SlideShare a Scribd company logo
1 of 33
Computer Forensics Neil Greenberg
Forensics Page  Specializing in or having to do with the application of scientific knowledge to legal matters, as in the investigation of a crime.
Computer Forensics Page  Computer forensics is the process of collecting, preserving, and analyzing computers and computer media for the purpose of determining the presence of evidence.
Evidence Page  Anything properly admissible in a Court, that will aid the function of a criminal / civil proceeding in establishing guilt or innocence.
How Used ,[object Object],[object Object],Page
Who Uses  ,[object Object],[object Object],Page  Focus of practice
Who Uses  ,[object Object],[object Object],Page
Procedures  ,[object Object],[object Object],[object Object],Page
Procedures ,[object Object],[object Object],Page
Special Considerations
Computer Evidence Vs. Other ,[object Object],[object Object],[object Object],Page
Science Vs. Art ,[object Object],[object Object],[object Object],Page
The Process An Overview
Protecting the Evidence ,[object Object],[object Object],[object Object],Page
Collecting the Evidence ,[object Object],[object Object],[object Object],[object Object],Page
Data Replication ,[object Object],[object Object],[object Object],Page
Replication Process ,[object Object],[object Object],[object Object],Page
Exam System Replica ,[object Object],[object Object],[object Object],[object Object],Page
Exam System Replica Alternate ,[object Object],[object Object],[object Object],Page
Performing an Examination ,[object Object],[object Object],[object Object],[object Object],Page
Basic Processing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Page
Verify Virus Free ,[object Object],[object Object],[object Object],[object Object],Page
Survey the Contents ,[object Object],[object Object],[object Object],Page
Examining File Content ,[object Object],[object Object],[object Object],[object Object],Page
Erased Files ,[object Object],[object Object],Page
Hidden Files ,[object Object],[object Object],[object Object],[object Object],Page
Where Data Hides ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Page
Reporting ,[object Object],[object Object],[object Object],Page
Forensic Analysis Intellectual Property
The Challenge ,[object Object],[object Object],Page
Intellectual Property ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Page
Where is it Located? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Page
Corporate Espionage ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Page

More Related Content

What's hot

Memory forensics
Memory forensicsMemory forensics
Memory forensicsSunil Kumar
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer ForensicsDaksh Verma
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedurenewbie2019
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital ForensicsManik Bhola
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsFilip Maertens
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxBhupeshkumar Nanhe
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Sagar Rahurkar
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidenceOnline
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics Avinash Mavuru
 

What's hot (20)

Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Memory forensics
Memory forensicsMemory forensics
Memory forensics
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Memory Forensics
Memory ForensicsMemory Forensics
Memory Forensics
 
Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 

Viewers also liked

Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganographyXavier Prathap
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumOWASP Khartoum
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensicsalrawes
 
OWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security SessionOWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security SessionOWASP Khartoum
 
Access lesson 06 Integrating Access
Access lesson 06  Integrating AccessAccess lesson 06  Integrating Access
Access lesson 06 Integrating AccessAram SE
 
Access lesson 02 Creating a Database
Access lesson 02 Creating a DatabaseAccess lesson 02 Creating a Database
Access lesson 02 Creating a DatabaseAram SE
 
Monte Carlo G P U Jan2010
Monte  Carlo  G P U  Jan2010Monte  Carlo  G P U  Jan2010
Monte Carlo G P U Jan2010John Holden
 
Monte Carlo Simulation
Monte Carlo SimulationMonte Carlo Simulation
Monte Carlo SimulationAyman Hassan
 
Lecture1
Lecture1Lecture1
Lecture1rjaeh
 
Communication skills in english
Communication skills in englishCommunication skills in english
Communication skills in englishAqib Memon
 
Database and Access Power Point
Database and Access Power PointDatabase and Access Power Point
Database and Access Power PointAyee_Its_Bailey
 
Monte Carlo Statistical Methods
Monte Carlo Statistical MethodsMonte Carlo Statistical Methods
Monte Carlo Statistical MethodsChristian Robert
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20worldAqib Memon
 
