Premium Essay

Internet Forensics

In:

Submitted By eniac
Words 1947
Pages 8
IP Addresses IP Addresses
• IP Address – numerical label of a device IP Address numerical label of a device participating in a network • IPv4 32 bit x x x x IPv4 – 32 bit – x.x.x.x • IPv6 – 128 bit hex – x.x.x.x.x.x.x.x • Static vs. Dynamic • Address lease expiration, “sticky dynamic IPs” p , y y

Internet Registries Internet Registries
• ARIN – North America, part of the Caribbean, Sub‐Saharan Africa • RIPE – Europe, Middle East, parts of Africa and Asia • APNIC – Asia‐Pacific Asia Pacific • LACNIC – Latin America, Caribbean • Private IP Ranges:
IPv4 : IP 4 192.168.0.0 192 168 0 0 10.0.0.0 172.16.0.0 FEC ‐ FEF FE8 ‐ FEB

IPv6 : IP 6 Site‐local: Link‐local:

DNS
• DNS (Domain Name System) – hierarchical S( o a a e Syste ) e a c ca naming system for any resource connected to a network or Internet. • Maintains the domain namespace and provides translation services between the IP and DN namespaces • DNS Server maintains:
– (A) Add (A) Address records d – (NS) Name server records – (MX) Mail exchanger records (MX) Mail exchanger records

DNS on the Internet DNS on the Internet
• ICANN – Internet Corporation of Assigned Names and Numbers
• • • • IP address allocation Protocol identifier assignment Country code / top‐level domain management Root server management

• Top‐Level Domain – highest hierarchical level in DNS
– – – – Category ‐ .com, .net, .org, .biz, .name, .pro Country ‐ .ua, .ru, .cn, .us, .ca Sponsored ‐ .aero, .jobs, .travel, .mobi, .edu, .gov, .mil Infrastructure – .arpa, .localhost, .test, .example, .invalid

• Domain Name Registry – database of all domains registered to a top‐level domain t l ld i • Domain Name Registrar – agency accredited by ICANN to manage domain name reservations (GoDaddy, TwoCows, Network Solutions, etc.) etc )

DNS Concerns DNS Concerns
• • DNS Cache Poisoning ‐ is a maliciously created or

Similar Documents

Free Essay

Security Job Search

...000/Yr Title: Forensics Managing Specialist –Security JOB DESCRIPTION All Forensics Candidates are encouraged to apply. Jr. to Sr. level positions are available from 2 years to 10+ years experience. Salary based on experience. A Bachelor's Degree in Forensics or related is a plus. This is a full time perm position. Must be willing to travel nationwide. Our client’s computer forensics team is a comprehensive solution for global data collections and forensic analysis. They offer best-in-class security. From small to large matters, they provide easy to understand interpretations of findings and a single point of contact. The Managing Consultant utilizes state of the art techniques that enable the recovery and use of critical electronic evidence for litigation, investigations and other fact-finding exercises. The Computer Forensics Managing Consultant establishes whether evidence has been erased or modified; analyzes electronic content and patterns of Internet and e-mail usage; recovers deleted data; and assesses and explains metadata within recovered files. RESPONSIBILITIES Manage day to day activities for projects involving computer forensics, information security or rapid response data breach matters. Manage large data preservation and collection activities to ensure that accepted forensic protocols; create and maintain Chain of Custody; document the handling of evidence. Analyze log files from firewalls, web servers and computers. Conduct forensic analysis and write...

Words: 585 - Pages: 3

Free Essay

Assignnment Template

...Job Title | Description | Skills Required (list at least five skills, three of which are specific skills in the field of criminal justice). | Why are the skills listed needed to succeed in the position? | Computer Forensics Science Technicians | Forensic science technicians help investigate crimes by collecting and analyzing physical evidence. Many technicians specialize in either crime scene investigation or laboratory analysis. Most forensic science technicians spend some time writing reports. | Skills required for this career are: communication skills; composure; critical thinking skills; detail oriented; as well as problem solving skills. | Forensic science technicians write reports and testify in court. They often work with other law enforcement and specialists. Crime scenes are often the results of acts of violence and destruction, but technicians have to maintain their professionalism and objectivity. Forensic science technicians use their best judgment when matching physical evidence, such as fingerprints and DNA, to suspects. Forensic science technicians must be able to notice small changes in mundane objects to be good at collecting and analyzing evidence. Forensic science technicians use scientific tests and methods to help law enforcement officials solve crimes. | Information Security Analyst | Information security analysts plan and carry out security measures to protect an organization's computer networks and systems. Their responsibilities are continually expanding...

Words: 529 - Pages: 3

Premium Essay

Cyber Crime in India

...against computers, or against information on computers, is beginning to claim attention in the India. The digital age has dramatically changed the scope of a crime by adding the electronic component and it comes a new form of science ≴Computer Forensic Science≵. Computer Forensic allows for the evidence of cyber crime to be admissible in court when prosecuting the cyber criminal. In most countries, existing laws are likely to be unenforceable against such crime. Cyber laws, as it stand today, gives rise to both positive & negative consequences. The main negative consequences is the digital soup so vague that many refer to it as the dark sides of technology and that cyber criminal currently have upper hand. The applicability and effectiveness of our existing laws need to be constantly reviewed to face the risk coming from the cyber world. In this paper we are going to firstly describe the computer forensic, cyber crimes, cyber laws of nation & technology challenges. Aim of this paper is to act as a catalyst to raise awareness regarding computer forensic which continues to grow as one of the most important branch of science and help in investigation of cyber crime which continues to grow as one of the most potent threats to the Internet and computer users of the cyber society of 21st century in India Introduction The rapid change occurring in the present era of Information Technology and the computer has gained popularity in every aspect of our lives. This includes the use...

Words: 2686 - Pages: 11

Premium Essay

Essay On Computer Forensics

...Abstract: Rising era of computer and other technologies as internet and gadgets, explosively increase in number of cybercrime or other crimes using technologies. The growth of computer forensic has taken as huge success to control those crimes which are committed using computers. The main task of computer forensic is to examining and collecting electronic data as evidence from a crime scene. The work of computer forensic is to recover the data which has been hacked or lost by the criminals using different system. The growing dependency on computer forensic has decreased the cybercrime and professionals have to understand the computer technology that is used in computer forensic. Introduction Forensic roots from a Latin word, “forensic” which...

Words: 870 - Pages: 4

Free Essay

Computer Forensics

...International Journal of Digital Evidence Fall 2007, Volume 6, Issue 2 Computer Forensic Analysis in a Virtual Environment Derek Bem Ewa Huebner University of Western Sydney, Australia Abstract In this paper we discuss the potential role of virtual environments in the analysis phase of computer forensics investigations. General concepts of virtual environments and software tools are presented and discussed. Further we identify the limitations of virtual environments leading to the conclusion that this method can not be considered to be a replacement for conventional techniques of computer evidence collection and analysis. We propose a new approach where two environments, conventional and virtual, are used independently. Further we demonstrate that this approach can considerably shorten the time of the computer forensics investigation analysis phase and it also allows for better utilisation of less qualified personnel. Keywords: Computer Forensics, Virtual Machine, computer evidence. Introduction In this paper we examine the application of the VMWare (VMWare, 2007) virtual environment in the analysis phase of a computer forensics investigation. We show that the environment created by VMWare differs considerably from the original computer system, and because of that VMWare by itself is very unlikely to produce court admissible evidence. We propose a new approach when two environments, conventional and virtual, are used concurrently and independently. After the images...

Words: 3983 - Pages: 16

Premium Essay

Networking

...Digital Forensics is an important aspect to computer systems security. I mean we are talking about Identifying, Collecting, Preserving, Analyzing, and Presenting evidence digitally. Therefore, preserving electronic evidence is important. Investigating Data Theft is a malice act towards a company/ organization (Kruse, 2001). Such theft is made by an employee that is either terminated or resigning. Motives for data theft include setting up a competing business, using the information at a new job, sense of ownership of what was created, and revenge against the employer, among other things. Common Theft include, customer information, financial records, software code, email lists, strategic plans, process documents, secret formulas, databases, research and development materials, and employee records. Now, with such theft around, we often wonder how is such theft achieved. Knowing how technology is always advancing each year, the millennium era grows with fascinating knowledge on the know how to working a computer, hard drives, etc. Tools like flash drive, which can hold thousands of documents that can be copied to the flash drive, and taken anywhere. Then you have Dropbox, remote desktop connections, personal email accounts, smart phones, CD’s/DVD’s, and FTP ( File Transfer Protocol ) (Kruse, 2001) There is always this saying, that personnel who steal data often leave a trail of digital evidence that proves invaluable when investigating data theft. We as the forensic specialists...

