SlideShare a Scribd company logo
1 of 4
Download to read offline
The purpose of this research was to analyze Microsoft Windows event logs for artifacts that may
be pertinent to an investigation. How are investigators using Windows event logs in forensic
investigations? How do investigators approach the various types of breaches when collecting
data from Windows event logs? What are the best practices to analyze Windows event logs? The
world of Digital Forensics is expanding each day. There are many OSs available for use by
professionals and casual users to choose from. In 2013 the three main OSs in use on nontablet
computers are Windows, Linux and Mac OS. This research focuses on the Windows OS. The
first version of Windows was Windows 1.0 which was released in 1985 (Microsoft, 2013). Since
that time, there have been 8 major new Windows releases. Table 1 lists Windows OS and their
release dates. Table 1 Windows OS Release Years Windows 1.0 1985 Windows 2.0 1987
Windows 3.0 1990 Windows 95 1995 Windows 98 1998 Windows XP 2001 Windows Vista
2006 Windows 7 2009 Windows 8 2012 Note. This table illustrates the various Window OS and
when they were released by Microsoft. Mark Hackman (2013), a staff writer for PC World,
reports that according to Net Applications’ NetMarketshare tracker in June 2013, about 44.37%
of computers are using Windows 7 and another 5.1% are using Windows 8. The newest
Windows OS update, Windows 2 8.1, was released to manufacturers on August 27, 2013
(Endler, 2013). Most businesses and home users choose Windows based systems over Macs due
to the lower operational and training costs (Menga, 2008). These statistics indicate that over half
of the computers currently used are Windows based systems. The amount of Windows based
systems in use by businesses and home users gives criminals a broader range of computers to
break into for any type of data theft. Home users typically do not keep their systems as secure as
they should (Byrne, Howe, Ray, Roberts, & Urbanska, 2012). Programmers often design
computer hacking techniques called "hacks" to test certain scenarios. Regardless of the purpose
they were designed, organized cyber criminals who are computer savvy often employ these
hacks for nefarious purposes. The criminals either buy a hack from the author or they find it on a
hacking website (Jordan, 1998). Cyber criminals will break into home user systems in order to
build a network to attack a corporate or government target (Wash, 2010). This intrusion and
victimization of another's computer is called a Botnet. The number of Windows event logs has
grown over the years. For instance, prior to Windows Vista, there were only three main logs in
the event viewer, System, Security and Application. Today there are application specific logs and
service logs as well in the main event viewer. There are an additional 100 plus log files, but this
research focused on the main three, System, Security and Application. Windows event logs are
used to help correlate and prove that certain actions occurred at certain times and by specific
individuals, groups or IP addresses. For instance, Windows Security event logs can be analyzed
to help determine how many failed logon attempts occurred in a particular time period. It can
also be used to identify who logged in by examining the Event ID 4624 (Smith, 2013). Cyber
attackers use event logs nefariously to determine what is running on a 3 targeted network so they
can take advantage of known threats that have not been patched (Stuttard, 2008). This research
discusses the importance of specific logs when providing facts to an investigator. When
discussing how event logs will be used during an investigation, it is important to differentiate
between the various types of analysis and forensic practices. Different logs and methods of
collection are necessary depending on the type of investigation or attack defense. Investigators
will perform either a traditional or live analysis of the data stored within a computer or on a
network. The purpose for the collection of the targeted data usually dictates which type of
analysis should be performed. Today, it is expected to be a hybrid of both because some
important computer processes and data are stored in volatile memory, such as RAM. RAM
requires continuous power and will fade away as soon as the system is shutdown. Therefore, it
cannot be collected once systems are shut down (Cummings, 2008). There are three main types
of analysis, traditional, live, and network. Traditional, or dead-box analysis, includes shutting
down the computer and removing the hard drive or other media from the computer for analysis
with another machine (Amari, 2009). Live analysis refers to the capturing of data while the
computer is still running. A live analysis targets data on the hard drives and attached media,
artifacts of the operating system (OS), processes and data stored in volatile memory, and network
traffic coming in or going out of the computer (Amari, 2009). Investigators often concentrate on
the type of data stored in RAM. Since RAM memory is volatile and must be analyzed or
captured while the machine is operating, a live analysis is required. RAM is where processes run
and significant data that is not stored elsewhere may be collected.
