage, this is the documentation phase.The swing items are included in reporting folio A statement about the Chain of Custody. The various tools that were used are explained, {A description of how various data sources were analysed, Issues have been identified. Vulnerabilities have been discovered, ‘Additional forensics measures that can be taken are suggested. The procedure for establishing the Chain of Custody A series of steps must be followed in order to ensure the chain of custody’s authenticity. It's worth noting that the more information a forensic expert obtains about the evidence, the more reliable the chain of custody created becomes. According to the chain of custody for electronic devices, you should ensure that the following procedure is followed : «Save the original files. + Photograph the physical evidence. + Taking screenshots of the digital evidence is a good idea. * Date, time, and any other information about the evidence's receipt should be documented. Inject forensic computers with a bit-for-bit clone of digital evidence content. To authenticate the working clone, perform a hash test analysis. 4.13 Duplication and Preservation of Digital Evidence 4.13.1 Preserving the Digital Crime Scene * Before reviewing or processing any computer data, we must first secure the machine and create 4 comprehensive bit stream backup of all data. Bit stream backups are far more comprehensive than traditional backups. * They include replicating every piece of data on a storage device, and when hard disc drives are involved, itis advised that two such copies be produced of the original. Wwfividence Collection tate ai W cyrer Security & Digital Forensics (SPPU) cau ‘© Any processing ought to be done on a copy that Is a backup for creating bit stream backuyy «Michael White originally created IMDUMP, a programme far creating ech SafeBack o ilitary, and lave enter ¢ SafeBack is now widely utilised by government intelligence, military, and law eng one, organisations on a global scale and has become the indu of the data stored On the hard drive, gy, stry standard ‘© The SafeBack application copies and maintains all going so far as to avoid attempts to bury data in problematic clusters and even sector, yy, flawed CRCs. SnapBack * Another bit stream backup application, called SnapBack, is also accessible and is employed jy, some law enforcement organisations mainly because to its usability, * Its costs are many hundred times more expensive than SafeBack © Every step of the evidence backup and restoration procedure includes error-checking, * To image the hard drive, need specialist bit stream backup software. * To image the hard drive, need specialist bit stream backup software. ‘+ The common DOS DISKCOPY software may be used to image the floppy diskettes * Ibis advised to use MS DOS Version 6.22 and to run the (data verification) option from the command line while using DOS DISKCOPY. * Before employing any of your forensic software tools to process digital evidence, familiarise yourself with them and practise using them. ‘* We might only have one opportunity to get it properly. 4.13.2 Computer Evidence Processing Steps There aren't any hard and fast guidelines that must be adhered to while Processing digital evidence. The general procedures for processing digital evidence are as follows : 1. Tum the computer off : This often entails disconn& Digital Forensics (SPPU) Eviderice Collection and Data Seizure pose transport the computer system fo 2 secure locatlo Inattended confiscated computers ara cost vulnerable to compromise. Unless the computer is locked up and placed in @ secure area, never feave it alone. create hard dise and floppy disc bit stream backups : Instead of using the original computer, all evidence processing should be done on a recovered copy of the bit stream backup. Bit stream backups are crucial for any significant computer evidence processing and function much like an insurance coverage. ‘5. Mathematically verify all storage devices’ data : You need to be able to demonstrate that after getting your hands on the computer, you did not change any of the evidence. Law snforcement and military organisations have been doing authentication using a 32-bit mathematical procedure since 1989. §, Record the system's time and date : File timestamps will also show the incorrect time if the gystem clock is one hour off due to daylight saving time, Documenting the system date and time settings at the timé the computer is introduced into evidence is crucial to account for these discrepancies. 