Computer Forensics & Windows Registry
Computer Forensics & Windows RegistryComputer Forensics & Windows Registry
Computer Forensics & Windows Registryaradhanalaw
 
Chapter 4 microsoft access 2010
Chapter 4 microsoft access 2010Chapter 4 microsoft access 2010
Chapter 4 microsoft access 2010home
 
Super Efficient Monte Carlo Simulation
Super Efficient Monte Carlo SimulationSuper Efficient Monte Carlo Simulation
Super Efficient Monte Carlo SimulationCheng-An Yang
 
Access lesson 04 Creating and Modifying Forms
Access lesson 04 Creating and Modifying FormsAccess lesson 04 Creating and Modifying Forms
Access lesson 04 Creating and Modifying FormsAram SE
 
Access lesson05
Access lesson05Access lesson05
Access lesson05Aram SE
 

Viewers also liked (20)

Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganography
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
OWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security SessionOWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security Session
 
Access lesson 06 Integrating Access
Access lesson 06  Integrating AccessAccess lesson 06  Integrating Access
Access lesson 06 Integrating Access
 
Access lesson 02 Creating a Database
Access lesson 02 Creating a DatabaseAccess lesson 02 Creating a Database
Access lesson 02 Creating a Database
 
Monte Carlo G P U Jan2010
Monte  Carlo  G P U  Jan2010Monte  Carlo  G P U  Jan2010
Monte Carlo G P U Jan2010
 
Monte Carlo Simulation
Monte Carlo SimulationMonte Carlo Simulation
Monte Carlo Simulation
 
Lecture1
Lecture1Lecture1
Lecture1
 
Communication skills in english
Communication skills in englishCommunication skills in english
Communication skills in english
 
Database and Access Power Point
Database and Access Power PointDatabase and Access Power Point
Database and Access Power Point
 
Monte Carlo Statistical Methods
Monte Carlo Statistical MethodsMonte Carlo Statistical Methods
Monte Carlo Statistical Methods
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
 
Computer Forensics & Windows Registry
Computer Forensics & Windows RegistryComputer Forensics & Windows Registry
Computer Forensics & Windows Registry
 
Model inquiri
Model inquiriModel inquiri
Model inquiri
 
Chapter 4 microsoft access 2010
Chapter 4 microsoft access 2010Chapter 4 microsoft access 2010
Chapter 4 microsoft access 2010
 
Super Efficient Monte Carlo Simulation
Super Efficient Monte Carlo SimulationSuper Efficient Monte Carlo Simulation
Super Efficient Monte Carlo Simulation
 
Access lesson 04 Creating and Modifying Forms
Access lesson 04 Creating and Modifying FormsAccess lesson 04 Creating and Modifying Forms
Access lesson 04 Creating and Modifying Forms
 
Access lesson05
Access lesson05Access lesson05
Access lesson05
 

Similar to Computer Forensics

Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensicsLalit Garg
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics SlidesVarun Sehgal
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating proceduresSoumen Debgupta
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer ForensicsBense Tony
 
computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...pable2
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer CrimeMISY
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And PrivacyMISY
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic pptSuchita Rawat
 
Compter Forensics Intro for Students
Compter Forensics Intro for Students Compter Forensics Intro for Students
Compter Forensics Intro for Students Ernest Staats
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfGnanavi2
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)Patrick Garrett
 
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...ARMA International
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of DataMISY
 

Similar to Computer Forensics (20)

Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital forensics.abdallah
Digital forensics.abdallahDigital forensics.abdallah
Digital forensics.abdallah
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating procedures
 
Cyber
CyberCyber
Cyber
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
 
Compter Forensics Intro for Students
Compter Forensics Intro for Students Compter Forensics Intro for Students
Compter Forensics Intro for Students
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
 