Solution
The purpose of this research was to analyze Microsoft Windows event logs for artifacts that may
be pertinent to an investigation. How are investigators using Windows event logs in forensic
investigations? How do investigators approach the various types of breaches when collecting
data from Windows event logs? What are the best practices to analyze Windows event logs? The
world of Digital Forensics is expanding each day. There are many OSs available for use by
professionals and casual users to choose from. In 2013 the three main OSs in use on nontablet
computers are Windows, Linux and Mac OS. This research focuses on the Windows OS. The
first version of Windows was Windows 1.0 which was released in 1985 (Microsoft, 2013). Since
that time, there have been 8 major new Windows releases. Table 1 lists Windows OS and their
release dates. Table 1 Windows OS Release Years Windows 1.0 1985 Windows 2.0 1987
Windows 3.0 1990 Windows 95 1995 Windows 98 1998 Windows XP 2001 Windows Vista
2006 Windows 7 2009 Windows 8 2012 Note. This table illustrates the various Window OS and
when they were released by Microsoft. Mark Hackman (2013), a staff writer for PC World,
reports that according to Net Applications’ NetMarketshare tracker in June 2013, about 44.37%
of computers are using Windows 7 and another 5.1% are using Windows 8. The newest
Windows OS update, Windows 2 8.1, was released to manufacturers on August 27, 2013
(Endler, 2013). Most businesses and home users choose Windows based systems over Macs due
to the lower operational and training costs (Menga, 2008). These statistics indicate that over half
of the computers currently used are Windows based systems. The amount of Windows based
systems in use by businesses and home users gives criminals a broader range of computers to
break into for any type of data theft. Home users typically do not keep their systems as secure as
they should (Byrne, Howe, Ray, Roberts, & Urbanska, 2012). Programmers often design
computer hacking techniques called "hacks" to test certain scenarios. Regardless of the purpose
they were designed, organized cyber criminals who are computer savvy often employ these
hacks for nefarious purposes. The criminals either buy a hack from the author or they find it on a
hacking website (Jordan, 1998). Cyber criminals will break into home user systems in order to
build a network to attack a corporate or government target (Wash, 2010). This intrusion and
victimization of another's computer is called a Botnet. The number of Windows event logs has
grown over the years. For instance, prior to Windows Vista, there were only three main logs in
the event viewer, System, Security and Application. Today there are application specific logs and
service logs as well in the main event viewer. There are an additional 100 plus log files, but this
research focused on the main three, System, Security and Application. Windows event logs are
used to help correlate and prove that certain actions occurred at certain times and by specific
individuals, groups or IP addresses. For instance, Windows Security event logs can be analyzed
to help determine how many failed logon attempts occurred in a particular time period. It can
also be used to identify who logged in by examining the Event ID 4624 (Smith, 2013). Cyber
attackers use event logs nefariously to determine what is running on a 3 targeted network so they
can take advantage of known threats that have not been patched (Stuttard, 2008). This research
discusses the importance of specific logs when providing facts to an investigator. When
discussing how event logs will be used during an investigation, it is important to differentiate
between the various types of analysis and forensic practices. Different logs and methods of
collection are necessary depending on the type of investigation or attack defense. Investigators
will perform either a traditional or live analysis of the data stored within a computer or on a
network. The purpose for the collection of the targeted data usually dictates which type of
analysis should be performed. Today, it is expected to be a hybrid of both because some
important computer processes and data are stored in volatile memory, such as RAM. RAM
requires continuous power and will fade away as soon as the system is shutdown. Therefore, it
cannot be collected once systems are shut down (Cummings, 2008). There are three main types
of analysis, traditional, live, and network. Traditional, or dead-box analysis, includes shutting
down the computer and removing the hard drive or other media from the computer for analysis
with another machine (Amari, 2009). Live analysis refers to the capturing of data while the
computer is still running. A live analysis targets data on the hard drives and attached media,
artifacts of the operating system (OS), processes and data stored in volatile memory, and network
traffic coming in or going out of the computer (Amari, 2009). Investigators often concentrate on
the type of data stored in RAM. Since RAM memory is volatile and must be analyzed or
captured while the machine is operating, a live analysis is required. RAM is where processes run
and significant data that is not stored elsewhere may be collected.