7. Create a list of key search words : To manually review and assess each file on a computer hard drive would be nearly difficult for a computer expert. It's crucial to gather information from people who are knowledgeable with the issue in order to compile a list of pertinent keywords. Using automated software, these keywords may be used to search all computer hard drives and floppy diskettes. 8 Examine Windows’ swap file : The Windows swap file may include useful information and leads. The swap file is deleted when the machine is shut off. However, it is simple to record and assess the contents of the swap file. 9. Determine the file slack : It is a key security leakage source and is made up of raw memory dumps that happen as files are closed during @ work session. The keywords found in the Preceding phases should be supplemented by searching through file content for pertinent terms, Internet leads are often easy to get from via file slack. According to tests, file slack generates almost 80 times as many Internet leads as the Windows swap file. Examine unallocated space (erased files) = Unallocated space has to be searched for Pertinent keywords to add to the ones found in the earlier steps. 1 = 1. Search files, ile slack, and unallocated space for keywords : All relevant computer hard disc drives and floppy diskettes should be searched using the list of pertinent keywords determined in the preceding phases. Reviewing the results of the text search tool is crucial, and recording Pertinent information is just as crucial. TeaEvidence Collection and Dats eeu, a vu) curity & Digital Forensics (SPPI Cyber Security & Digit ile names, creation dates, and last updateg . evidence. The final product ought to be , tes 12. Document file names, dates, and aoe : i sof > and times may be crucial in term: ce red rere with de i processing-compatible file that may be nected to certain files. ; 7 = i ams, and storage : Data is stored in binary forma. }. Detect irregularities in files, ora ‘as a result, a text search tool cannot locate tay Ps a i r d encrypted graphic, pa essed i The rsessment of these files manually is neces, The conten din these file typ ee the fi should be a and assessed for their potential as evidence, depending on the a e file of file involved. 14. Examine the operation of the software : Depending on the application software in questi, . Examine : it could be essential to execute applications to determine their function. This can be used 1, mful processes are linked to pertinent evidence, demonstrate wilfulness when har 15. Document your findings : As issues are discovered and proof is gathered, it is crucial tp document your findings. It's crucial to record every piece of software you used to analyse the evidence forensically, including the apps’ version numbers. Make sure you have the prope, authorization to USE the forensic software. The version of the programme and the procedures used to locate or analyse the evidence are also documented by screenshots of the Operating system. . Retain copies of software used : It is advised that a copy of the software utilised be provided with the output of the relevant forensic instrument as part of your documentation procedure. it the software has been upgraded and the previous version used has not been kept, duplicating findings may be challenging or impossible 4.14 Legal Aspects of Collecting and Preserving Computer Forensic Evidence 4.14.1 Chain of Custody * Chain of custody means documentation that identifies all changes in the control, handling. custody and ownership of a piece of evidence. * The gathered evidences should store in a tamper - Proof manner means that evidence cannot be accessed by unauthorized