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
 

Computer Forensics

Editor's Notes

  1. Computer evidence requires the same chain of custody procedures as other types of evidence. The custodian must strictly control access and keep accurate records to show who has examined the evidence and when. When evidence is presented to a court, council must be ready to show that the “thing” they offer is the same “thing” originally seized. “When that evidence is not distinctive but fungible (whether little bags of cocaine, bullet shell casings, or electronic data), the "process or system" (to use the language of Fed. R. Evid. 901(b)(9)) which authenticates the item is a hand-to-hand chain of accountability.” [1] Fungible adj.: (law) of goods or commodities; freely exchangeable for or replaceable by another of like nature or kind in the satisfaction of an obligation. This means to the computer forensic examiner that they must have a continuing awareness that all the actions that they take during a technical examination are subject to review by all parties in a civil or criminal investigation. The procedures detailed below will assist in providing a guideline for handling and processing computer-related evidence.   [1] Federal Guidelines for Searching and Seizing Computers , Page 119.
  2. Prevent the subject from having access to the system. This means: Remove them from keyboard from the moment you begin the search Disable any access they have to the network they are on Don’t allow them to “assist” you with your examination of the computer General Principles during Evidence Collection Adhere to your site's Security Policy and engage the appropriate Incident Handling and Law Enforcement personnel Capture as accurate a picture of the system as possible. Keep detailed notes. These should include dates and times. If possible generate an automatic transcript. (e.g., The 'script' program can be used, however the output file it generates should not be to media that is part of the evidence). Be prepared to testify (perhaps years later) outlining all actions you took and at what times. Detailed notes will be vital. Minimize changes to the data as you are collecting it. This is not limited to content changes; you should avoid updating file or directory access times. Remove external avenues for change. When confronted with a choice between collection and analysis you should do collection first and analysis later. Though it hardly needs stating, your procedures should be implementable. If possible procedures should be automated for reasons of speed and accuracy. Be methodical. Speed will often be critical so your team should break up and collect evidence from multiple systems (including network devices) in parallel. However on a single given system collection should be done step by step, strictly according to your collection procedure. Proceed from the volatile to the less volatile (see the Order of Volatility below). You should make a bit-level copy of the system's media. If you wish to do forensics analysis you should make a bit-level copy of your evidence copy for that purpose, as your analysis will almost certainly alter file access times. Avoid doing forensics on the evidence copy. Chain of Custody You should be able to clearly describe how the evidence was found, how it was handled and everything that happened to it. The following need to be documented Where, when and by whom was the evidence discovered. Where, when and by whom was the evidence handled or examined. Who had custody of the evidence, during what period. How was it stored. When the evidence changed custody, when and how did the transfer occur (include shipping numbers, etc.). Portions of the above are from “Guidelines for Evidence Collection and Archiving” by Dominique Brezinski and Tom Killalea which is a draft document
  3. A common practice is to make at least two copies of the evidential computer. One of these is sealed in the presence of the computer owner and then placed in secure storage. This is the MASTER copy and it will only be opened for examination under instruction from the Court in the event of a challenge to the evidence presented after forensic analysis on the second copy. If the computer itself has been seized and held in secure storage by the Police, this will constitute "best evidence". If the computer has not been seized then the MASTER copy becomes best evidence. In either case, the assumption is that whilst in secure storage there can be no possibility of tampering with the evidence. This does not protect the computer owner from the possibility that secured evidence may be tampered with. A growing practical problem with this method of evidential copying occurs not with the security aspect but because of the increasing sizes of fixed disks found in computers. A size of 2 Gigabytes is no longer unusual and it is common to find more than one fixed disk within a single machine. The cost of the media is decreasing slowly but this is still significant when considering the quantity of information to be copied and stored (even though the system does allow for media re-use). There is also the problem of the length of time individual copies may take to complete. A sizable saving in both time and expense might therefore be achieved if an alternative method of evidential security could be arranged. SafeBack is a sophisticated evidence preservation tool that was developed specifically for the U. S. Treasury Department in the processing of computer evidence. It is a unique piece of software