![Digital-Evidence-Standards---Information-Systems-and-Internet-數(shù)字證據(jù)標(biāo)準(zhǔn)的信息系統(tǒng)與互聯(lián)網(wǎng)-PPT課件_第1頁](http://file4.renrendoc.com/view/41e39093db0f3d6275bdae3c67c5d5fa/41e39093db0f3d6275bdae3c67c5d5fa1.gif)
![Digital-Evidence-Standards---Information-Systems-and-Internet-數(shù)字證據(jù)標(biāo)準(zhǔn)的信息系統(tǒng)與互聯(lián)網(wǎng)-PPT課件_第2頁](http://file4.renrendoc.com/view/41e39093db0f3d6275bdae3c67c5d5fa/41e39093db0f3d6275bdae3c67c5d5fa2.gif)
![Digital-Evidence-Standards---Information-Systems-and-Internet-數(shù)字證據(jù)標(biāo)準(zhǔn)的信息系統(tǒng)與互聯(lián)網(wǎng)-PPT課件_第3頁](http://file4.renrendoc.com/view/41e39093db0f3d6275bdae3c67c5d5fa/41e39093db0f3d6275bdae3c67c5d5fa3.gif)
![Digital-Evidence-Standards---Information-Systems-and-Internet-數(shù)字證據(jù)標(biāo)準(zhǔn)的信息系統(tǒng)與互聯(lián)網(wǎng)-PPT課件_第4頁](http://file4.renrendoc.com/view/41e39093db0f3d6275bdae3c67c5d5fa/41e39093db0f3d6275bdae3c67c5d5fa4.gif)
![Digital-Evidence-Standards---Information-Systems-and-Internet-數(shù)字證據(jù)標(biāo)準(zhǔn)的信息系統(tǒng)與互聯(lián)網(wǎng)-PPT課件_第5頁](http://file4.renrendoc.com/view/41e39093db0f3d6275bdae3c67c5d5fa/41e39093db0f3d6275bdae3c67c5d5fa5.gif)
版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
1、Why standards?A scenarioDagestan separatistsSupported by Islamic fundamentalistsSend two teams:WashingtonLondonWire transfer funds from:ParisRomeBy means of PC bankingSimultaneously explode two devicesThe crime scenesSubjects identifiedComputers recoveredReveal communications linksRequests for inves
2、tigationsAdditional digital evidence collectedDigital evidence became the glueDigital Evidence TrailCritical issuesHow do we ask for what evidence?Do we get what we thought we asked for?Can we use what we received?Why standards?Trans-jurisdictionalExchangeDigital evidenceWhat standards?DefinitionsPr
3、inciplesProcessesOutcomesCommon languageHow it started1993 - 1st International Conference on Computer Evidence2019 - International Organization on Computer Evidence formed2019 - IOCE & G-8 independently decide to develop standardsHow it started - continued2019 - G-8 asks IOCE to undertake this initi
4、ative2019 - SWG-DE formed to pursue U.S. participation2019 - ACPO, FCG and ENSFI agree to participate2019 - INTERPOL is briefed on progressWhere we are nowUK Good Practice Guide (ACPO)ENSFI Working GroupSWG-DE draft /swgdein.htm (under construction)October 4-7, 2019IOCE, ACPO, FC
5、G & ENSFI meet on European standards ihcfc - results forthcommingWhere we are goingFirst you must crawlCreate foundationdefinitionsprinciplesprocessesDurableUniversalall digital evidence typesmutually understoodWhat will the impact be?Evidence will be collectedCases will be madeEvidence is the found
6、ation of criminal justiceLaw enforcement will assume its proper roleThe world will be a little saferA Brief History of CART Protocols.1st Gen. - “The Big Book” (shotgun)Problem - out of date the day it came out2ed Gen. - Checklist (linear) combined w/the Big Book as a referenceProblem - do 1, do 2,
7、do 3 - what if 2 doesnt work? 3rd Gen. - Descriptions & Flow Chart, the Big Book becomes an independent referenceBased on DE Principals, independent of application or OS (link)SWG-DE Definitions:Digital evidence -is information of probative value stored or transmitted in digital form (SWG-DE 7/14/98
8、)is acquired when information and/or physical items are collected and stored for examination purposes. (SWG-DE 8/18/98)SWG-DE Principle:Evidence HandlingANY action which has the potential to alter, damage or destroy any aspect of original evidence must be performed by qualified persons in a forensic
9、ally sound manner (SWG-DE 3/12/99)SWG-DE Definitions:Evidence typesOriginal digital evidence - physical items and all the associated data objects at the time of acquisitionSWG-DE Definitions:Evidence types cont.Duplicates - an accurate reproduction of all data objects independent of the physical ite
10、mCopy - an accurate reproduction of the information contained in the data objects independent of the physical item.In Summary.Nearly all computer crime is trans-jurisdictionalStandards for collection & processing evidence required to share evidenceAdopt standards - compare standardsDE Forensics is a
11、 specialty, distinct from computer investigationsForensic Laboratories encouraged to lead effort to develop standardsQuestions?Mark M. PollittUnit CDon CavenderSupervisory Special AComputer Analysis Response TeamRoom 4315935 Pennsylvania Ave, NWWashi
12、ngton, DC 20535 USA202.324.9307Computer Investigative SkillsDigital Evidence Collection SpecialistFirst Responder2-3 days trainingSeize & Preserve Evidentiary Computers/MediaComputer InvestigatorAbove experience +Understanding of Internet/Networks/Tracing computer communications, etc.1 to 2 weeks sp
13、ecialized trainingComputer Forensic ExaminerExamines Original MediaExtracts Data for Investigator to review4 - 6 weeks specialized trainingDigital evidence = Latent evidence:Is invisibleIs easily altered or destroyedRequires precautions to prevent alterationRequires special tools and equipmentRequir
14、es specialized trainingRequires expert testimonyForensic ModelQuality AssurancePeopleEquipmentProtocolsServices Provided by Computer Forensic ExaminersExamsComputer and diskette examsOther media - Jaz, Zip, MO, Tape backupsPDAsOn site support of search warrantsConsultation with investigators and pro
15、secutorsExpert testimony for results and proceduresAdditional ServicesRecover deleted, erased, and hidden dataPassword and encryption crackingDetermine effects of codesuch as malicious virusCART Field Examiner (FE) Certification4-5 weeks specialized in-service training4 weeks commercial trainingLab
16、internship if desired or necessaryOne year for certification process$25,000 to train & equip a new examinerAlso, annual re-certification and commercial training for FEs - 3 year commitmentOther Computer Forensic CertificationsSCERS - Treasury version of CARTalso offered to Local LEA through FLETCIAC
17、IS - LEA non profit association Local LEOsState LabsSome commercial and academic programs in early developmentComputer Forensic TrainingIACIS - International Association of Computer Investigative Specialists - /Federal Law Enforcement Training Center (FLETC) Financial Fraud Institute - (SCER
18、S Training) /fletc/ffi/ffi_home.htmHTCIA - High Technology Crime Investigation Association - /SEARCH Group - / National White Collar Crime Center - Computer Forensic EquipmentExamination Desktop $3,000Highest performance affordableSCSI, DVD, Super DriveAdditional Large Hard Drive $ 500Printer $ 500 - $1500Search & Examination Notebook $ 3,000PCMCIA SCSI & Network Cards $ 300Additional Large Hard Drive $ 500External Backup (MO, Jaz or Tape Drive) $ 500 -
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 會博通 文件檔案知識一體化管理的引領(lǐng)者(單用戶版)
- 廣東省佛山市普通高中高三教學(xué)質(zhì)量檢測(一)語文試題(含答案)
- 專題06《最動聽的聲音》《把奮斗寫進(jìn)明天》《成功的鑰匙》《青年之擔(dān)當(dāng)》
- 購書買賣合同
- 產(chǎn)品代銷合同范本
- 幼兒園重陽節(jié)主題活動策劃方案五篇
- 包裝材料購銷合同范本
- 2024年世界旅游產(chǎn)業(yè)發(fā)展投資合同
- 海參海鮮采購合同
- 西安二手車買賣合同
- 電力溝施工組織設(shè)計(jì)-電纜溝
- 《法律援助》課件
- 《高處作業(yè)安全》課件
- 鍋爐本體安裝單位工程驗(yàn)收表格
- 一種基于STM32的智能門鎖系統(tǒng)的設(shè)計(jì)-畢業(yè)論文
- 妊娠合并強(qiáng)直性脊柱炎的護(hù)理查房
- 2024年山東鐵投集團(tuán)招聘筆試參考題庫含答案解析
- 兒童10歲生日-百日宴-滿月酒生日會成長相冊展示(共二篇)
- 《繪本閱讀與指導(dǎo)》課程教學(xué)大綱
- 員工離職登記表(范本模板)
- 2023人教版(PEP)小學(xué)英語(三、四、五、六年級)詞匯及常用表達(dá)法(課本同步)
評論
0/150
提交評論