person, it helps in maintaining the chain of custody. For each obtained item a complete chain-of-custody record ig kept. place to meet the chain of custody requirementcyber SOT a 4-11 Evidence Collection and Data Seizure whenever the Experts and law enforcement officers required reviewing the evidence then check-out the evidence, and then check-in the evidence every time it is returned to storage. organization's best evidence should be stored in a safe room or storage so that is inaccessible to anyone other than the appointed evidence custodians. This storage area is also known as evidence safe.” Access to evidence safe is controlled by the evidence custodians. For electronic evidence to maintain a chain of custody, it must be demonstrated that : > Noinformation has been added or modified, o Afull copy was created. o Atrustworthy copying procedure was applied. o Allmedia were protected. 14.2. Legal Requirements When gathering evidence, specific legal standards must be followed. These legal requirements are extensive, intricate, and differ from nation to nation. CERT Advisory CA-1992-19 advises that the following wording be customised to a corporation's particular requirements while being overseen by legal counsel: © This system is only intended for usage by authorised users. All activity on this computer system by users who lack authority or who use it in excess of their authority are subject to monitoring and recording by system staff. The actions of authorised users may also be watched when monitoring those who are abusing this system or while doing system maintenance. Anyone using this system expressly agrees to such monitoring, and they are informed that system staff may give the evidence of such monitoring to law enforcement officials if the monitoring turns up any indications of suspected criminal conduct. The existence of employment policies that permit monitoring and the extent to which those Policies have been made known to employees are the two main factors that determine whether workplace monitoring is lawful. Employees should sign a declaration stating that they have read, understood, and agreed te abide by company policy and consent to system monitoring in order to demonstrate that th Policy has been conveyed,™~ Evidence Collecti W cyder Security & Digital Forensics (SPPU) 4:12 ids en Data sy, 4.3 Evidence Collection Procedure The first guideline that must be followed when it's time to start gathering evidence ig Don't hurry : * The investigative team will require a copy of their incident-handling process, a notey., fe gathering evidence, and tags for identifying specific pieces of evidence. They might a., to bring the necessary equipment, such as media for copying, to make accurate COpies of electronic evidence. Legal counsel may occasionally request pictures of the system before a search ang Seieue Afterward, add a Polaroid camera to the list of equipment. The Incident Coordinator * The incident coordinator should be identified in the policy and process. * When an event is reported, the incident ccordinator will get in touch with the other member Of the response team in accordance with the incident response policy. will be in charge of making sure that, once at the scene of the occurrence, every step of the incident-handling method is carried out. will distribute the different responsibilities listed in the incident-handling method to ‘team members, act as the point of contact for the legal team, law enforcement agents, management, and > specialists The incident coordinator is ultimately in. charg gathered, preserved, and thatthe chain of custody is The Evidence Notebook @ of making sure that evidence is corredy upheld, The duty of keeping the evidence note-book where, when, and how of the inquiry will be noted the very least of the things that need to be writen d will fall to one team member. The who, what by this individual. The following assignment lown in the notebook, 3) Who reported the alleged occurrence in the fist place, along with the time, date, 24 circumstances surrounding it? b) Details of the Preliminary evaluation that led to the ful