unit iv 1. contents cyber stalking, computer basics for digital investigators, applying forensic...

81
UNIT IV 1

Upload: christiana-hart

Post on 18-Jan-2016

227 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

1

UNIT IV

Page 2: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

2

Contents

• Cyber stalking, • Computer Basics for Digital Investigators,• Applying Forensic Science to Computers

Page 3: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

3

1. Cyber stalking• stalking behavior is fixation on victims.• this type of investigation challenging and potentially dangerous.• when stalkers have been identified, attempts to discourage them

can have the opposite effect.• The law in the United Kingdom is the Protection from Harassment

Act 1997.• single upsetting e-mail message is not considered harassment

because anti-stalking laws were enacted to protect individuals against persistent terrorism

• it is important to gather as much evidence as possible to demonstrate that persistent harassment took place and that the victim reacted to the credible threat in a reasonable manner.

Page 4: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

4

1.1 How Cyber stalkers Operate

• Cyberstalking works in much the same way as stalking in the physical world.

• offenders combine their online activities with more traditionalforms of stalking such as telephoning the victim and goingto the victim’s home.

• A stalker’s ability to frighten and control a victim increases with the amount of information that he/she can gather about the victim.

• Databases containing Social Security numbers, credit card numbers, medical history, criminal records, and much more can also be accessed using the Internet.

Page 5: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

1.1.1 Acquiring Victims• Case studies indicate that many stalkers had prior acquaintance with

their victims before the stalking behavior began• Investigators should pay particular attention to acquaintances of the

victim. However, these studies are limited because many stalking cases are unsolved or unreported.

• As a rule, investigators should rely more on available evidence than on general studies.

1.1.2 Anonymity and Surreptitious(hidden) Monitoring• The Internet has the added advantage of protecting a stalker’s identity

and allowing a stalker to monitor a victim’s activities.• For example, stalkers acquainted with their victims use the Internet to

hide their identity, sending forged e-mail and using Instant Messenger to harass their victims

1.1.3 Escalation(increasing) and Violence• Investigators should examine the available evidence closely, protect the

victim against further harm• investigators to be cautious when dealing with this case & investigators should

not make hurried judgments 5

Page 6: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

6

1.2 Investigating Cyber Stalking

• In every stages of cyber stalking assume that the identity of the cyberstalker is unknown

• Therefore, consider the possibility that the victim knows the stalker in physical, but do not assume that in Internet.

• There are several stages to investigating a cyberstalking case

Page 7: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

Investigating Cyber Stalking

stages are

•Interview victim•Interview others•Victimology and risk assessment•Search for additional digital evidence•Crime scene characteristics•Motivation•Repeat

Page 8: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

2. Computer Basics for Digital Investigators

A Brief history of Computers

Basic operation of Computers

Representation of Data

Storage media and Data hiding

Dealing with password protection and Encryption

Page 9: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

9

2.1 A Brief history of Computers

• Babbage conceived of a steam-powered “difference engine” that could perform arithmetic operations,

• Later in the 1800s, Augusta Ada suggested a binary system rather than decimal and George Boole developed Boolean logic.

• German engineer named Konrad Zuse apparently created an electronic binary computer called the Z3 that used old moviefilm to store his programs and data.

Page 10: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

10

2.2 Basic Operation Of Computers

• The boot process has three basic stages:1. the central processing unit (CPU) reset, 2. The power-on self-test (POST), 3. the disk boot.

Page 11: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

Cont..

Central Processing unit

• CPU’s ability to process instructions that it receives. Once the CPU is reset, it starts the computer’s basic input and output system (BIOS)

Basic Input and Output System

• The BIOS deals with the basic movement of data around the computer. Every program run on a computer uses the BIOS to communicate with the CPU

POST and CMOS (complementary metal oxide silicon)Configuration

Tool

• .POST verifies that all of the computer’s components are functioning properly, including the disk drives, monitor, RAM, and keyboard.

