200 likes | 389 Views
Intro to Cyber Crime and Computer Forensics CS 4273/6273 August 18, 2004. MISSISSIPPI STATE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE. Instructors. Dr. Dave Dampier, Butler 300, 325-8923, dampier@cs.msstate.edu , Ofc Hrs: By Appointment With Assistance from: Dr. Peter Wood
E N D
Intro to Cyber Crime and Computer Forensics CS 4273/6273 August 18, 2004 MISSISSIPPI STATE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE
Instructors Dr. Dave Dampier, Butler 300, 325-8923, dampier@cs.msstate.edu, Ofc Hrs: By Appointment With Assistance from: Dr. Peter Wood Dr. Kent Kerley Various other guest lecturers
Textbook • Required: • Computer Forensics: Incident Response Essentials, by Warren Kruse and Jay Heiser • Vacca John R., Computer Forensics: Computer Crime Scene Investigation, Charles River Media, 2002 • Other material may be provided during the semester to read as well.
Academic Honesty • You are expected to do your own work on any homework assignments and on examinations, unless otherwise instructed. The Department's academic honesty policy applies to this class and can be accessed on the computer science web page at http://www.cse.msstate.edu/academics/honesty.html.
Course Requirements • Class Attendance and Participation • 10 % of grade • Assigned Readings – Required • Pop quizzes may be given at any time to check • Will impact participation grade. • Homework – Required almost weekly • Fridays • 20% of grade
Course Requirements (cont.) • Quizzes (3) • Cover material not tested to date • 10% of grade • No makeups will be given • Excused absences will be made up using a method acceptable to the professor • Unexcused absences will result in 0 for that quiz. • Midterm – Comprehensive • 20% of grade • Final – Comprehensive • 20% of grade
Course Requirements (cont.) • Undergraduate Term Paper • Assessment of some research area related to course work. • 3 to 5 pages • 20% of grade • Graduate Research Paper • Scholarly Work – Publication Quality • 7 to 10 pages • Evidence of independent research and understanding required. • 20% of grade
What is Forensics? • Forensics is the application of scientific techniques of investigation to the problem of finding, preserving and exploiting evidence to establish an evidentiary basis for arguing about facts in court cases
What is Computer Forensics? • Computer forensics is forensics applied to information stored or transported on computers • It “Involves the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and/or root cause analysis” • Procedures are followed, but flexibility is expected and encouraged, because the unusual will be encountered.
What is Computer Crime? • Two categories of computer crime: • Computer used to conduct the crime • Child Pornography/Exploitation • Threatening letters • Fraud • Embezzlement • Theft of intellectual property • Computer is the target of the crime • Incident Response • Security Breach
What is evidence? • Bytes • Files • Present • Deleted • Encrypted • Fragments of Files • Words • Sentences • Paragraphs
Where do we find it? • Storage Media • Hard Disks • Floppy Disks • CDs, Zip disks, tapes, etc. • RAM • Log Files
What do we do with it? • Acquire the evidence without altering or damaging the original. • Authenticate that your recovered evidence is the same as the originally seized data. • Analyze the data without modifying it.
Acquire the evidence • How do we seize the computer? • How do we handle computer evidence? • What is chain of custody? • Evidence collection • Evidence Identification • Transportation • Storage • Documenting the Investigation
Authenticate the Evidence • Prove that the evidence is indeed what the criminal left behind. • Readable text or pictures don’t magically appear at random. • Calculate a hash value for the data • CRC • MD5
Analysis • Always work from an image of the evidence and never from the original. • Prevent damage to the evidence • Make two backups of the evidence in most cases. • Analyze everything, you may need clues from something seemingly unrelated.
Analysis (cont.) • Existing Files • mislabeled • Deleted Files • Show up in directory listing with in place of first letter • “Dave.txt” appears as “ ave.txt” • Free Space • Slack Space • Swap Space
Schedule • Introduction to Cyber Crime and Forensics Kruse: Chapter 1 Vacca: Chapter 1 • Introduction to Cyber Crime and Forensics Kruse: Chapter 12 Vacca: Chapter 2 & 3 • Investigating Internet Clues Kruse: Chapter 2 Vacca: Chapter 11, 16, 17Quiz 1 • Structure of Storage Media Kruse: Chapter 3 Vacca: Chapter 4, 6 & 7 • Introduction to FAT File Systems Kruse: Chapter 8 • Data Recovery Kruse: Chapter 7 Vacca: Chapter 8, 9 & 10Quiz 2
Schedule • Introduction to NTFS File Systems • Encryption/Decryption Kruse: Chapter 4 • Data Hiding/Steganography Kruse: Chapter 5 Midterm • Windows Based Investigative Software Kruse: Chapter 7 • Hostile Code Kruse: Chapter 6 • Introduction to Unix File Systems Kruse: Chapter 9Quiz 3 • Introduction to Network Forensics Kruse: Chapter 10Term Papers Due • Network Forensics Kruse: Chapter 11 • Criminal Justice Issues Vacca: Chapter 5 • Wrap up and Final Review
? ? ? ? ? Questions? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ?