




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、Guide to Computer Forensics and Investigations Third EditionChapter 1Computer Forensics and Investigations as a ProfessionGuide to Computer Forensics and Investigations2Objectives Define computer forensics Describe how to prepare for computer investigations and explain the difference between law enf
2、orcement agency and corporate investigations Explain the importance of maintaining professional conduct Guide to Computer Forensics and Investigations3Understanding Computer Forensics Computer forensics Involves obtaining and analyzing digital information As evidence in civil, criminal, or administr
3、ative cases FBI Computer Analysis and Response Team (CART) Formed in 1984 to handle the increasing number of cases involving digital evidenceGuide to Computer Forensics and Investigations4Understanding Computer Forensics (continued)Guide to Computer Forensics and Investigations5Understanding Compute
4、r Forensics (continued) Fourth Amendment to the U.S. Constitution Protects everyones rights to be secure in their person, residence, and property From search and seizure Search warrants are neededGuide to Computer Forensics and Investigations6Computer Forensics Versus Other Related Disciplines Compu
5、ter forensics Investigates data that can be retrieved from a computers hard disk or other storage media Network forensics Yields information about how a perpetrator or an attacker gained access to a network Data recovery Recovering information that was deleted by mistake Or lost during a power surge
6、 or server crash Typically you know what youre looking forGuide to Computer Forensics and Investigations7Computer Forensics Versus Other Related Disciplines (continued) Computer forensics Task of recovering data that users have hidden or deleted and using it as evidence Evidence can be inculpatory (
7、“incriminating”) or exculpatory Disaster recovery Uses computer forensics techniques to retrieve information their clients have lost Investigators often work as a team to make computers and networks secure in an organizationGuide to Computer Forensics and Investigations8Computer Forensics Versus Oth
8、er Related Disciplines (continued)Guide to Computer Forensics and Investigations9Computer Forensics Versus Other Related Disciplines (continued) Enterprise network environment Large corporate computing systems that might include disparate or formerly independent systems Vulnerability assessment and
9、risk management group Tests and verifies the integrity of standalone workstations and network servers Professionals in this group have skills in network intrusion detection and incident responseGuide to Computer Forensics and Investigations10Computer Forensics Versus Other Related Disciplines (conti
10、nued) Litigation Legal process of proving guilt or innocence in court Computer investigations group Manages investigations and conducts forensic analysis of systems suspected of containing evidence related to an incident or a crimeGuide to Computer Forensics and Investigations11A Brief History of Co
11、mputer Forensics By the 1970s, electronic crimes were increasing, especially in the financial sector Most law enforcement officers didnt know enough about computers to ask the right questions Or to preserve evidence for trial 1980s PCs gained popularity and different OSs emerged Disk Operating Syste
12、m (DOS) was available Forensics tools were simple, and most were generated by government agenciesGuide to Computer Forensics and Investigations12A Brief History of Computer Forensics (continued) Mid-1980s Xtree Gold appeared on the market Recognized file types and retrieved lost or deleted files Nor
13、ton DiskEdit soon followed And became the best tool for finding deleted file 1987 Apple produced the Mac SE A Macintosh with an external EasyDrive hard disk with 60 MB of storageGuide to Computer Forensics and Investigations13A Brief History of Computer Forensics (continued)Guide to Computer Forensi
14、cs and Investigations14A Brief History of Computer Forensics (continued)Guide to Computer Forensics and Investigations15A Brief History of Computer Forensics (continued) Early 1990s Tools for computer forensics were available International Association of Computer Investigative Specialists (IACIS) Tr
15、aining on software for forensics investigations IRS created search-warrant programs ExpertWitness for the Macintosh First commercial GUI software for computer forensics Created by ASR DataGuide to Computer Forensics and Investigations16A Brief History of Computer Forensics (continued) Early 1990s (c
16、ontinued) ExpertWitness for the Macintosh Recovers deleted files and fragments of deleted files Large hard disks posed problems for investigators Other software iLook AccessData Forensic Toolkit (FTK)Guide to Computer Forensics and Investigations17Understanding Case Law Technology is evolving at an
17、exponential pace Existing laws and statutes cant keep up change Case law used when statutes or regulations dont exist Case law allows legal counsel to use previous cases similar to the current one Because the laws dont yet exist Each case is evaluated on its own merit and issuesGuide to Computer For
18、ensics and Investigations18Developing Computer Forensics Resources You must know more than one computing platform Such as DOS, Windows 9x, Linux, Macintosh, and current Windows platforms Join as many computer user groups as you can Computer Technology Investigators Network (CTIN) Meets monthly to di
19、scuss problems that law enforcement and corporations faceGuide to Computer Forensics and Investigations19Developing Computer Forensics Resources (continued) High Technology Crime Investigation Association (HTCIA) Exchanges information about techniques related to computer investigations and security
20、User groups can be helpful Build a network of computer forensics experts and other professionals And keep in touch through e-mail Outside experts can provide detailed information you need to retrieve digital evidenceGuide to Computer Forensics and Investigations20Preparing for Computer Investigation
21、s Computer investigations and forensics falls into two distinct categories Public investigations Private or corporate investigations Public investigations Involve government agencies responsible for criminal investigations and prosecution Organizations must observe legal guidelines Law of search and