• Computers use CMOS RAM chips to retain the date, time, hard drive parameters, and other configuration details while the computer’s main power is off.

Disk Boot • Allows to preempt a computer’s primary operating system by providing an alternate operating system on another disk.

Page 12: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

2.3 Representation of Data

• All digital data are basically combinations of ones and zeros, commonly called bits.

• In other words, big-endian architectures place the most significant bytes on the left (putting the big end first) whereas little-endian architectures place the most significant bytes on the right

• It is often necessary for digital investigators to deal with data at the bit level, requiring an understanding of how different systems represent data.

File Formats and Carving• The common headers in a JPEG image, Word document, and other

file types are often referred to as file signatures and can be used to locate and salvage portions of deleted files.

• The process of searching for a certain file signature and attempting to extract the associated data is called “carving” because it conceptually involves cutting a specific piece of data out of a larger dataset.

Page 13: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

13

Page 14: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

2.4 Storage media and Data hiding • Storage media like hard drives, USBs ,magnetic tapes (cluster, sectors, head, track)

• There are several common hard drive technologies.• Advanced Technology Attachment (ATA) drives— are simpler,

less expensive, and therefore more common than higher performance SCSI drives.

• This holds true for newer versions of these technologies: SATA drives are more common than higher performance Serial Attached SCSI drives.

Page 15: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

15

Page 16: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

16

Cont..

Data hiding• The individual could store data in the hidden area of the hard

drive without other users of the system being aware that such a hidden partition exists.

• Forensic examination tools expose such hidden partitions, demonstrating the importance of using tools that are specifically designed to conduct forensic examinations—relying on other methods to view storage media can result in digital investigators missing important information.

Page 17: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

2.5 File systems and location of Data • File systems such as FAT16, FAT32, NTFS, HFS (Macintosh

Hierarchical File system), HFS+, Ext2 (Linux), and UFS (Solaris) keep track of where data are located on a disk, providing the familiar file and folder structure.

• Before a file system can be created, a partition must be created to specify how much of the hard drive it will occupy.

• The first sector of a hard disk contains the Master Boot Record (MBR) containing a partition table to tell the operating system how the disk is divided.

Page 18: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

Cont..

Fig. 4.1 General structure of a disk withtwo partitions

Page 19: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

Cont..• When a file is deleted, its entry in the file system is updated to

indicate its deleted status and the clusters that were previously allocated to storing are unallocated and can be reused to store a new file.

• However, the data are left on the disk and it is often possible to retrieve a file immediately after it has been deleted. The data will remain on the disk until a new file overwrites them

• However, if the new file does not take up the entire cluster, a portion of the old file might remain in the slack space. In this case, a portion of a file can be retrieved long after it has been deleted and partially overwritten.

Page 20: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

2.6 Dealing with password protection and Encryption

Basics of Encryption:

• Conceptually, encryption locks data with a key and only people with the appropriate key can unlock the data.

• Encryption can sometimes be by-passed or broken using specialized knowledge and equipment but, in many cases, it is not feasible to expend the required resources to break encryption.

• Encryption is a process by which a readable digital object (plaintext) is converted into an unreadable digital object (ciphertext) using a mathematical function.

• Strong encryption schemes use the equivalent of a password, called a key.

Page 21: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

Cont..

Private Key Encryption •Private key encryption i.e. symmetric key encryption) is that the same key that is used to encrypt a message is also used to decrypt it. Commonly used symmetric key encryption algorithms are DES, IDEA, and Blowfish.

Public Key Encryption

• A public key is that anyone could use to encrypt a message and only the intended recipient who possessed the corresponding private key could decrypt the message. Two commonly used public key algorithms are RSA and DSA.

Pretty Good Privacy

• A program that uses both private and public key cryptography is Pretty Good Privacy.

• PGP sends both the encrypted text and the encrypted private key to the recipient. Thus, when the recipient receives the encrypted message, he/she uses his/her personal private key to decrypt the randomly generated private key and uses the randomly generated private key to decrypt the message.

E-mail Encryption

• Encryption programs like PGP enable individuals to encrypt and sign messages, protecting the contents in transit and providing some assurance that the message is from a specific individual and has not been altered since it was created by the sender.

Page 22: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

3. Applying Forensic Science to Computers• Forensic science is useful, offering carefully tested methods for

processing and analyzing evidence and reaching conclusions that are reproducible and free from distortion or bias.

• Concepts from forensic science can also help digital investigators take advantage of digital evidence in ways that would otherwise not be possible.

• Sections or stages are1. Preparation2. Survey3. Documentation4. Preservation5. Examination and analysis6. Reconstruction7. Reporting results

Page 23: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

3.1 Planning

• Planning is especially important in cases that involve computers. Whenever possible, while generating a search warrant,

• assistance of system administrators might be able to point out oversights or potential pitfalls if he/she is are familiar with the system. This is especially valuable when dealing with large volumes of data in various locations

• A final preparatory consideration is regarding proper equipment. Most plans and procedures will fail if adequate acquisition systems and storage capacity are not provided.

Page 24: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

24

• Some of the fundamental items that can be useful when dealingwith computers as a source of evidence include the following:

1. Evidence bags, tags, and other items to label and package evidence

2. Digital camera to document scene and evidential items3. Forensically sanitized hard drives to store acquired data4. Forensically prepared computer(s) to connect with and copy

data 5. From evidential hard drives onto forensically sanitized hard

drives6. Hardware write blockers for commonly encountered hard drives

(e.g., IDE and SATA)7. Toolkit, including a flashlight, needle-nose pliers, and

screwdrivers 8. For various types and sizes of screws.

Page 25: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

25

3.2 Survey

• Crime scene is process of finding all potential sources of digital evidence and making decisions about what digital evidence to preserve.

• surveying a crime scene for potential sources of digital evidence is a twofold process.

First, digital investigators have to recognize the hardwareSecond, digital investigators must be able to distinguish between irrelevant information and the digital data• Applying the scientific method during the survey process involves

developing and testing theories about which items contain relevant digital evidence, why expected items are missing, and where missing items might be found.

3.2.1 Survey of Hardware

Page 26: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

26

3.2.2 Survey of Digital Evidence• Different crimes result in different types of digital evidence.• eg cyberstalkers often use e-mail to harass their victims, computer

crackers leave evidence in log files • Therefore, the ability to identify evidence depends on a digital

investigator’s familiarity with the type of crime that was committed3.3 Documentation

• Documentation is essential at all stages of handling and processing digital evidence, and includes the following:

1. Chain of custody: who handled the evidence, when, where, and for what purpose;

2. Evidence intake: characteristics of each evidential item such as make, model, and serial number;

3. Photos, videos, and diagrams: capturing the context of the original evidence;

4. Evidence inventory: a list or database of all evidential items;

Page 27: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

27

• The primary goal of documentation is to establish the authenticity of the evidence.

• So, careful note should be made of when the evidence was collected, from where, and by whom.

• For example, if digital evidence is copied onto a removable storage media, the label should include the current date and time, the initials of the person who made the copy, how the copy was made, and the information believed to be contained on the storage media.

3.3.1 Case Management• Case management also involves maintaining the physical

security of evidential items, and storing multiple copies of digital evidence

Page 28: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

28

3.4 Preservation• Once identified, digital evidence must be preserved in such a way that it

can later be authenticated • A major aspect of preserving digital evidence is preserving it in a way that

minimizes the changes made.4.4.1 Preserving Hardware• When dealing with hardware as contraband, instrumentality, or evidence,

it is usually necessary to collect computer equipment• Additionally, sometimes it simply is not feasible to collect hardware

because of its size or quantity.4.4.2 Preserving Digital Evidence• There are several approaches to preserving digital evidence on a

computer:1. Place the evidential computers and storage media in secure storage for

future reference;2. Extract just the information needed from evidential computers andStorage media;3. Acquire everything from evidential computer and storage media.