More Related Content

Similar to The purpose of this research was to analyze Microsoft Windows event .pdf

Computer Software Attacks
Computer Software AttacksComputer Software Attacks
Computer Software AttacksSusan Cox
 
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”IRJET Journal
 
2600 v03 n06 (june 1986)
2600 v03 n06 (june 1986)2600 v03 n06 (june 1986)
2600 v03 n06 (june 1986)Felipe Prado
 
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET Journal
 
Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Laura Arrigo
 
Logging "BrainBox" Short Article
Logging "BrainBox" Short ArticleLogging "BrainBox" Short Article
Logging "BrainBox" Short ArticleAnton Chuvakin
 
Study on Live analysis of Windows Physical Memory
Study on Live analysis of Windows Physical MemoryStudy on Live analysis of Windows Physical Memory
Study on Live analysis of Windows Physical MemoryIOSR Journals
 
A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...csandit
 
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...cscpconf
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysisdadkhah077
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1Jinalkakadiya
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet IJECEIAES
 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMIJNSA Journal
 
Survey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectioncsandit
 
Live Forensics Analysis Method for Random Access Memory on Laptop Devices
Live Forensics Analysis Method for Random Access Memory on Laptop DevicesLive Forensics Analysis Method for Random Access Memory on Laptop Devices
Live Forensics Analysis Method for Random Access Memory on Laptop DevicesIJCSIS Research Publications
 

Similar to The purpose of this research was to analyze Microsoft Windows event .pdf (20)

Computer Software Attacks
Computer Software AttacksComputer Software Attacks
Computer Software Attacks
 
Forensics
ForensicsForensics
Forensics
 
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
 
2600 v03 n06 (june 1986)
2600 v03 n06 (june 1986)2600 v03 n06 (june 1986)
2600 v03 n06 (june 1986)
 
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
 
Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
 
Logging "BrainBox" Short Article
Logging "BrainBox" Short ArticleLogging "BrainBox" Short Article
Logging "BrainBox" Short Article
 
Study on Live analysis of Windows Physical Memory
Study on Live analysis of Windows Physical MemoryStudy on Live analysis of Windows Physical Memory
Study on Live analysis of Windows Physical Memory
 
A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...
 
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
A COMPREHENSIVE STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DE...
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
 
OS-Anatomy-Article
OS-Anatomy-ArticleOS-Anatomy-Article
OS-Anatomy-Article
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Comparative Research In Recent Times, Various Designs And Functionalities In ...
Comparative Research In Recent Times, Various Designs And Functionalities In ...Comparative Research In Recent Times, Various Designs And Functionalities In ...
Comparative Research In Recent Times, Various Designs And Functionalities In ...
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet
 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
 
Survey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detection
 
Live Forensics Analysis Method for Random Access Memory on Laptop Devices
Live Forensics Analysis Method for Random Access Memory on Laptop DevicesLive Forensics Analysis Method for Random Access Memory on Laptop Devices
Live Forensics Analysis Method for Random Access Memory on Laptop Devices
 

More from anil0878

1Calculation of predetermined overhead rate based on direct labor .pdf
1Calculation of predetermined overhead rate based on direct labor .pdf1Calculation of predetermined overhead rate based on direct labor .pdf
1Calculation of predetermined overhead rate based on direct labor .pdfanil0878
 
14 years.Solution14 years..pdf
14 years.Solution14 years..pdf14 years.Solution14 years..pdf
14 years.Solution14 years..pdfanil0878
 
1. Neutrophils have the highest phagocytic activity. Phagocytosis is.pdf
1. Neutrophils have the highest phagocytic activity. Phagocytosis is.pdf1. Neutrophils have the highest phagocytic activity. Phagocytosis is.pdf
1. Neutrophils have the highest phagocytic activity. Phagocytosis is.pdfanil0878
 
1. Which analysis tool determines the percentage of increase or decr.pdf
1. Which analysis tool determines the percentage of increase or decr.pdf1. Which analysis tool determines the percentage of increase or decr.pdf
1. Which analysis tool determines the percentage of increase or decr.pdfanil0878
 
