Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

ISEC 4330

Rating
-
Sold
-
Pages
29
Uploaded on
08-04-2024
Written in
2023/2024

summarize of the course ISEC 4330

Institution
Course

Content preview

01-Computer forensics
Outlines:
• Definition of computer forensics
• Digital evidence and recovery:
1. Digital evidence on computer system
2. Digital evidence on network
• Challenges


Definition of computer forensics: type of investigation by collecting data and evidence from
technical devices using computer or investigation devices
Preservation, Identification, extraction, documentation and interpretation of computer media for
root cause analysis using well-defined methodologies and procedures


The functions of forensics scientist:
• Analysis of physical evidence
• Provision of expert testimony
• Furnishes of proper recognition, collection and preservation


Methodologies:
• Obtain the evidence without damaging the original
• Authenticate that the evidences have the same size of the original seized
• Analyze data without modifying it


Categories of evidence:
• Hardware
• Software: data and programs


Evidence resides:
• Computer system:
1. Logical file system: file system, RAM, physical space storage
2. Slack space
3. Unallocated space
• Computer networks:

, 1. Application layer: web pages, online documents, e-mail, news group archives,
chat room archives
2. Transportation layer: log files in host modem, ISP, firewall, router
3. Network layer
4. Data link layer




Challenges of computer forensics:
• microcomputer may have 60-GB or more storage capacity.
• There are more than 2.2 billion messages expected to be sent and received (in US) per
day
• There are more than 3 billion indexed Web pages worldwide.
• There are more than 550 billion documents online.
• Exabytes of data are stored on tape or hard drives.
• How to collect the specific, probative, and case-related information from very large
groups of files?
•Link analysis
•Visualization
• Enabling techniques for lead discovery from very large groups of files:
•Text mining
•Data mining
•Intelligent information retrieval
• Computer forensics must also adapt quickly to new products and innovations with valid
and reliable examination and analysis techniques.


02-Cyber Forensics
Communities of computer forensics:
• Law enforcement
• Military
• Business and industry
• Academia


Cyber forensics activities:
• The secure collection of digital data
• The identification of suspect data
• The examination of suspect data to determine the original and content

, • The presentation of computer-based data to the court of law
• The application of country’s law to computer practice


Forensic Principles:
• Digital/ Electronic evidence is extremely volatile!
• Once the evidence is contaminated it cannot be de-contaminated!
• The courts acceptance is based on the best evidence principle
• Chain of Custody is crucial


Cyber Forensic Principles:
1.When dealing with digital evidence, all of the general forensic and procedural principles must
be applied.
2.Upon seizing digital evidence, actions taken should not change that evidence.
3.When it is necessary for a person to access original digital evidence, that person should be
trained for the purpose.
4.All activity relating to the seizure, access, storage or transfer of digital evidence must be fully
documented, preserved and available for review.
5.An Individual is responsible for all actions taken with respect to digital evidence whilst the
digital evidence is in their possession.
6.Any agency, which is responsible for seizing, accessing, storing or transferring digital evidence
is responsible for compliance with these principles.


Phases of forensics:
• Identification: The first step is identifying evidence and potential containers of evidence:
Small scale devices
Non-traditional storage media
Multiple possible crime scenes
Context of the investigation is very important, Do not operate in a vacuum, Do not
overlook non-electronic sources of evidence
• Collection: Care must be taken to minimize contamination, Collect or seize the system,
create forensic image, take detailed photos and notes of the computer, make sure to take
photos and notes of all connections to the computer/other devices, make 2 copies and
don’t work from the original
A file copy does not recover all data areas of the device for examination, Working from a
duplicate image

Written for

Institution
Course

Document information

Uploaded on
April 8, 2024
Number of pages
29
Written in
2023/2024
Type
Class notes
Professor(s)
Najim albimani
Contains
All classes

Subjects

$10.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
mohamedal-habsi

Get to know the seller

Seller avatar
mohamedal-habsi modern collage of business and science
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
2 year
Number of followers
0
Documents
3
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions