SlideShare a Scribd company logo
chapter23 ComputerForensics
“HowoftenhaveIsaidtoyouthatwhenyouhaveeliminatedtheimpossi
ble,whateverremains,
howeverimprobable,mustbethetruth?”
C
—SIRARTHURCONANDOYLE
Inthischapter,youwilllearnhowto
Explorethebasicsofdigitalforensics
Identifytherulesandtypesofevidence
Collectevidence
Preserveevidence
Maintainaviablechainofcustody
Investigateacomputercrimeorpolicyviolation
Examinesystemartifacts
Developforensicpoliciesandprocedures
Examinethepoliciesandproceduresassociatedwithe-discovery
omputerforensicsiscertainlyapopularbuzzwordincomputer
security.Thischapteraddressesthekeyaspectsofcomputerforensics
inpreparationfortheCompTIASecurity+certificationexam.Itisnot
intendedtobeatreatiseonthetopicoralegaltutorialregardingthe
presentationofevidenceinacourtoflaw.Thismaterialisonlyan
introductiontothetopic,andbeforeoneentersintoforensicworkor
practice,muchadditionalstudyisnecessary.Theprinciplespresented
in
thischapterareofvalueinconductinganyinvestigativeprocesses,
includinginternalorexternalauditprocedures,butmanynuancesof
handlinglegalcasesarefarbeyondthescopeofthistext.
Thetermforensicsrelatestotheapplicationofscientificknowledgeto
legalproblems.Specifically,computerforensicsinvolvesthepreserv
ation,
identification,documentation,andinterpretationofcomputerdata.I
n
today’spractice,computerforensicscanbeperformedforthreepurpo
ses:
Investigatingandanalyzingcomputersystemsasrelatedtoaviolation
oflaw
Investigatingandanalyzingcomputersystemsforcompliancewithan
organization’spolicies
Respondingtoarequestfordigitalevidence(e-discovery)
Forensicsisoftenassociatedwithincidentresponse,theproceduresus
ed
torespondtoanabnormalconditioninasystem.Thereissubtle
difference,however:incidentresponseisaboutcorrectiveaction—
returningthesystemtoanormaloperationalstate—
whereasforensicsis
aboutfiguringoutwhathappened.
CrossCheck
IncidentResponse
Incidentresponseandassociatedpoliciesandproceduresarecoveredi
nChapter22.
Ifanunauthorizedpersonaccessesasystem,thatpersonlikelyhas
violatedthelaw.However,acompanyemployeewhoperformssimilar
acts(accessingdataremotely)mayormaynotviolatelaws,the
determinationofwhichdependsonmanyfactors,includingspecific
authorizationsandjobduties.Onecanviolatecorporatepolicieswhile
actinglawfullywithrespecttocomputerlaws.Itisworthnotingthat
knowinglyexceedingone’sauthorizationswithrespecttosystemacc
essis
aviolationofthelaw.
Anyofthesesituationscouldultimatelyresultinlegalactionandmay
requirelegaldisclosure.Therefore,itisimportanttonotethatcompute
r
forensicactionsmay,atsomepointintime,dealwithlegalviolations,a
nd
investigationscouldgotocourtproceedings.Asapotentialfirstrespo
nder,
youshouldalwaysseeklegalcounsel.Alsoseeklegalcounselaheadof
timeasyoudevelopandimplementcorporatepoliciesandprocedures.
Itis
extremelyimportanttounderstandthatevenminorproceduralmisste
ps
canhavesignificantlegalconsequences.Theruletofollowissimple:
alwaysassumethatthematerialwillbeusedinacourtoflawandthus
mustbehandledinaperfectlypropermanneratalltimes.Thisfurther
meansthatwhendealingwithforensics,youmustensurethatallstepsa
re
performedbyqualifiedforensicexaminers.
Evidence
Evidenceconsistsofthedocuments,verbalstatements,andmaterial
objectsthatareadmissibleinacourtoflaw.Evidenceiscriticalto
convincingmanagement,juries,judges,orotherauthoritiesthatsome
kind
ofviolationhasoccurred.Thesubmissionofevidenceischallenging,b
utit
isevenmorechallengingwhencomputersareusedbecausethepeople
involvedmaynotbetechnicallyeducatedandthusmaynotfully
understandwhat’shappened.
Computerevidencepresentsyetmorechallengesbecausethedataitsel
f
cannotbeexperiencedwiththephysicalsenses—thatis,youcansee
printedcharacters,butyoucan’tseethebitswherethatdataisstored.Bi
ts
ofdataaremerelymagneticpulsesonadiskorsomeotherstorage
technology.Therefore,datamustalwaysbeevaluatedthroughsomeki
nd
of“filter”ratherthansenseddirectly.Thisisoftenofconcerntoauditor
s,
becausegoodauditingtechniquesrecommendaccessingtheoriginald
ata
oraversionthatisascloseaspossibletotheoriginaldata.
TypesofEvidence
Thedigitalforensicprocessisatechnicallydemandingone,withnoro
omforerrors.Themost
commoncauseofevidencefromaninvestigationbeingexcludedfrom
courtproceedingsis
spoliation,theunauthorizedalterationofdigitalevidence.Iftheforen
sicprocessislessthan
perfect,spoliationisassumed.Thebestguidanceis1)alwaysperformf
orensicsasifyouare
goingtocourtwiththeevidence,and2)ifyoudonothavequalifieddigit
alforensicinvestigators
in-house,donothingtothedevice/media—letaprofessionalhandleit.
Allevidenceisnotcreatedequal.Someevidenceisstrongerandbetter
thanotherevidence.Severaltypesofevidencecanbegermane:
DirectevidenceOraltestimonythatprovesaspecificfact(suchas
aneyewitness’sstatement).Theknowledgeofthefactsisobtained
throughthefivesensesofthewitness,withnoinferencesor
presumptions.
RealevidenceAlsoknownasassociativeorphysicalevidence,this
includestangibleobjectsthatproveordisproveafact.Physical
evidencelinksthesuspecttothesceneofacrime.
DocumentaryevidenceEvidenceintheformofbusinessrecords,
printouts,manuals,andthelike.Muchoftheevidencerelatingto
computercrimesisdocumentaryevidence.
DemonstrativeevidenceUsedtoaidthejuryandcanbeintheform
ofamodel,experiment,chart,andsoon,offeredtoprovethatan
eventoccurred.
StandardsforEvidence
EvidenceinU.S.federalcourtcasesisgovernedbyaseriesoflegal
precedents,themostnotableofwhichistheDaubertstandard.ThreeU.
S.
SupremeCourtcasesarticulatetheDaubertstandardandshapehow
materialsareenteredintoevidence.Fourspecificelementsareassocia
ted
withtheadmissionofscientificexperttestimony.Thisisimportantwit
h
respecttodigitalforensicsbecausetheformoftheevidencemeansthat
it
canrarelyspeakforitself;rather,itmustbeinterpretedbyanexpertand
presentedtothecourt.
ThefirstelementisthattheJudgeisthegatekeeper.Materialsarenot
consideredevidenceuntildeclaredsobythejudge.Thisistoensuretha
t
expertsaredeterminedtobeexpertsbeforethecourtreliesupontheir
judgment.Asecondelementisreliabilityandrelevance.Thetrialjudg
eis
todeterminethattheexpert’stestimonyisrelevanttotheproceedingsa
t
hand,andthattheexpert’smethodsarereliablewithrespecttothemate
rial
beingattestedto.Thethirdelementisthatexpertknowledgeshouldbe
basedonscience,specificallysciencethatisbasedonthescientificmet
hod
withareplicablemethodology.Thefinalelementrelatestothisscienti
fic
methodology,statingthatitmustbebasedonprovenscience,subjecte
dto
peerreview,withaknownerrorrateorpotentialerrorrateandconsensu
s
amongthescientificcommunitythatthemethodologyisgenerally
accepted.Aftertheseelementsaresatisfied,thejudgecanadmitthe
expert’stestimonyasevidence.
ThesefactorsallrelatetoaU.S.federalcourtdecisionandthereforeare
onlybindingintheU.S.federaljudiciary,butthetestisrecognizedand
appliedinsimilarformatmanylevelsofjurisdiction.Thebottomlineis
simple:thedatacan’tspeakforitself,andexpertswhocaninterpretthe
dataoperateunderstrictguidelineswithrespecttoconduct,qualificat
ions,
principles,andmethods.
Tobecredible,especiallyifevidencewillbeusedincourtproceedings
orincorporatedisciplinaryactionsthatcouldbechallengedlegally,
evidencemustmeetthreestandards:
SufficientevidenceItmustbeconvincingormeasureupwithout
question.
CompetentevidenceItmustbelegallyqualifiedandreliable.
RelevantevidenceItmustbematerialtothecaseorhaveabearing
onthematterathand.
TechTip
EvidenceControlMentalChecklist
Keepthesepointsinmindasyoucollectevidence:
Whocollectedtheevidence?
Howwasitcollected?
Wherewasitcollected?
Whohashadpossessionoftheevidence?
Howwasitprotectedandstored?
Whenwasitremovedfromstorage?Why?Whotookpossession?
ThreeRulesRegardingEvidence
Anitemcanbecomeevidencewhenitisadmittedbyajudgeinacase.