(4)12Mb ( 12 X 106 base pairs)200,000 ( 2.0 X 105) base pairs of m.pdf
(4)12Mb ( 12 X 106 base pairs)200,000 ( 2.0 X 105) base pairs of m.pdf(4)12Mb ( 12 X 106 base pairs)200,000 ( 2.0 X 105) base pairs of m.pdf
(4)12Mb ( 12 X 106 base pairs)200,000 ( 2.0 X 105) base pairs of m.pdfanil0878
 
we deduce from the variability of a quasar that their collective .pdf
 we deduce from the variability of a quasar that their collective .pdf we deduce from the variability of a quasar that their collective .pdf
we deduce from the variability of a quasar that their collective .pdfanil0878
 
ys i can .pdf
                     ys i can                                      .pdf                     ys i can                                      .pdf
ys i can .pdfanil0878
 
Tin (Sn) is an answer answer; (d) Solution .pdf
                     Tin (Sn) is an answer  answer; (d) Solution  .pdf                     Tin (Sn) is an answer  answer; (d) Solution  .pdf
Tin (Sn) is an answer answer; (d) Solution .pdfanil0878
 
the image is not visible put a proper image .pdf
                     the image is not visible put a proper image      .pdf                     the image is not visible put a proper image      .pdf
the image is not visible put a proper image .pdfanil0878
 
The most polar is acetone. Acetone is polar. That.pdf
                     The most polar is acetone. Acetone is polar. That.pdf                     The most polar is acetone. Acetone is polar. That.pdf
The most polar is acetone. Acetone is polar. That.pdfanil0878
 
The color from ferrocenes yellow to diacetylfer.pdf
                     The color from ferrocenes yellow to diacetylfer.pdf                     The color from ferrocenes yellow to diacetylfer.pdf
The color from ferrocenes yellow to diacetylfer.pdfanil0878
 
Step1 In the second period Li has the highest sec.pdf
                     Step1 In the second period Li has the highest sec.pdf                     Step1 In the second period Li has the highest sec.pdf
Step1 In the second period Li has the highest sec.pdfanil0878
 
Sorry, it looks like the formating went out of or.pdf
                     Sorry, it looks like the formating went out of or.pdf                     Sorry, it looks like the formating went out of or.pdf
Sorry, it looks like the formating went out of or.pdfanil0878
 
it is a base .pdf
                     it is a base                                     .pdf                     it is a base                                     .pdf
it is a base .pdfanil0878
 
Ground state terms symbols of elements from Ne to.pdf
                     Ground state terms symbols of elements from Ne to.pdf                     Ground state terms symbols of elements from Ne to.pdf
Ground state terms symbols of elements from Ne to.pdfanil0878
 
Did you include the figure I dont see anything.pdf
                     Did you include the figure I dont see anything.pdf                     Did you include the figure I dont see anything.pdf
Did you include the figure I dont see anything.pdfanil0878
 
Calcium Chloride Anhydrous calcium chloride is a .pdf
                     Calcium Chloride Anhydrous calcium chloride is a .pdf                     Calcium Chloride Anhydrous calcium chloride is a .pdf
Calcium Chloride Anhydrous calcium chloride is a .pdfanil0878
 
benyne can be both the most stable and an unstabl.pdf
                     benyne can be both the most stable and an unstabl.pdf                     benyne can be both the most stable and an unstabl.pdf
benyne can be both the most stable and an unstabl.pdfanil0878
 
All Lewis acids contain hydrogen. .pdf
                     All Lewis acids contain hydrogen.                .pdf                     All Lewis acids contain hydrogen.                .pdf
All Lewis acids contain hydrogen. .pdfanil0878
 
The soil is an important medium that supports life to various plants.pdf
The soil is an important medium that supports life to various plants.pdfThe soil is an important medium that supports life to various plants.pdf
The soil is an important medium that supports life to various plants.pdfanil0878
 

More from anil0878 (20)

1Calculation of predetermined overhead rate based on direct labor .pdf
1Calculation of predetermined overhead rate based on direct labor .pdf1Calculation of predetermined overhead rate based on direct labor .pdf
1Calculation of predetermined overhead rate based on direct labor .pdf
 
14 years.Solution14 years..pdf
14 years.Solution14 years..pdf14 years.Solution14 years..pdf
14 years.Solution14 years..pdf
 