that has become an industry standard in the processing of computer evidence around the world. SafeBack can also be used covertly to duplicate all storage areas on a computer hard disk drive. Drive size creates essentially no limitation for this unique computer forensics tool. SafeBack is used to create mirror-image backup files of hard disks or to make a mirror-image copy of an entire hard disk or partition. Backup image files can be written to essentially any writeable magnetic storage device, including SCSI tape backup units. SafeBack preserves all the data on a backed-up or copied hard disk, including inactive or 'deleted' data. Cyclical redundancy checksums (CRCs) distributed throughout the backup process enforce the integrity of backup copies to insure the accuracy of the process. Backup image files can be restored to another system's hard disk. Remote operation via parallel port connection allows the hard disk on a remote PC to be read or written by the master system. A date and time stamped audit trail maintains a record of SafeBack operations during a session and software dongles are not involved or required for operation. From an evidence standpoint, SafeBack is ideal for the computer forensics specialist because the restored SafeBack image can be used to process the evidence in the environment in which it was created. This is especially important when system configurations and/or application settings are relevant to the display or printing of the evidence.
  4. It should be acknowledged that almost all forensic examinations of computer media are different and that each cannot be conducted in the exact same manner for numerous reasons, however there are four essential requirements of a competent forensic examination. These are:   Forensically sterile media must be used, many utilities are available that will clean media to government security standards Any examination must maintain the integrity of the original media Positive control must be maintained for all attempts by software or hardware to write to the examined media Examination results must be properly marked, controlled and transmitted.  
  5. In many instances a complete examination of all of the data on media may not be authorized, possible, necessary or conducted for various reasons. In these instances, the examiner should document the reason for not conducting a complete examination. Some examples of limited examinations would be:   The search warrant or the courts limit the scope of examination. The equipment must be examined on premises. (This may require the examination of the original media. Extreme caution must be used during this type of examination.) The media size is so vast that a complete examination is not possible. The weight of the evidence already found is so overwhelming that a further search is not necessary. The material required to prove the case is very specific and addition examinations would be unnecessary or of no value. It is just not possible to conduct a complete examination because of hardware, operating systems or other conditions beyond the examiner’s control.
  6. Slack Space The unused space in a disk cluster . The DOS and Windows file systems use fixed-size clusters. Even if the actual data being stored requires less storage than the cluster size, an entire cluster is reserved for the file . The unused space is called the slack space. DOS and older Windows systems use a 16-bit file allocation table (FAT) , which results in very large cluster sizes for large partitions . For example, if the partition size is 2 GB , each cluster will be 32 K . Even if a file requires only 4 K, the entire 32 K will be allocated, resulting in 28 K of slack space. Windows 95 OSR 2 and Windows 98 resolve this problem by using a 32-bit FAT ( FAT32 ) that supports cluster sizes as small as 4 K for very large partitions. Unallocated space The space on a hard drive that is not reserved for use by a file in the file allocation table. Where data may be hidden - Word processing programs routinely store backup files of the document that is currently being worked on. - System programs routinely use portions of files currently in use to fill in blank or dead spots at the end of saved files. This means that portions of a document that is prepared or viewed on a computer could be stored in several locations on the computer ’ s hard drive without the operator ’ s knowledge. (ie slack space)
  7. A graphical chart can help investigators establish the most significant areas of an investigation and aid decision makers in effectively allocating resources.  Etrust Network Forensics can provide this graphical representation and can be used in techniques such as link analysis involved in any type of fraud investigation. As the relationships between individuals, accounts, and calling volumes are uncovered, the graphs grow in complexity. Investigators can then focus on individual aspects of their case, producing simplified charts that cut to the heart of the case. As data is captured from various sources and organized, investigators need to clearly understand which pieces of information are relevant, how they relate to each other, and what it means to their case. Investigators assigned to cases can use Etrust Network Forensics to uncover hidden links in their data and focus on the most likely suspects. Etrust Network Forensics can be commonly used in investigations to help identify the following: New investigation targets Significant links, patterns and dates New hot numbers for fraud detection systems