22、 seizure Protects rights of all people, including suspectsGuide to Computer Forensics and Investigations21Preparing for Computer Investigations (continued)Guide to Computer Forensics and Investigations22Preparing for Computer Investigations (continued)Guide to Computer Forensics and Investigations23
23、Preparing for Computer Investigations (continued) Private or corporate investigations Deal with private companies, non-law-enforcement government agencies, and lawyers Arent governed directly by criminal law or Fourth Amendment issues Governed by internal policies that define expected employee behav
24、ior and conduct in the workplace Private corporate investigations also involve litigation disputes Investigations are usually conducted in civil casesGuide to Computer Forensics and Investigations24Understanding Law Enforcements Agency Investigations In a criminal case, a suspect is tried for a crim
25、inal offense Such as burglary, murder, or molestation Computers and networks are only tools that can be used to commit crimes Many states have added specific language to criminal codes to define crimes involving computers Following the legal process Legal processes depend on local custom, legislativ
26、e standards, and rules of evidenceGuide to Computer Forensics and Investigations25Understanding Law Enforcements Agency Investigations (continued) Following the legal process (continued) Criminal case follows three stages The complaint, the investigation, and the prosecutionGuide to Computer Forensi
27、cs and Investigations26Understanding Law Enforcements Agency Investigations (continued) Following the legal process (continued) A criminal case begins when someone finds evidence of an illegal act Complainant makes an allegation, an accusation or supposition of fact A police officer interviews the c
28、omplainant and writes a report about the crime Police blotter provides a record of clues to crimes that have been committed previously Investigators delegate, collect, and process the information related to the complaintGuide to Computer Forensics and Investigations27Understanding Law Enforcements A
29、gency Investigations (continued) Following the legal process (continued) After you build a case, the information is turned over to the prosecutor Affidavit Sworn statement of support of facts about or evidence of a crime Submitted to a judge to request a search warrant Have the affidavit notarized u
30、nder sworn oath Judge must approve and sign a search warrant Before you can use it to collect evidenceGuide to Computer Forensics and Investigations28Understanding Law Enforcements Agency Investigations (continued)Guide to Computer Forensics and Investigations29Understanding Corporate Investigations
31、 Private or corporate investigations Involve private companies and lawyers who address company policy violations and litigation disputes Corporate computer crimes can involve: E-mail harassment Falsification of data Gender and age discrimination Embezzlement Sabotage Industrial espionageGuide to Com
32、puter Forensics and Investigations30Understanding Corporate Investigations (continued) Establishing company policies One way to avoid litigation is to publish and maintain policies that employees find easy to read and follow Published company policies provide a line of authority For a business to co
33、nduct internal investigations Well-defined policies Give computer investigators and forensic examiners the authority to conduct an investigation Displaying Warning Banners Another way to avoid litigationGuide to Computer Forensics and Investigations31Understanding Corporate Investigations (continued
34、) Displaying Warning Banners (continued) Warning banner Usually appears when a computer starts or connects to the company intranet, network, or virtual private network Informs end users that the organization reserves the right to inspect computer systems and network traffic at will Establishes the r
35、ight to conduct an investigation As a corporate computer investigator Make sure company displays well-defined warning bannerGuide to Computer Forensics and Investigations32Understanding Corporate Investigations (continued)Guide to Computer Forensics and Investigations33Understanding Corporate Invest
36、igations (continued) Designating an authorized requester Authorized requester has the power to conduct investigations Policy should be defined by executive management Groups that should have direct authority to request computer investigations Corporate Security Investigations Corporate Ethics Office
37、 Corporate Equal Employment Opportunity Office Internal Auditing The general counsel or Legal DepartmentGuide to Computer Forensics and Investigations34Understanding Corporate Investigations (continued) Conducting security investigations Types of situations Abuse or misuse of corporate assets E-mail
38、 abuse Internet abuse Be sure to distinguish between a companys abuse problems and potential criminal problems Corporations often follow the silver-platter doctrine What happens when a civilian or corporate investigative agent delivers evidence to a law enforcement officerGuide to Computer Forensics
39、 and Investigations35Understanding Corporate Investigations (continued) Distinguishing personal and company property Many company policies distinguish between personal and company computer property One area thats difficult to distinguish involves PDAs, cell phones, and personal notebook computers Th
40、e safe policy is to not allow any personally owned devices to be connected to company-owned resources Limiting the possibility of commingling personal and company dataGuide to Computer Forensics and Investigations36Maintaining Professional Conduct Professional conduct Determines your credibility Includes ethics, morals, and standards of behavior Maintaining objectivity means you must form and sustain unbiased opinions of your cases Maintain an investigations credibility by keeping the case confidential In the corporate en
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 矿业招聘考试题及答案
- 客服专项考试题及答案
- 颗粒剂工岗位操作规程考核试卷及答案
- 机制砂石骨料生产工专项考核试卷及答案
- 二次雷达机务员设备维护与保养考核试卷及答案
- 推拿治疗学考试题附答案详解【突破训练】
- 环氧丙烷装置操作工知识考核试卷及答案
- 磨工技术考核试卷及答案
- 真空电子器件装配工职业考核试卷及答案
- 高炉运转工转正考核试卷及答案
- 脊柱骨折护理查房
- 2025年秋沪科版八年级数学上册 第11章综合测试卷
- 粉末冶金制品制造工技能测试题库及答案
- 《产品三维建模与结构设计(UG)》技工全套教学课件
- 昭阳区生活垃圾管理办法
- 项目绩效评价思路
- 校纪校规主题班会课件
- 浙江海洋大学《大学英语Ⅰ(5)》2023-2024学年第一学期期末试卷
- 新一代大学英语(第二版)综合教程1-U5-教师用书 Unit 5 Pursue your dream
- 2025至2030中国电解二氧化锰粉行业发展分析及发展趋势分析与未来投资战略咨询研究报告
- 《社会生活的变迁》教学课件
评论
0/150
提交评论