1. Neutrophils have the highest phagocytic activity. Phagocytosis is.pdf
1. Neutrophils have the highest phagocytic activity. Phagocytosis is.pdf1. Neutrophils have the highest phagocytic activity. Phagocytosis is.pdf
1. Neutrophils have the highest phagocytic activity. Phagocytosis is.pdf
 
1. Which analysis tool determines the percentage of increase or decr.pdf
1. Which analysis tool determines the percentage of increase or decr.pdf1. Which analysis tool determines the percentage of increase or decr.pdf
1. Which analysis tool determines the percentage of increase or decr.pdf
 
(4)12Mb ( 12 X 106 base pairs)200,000 ( 2.0 X 105) base pairs of m.pdf
(4)12Mb ( 12 X 106 base pairs)200,000 ( 2.0 X 105) base pairs of m.pdf(4)12Mb ( 12 X 106 base pairs)200,000 ( 2.0 X 105) base pairs of m.pdf
(4)12Mb ( 12 X 106 base pairs)200,000 ( 2.0 X 105) base pairs of m.pdf
 
we deduce from the variability of a quasar that their collective .pdf
 we deduce from the variability of a quasar that their collective .pdf we deduce from the variability of a quasar that their collective .pdf
we deduce from the variability of a quasar that their collective .pdf
 
ys i can .pdf
                     ys i can                                      .pdf                     ys i can                                      .pdf
ys i can .pdf
 
Tin (Sn) is an answer answer; (d) Solution .pdf
                     Tin (Sn) is an answer  answer; (d) Solution  .pdf                     Tin (Sn) is an answer  answer; (d) Solution  .pdf
Tin (Sn) is an answer answer; (d) Solution .pdf
 
the image is not visible put a proper image .pdf
                     the image is not visible put a proper image      .pdf                     the image is not visible put a proper image      .pdf
the image is not visible put a proper image .pdf
 
The most polar is acetone. Acetone is polar. That.pdf
                     The most polar is acetone. Acetone is polar. That.pdf                     The most polar is acetone. Acetone is polar. That.pdf
The most polar is acetone. Acetone is polar. That.pdf
 
The color from ferrocenes yellow to diacetylfer.pdf
                     The color from ferrocenes yellow to diacetylfer.pdf                     The color from ferrocenes yellow to diacetylfer.pdf
The color from ferrocenes yellow to diacetylfer.pdf
 
Step1 In the second period Li has the highest sec.pdf
                     Step1 In the second period Li has the highest sec.pdf                     Step1 In the second period Li has the highest sec.pdf
Step1 In the second period Li has the highest sec.pdf
 
Sorry, it looks like the formating went out of or.pdf
                     Sorry, it looks like the formating went out of or.pdf                     Sorry, it looks like the formating went out of or.pdf
Sorry, it looks like the formating went out of or.pdf
 
it is a base .pdf
                     it is a base                                     .pdf                     it is a base                                     .pdf
it is a base .pdf
 
Ground state terms symbols of elements from Ne to.pdf
                     Ground state terms symbols of elements from Ne to.pdf                     Ground state terms symbols of elements from Ne to.pdf
Ground state terms symbols of elements from Ne to.pdf
 
Did you include the figure I dont see anything.pdf
                     Did you include the figure I dont see anything.pdf                     Did you include the figure I dont see anything.pdf
Did you include the figure I dont see anything.pdf
 
Calcium Chloride Anhydrous calcium chloride is a .pdf
                     Calcium Chloride Anhydrous calcium chloride is a .pdf                     Calcium Chloride Anhydrous calcium chloride is a .pdf
Calcium Chloride Anhydrous calcium chloride is a .pdf
 
benyne can be both the most stable and an unstabl.pdf
                     benyne can be both the most stable and an unstabl.pdf                     benyne can be both the most stable and an unstabl.pdf
benyne can be both the most stable and an unstabl.pdf
 
All Lewis acids contain hydrogen. .pdf
                     All Lewis acids contain hydrogen.                .pdf                     All Lewis acids contain hydrogen.                .pdf
All Lewis acids contain hydrogen. .pdf
 