Threerulesguidetheuseofevidencewithregardtoitsuseincourt
proceedings:
BestevidenceruleCourtspreferoriginalevidenceratherthana
copytoensurethatnoalterationoftheevidence(whetherintentional
orunintentional)hasoccurred.Insomeinstances,anevidence
duplicatecanbeaccepted,suchaswhentheoriginalislostor
destroyedbyactsofGodorinthenormalcourseofbusiness.A
duplicateisalsoacceptablewhenathirdpartybeyondthecourt’s
subpoenapowerpossessestheoriginal.
ExclusionaryruleTheFourthAmendmenttotheU.S.Constitution
precludesillegalsearchandseizure.Therefore,anyevidence
collectedinviolationoftheFourthAmendmentisnotadmissibleas
evidence.Additionally,ifevidenceiscollectedinviolationofthe
ElectronicCommunicationsPrivacyAct(ECPA)orotherrelated
provisionsoftheU.S.Code,itmaynotbeadmissibletoacourt.For
example,ifnopolicyexistsregardingthecompany’sintentto
monitornetworktrafficorsystemselectronically,andtheemployee
hasnotacknowledgedthispolicybysigninganagreement,sniffing
theemployee’snetworktrafficcouldbeaviolationoftheECPA.
HearsayruleHearsayissecondhandevidence—evidenceoffered
bythewitnessthatisnotbasedonthepersonalknowledgeofthe
witnessbutisbeingofferedtoprovethetruthofthematterasserted.
Typically,computer-generatedevidenceisconsideredhearsay
evidence,asthemakeroftheevidence(thecomputer)cannotbe
interrogated.Thereareexceptionsbeingmadewhereitemssuchas
logsandheaders(computer-generatedmaterials)arebeingaccepted
incourt.Thereareexceptions,buttheyrarelyapplytodigital
evidence.
ThelawsmentionedhereareU.S.laws.Othercountriesandjurisdictio
nsmayhavesimilarlaws
thatwouldneedtobeconsideredinasimilarmanner.
ForensicProcess
Forensicsistheuseofscientificmethodsintheanalysisofmattersin
connectionwithcrimeorotherlegalmatters.Becauseoftheconnectio
nto
law,itisanexactingprocess,withnoroomforerror.Indigitalforensics
,
theissueofalterationbecomesparamount,becausechanging1’sto0’s
doesnotleaveatraceinmanysituations.Becauseoftheissueof
contaminationorspoliationofevidence,detailedprocessesareusedi
nthe
processingofinformation.
Fromahigh-
levelpointofview,multiplestepsareemployedinadigital
forensicinvestigation:
1.IdentificationRecognizeanincidentfromindicatorsand
determineitstypeandscope.Thisisnotexplicitlywithinthefield
offorensicsbutissignificantbecauseitimpactsothersteps.What
toolswereused?Howmanysystemsareinvolved?Howmuchdata
istobecopied?Thesequestionsallhaveramificationsonthe
successfuloutcomeofaforensicprocess.
2.PreparationPreparetools,techniques,andsearchwarrantsand
monitorauthorizationsandmanagementsupport.
3.Approach/strategyDynamicallyformulateanapproachbasedon
potentialimpactonbystandersandthespecifictechnologyin
question.Thegoalofthestrategyshouldbetomaximizethe
collectionofuntaintedevidencewhileminimizingimpacttothe
victimorowner.
4.PreservationIsolate,secure,andpreservethestateofphysicaland
digitalevidence.Thisincludespreventingpeoplefromusingthe
digitaldeviceorallowingotherelectromagneticdevicestobeused
withinacertainproximity.Properpreservationisessentialto
preventalterationofthesource.
5.CollectionRecordthephysicalsceneandduplicatedigital
evidenceusingstandardizedandacceptedprocedures.Thisiswhere
adigitalcameraandmicrophonearevitaltoolsforcapturingdetails
—serialnumbers,layouts,andsoforth—quicklyanddefinitively.
6.ExaminationIn-depth,systematicsearchofevidencerelatingto
thesuspectedcrime.Thisstepoccurslater,inalab,andfocuseson
identifyingandlocatingpotentialspecificevidenceelements,
possiblywithinunconventionallocations.Itisimportantto
constructdetaileddocumentationforanalysis,documentingthe
metadataanddatavaluesthatmayberelevanttotheissuesathand
intheinvestigation.
7.AnalysisDeterminesignificance,reconstructfragmentsofdata,
anddrawconclusionsbasedontheelementsofevidencefound.The
dataitselfcannottellastory,andinthissteptheinvestigator
weavestheelementsintoapicture,hopefullytheonlyonethatcan
besupported.Althoughtheintuitionistoproveguilt,theskilled
andseasonedinvestigatorfocusesonpaintingthepicturethatthe
datadescribes,regardlessofoutcome,andmakingitcomprehensive
andcompletesothatitwillstanduptochallenge.Multiplepeople
withdifferentskillsetsmaybeneededtocompletethepicture.
8.PresentationSummarizeandprovideanexplanationofthe
conclusions.Theresultsshouldbewritteninlayperson’sterms
usingabstractedterminology.Ifyoucannotexplaintheinformation
toanontechnicallayperson,thenyoudonotunderstanditwell
enoughtocompletethisaspect.Allabstractedterminologyshould
referencethespecificdetailsofthecase.
9.ReturningevidenceEnsurephysicalanddigitalpropertyis
returnedtoitsproperowneranddeterminehowandwhatcriminal
evidencemustberemoved.(Forexample,hardwaremaybe
returned,butimagesofchildpornographywouldberemoved.)This
isnotanexplicitstepofforensicinvestigation,andmostmodels
thataddresshowtoseizeevidencerarelyaddressthisaspect.Butat
theendoftheday,thejobisnotdoneuntilallaspectsarefinished,
andthisincludesthislevelofclean-upactivity.
Wheninformationorobjectsarepresentedtomanagementoradmitted
tocourttosupportaclaim,thatinformationorthoseobjectscanbe
consideredasevidenceordocumentationsupportingyourinvestigati
ve
efforts.Seniormanagementwillalwaysaskalotofquestions—
second-
andthird-orderquestionsthatyouneedtobeabletoanswerquickly.
Likewise,inacourt,credibilityiscritical.Therefore,evidencemustb
e
properlyacquired,identified,protectedagainsttampering,transport
ed,and
stored.
ExamTip:Adigitalcameraisgreatforrecordingasceneandinformati
on.Screenshotsofactive
monitorimagesmaybeobtainedaswell.Picturescandetailelementss
uchasserialnumber
plates,machines,drives,cableconnections,andmore.Photographsar
etrulyworthathousand
words.
AcquiringEvidence
Whenanincidentoccurs,youwillneedtocollectdataandinformationt
o
facilitateyourinvestigation.Ifsomeoneiscommittingacrimeor
intentionallyviolatingacompanypolicy,shewilllikelytrytohideher
tracks.Therefore,youshouldcollectasmuchinformationassoonasyo
u
can.Intoday’shighlynetworkedworld,evidencecanbefoundnotonly
on
theworkstationorlaptopcomputer,butalsooncompany-ownedfile
servers,securityappliances,andserverslocatedwiththeInternetserv
ice
provider(ISP).
TechTip
DataVolatility
Fromthemostvolatiletothemostpersistent:
1.CPUstorage(registers/cache)
2.Systemstorage(RAM)
3.Kerneltables
4.Fixedmedia
5.Removablemedia
6.Output/hardcopy
Afirstrespondermustdoasmuchaspossibletocontroldamageorloss
ofevidence.Obviously,astimepasses,evidencecanbetamperedwith
or
destroyed.Lookaroundonthedesk,ontheRolodex,underthekeyboar
d,
indesktopstorageareas,andoncubiclebulletinboardsforany
informationthatmightberelevant.Securefloppydisks,opticaldiscs,
flash
memorycards,USBdrives,tapes,andotherremovablemedia.Reques
t
copiesoflogsassoonaspossible.MostISPsprotectlogsthatcouldbe
subpoenaed.Takephotos(somelocalitiesrequireuseofPolaroidphot
os,
astheyaremoredifficulttomodifywithoutobvioustampering)orvide
o.
Includephotosofoperatingcomputerscreensandhardwarecompone
nts
frommultipleangles.Besuretophotographinternalcomponentsbefo
re
removingthemforanalysis.
MicrosoftproducedaforensictoolforlawenforcementcalledCOFEE
(ComputerOnline
ForensicsEvidenceExtractor)thatcanbeusedtocollectawiderangeo
fdatafromasuspect
machine.Restrictedbylicensetolawenforcement,itisoutofreachfor
mostinvestigators.An
examinationofhowitfunctionsprovidesusefulinformation,andman
yofitsfunctionscanbe
readilycopiedbyinvestigators.COFEEisawrapperforawholehostof
utilities—think
Sysinternalsandmore—
allintegratedbyscript.Thisautomatedprocesscanbere-
createdbyany
competentforensicinvestigator.Automatedscriptsandtoolsreducee
rrorsandincrease
effectiveness.
Whenanincidentoccursandthecomputerbeingusedisgoingtobe
secured,youmustconsidertwoquestions:Shoulditbeturnedoff,and
shoulditbedisconnectedfromthenetwork?Forensicprofessionalsde
bate
thereasonsforturningacomputeronorturningitoff.Somestatethatth
e
plugshouldbepulledinordertofreezethecurrentstateofthecomputer
.
However,thisresultsinthelossofanydataassociatedwithanattackin
progressfromthemachine.AnydatainRAMwillalsobelost.Further,i
t
maycorruptthecomputer’sfilesystemandcouldcallintoquestionthe
validityofyourfindings.
