Exam 1 Flashcards
Bit
The smallest unit of measurement that a computer can interpret.
Also called a binary digit.
Binary
Being binary implies only implies only two possible states: 0 or 1
+5v or -5v
Yes or No
ASCII
American Standard Codes for Information Interchange.
7 bits per character.
Allows for 128 character possibilities.
1968.
Extended ASCII
8 bits (1 byte) per character. Added another 128 for a total of 256 characters.
Byte
Collection of 8 bits representing a single character.
Digital Forensics
The science of locating, extracting, and analyzing digital evidence in legal matters.
FBI CART
FBI Computer Analysis and Response Team.
Circa 1984.
No personal computers yet, started with larger main-frame type computers.
Fourth Amendment
Search warrants needed for digital devices.
Probable cause that crime has occurred and evidence is still there.
Can no longer search phone incident to arrest.
Warrants only apply to government, not corporate or private.
Sub-Disciplines
Growing in number. Computer Forensics. Network Forensics. Data Recovery. Disaster Recovery.
Network Forensics
Enterprise network environment.
Vulnerability assessment and risk management group.
IACIS
International Association of Computer Investigative Specialists.
Formed by police officers who wanted to formalize credentials in computing investigations.
Formed in early 1990’s.
Understanding Case Law
Technology evolves at an exponential rate.
Case law used when statutes or regulations don’t exist.
Laws developed in the 70’s.
Computer Investigation Types
Public investigations.
Private or corporate investigations.
Public Investigations
Law enforcement.
Performed by commissioned (armed) officers.
Moving toward more civilian investigators.
Private Investigations
No fourth amendment restrictions.
Mostly internal with corporations.
Often have tools for own needs.
Can still involve legal-type aspects.
Everything from harassment to falsifying data.
Can lead to criminal charges.
Handles evidence similar to law enforcement so that if it becomes criminal it can be handed over to police or court.
Professional Conduct in Corporate Investigations
Maintain objectivity by forming and sustaining unbiased opinions of case.
Keep cases confidential.
Case may become criminal if murder is involved (rare).
Professional conduct to maintain credibility.
Digital Forensics Examiner
Must know more than one computing platform.
Corporate Investigation Guidelines
Display warning banners to remind visitors and employees of policies.
Establish company policies.
Define and limit number of authorized requesters who can start investigation.
Silver-platter Doctrine
When private investigations hand evidence over to law enforcement because of indications of criminal activity.
Computer Forensics Lab
Conduct investigations.
Store evidence.
House equipment, hardware, and software.
ASCLD
American Society of Crime Laboratory Directors. Gives guidelines for: Managing a lab. Acquiring an official certification. Auditing lab functions and procedures.
Lab Manager Duties: Administrative
Enforce ethical standards among lab staff members.
Create and monitor lab policies for staff.
Promote group consensus in decision making.
Set reasonable production schedules.
Lab Manager Duties: Lab
Plan updates for lab.
Maintain fiscal responsibility for lab needs.
Provide safe and secure workplace for staff and evidence.
Lab Manager Duties: Processes
Set up processes for managing cases.
Establish and promote quality-assurance processes.
Estimate when to respect preliminary and final results.
Estimate how many cases an investigator can handle.
Lab Staff Member Duties
Hardware and software. OS and file types. Technical training. Deductive reasoning. Investigative skills.
Lab Budget Training
Break costs down into daily/quarterly/annual expenses.
Use past investigation expenses to extrapolate expected future costs.
Lab Expenses
Hardware.
Software.
Facility space.
Trained personnel.
Lab Budget Planning
Estimate number of cases lab expects to examine.
Identify types of computers you’re likely to examine.
Account for changes in technology.
Use statistics to determine which computer crimes are most likely to occur.
Acquiring Certification and Training
Update skills through appropriate training.
CEECS
Certified Electronic Evidence Collection Specialist.
CFCE
Certified Forensic Computer Examiner.
HTCN
High-Tech Crime Network.
Certified Computer Crime Investigator, basic and advanced level.
Certified Computer Forensic Technician, basic and advanced level.
EnCE
EnCase Certified Examiner Certification.
ACE
AccessData Certified Examiner Certification.
HTCIA
High Technology Crime Investigation Association.
SANS
SysAdmin, Audit, Network, Security Institute
NTI
NewTechnologies, Inc.
FLETC
Federal Law Enforcement Training Center
NW3C
National White Collar Crime Center
Physical Requirements for a Computer Forensics Lab
Secure so that evidence is not lost, corrupted, or destroyed.
Safe and secure physical environment.
Keep inventory control of assets.
Know when to reorder supplies.
Lab Security Needs: General
Secure to preserve integrity of evidence data.
People working together should have same access level.
Staff briefed about security policy.
Lab Security Needs: General Minimum Requirements
Small room with true floor-to-ceiling walls.
Door access with locking mechanism.
Secure containers.
Visitor’s log.
Conducting High-Risk Investigations
These demand more security than min. requirements.
TEMPEST facilities, very expensive.
Electromagnetic Radiation (EMR) proof.
Can use low-emanation workstations instead.
Using Evidence Containers
slide 6.2-7.1
Overseeing Facility Maintenance
slide 7.2
Physical Security Needs
slide 7.3
Auditing a Computer Forensics Lab
slide 8.1
Computer Forensic Lab Floorplans
slide 8.2-9.1
Selecting a Basic Forensic Workstation
slide 9.2
Workstations for Police Labs
slide 9.3
Workstations for Private/Corporate Labs
slide 10.1
Stocking Hardware Peripherals
slide 10.2
Maintaining Operating Systems and Software Inventories
slide 10.3
Using a Disaster Recovery Plan
slide 11.1
Planning Equipment Upgrades
slide 11.2
Using Laptop Forensic Workstations
slide 11.3
Lab Summary Points
slide 12.1-2