The soil is an important medium that supports life to various plants.pdf
The soil is an important medium that supports life to various plants.pdfThe soil is an important medium that supports life to various plants.pdf
The soil is an important medium that supports life to various plants.pdf
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 

Recently uploaded (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 

The purpose of this research was to analyze Microsoft Windows event .pdf

  • 1. The purpose of this research was to analyze Microsoft Windows event logs for artifacts that may be pertinent to an investigation. How are investigators using Windows event logs in forensic investigations? How do investigators approach the various types of breaches when collecting data from Windows event logs? What are the best practices to analyze Windows event logs? The world of Digital Forensics is expanding each day. There are many OSs available for use by professionals and casual users to choose from. In 2013 the three main OSs in use on nontablet computers are Windows, Linux and Mac OS. This research focuses on the Windows OS. The first version of Windows was Windows 1.0 which was released in 1985 (Microsoft, 2013). Since that time, there have been 8 major new Windows releases. Table 1 lists Windows OS and their release dates. Table 1 Windows OS Release Years Windows 1.0 1985 Windows 2.0 1987 Windows 3.0 1990 Windows 95 1995 Windows 98 1998 Windows XP 2001 Windows Vista 2006 Windows 7 2009 Windows 8 2012 Note. This table illustrates the various Window OS and when they were released by Microsoft. Mark Hackman (2013), a staff writer for PC World, reports that according to Net Applications’ NetMarketshare tracker in June 2013, about 44.37% of computers are using Windows 7 and another 5.1% are using Windows 8. The newest Windows OS update, Windows 2 8.1, was released to manufacturers on August 27, 2013 (Endler, 2013). Most businesses and home users choose Windows based systems over Macs due to the lower operational and training costs (Menga, 2008). These statistics indicate that over half of the computers currently used are Windows based systems. The amount of Windows based systems in use by businesses and home users gives criminals a broader range of computers to break into for any type of data theft. Home users typically do not keep their systems as secure as they should (Byrne, Howe, Ray, Roberts, & Urbanska, 2012). Programmers often design computer hacking techniques called "hacks" to test certain scenarios. Regardless of the purpose they were designed, organized cyber criminals who are computer savvy often employ these hacks for nefarious purposes. The criminals either buy a hack from the author or they find it on a hacking website (Jordan, 1998). Cyber criminals will break into home user systems in order to build a network to attack a corporate or government target (Wash, 2010). This intrusion and victimization of another's computer is called a Botnet. The number of Windows event logs has grown over the years. For instance, prior to Windows Vista, there were only three main logs in the event viewer, System, Security and Application. Today there are application specific logs and service logs as well in the main event viewer. There are an additional 100 plus log files, but this research focused on the main three, System, Security and Application. Windows event logs are used to help correlate and prove that certain actions occurred at certain times and by specific individuals, groups or IP addresses. For instance, Windows Security event logs can be analyzed to help determine how many failed logon attempts occurred in a particular time period. It can
  • 2. also be used to identify who logged in by examining the Event ID 4624 (Smith, 2013). Cyber attackers use event logs nefariously to determine what is running on a 3 targeted network so they can take advantage of known threats that have not been patched (Stuttard, 2008). This research discusses the importance of specific logs when providing facts to an investigator. When discussing how event logs will be used during an investigation, it is important to differentiate between the various types of analysis and forensic practices. Different logs and methods of collection are necessary depending on the type of investigation or attack defense. Investigators will perform either a traditional or live analysis of the data stored within a computer or on a network. The purpose for the collection of the targeted data usually dictates which type of analysis should be performed. Today, it is expected to be a hybrid of both because some important computer processes and data are stored in volatile memory, such as RAM. RAM requires continuous power and will fade away as soon as the system is shutdown. Therefore, it cannot be collected once systems are shut down (Cummings, 2008). There are three main types of analysis, traditional, live, and network. Traditional, or dead-box analysis, includes shutting down the computer and removing the hard drive or other media from the computer for analysis with another machine (Amari, 2009). Live analysis refers to the capturing of data while the computer is still running. A live analysis targets data on the hard drives and attached media, artifacts of the operating system (OS), processes and data stored in volatile memory, and network traffic coming in or going out of the computer (Amari, 2009). Investigators often concentrate on the