Words: 1774 - Pages: 8

Free Essay

Computer Forensics

...Computer Forensics The world of crime has expanded right along with the explosion of the internet. The modern cyber criminal has veritable global playground in which to steal money and information from unsuspecting victims. Computer forensics is a quickly emerging science against the increasingly difficult battle to bring criminals to justice who perpetrates crimes on others. The computer forensics field is a relatively new investigative tool but enjoys continual advances in procedures, standards, and methodology which is making the identification, preservation, and analyzing of digital evidence a powerful law enforcement apparatus. The job of the cyber forensic professional is to look for clues the attacker left behind on web sites, servers, and even the e-mail message itself that will unravel their sometimes carefully woven veil of secrecy. Attackers come in all forms and from a variety of different circumstances. For instance, an attacker can begin a phishing scam with only a web server they control with very little programming experience and a way to send a lot of e-mail messages. (Jones 4) In order to combat the waves of cyber-attackers, we must utilize Open Source Community applications to combat the continual onslaught of infections, exploitations, and trickery employed everyday against our systems and networks. Today's attacker uses a variety of technologies to employ their methods and understanding those abilities is integral to preparing for an investigation...

Words: 2742 - Pages: 11

Free Essay

Assignment 1: Computer Forensics Overview

...Assignment 1: Computer Forensics Overview CIS 417 Computer Forensics Computer forensics is the process of investigating and analyzing techniques to gather and preserve information and evidence from a particular computing device in a way it can be presented in a court of law. The main role of computer analyst is to recover data including photos, files/documents, and e-mails from computer storage devices that were deleted, damaged and otherwise manipulated. The forensics expert’s work on cases involving crimes associated with internet based concerns and the investigations of other potential possibilities on other computer systems that may have been related or involved in the crime to find enough evidence of illegal activities. Computer experts can also use their professional knowledge to protect corporate computers/servers from infiltration, determine how the computer was broken into, and recover lost files in the company. Processes are used to obtain this information and some of the processes are as follows; * Investigation process: Computer forensics investigations will typically be done as part of a crime that allegedly occurred. The first step of the investigation should be to verify that a crime took place. Understand what occurred of the incident, assess the case, and see if the crime leads back to the individual. * System Description: Next step, once you verified the crime did occur, you then begin gathering as much information and data about the specific...

Words: 1397 - Pages: 6

Premium Essay

Term Paper

...Computer Forensic Investigator’s Role in Cases Abstract Today, more and more people are using their computers for everything, from communication, to online banking and investing, to shopping.  As we do these things on a more regular basis, we open ourselves up to potential hackers and attackers.  While some may be looking to phish your personal or proprietary information and identity for resale, others simply just want to use your computer as a platform from which to attack other unknowing targets. The people responsible for computer security and digital forensic examination need to continually update their skills, tools and knowledge to stay abreast with fast growing technology of today. In this day and time you can no longer just unplug a computer and leave it to be evaluated later at the lab. Information that is on computers is so critical to the investigation of a case. Systems today can easily lose data just by unplugging and turning it off, making it hard to recover any evidence needed. Without policies and procedures, investigators, one wouldn’t know this, two would potentially destroy and corrupt any evidence admissible in court and the whole unit would be lost and a total failure. That is why it is important that management establish guidelines and procedures. Although with technology continuing to change, constant revisions will be made to these documents, but ensuring they stay updated is most crucial of all. Computer Forensic examiners and investigators have...

Words: 1408 - Pages: 6

Premium Essay

Digital Forensics Case

...Digital forensics is the process of uncovering and interpreting electronic data for use in a court of law. In The main goal of the process is to preserve any evidence in its most original form while performing a structured investigation by collecting, identifying and validating the digital information which will be admissible in a court of law. To collect the document is has to follow certain guidelines. United States v. Gourde (2006) and United States v. Zeigler (2007) are both great examples of cases to investigate the case. The primary goal of this document is to demonstrate the importance of digital forensic in solving criminal investigation. In the following paragraph two criminal cases are studied and analyzed. In United States v. Gourde,...

Words: 980 - Pages: 4

Premium Essay

You Have Been Hired as the Chief Security Officer for a Local University. for This Role You Will Be Responsible for Establishing and Maintaining an Enterprise Wide Information Security Program to Ensure That All

...data assets are not compromised. Knowing the concepts that are presented in the course, you will develop a plan to carry out a security program that deters computer crimes, establishes a process for investigation and outlines which laws are applicable for possible offenders. Write a 8-10 page paper in which you: Research the Internet for recent computer hacker attacks or other crimes that have been committed against higher educational institutions. Analyze the processes put in place by other higher education institutions in order to prevent these crimes from reoccurring. Recommend processes, methodologies, or technology that can be purchased to lower computer crime threats. Include specifics on pricing and the level of support and maintenance that would be required. Research the Internet for current laws and government agencies that exist in your region that address the threat of computer cyber-crimes. Identify the laws that would be effective to convict offenders. Determine what computer crime fighting government programs exist within your region that can complement your security operations. Research the internet for computer forensics technology that can be used by the University. Identify the types and determine the costs of technology that can be used for gathering electronic evidence, evidence from hardware, evidence from Firewalls, or cell phones. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify...

Words: 432 - Pages: 2

Premium Essay

Professional Standard

...assignment is Computer Forensics Investigator I picked this job because I think that is the career path I want to take. I am currently getting my degree in Information technology and want to go for a bachelor’s in information systems security. The job of a Computer Forensics Investigator is to identify and collect digital data and evidence from all sorts of media like hard drives, flash drives and even the Internet. Once the digital evidence and data our collected then the Computer Forensics Investigator must examine and analyze the evidence to find out what the data is and what it was used for. The Computer Forensics Investigator must also help with the collecting of physical evidence at crime scenes such as computers and digital media. A day in the like of a Computer Forensics Investigator would in tale of the investigator going to a crime scene and collecting of evidence and talking it back to the computer lab. Where the investigator would take the evidence say a computer and getting all the digital data off the drive where they can analyze the data and the hand any incriminating evidence over to the lead investigator to aid in the capture of the criminals. The Investigator may even need to go as far as retrieve data from the drive that has been deleted this can be a completed task in its self because it can talk days some times to retrieve this deleted data and then all the data might not be available to get a complete file. The next thing the Computer Forensics Investigator must...

Words: 570 - Pages: 3

Premium Essay

Casey Anthony Trial

...her two year old granddaughter, Caylee Anthony missing to the authorities of Orange County in Orlando, Florida. During questioning, Casey Anthony, the mother of Caylee Anthony informed the authorities that her child hand been abducted by her nanny and that she had been searching for her unsuccessfully for a month (Alvarez, 2011). Throughout the initial investigation, detectives found a number of inconsistencies with Casey Anthony’s story which lead them to suspect she had a role in Caylee’s disappearance; this ultimately lead to charges being brought against her (Alvarez, 2011). This report will give a brief description of the background, charges and trial of Casey Anthony in the death of her daughter. It will also analyze the digital forensic evidence associated with the prosecution’s case. Investigation Details Casey Anthony stated to authorities that on the evening of June 9, 2008, after leaving work at Universal Studios she arrived at her nanny, Zenaida Fernandez’s, residence to find that both she and her daughter were gone. Casey Anthony informed detectives that she began a search of her own but was unable to locate her daughter (Alvarez, 2011). Upon further investigation, the detectives found that Casey Anthony’s statements were false. There was no record of a Zenaida Fernandez occupying an apartment at the complex Anthony listed. Additionally, she was unemployed and had not worked at Universal Studios for years; she was actually fired. Lastly, Anthony lied...

Words: 772 - Pages: 4

Premium Essay

Mobile Forensics

...Abstract Mobile forensics involves recovering and retrieving digital evidence or data from mobile devices under forensically sound conditions utilizing established methods (Ayers, Brothers, & Jansen, 2013). The field of mobile forensics is complicated as the variety in providers, manufacturers, propriety technologies and formats are extensive. These challenges are coupled with the fast release and upgrades to mobile devices making a forensic investigator’s job more arduous in attempting to examine and analyze these devices for the purpose of recovering data and evidence (Martin, 2008). This white paper will focus on the challenges of mobile device technology, the methodology utilized in examining these devices to recover data which is crucial to security investigations; which includes the tools, techniques and procedures necessary for gathering data from various similar devices. This paper will also focus on the training and expense of acquiring efficient forensic investigators and, as well as impending approaches for addressing challenges. Introduction “The goal of mobile forensics is the practice of utilizing sound methodologies for the acquisition of data contained within the internal memory of a mobile device and associated media providing the ability to accurately report one’s findings” Mobile devices, contrary to popular belief, includes an array of devices not limited to cellular phones and smartphones, but also include table devices, mp3 players, digital cameras...

Words: 1628 - Pages: 7

Premium Essay

Ist 454 Project

...|[pic] |Term Project Guideline |[pic] | Introduction The intent of this project is for your project group to conduct independent investigation and demonstrate an in-depth knowledge of a specific area related to Computer and Cyber Forensics (or digital forensics). The project can take several forms. Your team may (1) design a hands-on lab, (2) develop a comprehensive WWW portal on a topic related to cyber forensics, or (3) choose your own form and substance. Project Details The following paragraphs are guidelines for some of the project options: 1. Hands-on Lab Development Your team may elect to design a hands-on lab (similar to what you have practiced in this class). Your report should include an instructional guide for the lab and a report that documents your team’s exploration and results of the lab. The hands-on lab should cover the detailed process of conducting a complete forensic analysis (imaging, data recovery, and analysis) on selected digital devices or using criminal tools for attack, defense, and data recovery. Here is a list of possible devices or tools: Digital Devices: |Digital Music Device |Mobile Phone | |Flash Memory Cards |RIM (BlackBerry) Wireless Device ...

Words: 822 - Pages: 4