ExamTip:Filetimestampsmaybeofuseduringtheanalysisphase.Toc
orrelatefiletime
stampstoactualtime,itisimportanttoknowthetimeoffsetbetweenthe
systemclockandreal
time.Recordingthetimeoffsetwhilethesystemisliveiscriticalifthes
ystemclockisdifferent
thanactualtime.
Imagingordumpingthephysicalmemoryofacomputersystemcan
helpidentifyevidencethatisnotavailableonaharddrive.Thisis
especiallyappropriateforrootkits,forwhichevidenceontheharddriv
eis
hardtofind.Oncethememoryisimaged,youcanuseahexeditorto
analyzetheimageofflineonanothersystem.(Memory-
dumpingtoolsand
hexeditorsareavailableontheInternet.)Notethatdumpingmemoryis
moreapplicableforinvestigativeworkwherecourtproceedingswilln
otbe
pursued.Ifacaseislikelytoendupincourt,donotdumpmemory
withoutfirstseekinglegaladvicetoconfirmthatliveanalysisofthe
memoryisacceptable;otherwise,thedefendantwilleasilybeableto
disputetheclaimthatevidencewasnottamperedwith.
Ontheotherhand,itispossibleforthecomputercriminaltoleave
behindasoftwarebombthatyoudon’tknowabout,andanycommands
youexecute,includingshuttingdownorrestartingthesystem,could
destroyormodifyfiles,information,orevidence.Thecriminalmayha
ve
anticipatedsuchaninvestigationandalteredsomeofthesystem’sbina
ry
files.
WhileteachingattheUniversityofTexas,Austin,Dr.LarryLeibrock
ledaresearchprojecttoquantifyhowmanyfilesarechangedwhen
turningoffandonaWindowsworkstation.Theresearchdocumentstha
t
approximately0.6percentoftheoperatingsystemfilesarechangedea
ch
timeaWindowsXPsystemisshutdownandrestarted.Anadministrato
r
lookingatamachineatthebehestofmanagementcancompletely
obfuscateanydatathatcouldberecovered,aprocesscalledspoliation.
Thiscannotbeundoneandrendersthedataunusableinlegalproceedin
gs,
whethercourtorhumanresources.
ExamTip:ForCompTIASecurity+testingpurposes,rememberthis:t
hememoryshouldbe
dumped,thesystemshouldbepowereddowncleanly,andanimagesho
uldbemadeandusedas
youwork.
Further,ifthecomputerbeinganalyzedisaserver,itisunlikely
managementwillsupporttakingitofflineandshuttingitdownfor
investigation.So,fromaninvestigativeperspective,eithercoursema
ybe
correctorincorrect,dependingonthecircumstancessurroundingthe
incident.Whatismostimportantisthatyouaredeliberateinyourwork,
youdocumentyouractions,andyoucanexplainwhyyoutooktheactio
ns
youperformed.
Manyinvestigativemethodsareused.Figure23.1showsthecontinuu
m
ofinvestigativemethodsfromsimpletomorerigorous.
•Figure23.1Investigativemethodrigor
Figure23.2showstherelationshipbetweenthecomplexityofyour
investigationandboththereliabilityofyourforensicdataandthe
difficultyofinvestigation.
•Figure23.2Requiredrigoroftheinvestigativemethodversusbothda
ta
reliabilityandthedifficultyofinvestigation
IdentifyingEvidence
Evidencemustbeproperlymarkedasitiscollectedsothatitcanbe
identifiedasaparticularpieceofevidencegatheredatthescene.Prope
rly
labelandstoreevidence,andmakesurethelabelscan’tbeeasilyremov
ed.
Keepanevidencecontrollogbookidentifyingeachpieceofevidence(i
n
casethelabelisremoved);thepersonswhodiscoveredit;thecasenumb
er;
thedate,time,andlocationofthediscovery;andthereasonforcollecti
on.
Keepalogofallstaffhoursandexpenses.Thisinformationshouldbe
specificenoughforrecollectionlaterincourt.Itisimportanttologothe
r
identifyingmarks,suchasdevicemake,model,serialnumber,cable
configurationortype,andsoon.Noteanytypeofdamagetothepieceof
evidence.
Youshouldneverexamineasystemwiththeutilitiesprovidedbythats
ystem.Youshouldalways
useutilitiesthathavebeenverifiedascorrectanduncorrupted.Evenbe
tter,useaforensic
workstation,acomputersystemspecificallydesignedtoperformcom
puterforensicactivities.Do
notopenanyfilesorstartanyapplications.Ifpossible,documentthecu
rrentmemoryandswap
files,runningprocesses,andopenfiles.Disconnectthesystemfromth
enetworkandimmediately
contactseniormanagement.Unlessyouhaveappropriateforensictrai
ningandexperience,
considercallinginaprofessional.
Beingmethodicalisextremelyimportantwhenidentifyingevidence.
Do
notcollectevidencebyyourself—
haveasecondpersonwhocanserveasa
witnesstoyouractions.Keeplogsofyouractionsduringbothseizurea
nd
duringanalysisandstorage.Asamplelog,providingtheminimum
contentsofanevidencecontrollogbookentry,isshownhere:
Third-
partyinvestigatorsarecommonlyusedincivilmatters.Whendoingdi
gitalforensicsfora
civillitigation–
basedcase,itisimportanttoconsultwiththeretainingcounselconcern
ingthe
levelofdetailandrecordsdesired.Incivillitigation,anythingwritten
willberequestedtobe
disclosedduringpretrialdiscovery.Thiscanprovidestrategydisclos
urebeyondwhatisdesired
bycounsel.Thealternativeistokeepminimalrequiredrecordsasdeter
minedbycounsel.
ProtectingEvidence
Protectevidencefromelectromagneticormechanicaldamage.Ensur
ethat
evidenceisnottamperedwith,damaged,orcompromisedbythe
proceduresusedduringtheinvestigation.Thishelpsavoidpotential
liabilityproblemslater.Protectevidencefromextremesinheatandcol
d,
humidity,water,magneticfields,andvibration.Usestatic-
freeevidence-
protectionglovesasopposedtostandardlatexgloves.Sealtheevidenc
ein
apropercontainerwithevidencetape,andmarkitwithyourinitials,dat
e,
andcasenumber.Forexample,ifamobilephonewithadvanced
capabilitiesisseized,itshouldbeproperlysecuredinahardcontainer
designedtopreventaccidentallypressingthekeysduringtransitand
storage.Ifthephoneistoremainturnedonforanalysis,radiofrequency
isolationbagsthatattenuatethedevice’sradiosignalshouldbeused.T
his
willpreventremotewiping,locking,ordisablingofthedevice.
TransportingEvidence
Properlylogallevidenceinandoutofcontrolledstorage.Useproper
packingtechniques,suchasplacingcomponentsinstatic-
freebags,using
foampackingmaterial,andusingcardboardboxes.Beespeciallycauti
ous
duringtransportofevidencetoensurecustodyofevidenceismaintain
ed
andtheevidenceisn’tdamagedortamperedwith.
TechTip
ProtectingEvidence
Anyandallcollecteddigitalevidenceneedstobeprotectedfromawide
rangeofpotential
losses—
environmental,theft,actualloss,alteration,physicalorelectricalda
mage,oreven
theperceptionofthepossibilityoflossoccurring.Inanylegalproceedi
ng,whethercriminal
orcivil,theotherpartywillalwaysexaminethestorageconditionsand,
iflessthanperfect,
placetheburdenonthepersonstoringittoprovethatitisstillintact.Thi
sisjustonereason
whyrecordinghashvaluesuponcollectionissoimportant.
StoringEvidence
Storetheevidenceinanevidenceroomthathaslowtraffic,restricted
access,cameramonitoring,andentry-loggingcapabilities.Store
componentsinstatic-freebags,foampackingmaterial,andcardboard
boxes,andinsidemetaltamper-resistantcabinetsorsafeswhenever
possible.Manyoftoday’selectronicsaresensitivetoenvironmental
factors.Itisimportantforstorageareastohaveenvironmentalcontrol
sto
protectdevicesfromtemperatureandhumiditychanges.Itisalsoprud
ent
tohaveenvironmental-
monitoringdevicestoensurethattemperatureand
humidityremainwithinsaferangesforelectronicdevices.
ConductingtheInvestigation
Whenanalyzingcomputerstoragecomponents,youmustuseextreme
caution.Acopyofthesystemshouldbeanalyzed—nevertheoriginal
system,asthatwillhavetoserveasevidence.Asystemspeciallydesign
ed
forforensicexamination,knownasaforensicworkstation,canbeused
.
Forensicworkstationstypicallycontainharddrivebays,writeblocke
rs,
analysissoftware,andotherdevicestosafelyimageandprotectcompu
ter
forensicdata.Analysisshouldbedoneinacontrolledenvironmentwit
h
physicalsecurityandcontrolledaccess.
ExamTip:Neveranalyzetheseizedsystemdirectly.Alwaysmakemul
tipleimagesofthedevice
andanalyzeacopy.
TechTip
ToolsoftheTrade
DiskwipeutilitiesToolstocompletelydeletefilesandoverwriteconte
nts
FileviewersTextandimageviewers
ForensicprogramsToolstoanalyzediskspace,filecontent,systemco
nfiguration,and
soon
ForensicworkstationsSpecializedworkstationscontaininghardwar
e,software,and
componentinterfacecapabilitiestoperformcomputerforensicactivi
ties
HarddrivetoolsPartition-viewingutilities,bootableCDs
UnerasetoolsToolstoreversefiledeletions
Rememberthatwitnesscredibilityisextremelyimportant.Itiseasyto
imaginehowquicklycredibilitycanbedamagedifthewitnessisasked,
“Didyoulockthefilesystem?”andcan’tansweraffirmatively.Or,wh
en
asked,“Whenyouimagedthisdiskdrive,didyouuseanewsystem?”th
e
witnesscan’tanswerthatthedestinationdiskwasneworhadbeen
completelyformattedusingalow-
levelformatbeforedatawascopiedto
it.
Oneofthekeyelementstopreservingthechainofcustody,protecting
evidence,andhavingcopiesofdataforanalysisistheconceptofdigital
forensicduplicationofdata.Adigitalforensiccopyisacarefully
controlledcopythathaseverybitthesameastheoriginal.Notjustfiles,
butalldatastructuresassociatedwiththedevice,includingunusedspa
ce,
arecopiedinadigitalforensicimagecopy,everybit,bitbybit.Making
thistypeofcopyisnotsomethingdonewithnormalfileutilities;specia
lty
programsarerequired.
Whenconductingadigitalforensicinvestigation,considerlocallaws.
Manystatesrequirethat
independentinvestigatorsbelicensedprivateinvestigators.Ifyouare
workingasananalyston
in-
housesystems,thelawsmayhavedifferinglevelsofapplicability.Bef
oreconsulting,itisbest
toinvestigatetheneedofalicense.
Itisalsoimportantnottointerfacewiththedigitalmediausingthehost
system,asallfilesystemsbothreadandwritetothestoragemediaaspar
t
oftheirnormaloperation,alteringthemedia.Thistypeofalteration
changesinformation,potentiallydamagingthetraceevidenceneeded
in
theinvestigation.Forthisreason,awriteblockeriscommonlyusedto
connectthemediatotheinvestigator’scomputer.Figure23.3showsak
it
thatcontainsbothwriteblockersandaforensicduplicator.
•Figure23.3(a)Writeblockerdevicesand(b)forensicduplicatordevi
ce
Itiscommonforforensicduplicatordevicestohaveadditionalfeature
s
toassistaninvestigator,suchasmakingmultiplecopiesatonceand
calculatinghashvaluesforthedeviceandtheduplicate.Capturingthe
hashvaluesforallitemsisanessentialfirststepinhandlinganydigital
evidence.
TechTip
Forensics-BasedDriveImaging
Whenaforensicinvestigationonaseriesofcomputersisneededtodete
rminefactsina
computerinvestigation,avarietyofmethodscanbeusedtodiscoveran
drecoverthe
evidence.Forexample,ifadevelopergroupisbeinginvestigated,thei
nvestigatorcouldlook
ateachmachineandfindthespecificevidencethatisbeingsought.The
problemwiththis
approachisthatintheprocessofdoingtheinvestigation,theotherdeve
lopersinthearea
becomeawareandhaveachancetodestroycriticalevidence.Forthisre
ason,andto
minimizedisruptiontoateam,manytimestheinvestigationbeginswit
halarge-scaleforensic
duplicationeffort.Thestepsareremarkablysimpleandwellpracticed
bymanyinvestigative
firms:
1.Documentthescopeofthemachinesbeinginvestigated,notingthen
umberofdrives
andsizes.
2.Sendinateamafterhourstodotheduplication.
3.Openeachmachine,disconnecttheharddrives,andattachexternalc
ables.
4.Duplicateeachdriveusingaforensicduplicationprocedurethatma
kesacomplete
imageoftheharddriveonaseparatemediasource.
5.Reassemblethemachines,leavingnoevidencethattheduplication
wasperformed.
Theforensicimagesarethenexaminedonebyoneatalatertime,awayfr
ominquisitiveand
pryingeyes.
Analysis
Aftersuccessfullyimagingthedrivestobeanalyzedandcalculatingan
d
storingthemessagedigests,theinvestigatorcanbegintheanalysis.Th
e
detailsoftheinvestigationwilldependontheparticularsoftheinciden
t
beinginvestigated.However,ingeneral,thefollowingstepswillbe
involved:
Thenumberoffilesstoredontoday’sharddrivescanbeverylarge,liter
allyhundredsof
thousandsoffiles.Obviouslythisisfartoomanyfortheinvestigatorto
directlyanalyze.
However,bymatchingthemessagedigestsforfilesinstalledbythemo
stpopularsoftware
productstothemessagedigestsoffilesonthedrivebeinganalyzed,the
investigatorcanavoid
analyzingapproximately90percentofthefilesbecausehecanassume
theyareunmodified.The
NationalSoftwareReferenceLibrary(NSRL)collectssoftwarefrom
varioussourcesand
incorporatesfileprofilesintoaReferenceDataSetavailablefordownl
oadasaservice.See
www.nsrl.nist.gov.
1.ChecktheRecycleBinfordeletedfiles.
2.Checkthewebbrowserhistoryfilesandaddressbarhistories.
3.Checkthewebbrowsercookiefiles.Differentwebbrowsersstore
cookiesindifferentplaces.
4.ChecktheTemporaryInternetFilesfolders.
http://www.nsrl.nist.gov
5.Searchfilesforsuspectcharacterstrings.Toconservevaluabletime
,
bewiseinthechoiceofwordsyousearchfor,choosing
“confidential,”“sensitive,”“sex,”orotherexplicitwordsand
phrasesrelatedtoyourinvestigation.
6.Searchtheslackandfreespaceforsuspectcharacterstringsas
describedpreviously.
TheCAINEComputerForensicsLinuxLiveDistroandSANSInvestig
ativeForensicToolkit
(SIFT)arejusttwoexamplesofthemanytoolsyoucanusetoperformco
mputerforensic
activities.
TechTip
Cleanup:PossibleRemediationActionsAfteranAttack
Thesearethingsyou’llneedtodotorestoreyoursystemafteryou’veres
pondedtoan
incidentandcompletedyourinitialinvestigation:
Placethesystembehindafirewall.
ReloadtheOS.
Runscanners.
Installsecuritysoftware.
Removeunneededservicesandapplications.
Applypatches.
Restorethesystemfrombackup.
ChainofCustody
Evidence,oncecollected,mustbeproperlycontrolledtoprevent
tampering.Thechainofcustodyaccountsforallpersonswhohandledo
r
hadaccesstotheevidence.Thechainofcustodyshowswhoobtainedth
e
evidence,whenandwhereitwasobtained,whereitwasstored,andwho
hadcontrolorpossessionoftheevidencefortheentiretimesincethe
evidencewasobtained.
Thefollowingshowscriticalstepsinachainofcustody:
1.Recordeachitemcollectedasevidence.
2.Recordwhocollectedtheevidence,alongwiththedateandtimeit
wascollectedorrecorded.
3.Writeadescriptionoftheevidenceinthedocumentation.
4.Puttheevidenceincontainersandtagthecontainerswiththecase
number,thenameofthepersonwhocollectedit,andthedateand
timeitwascollectedorputinthecontainer.
5.Recordallmessagedigest(hash)valuesinthedocumentation.
6.Securelytransporttheevidencetoaprotectedstoragefacility.
7.Obtainasignaturefromthepersonwhoacceptstheevidenceatthis
storagefacility.
8.Providecontrolstopreventaccesstoandcompromiseofthe
evidencewhileitisbeingstored.
9.Securelytransporttheevidencetocourtforproceedings.
MessageDigestandHash
Iffiles,logs,andotherinformationaregoingtobecapturedandusedfor
evidence,youneedtoensurethatthedataisn’tmodified.Inmostcases,
a
toolthatimplementsahashingalgorithmtocreatemessagedigestsisu
sed.
Themathematicsbehindhashingalgorithmshasbeenresearchedexte
nsively,andalthoughitis
possiblethattwodifferentdatastreamscouldproducethesamemessa
gedigest,itisvery
improbable.MostforensictoolsstillreportMD5hashes,althoughthei
ndustryisshiftingtoSHA-
2andSHA-
3seriesandthetoolsarecatchingup.HashingiscoveredindetailinCha
pter5.
CrossCheck
HashAlgorithmsandForensics
Hashalgorithmsofferdigitalforensicstheabilityto“bagandtag”evid
ence.Althoughitdoes
notprotecttheevidencefromtampering,itprovidesclearproofofwhet
herornotdatahasbeen
changed.Thisisaveryimportantissuetoresolve,givenhoweasyitisto
changedigitaldataand
thefactthattypicallynotraceisleftofthechange.Acompletereviewof
hashingalgorithmsis
foundinChapter5.Theimportantquestionregardinghashesandforen
sicsisthis:Howand
wheredoyourecordhashvaluestoprotecttheirintegrityaspartofthein
vestigativeprocess?
Ahashingalgorithmperformsafunctionsimilartothefamiliarparity
bits,checksum,orcyclicalredundancycheck(CRC).Itapplies
mathematicaloperationstoadatastream(orfile)tocalculatesome
numberthatisuniquebasedontheinformationcontainedinthedata
stream(orfile).Ifasubsequenthashcreatedonthesamedatastream
resultsinadifferenthashvalue,itusuallymeansthatthedatastreamwa
s
changed.
Thehashtoolisappliedtoeachfileorlog,andthemessagedigestvalue
isnotedintheinvestigationdocumentation.Itisagoodpracticetowrit
e
thelogstoawrite-oncemediasuchasCD-ROM.Whenthecaseactually
goestotrial,theinvestigatormayneedtorunthetoolonthefilesorlogs
againtoshowthattheyhavenotbeenalteredinanywaysincebeing
obtained.
HostForensics
Hostforensicsreferstotheanalysisofaspecificsystem.Hostforensic
s
includesawiderangeofelements,includingtheanalysisoffilesystem
s
andartifactsoftheoperatingsystem.Theseelementsoftenarespecific
to
individualsystemsandoperatingsystems,suchasLinuxorWindows.
FileSystems
Whenauserdeletesafile,thefileisnotactuallydeleted.Instead,apoint
er
inafileallocationtableisdeleted.Thispointerwasusedbytheoperatin
g
systemtotrackdownthefilewhenitwasreferenced,andtheactof
“deleting”thefilemerelyremovesthepointerandmarksthecluster(s)
holdingthefileasavailablefortheoperatingsystemtouse.Theactual
dataoriginallystoredonthediskremainsonthedisk(untilthatspaceis
usedagain);itjustisn’trecognizedasacoherentfilebytheoperating
system.
Partitions
Physicalmemorystoragedevicescanbedividedintoaseriesofcontain
ers
calledpartitions.Apartitionisalogicalstorageunitthatissubsequentl
y
usedbyanoperationsystem.Systemscanhavemultiplepartitionsfora
widevarietyofreasons,rangingfromhostingmultipleoperatingsyste
ms
toperformance-
maximizingeffortstoprotectionefforts.Thebroadissue
ofpartitionoperationandmanagementisoutsidethescopeofthischap
ter,
butthisisacriticaltopictounderstandandexaminewhenlookingata
systemforensically.
FreeSpace
Sinceadeletedfileisnotactuallycompletelyerasedoroverwritten,its
its
ontheharddiskuntiltheoperatingsystemneedstousethatspacefor
anotherfileorapplication.Sometimesthesecondfilethatissavedinth
e
sameareadoesnotoccupyasmanyclustersasthefirstfile,soafragment
oftheoriginalfileisleftover.
Theclusterthatholdsthefragmentoftheoriginalfileisreferredtoas
freespacebecausetheoperatingsystemhasmarkeditasusablewhen
needed.Assoonastheoperatingsystemstoressomethingelseinthis
cluster,itisconsideredallocated.Theunallocatedclustersstillcontai
nthe
originaldatauntiltheoperatingsystemoverwritesthem.Lookingatth
e
freespacemightrevealinformationleftoverfromfilestheuserthough
t
weredeletedfromthedrive.
SlackSpace
Anotherplacethatshouldbereviewedisslackspace,whichisdifferent
fromfreespace.Whenafileissavedtoaharddriveorotherstorage
medium,theoperatingsystemallocatesspaceinblocksofapredefined
size,calledclusters.Evenifyourfilecontainsonlytencharacters,the
operatingsystemwillallocateafullcluster—withspaceleftoverinthe
cluster.Thisisslackspace.
Itispossibleforausertohidemaliciouscode,tools,orcluesinslack
space,aswellasinthefreespace.Youmayalsofindinformationinslac
k
spacefromfilesthatpreviouslyoccupiedthatsamecluster.Therefore,
an
investigatorshouldreviewslackspaceusingutilitiesthatcandisplayt
he
informationstoredintheseareas.
HiddenFiles
Therearenumerouswaystohidedataonasystem.Onemethodistohide
filesbysettingthehiddenattribute,whichlimitsthelistingofthemby
standardfileutilities.Devisedsothatsystemfilesthatshouldnotbe
directlymanipulatedarehiddenfromeasyview,thisconceptraisesa
broaderquestionwithrespecttoforensics.Howcanauserhide
informationfromeasyaccessibility?
Thereisawiderangeofmethodsofhidingfiles,andanyattempttolist
themwouldbelongandsubjecttocontinualchange.Themajorones
typicallyencounteredincludechangingafileextension,encryption,
streams,andstorageonotherpartitions.Wehavealreadycovered
partitions—itisobviousthataforensicinvestigationshouldfind,
enumerate,andexploreallpartitions.Streamswillbecoveredinthene
xt
section.Encrypteddata,byitsverynature,ishiddenfromview.Witho
ut
thekey,modernencryptionmethodsresistanybrute-forceattemptsto
determinethecontents.Itisimportanttofindencrypteddatastoresand
documentthelocationsforlaterusebylegalcounsel.
Changingafile’sextensiondoesnotactuallyalterthecontentsor
usabilityofafile.Itmerelybreakstheautomatedruntimeassociation
managerthatdetermineswhatexecutableisassociatedwiththefiletyp
eto
properlyhandleit.Thechallengeofhowtohandlefiletypesgoesbackt
o
theearlydaysofcomputers,whenthemagicnumbermethodwascreate
d.
Thetermmagicnumberdescribesaseriesofdigitsnearthebeginningo
f
thefilethatprovidesinformationaboutthefileformat.Insomecasesth
e
magicnumbercanbereadbyhumans,asGIF87aorGIF89aindicatesbo
th
GraphicsInterchangeFormatandthespecification.Otherfiletypesar
e
lessobvious,suchasaTIFFfileonanIntelplatform,whichisIIfollowe
d
by42asatwo-byteinteger(49492A00).
Mostintegratedforensictoolsuiteshandlefileidentificationviamagi
c
numberandarethusabletofindhiddenvideos,pictures,andotheritem
s.
Theotherthingthesetoolscandoiscompletesearchesacrosstheentire
storagestructureforstrings,andthiscanfindmany“hidden”items.
Streams
StreamsisashortnameforAlternateDataStreams,aspecificdata
structureassociatedwithNTFSinWindows.Thenormallocationford
ata
inanNTFS-basedsystemisinthedatastream,alocationidentifiedbya
recordintheMasterFileTable(MFT)called$DATA:,whichis
technicallyanunnameddatastream.Alternatedatastreamshavename
s
andareidentifiedby$DATA:StreamName,whereStreamNameisthe
nameofthestreambeingused.Streamscanbeusedtohideinformation;
althoughtheinformationisstillpresent,mostofthenormalfileutilitie
sdo
notdealwithstreams,soitwillnotbeseen.Forensictoolsuiteshavetoo
ls
thatcansearchfor,reporton,andanalyzestreamdataonWindows
systems.
WindowsMetadata
MicrosoftWindows–basedsystemshaveawiderangeofartifactswith
forensicvalue.Beforeweexaminesomeoftheseartifacts,itisimporta
nt
tounderstandwhytheyexist.Thevastmajorityofartifactsexistforthe
purposeofimprovingtheuserexperience.Trackingwhatusersdoand
havedoneandmakingthatinformationavailabletotheoperatingsyste
m
toimprovefutureuseisoneoftheprimaryreasonsfortheinformation;i
ts
forensicvalueissecondary.
RegistryAnalysis
ThefirstandforemostWindowsartifactisthesystemRegistry,whicha
cts
adatabaserepositoryofawholehostofinformationandprovidesaone-
stopshopforawiderangeofWindowsforensicartifacts—what
applicationshavebeeninstalled,useractivity,activityassociatedwit
h
externaldevices,andmore.Althoughthespecificartifactsneededina
n
investigationdifferbasedonthescopeoftheinvestigation,itissafeto
assumethatmetadatarecordedbytheWindowsoperatingsystemwill
serveausefulpurposeintheinvestigation,especiallysincetheRegistr
yis
storedbyuserandthereforetheactivityrecordedintheRegistryis
attributabletoauser.
ThelistofartifactsstoredbytheRegistryisextremelylong,butsomeof
themajoronesincludeeventlogsofawiderangeofsystemandsecurity
information.Thereisalsoawiderangeoffileactivityartifactsthatcan
be
analyzed,includinganalysisofshellbags,whichprovidesevidenceof
folderopening.LNKfilesandmostrecentlyused(MRU)elementscan
pointtofilesystemactivity.Awiderangeofdate/timestampsonfiles,
evendeletedfiles,canbepresentforexamination.Therearespecific
toolsetsdesignedtoforensicallyexploretheRegistryandretrievethe
desiredartifactsfromthisvoluminousstore.
TechTip
WindowsUSBAnalysis
WindowsrecordsawidearrayofinformationoneachUSBdeviceusedi
nthesystem,
including:
Vendor/make/versionandpossiblyuniqueserialnumber
Volumenameandserialnumber
Lastdriveletterassigned
MountPoints2,aregistryentrythatstoresthelastdrivemappingperus
er
UsernamethatusedtheUSBdevice
TimeoffirstUSBdeviceconnection
TimeoflastUSBdeviceconnection
TimeoflastUSBdeviceremoval
Asmentionedbeforeandwillbementionedagain,Windowsforensic
analysisisnodifferentfromanyotherforensicanalysiswithrespectto
forensicprocedures.Skillandproficiencyinforensicproceduresisth
e
mostimportantissuewhenanalyzingasystem,becausedamagemaym
ake
useoftheinformationimpossible.
LinuxMetadata
Linuxsystemshavetheirownsetsofartifacts.Fromaforensics
perspective,LinuxsystemsdifferfromWindowssystemsinthreemai
n
ways:
NoregistryProgramdataisstoredinscatteredlocations.
DifferentfilesystemAmultitudeofdifferentfilesystemsareused,
eachwithdifferentattributes.
PlaintextaboundsFilesanddatatendtobeinplaintext,which
impactssearching.
Thelackofaregistrytoholdsystemandprograminformationdoesnot
meanthattheinformationisnotthere;itjustmeansthatitisdistributed.
Thesameistrueoffilesystems.Ratherthanofferingonlytwofilesyste
m
structures(NTFSandFAT),Linuxcomeswithawholehostofdifferent
forms.Eachofthesehasquirks,suchasnofilecreationdatesinmanyof
them,andthezeroingofmetadatawhenfilesaredeletedresultsinforen
sic
challenges.
WhenitcomestoperformingforensicsonaLinuxsystem,thevalueof
agoodsysadmincannotbeunderstated.Manyoftheartifactsofactivit
y
onaLinuxsystemarescatteredtovariouslocallocations,andagood
sysadmincanassistinlocatingandrecoveringtheessentialelementsf
or
analysis.Thisisnotalicenseforasysadmintobeginperformingforens
ic
activities!Thesamerulesandproceduralrequirementslistedearlierst
ill
apply,andinmostcasesthisnecessitatestheuseofforensicallytrained
professionals.
DeviceForensics
Deviceforensicsistheapplicationofdigitalforensicprinciplestodev
ices
—mobilephones,tablets,theendlesslistofdevicesthatcomprisethe
“InternetofThings,”andmore.Thefactthatitisadevicedoesnotchang
e
theprinciplespertainingtothecollectionandhandlingofevidence.Al
lof
theforensicprinciplesstillapplyandarejustasimportant.Whatdoes
changearethetoolsandprocessesemployedtoretrieveandanalyzethe
data.Thisisbecausethefilesystems,datastructures,operatingsystem
s,
andartifactsaredifferentthanthoseintheworldofserversandPCs.
TechTip
SSDForensics
Theadventofsolidstatedrivesbringssubstantialimprovementsinper
formance.Italso
bringsnewissueswithrespecttoforensics.Becauseofthewaythesyst
emisdesigned,alotof
“standard”artifactsthatwouldbefoundinamagneticmemorysystem
arenotpresentin
solidstatedrives.Asthesedrivesarecommonindevices,forensicanal
ystshavetotakeallof
thesetechnicalissuesintoconsiderationwhenattemptingtoreconstru
ctwhathappened.
NetworkForensics
Networkforensicsisthecapture,recording,andanalysisofnetwork
eventsinordertodiscoverthesourceofnetworkproblemsorsecurity
incidents.Examiningnetworksinaforensicfashionintroducessever
al
challenges.Firstisscale.Thescaleofanetworkisrelatedtothenumber
of
nodesandthespeedoftraffic.Secondistheissueofvolume.Packet
captureisnottechnicallydifficult,butitcannecessitatelargequantiti
esof
storage.Andalthoughstorageisrelativelycheap,largenumbersofpac
kets
canbedifficulttosortthroughandanalyze.Becauseoftheseissues,—
networkforensicsbecomesanissueofspecificity;ifyouknowwhattar
get
andwhatprotocolsyouarelookingfor,youcanselectivelycaptureand
analyzethetrafficforthosesegmentsandhavedatathatisuseful.But
thereinliestheotherchallenge.Networkdataistemporal.Itexistswhil
e
thepacketisintransitandthenitisgone,forever.Metadatasuchas
NetFlowdatacanprovidesomeinformation,butitdoesnotcontainany
contentofthedatabeingtransmitted.
Asageneral-purposetool,networkforensicsisnearlyimpossible
becauseofthescaleissues.Butinspecificsituations,suchasinfrontof
high-valuetargetsthathavelimiteddatamovement,itcanprovetobe
valuable.Itcanalsobevaluableintroubleshootingongoingincidents
and
problemsinthenetwork.
Thesamerulesapplytonetworkforensicsasapplytoallotherforensic
collectionefforts.Preservingtheintegrityofthedataisparamount,an
d
maintainingcontroloverthedataisalwaysachallenge.Forensicrules
(admissibility,chainofcustody,etc.)donotchangebecausethesourc
eof
datahaschanged.
E-Discovery
Electronicdiscovery,ore-
discovery,isthetermusedforthedocumentand
dataproductionrequirementsaspartoflegaldiscoveryincivillitigati
on.
Whenacivillawsuitisfiled,undercourtapproval,afirmcanbe
compelledtoturnoverspecificdatafromsystemspursuanttothelegal
issueathand.Electronicinformationisconsideredtobethesameaspap
er
documentsinsomerespectsandcompletelydifferentinothers.The
evidentiaryvaluecanbeidentical.Thefragilitycanbesubstantial—
electronicrecordscanbechangedwithoutleavingatrace.Electronic
documentscanalsohavemetadataassociatedwiththedocuments,suc
has
whoeditedthedocument,previousversioninformation,andmore.
Oneofthepressingchallengesintoday’senterpriserecordstoreisthe
maintenanceofthevolumesofelectronicinformation.Keepingtrack
of
theinformationstoresbasedonawiderangeofsearchtermsisessential
to
complywithe-discoveryrequests.Itiscommonforsystemstouse
forensicprocessesandtoolstoperforme-discoverysearches.
ReferenceModel
EDRM,acoalitionofconsumersandprovidersfocusedonimprovinge
-
discoveryandinformationgovernance,hascreatedareferencemodel
for
e-
discovery.TheElectronicDiscoveryReferenceModel,showninFigu
re
23.4,providesaframeworkfororganizationstopreparefore-
discovery.
ThemajorstepsoftheframeworkarethoroughlydescribedontheEMD
R
website(http://edrm.net).AdditionalresourcesavailablefromEDR
M
includeXMLschemas,glossaries,metric,andmore.
http://edrm.net
•Figure23.4ElectronicDiscoveryReferenceModel(courtesyof
EDRM,EDRM.net)
http://EDRM.net
BigData
Itmayseemthatbigdataisalltherageinbusinesstoday,butinrealityit
issimplyadescriptionofthetimes.Wehavecreatedlargedatastoresin
mostenterprises,abyproductofcheapstorageandtheubiquityofthe
Internet.Bigdataisanissueine-discoveryaswell.Thecataloging,
storage,andmaintenanceofcorporaterecordsoftenbecomesabigdat
a
issue.Thisfacilitatestheuseofbigdatamethodsinmanycases.Thisisa
n
areaofrapiddevelopment,bothforforensicsande-discovery,asdata
volumescontinuetogrowexponentially.
Cloud
ThecloudhasbecomearesourceforenterpriseITsystems,andassuchi
t
isintimatelyinvolvedinbothe-
discoveryandforensics.Havingdatathat
mayormaynotbedirectlyaccessedbythetoolsofe-discoveryand
forensicscancomplicatetheneededprocesses.Anadditionalcomplic
ation
isthelegalissuesassociatedwiththecontractsbetweentheorganizati
on
andthecloudprovider.Asbothforensicsande-
discoveryaresecondary
processesfromabusinessperspective,theymayormaynotbeaddresse
d
inastandardcloudagreement.Becausetheseprocessescanbecome
important—
andiftheydo,itmaybetoolatetocontractuallyaddressthem
—itbehoovesanorganizationtopreparebyaddressingthemincloud
agreementswiththirdparties.
Chapter23Review
LabManualExercises
Thefollowinglabexercisesfromthecompanionlabmanual,Principle
sof
ComputerSecurityLabManual,FourthEdition,providepractical
applicationofmaterialcoveredinthischapter:
ChapterSummary
Afterreadingthischapterandcompletingtheexercises,youshould
understandthefollowingaboutincidentresponseandforensics.
Explorethebasicsofdigitalforensics
Digitalforensicsisthecollectionofprocessesandproceduresusedto
preparedigitalinformationforuseinlegaloradministrative
proceedings.
Becauseoftheimportanceofveracityandthefragilityofdigitaldatato
integrityviolationsthatcannotbedetected,itisimperativethat
processesbecompleteandcomprehensive.
Identifytherulesandtypesofevidence
Evidencemustmeetthethreestandardsofbeingsufficient,competent
,
andrelevantifitistobeusedinlegalproceedings.
Therearefourdifferenttypesofevidence:direct,real,documentary,
anddemonstrative.
Therearethreerulesregardingevidence:thebestevidencerule,the
exclusionaryrule,andthehearsayrule.
Collectevidence
Evidencemustbeproperlycollected,protected,andcontrolledtobeof
valueduringcourtordisciplinaryactivities.
Whenacquiringevidence,onemustbedeliberatetoensureevidenceis
notdamagedandoperationsarenotnegativelyimpacted.
Preserveevidence
Evidencemustbeproperlymarkedsothatitcanbereadilyidentifiedas
thatparticularpieceofevidencegatheredatthescene.
Evidencemustbeprotectedsothatitisnottamperedwith,damaged,or
compromised.
Evidenceshouldbetransportedcautiouslytoensurecustodyofthe
evidenceismaintainedandtheevidenceitselfisnottamperedwithor
damaged.
Evidenceshouldbestoredinproperlycontrolledareasandconditions.
Whenconductinganinvestigationoncomputercomponents,onemust
bedeliberateandcautioustoensureevidenceisnotdamaged.
Maintainaviablechainofcustody
Achainofcustodythataccountsforallpersonswhohandledorhave
accesstotheevidencemustbemaintainedtopreventevidence
tamperingordamage.
Investigateacomputercrimeorpolicyviolation
Informationcanberecordedandpossiblyhiddeninvariouswaysona
computer.Sometimesinformationwillbehiddenineitherthefree
spaceortheslackspaceofthecomputer’sdiskdrive.
Freespaceisthespace(clusters)onastoragemediumthatisavailable
fortheoperatingsystemtouse.
Slackspaceistheunusedspaceonadiskdrivecreatedwhenafileis
smallerthantheallocatedunitofstorage,suchasacluster.
Theuseofamessagedigestorhashingalgorithmisessentialtoensure
thatinformationstoredonacomputer’sdiskdriveshasnotbeen
changed.
Iftheinformationinthedatastreamorfileischanged,adifferent
messagedigestwillresult,indicatingthefilehasbeentamperedwith.
Forensicanalysisofdatastoredonaharddrivecanbeginoncethe
drivehasbeenimagedandmessagedigestsofimportantfileshave
beencalculatedandstored.
AnalysistypicallyinvolvesinvestigatingtheRecycleBin,webbrows
er
andaddressbarhistoryfiles,cookiefiles,temporaryInternetfile
folders,suspectfiles,andfreespaceandslackspace.
Experienceandknowledgeareyourmostvaluabletoolsavailablewhe
n
performingcomputerforensicactivities.
ExamineSystemartifacts
Differentsystemscanhavedifferentartifactsbasedontheoperating
systemandequipmentemployed.
WindowsandLinuxsystemshavemanysimilarartifacts,althoughthe
y
arelocatedindifferentareasandpreservedindifferentways.
DevelopForensicpoliciesandprocedures
Theoverarchingprincipleforalldigitalforensicinvestigationsis
properprocedures.Anydeviationfromproperprocedurescan
permanentlyalterevidenceandrenderinformationunusableinfollow
-
onprocedures,whethercriminal,civil,oradministrative.Ensuring
properproceduresbytrainedprofessionalsisessentialfromthefirst
aspectofaninvestigation.
Examinethepoliciesandproceduresassociatedwithe-discovery
E-discovery,isthetermusedforthedocumentanddataproduction
requirementsaspartoflegaldiscoveryincivillitigation
TheElectronicDiscoveryReferenceModel,providesaframeworkfor
organizationstopreparefore-discovery.
KeyTerms
bestevidencerule(677)
competentevidence(677)
demonstrativeevidence(676)
deviceforensics(688)
directevidence(676)
documentaryevidence(676)
evidence(675)
exclusionaryrule(677)
forensics(675)
freespace(686)
hearsayrule(677)
magicnumber(687)
networkforensics(689)
partition(686)
realevidence(676)
relevantevidence(677)
slackspace(686)
stream(687)
sufficientevidence(677)
writeblocker(683)
KeyTermsQuiz
UsetermsfromtheKeyTermslisttocompletethesentencesthatfollow
.
Don’tusethesametermmorethanonce.Notalltermswillbeused.
1.EvidencecollectedinviolationoftheFourthAmendmentofthe
U.S.Constitution,theElectronicCommunicationsPrivacyAct
(ECPA),orotheraspectsoftheU.S.Codemaynotbeadmissibleto
acourtunderthetermsofthe_______________.
2.Evidencethatislegallyqualifiedandreliableis_______________.
3.Documents,verbalstatements,andmaterialobjectsadmissibleina
courtoflawarecalled_______________.
4.Therulewherebycourtspreferoriginalevidenceratherthanacopy
toensurethatnoalterationoftheevidence(whetherintentionalor
unintentional)hasoccurredistermedthe_______________.
5.Evidencethatisconvincingormeasuresupwithoutquestionis
_______________.
6._______________isthepreservation,identification,
documentation,andinterpretationofcomputerdatatobeusedin
legalproceedings.
7._______________isevidencethatismaterialtothecaseorhasa
bearingonthematterathand.
8._______________istheunusedspaceonadiskdrivewhenafileis
smallerthantheallocatedunitofstorage.
9._______________isoraltestimonyorotherevidencethatprovesa
specificfact(suchasaneyewitness’sstatement,fingerprint,photo,
andsoon).Theknowledgeofthefactsisobtainedthroughthefive
sensesofthewitness.Therearenoinferencesorpresumptions.
10._______________istheremainingsectorsofapreviouslyallocate
d
filethatareavailablefortheoperatingsystemtouse.
Multiple-ChoiceQuiz
1.Whichofthefollowingcorrectlydefinesevidenceasbeing
competent?
A.Theevidenceismaterialtothecaseorhasabearingonthe
matterathand.
B.Theevidenceispresentedintheformofbusinessrecords,
printouts,orotheritems.
C.Theevidenceisconvincingormeasuresupwithoutquestion.
D.Theevidenceislegallyqualifiedandreliable.
2.Whichofthefollowingcorrectlydefinesevidenceasbeing
relevant?
A.Theevidenceismaterialtothecaseorhasabearingonthe
matterathand.
B.Theevidenceispresentedintheformofbusinessrecords,
printouts,orotheritems.
C.Theevidenceisconvincingormeasuresupwithoutquestion.
D.Theevidenceislegallyqualifiedandreliable.
3.Whichofthefollowingcorrectlydefinesdocumentaryevidence?
A.Theevidenceispresentedintheformofbusinessrecords,
printouts,manuals,andotheritems.
B.Theknowledgeofthefactsisobtainedthroughthefivesenses
ofthewitness.
C.Theevidenceisusedtoaidthejuryandmaybeintheformofa
model,experiment,chart,orotheritemandbeofferedtoprove
aneventoccurred.
D.Physicalevidencethatlinksthesuspecttothesceneofacrime.
4.Whichofthefollowingcorrectlydefinesrealevidence?
A.Theevidenceisconvincingormeasuresupwithoutquestion.
B.Theevidenceismaterialtothecaseorhasabearingonthe
matterathand.
C.Theevidenceisusedtoaidthejuryandmaybeintheformofa
model,experiment,chart,orotheritemandbeofferedtoprove
aneventoccurred.
D.Tangibleobjectsthatproveordisproveafact.
5.Whichofthefollowingistheleastrigorousinvestigativemethod?
A.Usingadedicatedforensicworkstation
B.Verifyingsoftwareonasuspectsystemandusingthatsoftware
fortheinvestigation
C.Examiningthesuspectsystemusingitssoftwarewithout
verification
D.BootingthesuspectsystemwithaverifiedfloppyorCD,
kernel,andtools
6.Whichofthefollowingcorrectlydefinesslackspace?
A.Thespaceonadiskdrivethatisoccupiedbythebootsector
B.Thespacelocatedatthebeginningofapartition
C.Theremainingsectorsofapreviouslyallocatedfilethatare
availablefortheoperatingsystemtouse
D.Theunusedspaceonadiskdrivewhenafileissmallerthanthe
allocatedunitofstorage
7.Whichofthefollowingcorrectlydescribestheminimumcontentsof
anevidencecontrollogbook?
A.Description,Investigator,Case#,Date,Time,Location,Reason
B.Description,Investigator,Case#,Date,Location,Reason
C.Description,Case#,Date,Time,Location,Reason
D.Description,Coroner,Case#,Date,Time,Location,Reason
8.Whichofthefollowingcorrectlydescribesthechainofcustodyfor
evidence?
A.Theevidenceisconvincingormeasuresupwithoutquestion.
B.Accountsforallpersonswhohandledorhadaccesstoa
specificitemofevidence.
C.Description,Investigator,Case#,Date,Time,Location,
Reason.
D.Theevidenceislegallyqualifiedandreliable.
9.Whichofthefollowingcorrectlydefinestheexclusionaryrule?
A.AnyevidencecollectedinviolationoftheFourthAmendment
isnotadmissibleasevidence.
B.Theevidenceconsistsoftangibleobjectsthatproveordisprove
afact.
C.Theknowledgeofthefactsisobtainedthroughthefivesenses
ofthewitness.
D.Theevidenceisusedtoaidthejuryandmaybeintheformofa
model,experiment,chart,orthelike,offeredtoproveanevent
occurred.
10.Whichofthefollowingcorrectlydefinesfreespace?
A.Theunusedspaceonadiskdrivewhenafileissmallerthanthe
allocatedunitofstorage(suchasasector)
B.Thespaceonadiskdrivethatisoccupiedbythebootsector
C.Thespacelocatedatthebeginningofapartition
D.Theremainingsectorsofapreviouslyallocatedfilethatare
availablefortheoperatingsystemtouse
EssayQuiz
1.Asupervisorhasbroughttoyourofficeaconfiscatedcomputerthat
wasallegedlyusedtoviewinappropriatematerial.Hehasaskedyou
tolookforevidencetosupportthisallegation.Becauseyouwork
forasmallcompany,youdonothaveanextracomputeryoucan
dedicatetoyouranalysis.Howwouldyoubootthesystemand
beginforensicanalysis?Provideareasonforyourmethod.
2.Explainwhyyoushouldalwayssearchthefreespaceandslack
spaceifyoususpectapersonhasdeliberatelydeletedfilesor
informationonaworkstationthatyouareanalyzing.
3.Youhavebeenaskedbymanagementtosecurethelaptopcomputer
ofanindividualwhowasjustdismissedfromthecompanyunder
unfavorablecircumstances.Pretendthatyourowncomputeristhe
laptopthathasbeensecured.Makethefirstentryinyourlogbook
anddescribehowyouwouldstartthisincidentoffcorrectlyby
properlyprotectingandsecuringtheevidence.