investigation, The names of everyone involved in the inquiry d) The incident’s case number. SEones security & Digital Forensics (SPPU) Tre investigation’s justifications, Evidence Collection and Data Seizure plist of all the een "used in the inguiy, together with a detailed description of each aystem, Include ary identifying tag numbers that were given to the systems or specific syster erp specific system network flowcharts. Applications operating on the above-mentioned computer platforms. ) Acopy of the policy or policies that govern using and accessing the aforementioned systems. Alist of administrators in charge of doing normal system maintenance y A thorough breakdown of the procedures taken to gather and evaluate the evidence. This list should specifically include the day and time each task was completed, a description of the task, who completed the work, where the activity was completed, and the analysis's findings ‘Arecord of who had access to the gathered evidence on what dates and at what times. Each inquiry should have its own notebook. It ought to be bound such that it is clear if any pages have been deleted. The chain of custody is maintained by using this notebook. To help keep this chain going, it must be as specific as possible. Evidence Collection The task of gathering evidence will be delegated to another team member (or team members). The number of employees allocated to this work should be maintained to a minimum to prevent misunderstanding. The member in question (or members) ought to be an expert user of copying and analysing software, In order to guarantee that this information is accurately documented, this individual will tag all evidence and collaborate with the person in charge of the evidence notebook. The employee will also be in charge of accurately copying all data so that it may be used as Proof. Complete copies of drives on infected or dubious computers, as well as all pertinent log files, will be included in the data. Depending on the situation, this can be done on-site or the complete system can be taken to a fotensics lab. ao {tis proper to keep a binary duplicate of the data as proof. ° we A trustworthy copy process must include three essential qualities.sd OW UE BUKLED fa KYM6 Lond pun asuomuy i ‘wiorshs 194 10 siy 0} ssa2ze supra 98H 05 BUOP 1N9 "weIsKs syndwo> aun punoduy 10 oy rs(5J2\nduo> & Uo paloys 9q Kew aouapina yeu uoneBnsan 3d22U09 jewwawepury ay yUo> 0 ajgenaoue> aq ue Buunp papap sp ‘ouapina se pasn aq ©) paniaras Aaya sjevorews ayy ie Busy dieDay e seyo asnus sannewuasaida) es) ‘ynsme| © aly 0} aauapina YEnoua 51 sayy JEW SOLIMATEP Wear jeBa) yp saQuOMne je62p tdoudde un 0) uani6 s| a2uapina aur [nun Aporsn> yo uley> arp ansasoud 0} eDNID 9q ML} Paluawn2op useq aney saworINO aut pue Paulusexs B9q sey a2uapINa AY ‘eat [26a] ax 0} palanyap pue payea.2 aq Pinoys YoogsioU aruapiAe aun Jo Ado> yi jo s6urpuy ayo uu ud upeoudde sssfyeue ain jo uoneuerdg sisheue amu pesinn swaunasuy © sisheve aiajo.aiep pur aun aul © ‘pavoquow 9g pynoys Buymoy aun 250 flan ap ay e>uapina an asheue four *yeoqsou aouapine aun ul suonse sau jo sypads eu poe! 0 paunbo! ne sioeBsaHUL ‘aisypeu pojn 9 om Ain few 2uapi® 7 PaynuiUN Aq passaose sem anuapina ay) rey arcu Ue? AswoNe 92uR}P EH & uoneso, papuaneun ue pede 9q2%0u pInoys ueRI + ajatpue pow uosid yo 88 > ssane jo pur wos aA 0154 G1 3UL eqeq jo sishreuy pue 261035 sem ep 2b “a4 swous yews sday 9g pinous plone! @ +1 Jo absey> uy sem oum pul paLsssu ravep yp apni PyNOUS P1022 AHL *P Yoncuerdra yBnosouy se 49m se ‘3004 PUE papie2as 9q few a2u0pa ysuav0) 24h 0} pewa}sUelt Pao uaa : idsodwer 94 80! S91409 UL 22u0 4e) ‘0 age 24 pur 00H yo! 99) Poyuon fauapuadapul sauowosnbas Ansnpuy 1 dn PUE 2 paou oMnpa2exd 24k Samay aus Hao RR HonePqueWany jenuapina jo Speen jepeds TsT'y ———_ Uoneonualiny pue uopeayueA oGewy aanduio> Srprs | security & Digital Forensics (SPPU) 4 Ss Evidence Collection and Data Seizure shoud be absolutely Possible fo duplicate al ofthe formation f doch a way that the original system is left undisturb eae secured against either accidental or purposeful change, and that the erates - | establish this. Thus, it is the integrity of the material that must be protected, vote a itself , Ths safeguard comes in two varieties 9 Asecure technique of confirming that the data has not been changed in an y way since the copy was made. 9 Asecure way of determining if the copy was made at the time and on the machine in question. The Digital Image Verification and Authentication Protocol is the name given to all of these components. Digital IDS and Authentication Technology : A Digital 1D/Certificate is a type of electronic credential for the Internet that is provided by a trusted third party to establish the ID holder's identification. A Certificate Authority is a third party that issues certificates (CA). The notion of public key cryptography underpins digital 1D technologies. A Digital ID's goal is to properly link a public/private key pair to its owner. When a CA, such as VeriSign, offers a Digital ID, it ensures that the owner is not claiming an alias. When a CA offers you a digital certificate, it places its name behind the assertion that you are the legitimate owner of your public/private key pair. Authentication with Verisign Digital ID's uses‘ Cotomer struggle to know how much to trust software without assurances of its integrity and without knowing who published it. Itis tough to decide whether to download software from the Internet. __7 ff * Software developers, for example, can integrate information about themselves and their code With their programmes using digital signatures (when using Microsoft Authenticode in Conjunction with Digital IDsTM from VeriSign®) Customers should be assured of content source, indicating that the software truly < - me a nm the publisher who signed it, and content integrity, indicating that the software has not Authenticode and verified by VeriSign. TechtinenledyEvidence Collection and Data Seiny te W cyber Security & Digital Forensics (SPPU)__ +16 Authenticode jables developers to add information, abo, " ni Using digital signatures, Microsoft Authenticode & ications. themselves and their code with their app! The user is alerted through Authenticode: 1) of the publisher's genuine identity 2) ofa location to learn more about the control 3) The authenticity of the previous information Users can opt to trust all subsequent downloads of software from the same Publisher as wel any software produced by commercial publishers and VeriSign-verified. Public Key Cryptography + Every entity ina public key cryptography system has two complementary keys (a public key ang ie a private key) that work only when they are kept together. a Private keys are kept safe and only used by their owner, whereas public keys are widely available to users. Any code that has been digitally signed using the publisher's private key may only be validated with the complementary public key. : Code that has been successfully validated using the publisher's public key, digitally signed | . using the publisher's private key, and has not been tampered with. Certificate Authorities Certification Authorities, such as VeriSign, are companies that give digital certificates to applicants whose identities they are prepared to verify. Each certificate is connected to the CA's Certificate that signed it. VeriSign is responsible for the following tasks: Making public the criteria for granting, revoking, and maintaining certifications. Certifying applications that match the declared requirements Certificate administration 1 2 3. 4. Exceptionally safe storage of VeriSign’s root keys 5. Examining the evidence supplied by applicants 6. Making enrolment tools available 7. Accepting the obligation for these tasks 8. Digital signatures with time stamps.por security & Digital Forensics (SPPU) 4.47 st Evidence Coll lion and Data Seizure ‘ pigital 1D/Certificate is a type of Internet electronic cre 7 . dential A t pigitl ID to verity the identity ofthe 1D bearer. erence gees a certificate Authority is a third party that issues certificates (A), the notion of public key cryptography underpins di : z igital 1D. technologies. A Digital ID's goal is to properly ink a public/private key pair