Page 29: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

29

• Whether acquiring all data or just a subset, there are two empirical laws of digital evidence collection that should always be remembered:

Empirical Law of Digital Evidence Collection and Preservation #1: If you only make one copy of digital evidence, that evidence will be damaged or completely lost.

Empirical Law of Digital Evidence Collection and Preservation #2: A forensic acquisition should contain at least the data that is accessible to a regular user of the computer.

• In addition, it is important to verify that tools used to copy digital evidence capture all of the desired information, including metadata such as date-time stamps that are associated with acquired files.

• To document the integrity of acquired data, some logical evidence container formats maintain the MD5 hash of each acquired item, while others simply calculate the MD5 value of the overall container.

Page 30: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

5) Examination and Analysis Forensic examination involves preparing digital evidence to facilitate the analysis stage.

There are three levels of forensic examination:

(1) Survey/triage forensic inspections

(2) Preliminary forensic examination

(3) In-depth forensic examination• Nature and extent of a digital evidence examination depend

on the known circumstances of the crime and the constraints placed on the digital investigator.

• In any case, the forensic examination and subsequent analysis should preserve the integrity of the digital evidence and should be repeatable and free from distortion or bias.

Page 31: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

5.1 Filtering/Reduction

• The process of filtering out irrelevant, confidential, or privileged data includes the following:

1. Eliminating valid system files and other known entities that have no relevance to the investigation.

2. Focusing on the most probable user-created data.

3. Focusing on files within a restricted time frame.

4. Managing duplicate files, which is particularly useful when dealing with backup tapes.

5. Identifying discrepancies between digital evidence examination tools, such as missed files and MD5 calculation errors.

6. Less methodical data reduction techniques, such as searching for specific keywords or extracting only certain file types can be effective in certain cases.

7. Any method of filtering data has limitations with the associated risk of missing important clues but careful data reduction generally enables a more efficient and thorough digital evidence examination.

Page 32: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

5.2 Class/Individual Characteristics and Evaluation of Source• Three fundamental questions that need to be addressed when

examining a piece of digital evidence are (ICE):

I. What is it (Identification)

II. What characteristics distinguish it (Classification or Individualization)

III. Where did it come from (Evaluation of source)

• The process of identification generally involves ascertaining what a particular digital object is and classifying it based on similar characteristics, called class characteristics.

Page 33: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2
Page 34: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

Applying Forensic Science to Computers

• The concept of a significant difference is important because it can be just such a difference that distinguishes an object from all other similar objects, that is, it may be an individual characteristic.

• Although such characteristics are rarer than class characteristics, it is important to keep in mind that digital evidence may contain a unique characteristic that individualizes it, that is, links it to a particular source with a high degree of probability.

Page 35: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

Applying Forensic Science to Computers5.3 Data Recovery/Salvage

• In general, when a file is deleted, the data it contained actually remain on a disk for a time and can be recovered.

• The details of recovering and reconstructing digital evidence depend on the kind of data, its condition, the operating system being run, the type of the hardware and software, and their configurations.

• When a deleted file is partially overwritten, part of it may be found in slack space and/or in unallocated space. It may be possible to extract and reconstitute such fragments to view them in their near original state.

• Stored data must be retrieved in such a way as to ensure that its source can be proved in court, and handled in such a way as to maintain the “chain of evidence.”

Page 36: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

Applying Forensic Science to Computers6) Reconstruction The three fundamental types of reconstruction:• Functional Analysis• Relational Analysis• Temporal Analysis

6.1) Functional Analysis: How a computer system functioned:

1. To determine if the individual or computer was capable of performing actions necessary to commit the crime.

2. To gain a better understanding of a piece of digital evidence or the crime as a whole.

3. To prove that digital evidence was tampered with.

4. To gain insight into an offender’s intent and motives. For instance, was a purposeful action required to cause damage to the system or could it have been accidental?

5. To determine the proper working of the system during the relevant time period. This relates to authenticating and determining how much weight to give digital evidence.

Page 37: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

Applying Forensic Science to Computers6.2)Relational Analysis

• In an effort to identify relationships between suspects, victim, and crime scene, it can be useful to create nodes that represent places they have been, e-mail and IP addresses used, financial transactions, telephone numbers called, etc. and determine if there are noteworthy connections between these nodes.

• For instance, in large-scale fraud investigation, representing fund transfers by drawing lines between individuals and organizations can reveal the most active entities in the fraud.

• Similarly, depicting e-mail messages sent and received by a suspect can help investigators spot likely associates by the large numbers of messages exchanged.

Page 38: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

Applying Forensic Science to Computers6.3)Temporal Analysis

• When investigating a crime, it is usually desirable to know the time and sequence of events.

• Fortunately, in addition to storing, retrieving, manipulating, and transmitting data, computers keep ample account of time.

• The simple act of creating a timeline of when files were created, accessed, and modified can result in a surprising amount of information.

• Creating a timeline of events can help an investigator identify patterns and gaps, shedding light on a crime and leading to other sources of evidence.

Page 39: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

Applying Forensic Science to Computers

6.3)Temporal AnalysisDigital investigators should seek new ways to represent visually temporal information to help them recognize patterns. Plotting times on concentric circles or a spiral may cause certain patterns to stand out.

Page 40: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

Applying Forensic Science to Computers6.4 Digital Stratigraphy• When time markers are destroyed, more imaginative

approaches are required to get a sense of when data were created.

• Concepts from other fields can be translated into the digital land to develop new analysis techniques such as digital stratigraphy.

• Stratigraphy is the scientific study of layers (a.k.a. strata) in geology and archaeology with the aim of determining the origin, composition, distribution, and time frame of each stratum.

• Applying this concept to data stored on a disk can be fruitful in some investigations.

Page 41: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

Applying Forensic Science to Computers7) Reporting

• The last stage of a digital evidence examination is to integrate all findings and conclusions into a final report that conveys the findings to others and that the examiner may have to present in court.

• Writing a report is one of the most important stages of the process because it is the only view that others have of the entire process.

• Unless findings are communicated clearly in writing, others are unlikely to appreciate their significance.

• A well-rendered report that clearly outlines the examiner’s findings can convince the opposition to settle out of court, while a weakly rendered report can fuel the opposition to proceed to trial.

• Assumptions and lack of foundation in evidence result in a weak report.• Therefore, it is important to build solid arguments by providing all

supporting evidence and demonstrating that the explanation provided is the most reasonable one.

Page 42: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

42

Page 43: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

43

Page 44: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

44

Page 45: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

45

Page 46: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

46

Page 47: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

47

Page 48: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

48

Page 49: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

49

Page 50: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

50

Page 51: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

51

Page 52: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

52

Page 53: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

53

Page 54: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

54

Page 55: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

55

Page 56: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

56

Page 57: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

57

Page 58: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

58

Page 59: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

59

Page 60: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

60

Page 61: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

61

Page 62: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

62

Page 63: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

63

Page 64: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

64

Page 65: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

65

Page 66: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

66

Page 67: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

67

Page 68: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

68

Page 69: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

69

Page 70: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

70

Page 71: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

71

Page 72: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

72

Page 73: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

73

Page 74: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

74

Page 75: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

75

Page 76: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

76

Page 77: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

77

Page 78: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

78

Page 79: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

79

Page 80: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

80

Page 81: UNIT IV 1. Contents Cyber stalking, Computer Basics for Digital Investigators, Applying Forensic Science to Computers 2

81

Thank You