170 likes | 271 Views
Collection & Processing of Electronic Information. 25 th , January; 2011. EDRM. Know Your Landscape. Questions: Who are the “Players”? Secretaries/Executive Assistants? Network type Devices/Media Corporate Issue vs. Personal?. Collection. Traditional. Password Recovery.
E N D
Collection & Processing of Electronic Information 25th, January; 2011
Know Your Landscape • Questions: • Who are the “Players”? • Secretaries/Executive Assistants? • Network type • Devices/Media • Corporate Issue vs. Personal?
Collection Traditional Password Recovery Bit-stream Imaging HASH Original HD Forensic Copy Signature Analysis Extraction History Email Internet History Passwords
Network • Examples: • File Servers • Server Farms • Issues: • Dynamic • Geographical Locations • Size • Use
Archival Media • Examples: • Tapes • Hard Drives • Issues: • Reliability • Archival Schemes • Costs
Mobile Devices • Examples: • Cellular Phones • Tablets • GPS • Issues: • Ownership • Channels
Cloud Computing • Examples: • Google Mail • Google Docs • MS Office Web Apps • Issues: • Ownership • Geographical • Collection
Social Media • Examples: • Facebook • Twitter • LinkedIn • Issues: • Ownership • Geographical • Collection
Forensic Imaging • Forensic Imaging: • the entire drive contents are imaged to a file and checksum values are calculated to verify the integrity (in court cases) of the image file (often referred to as a “hash value”). • Forensic images are acquired with the use of software tools. (Some hardware cloning tools have added forensic functionality.) – EnCase, FTK, DD, etc. • HASH – MD5 or SHA
Forensic Imaging Data are stored in “bucket” like storage Empty Data Data Empty Data Data Empty Data UA Space Data
Collection • Covert vs. Office Hour • Forensic Imaging vs. Logical File Imaging vs. Manual Collection • Chain of Custody
Q&A Kevin Lo Email: klo@ffpl.ca Twitter: kevin_lo Phone: +1 (416) 926-4215