to its owner. ° ° when a CA, such as VeriSign, offers a Digital 1D, it ensures that the owner is not claiming an alias. When a CA offers you a digital certificate, it places its name behind the assertion that you are the legitimate owner of your public/private key pair. ‘Authenticode's relationship with VeriSign Digitall IDs VeriSign issues a Software Developer Digital ID to the publisher. The publisher writes code The publisher uses the SIGNCODE.EXE programme to generate a hash of the code using a technique such as MDS or SHA. It Encrypts the hash using his/her private key and generates a package that includes the code, the encrypted hash, and the publisher's certificate The package is encountered by the end user The publisher's Digital ID is examined by the end user's browser. The end user browser validates the validity of the Software Developer Digital ID using the VeriSign root Public Key, which is already incorporated in Authenticode enabled apps (which is itself signed by the VeriSign root Private Key) The end user browser decrypts the signed hash using the publisher's public key, which is Provided within the publisher's Digital ID. The final browser uses the same hashing technique as the publisher to generate a new hash The browser of the end user compares the two hashes. If they are identical, the browser displays a notice indicating that the content has been confirmed by VeriSign, and the end user has trust that the code was signed by the publisher listed in the Digital 1D, and that the code has not been altered since it was signed. Bie Stamping ked" A " . “erad Since key pairs are based on mathematical connections that can potentially be “cra lot of time and effort It is a widely accepted security principle that digital certificates should “iy with a
You might also like
Csol590-02-Fa18-Module 7 Final Project - Computer Forensic Examination Report - Keith Anderson
PDF
No ratings yet
Csol590-02-Fa18-Module 7 Final Project - Computer Forensic Examination Report - Keith Anderson
13 pages
Blockchain For Cybersecurity A Comprehensive Survey
PDF
100% (1)
Blockchain For Cybersecurity A Comprehensive Survey
6 pages
Computer Forensics Lab 1 Report
PDF
100% (2)
Computer Forensics Lab 1 Report
9 pages
cfr105 Lnguyen Final Project
PDF
No ratings yet
cfr105 Lnguyen Final Project
16 pages
CSDF Endsem
PDF
100% (1)
CSDF Endsem
33 pages
Computer Forensics
PDF
No ratings yet
Computer Forensics
18 pages
Disk Image Analsysis in Forensic
PDF
No ratings yet
Disk Image Analsysis in Forensic
10 pages
TYCS SEM - 6 P - 5 ETHICAL HACKING UNIT - 1 Introduction To Information Security
PDF
100% (1)
TYCS SEM - 6 P - 5 ETHICAL HACKING UNIT - 1 Introduction To Information Security
11 pages
Chapter 5. Computer Security
PDF
No ratings yet
Chapter 5. Computer Security
27 pages
DATA ANALYTICS FOR FRAUD DETECTION IV YEAR UNIT 3,4,5
PDF
100% (1)
DATA ANALYTICS FOR FRAUD DETECTION IV YEAR UNIT 3,4,5
72 pages
Solution of End-Of-Semester Assessment Sample Paper (Kathy)
PDF
No ratings yet
Solution of End-Of-Semester Assessment Sample Paper (Kathy)
14 pages
Itec413 15
PDF
100% (1)
Itec413 15
33 pages
U5 AQ5 With Answers
PDF
No ratings yet
U5 AQ5 With Answers
14 pages
Lecture 1 Information Security Design
PDF
No ratings yet
Lecture 1 Information Security Design
55 pages
CC7177 2 MS Exam Y1718S1 1711011010
PDF
0% (1)
CC7177 2 MS Exam Y1718S1 1711011010
3 pages
Explain Each of The Following Symmetric Key Algorithms in 50-100 and List at Least Two (2) Usages For Each of Symmetric Key Algorithms
PDF
100% (1)
Explain Each of The Following Symmetric Key Algorithms in 50-100 and List at Least Two (2) Usages For Each of Symmetric Key Algorithms
9 pages
HSST Computer Science
PDF
No ratings yet
HSST Computer Science
4 pages
Data Recovery and Evidence Collection SYMCA
PDF
No ratings yet
Data Recovery and Evidence Collection SYMCA
16 pages
Ethical Hacking Unit 2
PDF
No ratings yet
Ethical Hacking Unit 2
23 pages
Sara - Unit-4
PDF
No ratings yet
Sara - Unit-4
28 pages
PPT ch09
PDF
No ratings yet
PPT ch09
47 pages
Creating A Response Toolkit: Gathering The Tools
PDF
No ratings yet
Creating A Response Toolkit: Gathering The Tools