type of data stored in RAM. Since RAM memory is volatile and must be analyzed or captured while the machine is operating, a live analysis is required. RAM is where processes run and significant data that is not stored elsewhere may be collected. Solution The purpose of this research was to analyze Microsoft Windows event logs for artifacts that may be pertinent to an investigation. How are investigators using Windows event logs in forensic investigations? How do investigators approach the various types of breaches when collecting data from Windows event logs? What are the best practices to analyze Windows event logs? The world of Digital Forensics is expanding each day. There are many OSs available for use by professionals and casual users to choose from. In 2013 the three main OSs in use on nontablet computers are Windows, Linux and Mac OS. This research focuses on the Windows OS. The first version of Windows was Windows 1.0 which was released in 1985 (Microsoft, 2013). Since that time, there have been 8 major new Windows releases. Table 1 lists Windows OS and their release dates. Table 1 Windows OS Release Years Windows 1.0 1985 Windows 2.0 1987 Windows 3.0 1990 Windows 95 1995 Windows 98 1998 Windows XP 2001 Windows Vista
  • 3. 2006 Windows 7 2009 Windows 8 2012 Note. This table illustrates the various Window OS and when they were released by Microsoft. Mark Hackman (2013), a staff writer for PC World, reports that according to Net Applications’ NetMarketshare tracker in June 2013, about 44.37% of computers are using Windows 7 and another 5.1% are using Windows 8. The newest Windows OS update, Windows 2 8.1, was released to manufacturers on August 27, 2013 (Endler, 2013). Most businesses and home users choose Windows based systems over Macs due to the lower operational and training costs (Menga, 2008). These statistics indicate that over half of the computers currently used are Windows based systems. The amount of Windows based systems in use by businesses and home users gives criminals a broader range of computers to break into for any type of data theft. Home users typically do not keep their systems as secure as they should (Byrne, Howe, Ray, Roberts, & Urbanska, 2012). Programmers often design computer hacking techniques called "hacks" to test certain scenarios. Regardless of the purpose they were designed, organized cyber criminals who are computer savvy often employ these hacks for nefarious purposes. The criminals either buy a hack from the author or they find it on a hacking website (Jordan, 1998). Cyber criminals will break into home user systems in order to build a network to attack a corporate or government target (Wash, 2010). This intrusion and victimization of another's computer is called a Botnet. The number of Windows event logs has grown over the years. For instance, prior to Windows Vista, there were only three main logs in the event viewer, System, Security and Application. Today there are application specific logs and service logs as well in the main event viewer. There are an additional 100 plus log files, but this research focused on the main three, System, Security and Application. Windows event logs are used to help correlate and prove that certain actions occurred at certain times and by specific individuals, groups or IP addresses. For instance, Windows Security event logs can be analyzed to help determine how many failed logon attempts occurred in a particular time period. It can also be used to identify who logged in by examining the Event ID 4624 (Smith, 2013). Cyber attackers use event logs nefariously to determine what is running on a 3 targeted network so they can take advantage of known threats that have not been patched (Stuttard, 2008). This research discusses the importance of specific logs when providing facts to an investigator. When discussing how event logs will be used during an investigation, it is important to differentiate between the various types of analysis and forensic practices. Different logs and methods of collection are necessary depending on the type of investigation or attack defense. Investigators will perform either a traditional or live analysis of the data stored within a computer or on a network. The purpose for the collection of the targeted data usually dictates which type of analysis should be performed. Today, it is expected to be a hybrid of both because some important computer processes and data are stored in volatile memory, such as RAM. RAM requires continuous power and will fade away as soon as the system is shutdown. Therefore, it
  • 4. cannot be collected once systems are shut down (Cummings, 2008). There are three main types of analysis, traditional, live, and network. Traditional, or dead-box analysis, includes shutting down the computer and removing the hard drive or other media from the computer for analysis with another machine (Amari, 2009). Live analysis refers to the capturing of data while the computer is still running. A live analysis targets data on the hard drives and attached media, artifacts of the operating system (OS), processes and data stored in volatile memory, and network traffic coming in or going out of the computer (Amari, 2009). Investigators often concentrate on the type of data stored in RAM. Since RAM memory is volatile and must be analyzed or captured while the machine is operating, a live analysis is required. RAM is where processes run and significant data that is not stored elsewhere may be collected.