Electronic devices leave digital footprints and data trails.
Computer forensics encompasses data preservation, acquisition, extraction, and interpretation.
Various electronic devices are included in computer forensics.
The Basics
Hardware vs Software
Hardware: Physical components of a computer.
Software: Programs that execute tasks on hardware.
Key Terminology
Computer Case/Chassis: Enclosure for internal components.
Power Supply: Converts wall outlet power for use by components.
Motherboard: Main circuit board connecting all hardware parts.
System Bus: Network of wires on the motherboard carrying data.
Memory Types
Read-Only Memory (ROM): Stores firmware for booting and configuration.
Random Access Memory (RAM): Volatile memory storing data temporarily while active.
Central Processing Unit (CPU): The brain of the computer processing instructions.
Input/Output Devices
Input Devices:
Examples: Keyboard, mouse, joystick, scanner.
Output Devices:
Examples: Monitor, printer, speakers.
Hard Disk Drive (HDD) Details
Primary data storage location, with different operating system mapping.
Data Evidence:
Two types: Visible and latent data.
Data Storage Methods
Partitioning: Organizing HDD space into segments for use.
Sectors: Basic units of storage, typically 512 bytes.
Clusters: Combinations of sectors defined by the operating system.
Tracks: Concentric circles on the platter of the HDD.
Cylinders: Groups of tracks stacked vertically.
File Management Systems
File Allocation Table (FAT): Map of files and folders in a partition.
NTFS (New Technology File System): Used in modern Windows systems, includes a Master File Table (MFT).
Processing the Electronic Crime Scene
Similar to traditional crime scene processing:
Warrants and documentation needed.
Decision on live data acquisition must be made.
Shutdown vs. Pulling the Plug
Considerations:
Encryption may render data unreadable if power is cut.
Critical data in RAM could be lost if power is severed.
Forensic Image Acquisition
Best Practices: Aims to avoid altering data during acquisition.
Generally involves removing HDDs to create forensics images.
Fingerprinting for Verification:
Use of cryptographic algorithms like MD5 or SHA to ensure data integrity.
Data Types in Forensics
Visible Data: Data accessible to users, such as documents, spreadsheets, photos, etc.
Temporary Files: Created for backup, can provide evidence.
Latent Data: Not known to the operating system, including RAM slack and deleted file remnants.
Analysis of Internet Data
Investigators look for:
Cached files, cookies, internet history.
Use forensic software to read history files and bookmarks.
IP Address Basics
Format: ###.###.###.###, with values between 0-255.
Essential for directing data on the Internet and investigating web activity.
Investigating Internet Communications
Email Tracking: Origin traced via sender's IP address in headers.
Chat Logs: Often reside in RAM.
Unauthorized Access Investigation: Analyze log files, RAM, and network traffic.
Summary of Content
The material covers crucial aspects of computer forensics including terminology, data management, evidentiary guidelines, and internet analysis methods, essential for understanding computer forensics practices.