26 pages
Gcia Tools
PDF
No ratings yet
Gcia Tools
17 pages
CS - 6004 Cyber Forensics 1 PDF
PDF
50% (2)
CS - 6004 Cyber Forensics 1 PDF
80 pages
Module 1 - Introduction To Digital Investigation and Forensics
PDF
No ratings yet
Module 1 - Introduction To Digital Investigation and Forensics
34 pages
Network File Systems
PDF
No ratings yet
Network File Systems
18 pages
Se161148 Lab2 3.2,4,6.1
PDF
No ratings yet
Se161148 Lab2 3.2,4,6.1
34 pages
CS Unit 4
PDF
No ratings yet
CS Unit 4
27 pages
Lab 2 - Steganography and MD5 Hashing
PDF
No ratings yet
Lab 2 - Steganography and MD5 Hashing
3 pages
Chapter 3 - Cyber Security
PDF
No ratings yet
Chapter 3 - Cyber Security
20 pages
Introduction to Cyber Security and Ethical Hacking
PDF
No ratings yet
Introduction to Cyber Security and Ethical Hacking
8 pages
15 - CHFI (Mobile and IoT Forensics) - RD
PDF
No ratings yet
15 - CHFI (Mobile and IoT Forensics) - RD
46 pages
Cyber Security - Network Intrusion Case Study
PDF
No ratings yet
Cyber Security - Network Intrusion Case Study
9 pages
Digital Forensics and Incident Response (DFIR)
PDF
No ratings yet
Digital Forensics and Incident Response (DFIR)
11 pages
4680 ch04
PDF
No ratings yet
4680 ch04
64 pages
Data Privacy and Security
PDF
No ratings yet
Data Privacy and Security
13 pages
ISM Lab 6
PDF
No ratings yet
ISM Lab 6
16 pages
Data Formats
PDF
No ratings yet
Data Formats
89 pages
Internship Report
PDF
No ratings yet
Internship Report
31 pages
Cyber Forensics Unit - 1 Computer Forensics
PDF
No ratings yet
Cyber Forensics Unit - 1 Computer Forensics
17 pages
UNIT-4 Cybersecurity Complete Notes
PDF
50% (2)
UNIT-4 Cybersecurity Complete Notes
18 pages
Explorning The Role of Machine Learning in Enhancing Cloud Security
PDF
No ratings yet
Explorning The Role of Machine Learning in Enhancing Cloud Security
5 pages
Module 02 - Computer Forensics Investigation Process - AG - 25
PDF
No ratings yet
Module 02 - Computer Forensics Investigation Process - AG - 25
53 pages
Cloud Forensics
PDF
No ratings yet
Cloud Forensics
6 pages
ECC Product Info 4hours
PDF
No ratings yet
ECC Product Info 4hours
41 pages
Capability Maturity Model (CMM) & It's Levels in Software Engineering
PDF
No ratings yet
Capability Maturity Model (CMM) & It's Levels in Software Engineering
11 pages
FTK Ug
PDF
No ratings yet
FTK Ug
378 pages
6 Analysis & Validation Xid-10936710 2
PDF
No ratings yet
6 Analysis & Validation Xid-10936710 2
34 pages
2 Authentication - Access Control & Cryptography
PDF
100% (1)
2 Authentication - Access Control & Cryptography
39 pages
(eBook PDF) Information Security: Principles and Practices 2nd Editionpdf download
PDF
100% (4)
(eBook PDF) Information Security: Principles and Practices 2nd Editionpdf download
38 pages
Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning
PDF
No ratings yet
Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning
69 pages
Digital Signature
PDF
No ratings yet
Digital Signature
18 pages
Feasibility Study SaaS
PDF
No ratings yet
Feasibility Study SaaS
15 pages
CSCL Chapter 1 Introduction To Computer Security
PDF
No ratings yet
CSCL Chapter 1 Introduction To Computer Security
12 pages
INT250
PDF
No ratings yet
INT250
2 pages
CH 01
PDF
No ratings yet
CH 01
39 pages
report
PDF
No ratings yet
report
40 pages
COIT20263 Information Security Management - Assignment 2
PDF
No ratings yet
COIT20263 Information Security Management - Assignment 2
5 pages
Paper II Cyber and Information Security II
PDF
No ratings yet
Paper II Cyber and Information Security II
130 pages
DigitalForensics Unit1 2
PDF
No ratings yet
DigitalForensics Unit1 2
51 pages
Related titles
Click to expand Related Titles
Carousel Previous
Carousel Next
Csol590-02-Fa18-Module 7 Final Project - Computer Forensic Examination Report - Keith Anderson
PDF
Csol590-02-Fa18-Module 7 Final Project - Computer Forensic Examination Report - Keith Anderson
Blockchain For Cybersecurity A Comprehensive Survey
PDF
Blockchain For Cybersecurity A Comprehensive Survey
Computer Forensics Lab 1 Report
PDF
Computer Forensics Lab 1 Report
cfr105 Lnguyen Final Project
PDF
cfr105 Lnguyen Final Project
CSDF Endsem
PDF
CSDF Endsem
Computer Forensics
PDF
Computer Forensics
Disk Image Analsysis in Forensic
PDF
Disk Image Analsysis in Forensic
TYCS SEM - 6 P - 5 ETHICAL HACKING UNIT - 1 Introduction To Information Security
PDF
TYCS SEM - 6 P - 5 ETHICAL HACKING UNIT - 1 Introduction To Information Security
Chapter 5. Computer Security
PDF
Chapter 5. Computer Security
DATA ANALYTICS FOR FRAUD DETECTION IV YEAR UNIT 3,4,5
PDF
DATA ANALYTICS FOR FRAUD DETECTION IV YEAR UNIT 3,4,5
Solution of End-Of-Semester Assessment Sample Paper (Kathy)
PDF
Solution of End-Of-Semester Assessment Sample Paper (Kathy)
Itec413 15
PDF
Itec413 15
U5 AQ5 With Answers
PDF
U5 AQ5 With Answers
Lecture 1 Information Security Design
PDF
Lecture 1 Information Security Design
CC7177 2 MS Exam Y1718S1 1711011010
PDF
CC7177 2 MS Exam Y1718S1 1711011010
Explain Each of The Following Symmetric Key Algorithms in 50-100 and List at Least Two (2) Usages For Each of Symmetric Key Algorithms
PDF
Explain Each of The Following Symmetric Key Algorithms in 50-100 and List at Least Two (2) Usages For Each of Symmetric Key Algorithms
HSST Computer Science
PDF
HSST Computer Science
Data Recovery and Evidence Collection SYMCA
PDF
Data Recovery and Evidence Collection SYMCA
Ethical Hacking Unit 2
PDF
Ethical Hacking Unit 2
Sara - Unit-4
PDF
Sara - Unit-4
PPT ch09
PDF
PPT ch09
Creating A Response Toolkit: Gathering The Tools
PDF
Creating A Response Toolkit: Gathering The Tools
Gcia Tools
PDF
Gcia Tools
CS - 6004 Cyber Forensics 1 PDF
PDF
CS - 6004 Cyber Forensics 1 PDF
Module 1 - Introduction To Digital Investigation and Forensics
PDF
Module 1 - Introduction To Digital Investigation and Forensics
Network File Systems
PDF
Network File Systems
Se161148 Lab2 3.2,4,6.1
PDF
Se161148 Lab2 3.2,4,6.1
CS Unit 4
PDF
CS Unit 4
Lab 2 - Steganography and MD5 Hashing
PDF
Lab 2 - Steganography and MD5 Hashing
Chapter 3 - Cyber Security
PDF
Chapter 3 - Cyber Security
Introduction to Cyber Security and Ethical Hacking
PDF
Introduction to Cyber Security and Ethical Hacking
15 - CHFI (Mobile and IoT Forensics) - RD
PDF
15 - CHFI (Mobile and IoT Forensics) - RD
Cyber Security - Network Intrusion Case Study
PDF
Cyber Security - Network Intrusion Case Study
Digital Forensics and Incident Response (DFIR)
PDF
Digital Forensics and Incident Response (DFIR)
4680 ch04
PDF
4680 ch04
Data Privacy and Security
PDF
Data Privacy and Security
ISM Lab 6
PDF
ISM Lab 6
Data Formats
PDF
Data Formats
Internship Report
PDF
Internship Report
Cyber Forensics Unit - 1 Computer Forensics
PDF
Cyber Forensics Unit - 1 Computer Forensics
UNIT-4 Cybersecurity Complete Notes
PDF
UNIT-4 Cybersecurity Complete Notes
Explorning The Role of Machine Learning in Enhancing Cloud Security
PDF
Explorning The Role of Machine Learning in Enhancing Cloud Security
Module 02 - Computer Forensics Investigation Process - AG - 25
PDF
Module 02 - Computer Forensics Investigation Process - AG - 25
Cloud Forensics
PDF
Cloud Forensics
ECC Product Info 4hours
PDF
ECC Product Info 4hours
Capability Maturity Model (CMM) & It's Levels in Software Engineering
PDF
Capability Maturity Model (CMM) & It's Levels in Software Engineering
FTK Ug
PDF
FTK Ug
6 Analysis & Validation Xid-10936710 2
PDF
6 Analysis & Validation Xid-10936710 2
2 Authentication - Access Control & Cryptography
PDF
2 Authentication - Access Control & Cryptography
(eBook PDF) Information Security: Principles and Practices 2nd Editionpdf download
PDF
(eBook PDF) Information Security: Principles and Practices 2nd Editionpdf download
Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning
PDF
Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning
Digital Signature
PDF
Digital Signature
Feasibility Study SaaS
PDF
Feasibility Study SaaS
CSCL Chapter 1 Introduction To Computer Security
PDF
CSCL Chapter 1 Introduction To Computer Security
INT250
PDF
INT250
CH 01
PDF
CH 01
report
PDF
report
COIT20263 Information Security Management - Assignment 2
PDF
COIT20263 Information Security Management - Assignment 2
Paper II Cyber and Information Security II
PDF
Paper II Cyber and Information Security II
DigitalForensics Unit1 2
PDF
DigitalForensics Unit1 2