LabProjects
•LabProject23.1
UseanMD5orSHA-
1algorithmtoobtainthehashvalueforafileofyourchoice.Recordthe
hashvalue.Changethefilewithawordprocessorortexteditor.Obtaint
hehashvalueforthe
modifiedfile.Comparetheresult.
•LabProject23.2
Tounderstandwhatinformationisstoredonyourcomputer,examinet
hecontentsofthe
TemporaryInternetFilesfoldersonyourowncomputer.Reviewthefil
enamesandexaminethe
contentsofafewofthefiles.Describehowthisinformationcouldbeus
edasevidenceofa
crime.
Chapter 23 Computer ForensicsEvidenceTypes of
EvidenceStandards for EvidenceThree Rules Regarding
EvidenceForensic ProcessAcquiring EvidenceIdentifying
EvidenceProtecting EvidenceTransporting EvidenceStoring
EvidenceConducting the InvestigationAnalysisChain of
CustodyMessage Digest and HashHost ForensicsFile
SystemsWindows MetadataLinux MetadataDevice
ForensicsNetwork ForensicsE-DiscoveryReference ModelBig
DataCloudChapter 23 Review
Copyright©2016byMcGraw-
HillEducation.Allrightsreserved.Except
aspermittedundertheUnitedStatesCopyrightActof1976,nopartofth
is
publicationmaybereproducedordistributedinanyformorbyanymea
ns,
orstoredinadatabaseorretrievalsystem,withoutthepriorwritten
permissionofthepublisher,withtheexceptionthattheprogramlisting
s
maybeentered,stored,andexecutedinacomputersystem,buttheyma
y
notbereproducedforpublication.
ISBN:978-0-07-183597-8
MHID:0-07-183597-0
ThematerialinthiseBookalsoappearsintheprintversionofthistitle:
ISBN:978-0-07-183601-2,MHID:0-07-183601-2.
eBookconversionbycodeMantra
Version1.0
Alltrademarksaretrademarksoftheirrespectiveowners.Ratherthan
puta
trademarksymbolaftereveryoccurrenceofatrademarkedname,weus
e
namesinaneditorialfashiononly,andtothebenefitofthetrademark
owner,withnointentionofinfringementofthetrademark.Wheresuch
designationsappearinthisbook,theyhavebeenprintedwithinitialca
ps.
McGraw-
HillEducationeBooksareavailableatspecialquantitydiscounts
touseaspremiumsandsalespromotionsorforuseincorporatetraining
programs.Tocontactarepresentative,pleasevisittheContactUspage
at
www.mhprofessional.com.
SANSInstituteITCodeofEthicsreproducedwithpermission,©SAN
S
Institute.
InformationhasbeenobtainedbyMcGraw-
HillEducationfromsources
believedtobereliable.However,becauseofthepossibilityofhumano
r
mechanicalerrorbyoursources,McGraw-HillEducation,orothers,
http://www.mhprofessional.com
McGraw-
HillEducationdoesnotguaranteetheaccuracy,adequacy,or
completenessofanyinformationandisnotresponsibleforanyerrorso
r
omissionsortheresultsobtainedfromtheuseofsuchinformation.
McGraw-
HillEducationisanindependententityfromCompTIA®.This
publicationanddigitalcontentmaybeusedinassistingstudentstopre
pare
fortheCompTIASecurity+exam.NeitherCompTIAnorMcGraw-
Hill
Educationwarrantsthatuseofthispublicationanddigitalcontentwill
ensurepassinganyexam.CompTIAandCompTIASecurity+are
trademarksorregisteredtrademarksofCompTIAintheUnitedStates
and/orothercountries.Allothertrademarksaretrademarksoftheir
respectiveowners.
TERMSOFUSE
ThisisacopyrightedworkandMcGraw-
HillEducationanditslicensors
reserveallrightsinandtothework.Useofthisworkissubjecttothese
terms.ExceptaspermittedundertheCopyrightActof1976andtherigh
t
tostoreandretrieveonecopyofthework,youmaynotdecompile,
disassemble,reverseengineer,reproduce,modify,createderivative
works
basedupon,transmit,distribute,disseminate,sell,publishorsublicen
sethe
workoranypartofitwithoutMcGraw-HillEducation’spriorconsent.
Youmayusetheworkforyourownnoncommercialandpersonaluse;a
ny
otheruseoftheworkisstrictlyprohibited.Yourrighttousetheworkma
y
beterminatedifyoufailtocomplywiththeseterms.
THEWORKISPROVIDED“ASIS.”McGRAW-HILLEDUCATION
ANDITSLICENSORSMAKENOGUARANTEESORWARRANTI
ES
ASTOTHEACCURACY,ADEQUACYORCOMPLETENESSOFO
R
RESULTSTOBEOBTAINEDFROMUSINGTHEWORK,
INCLUDINGANYINFORMATIONTHATCANBEACCESSED
THROUGHTHEWORKVIAHYPERLINKOROTHERWISE,AND
EXPRESSLYDISCLAIMANYWARRANTY,EXPRESSORIMPLI
ED,
INCLUDINGBUTNOTLIMITEDTOIMPLIEDWARRANTIESOF
MERCHANTABILITYORFITNESSFORAPARTICULARPURPO
SE.
McGraw-
HillEducationanditslicensorsdonotwarrantorguaranteethat
thefunctionscontainedintheworkwillmeetyourrequirementsorthat
its
operationwillbeuninterruptedorerrorfree.NeitherMcGraw-Hill
Educationnoritslicensorsshallbeliabletoyouoranyoneelseforany
inaccuracy,errororomission,regardlessofcause,intheworkorforan
y
damagesresultingtherefrom.McGraw-HillEducationhasno
responsibilityforthecontentofanyinformationaccessedthroughthe
work.UndernocircumstancesshallMcGraw-
HillEducationand/orits
licensorsbeliableforanyindirect,incidental,special,punitive,
consequentialorsimilardamagesthatresultfromtheuseoforinability
to
usethework,evenifanyofthemhasbeenadvisedofthepossibilityof
suchdamages.Thislimitationofliabilityshallapplytoanyclaimorca
use
whatsoeverwhethersuchclaimorcausearisesincontract,tortor
otherwise.
AbouttheAuthors
Dr.Wm.ArthurConklinisanassociateprofessorandDirectorofthe
CenterforInformationSecurityResearchandEducationintheColleg
eof
TechnologyattheUniversityofHouston.Heholdstwoterminaldegre
es,a
Ph.D.inBusinessAdministration(specializinginInformationSecuri
ty)
fromTheUniversityofTexasatSanAntonio(UTSA)andthedegree
ElectricalEngineer(specializinginSpaceSystemsEngineering)fro
mthe
NavalPostgraduateSchoolinMonterey,CA.HeholdsCompTIA
Security+,CISSP,CSSLP,CRISC,DFCP,GICSP,andCASP
certifications.AnISSAFellow,heisalsoaseniormemberofASQanda
memberofIEEEandACM.Hisresearchinterestsincludetheuseof
systemstheorytoexploreinformationsecurity,specificallyincyber-
physicalsystems.Hehascoauthoredsixsecuritybooksandnumerous
academicarticlesassociatedwithinformationsecurity.Heisactivein
the
DHS-sponsoredIndustrialControlSystemsJointWorkingGroup
(ICSJWG)effortsassociatedwithworkforcedevelopmentand
cybersecurityaspectsofindustrialcontrolsystems.Hehasanextensiv
e
backgroundinsecurecodingandisaformerco-chairoftheDHS/DoD
SoftwareAssuranceForumworkinggroupforworkforceeducation,
training,anddevelopment.
Dr.GregoryWhitehasbeeninvolvedincomputerandnetworksecurit
y
since1986.Hespent19yearsonactivedutywiththeU.S.AirForceandi
s
currentlyintheAirForceReservesassignedtothePentagon.Heobtain
ed
hisPh.D.inComputerSciencefromTexasA&MUniversityin1995.Hi
s
dissertationtopicwasintheareaofcomputernetworkintrusiondetecti
on,
andhecontinuestoconductresearchinthisareatoday.Heiscurrentlyt
he
DirectorfortheCenterforInfrastructureAssuranceandSecurityandi
san
associateprofessorofcomputerscienceatTheUniversityofTexasatS
an
Antonio.Dr.Whitehaswrittenandpresentednumerousarticlesand
conferencepapersonsecurity.Heisalsothecoauthorforfivetextbook
s
oncomputerandnetworksecurityandhaswrittenchaptersfortwoothe
r
securitybooks.Dr.Whitecontinuestobeactiveinsecurityresearch.H
is
currentresearchinitiativesincludeeffortsinhigh-speedintrusion
detection,communityinfrastructureprotection,andvisualizationof
communityandorganizationsecuritypostures.
DwayneWilliamsisAssociateDirector,SpecialProjectsfortheCente
r
forInfrastructureAssuranceandSecurity(CIAS)attheUniversityof
TexasatSanAntonioandhasmorethan22yearsofexperiencein
informationsystemsandnetworksecurity.Mr.Williams’sexperienc
e
includessixyearsofcommissionedmilitaryserviceasaCommunicati
ons-
ComputerInformationSystemsOfficerintheU.S.AirForce,speciali
zing
innetworksecurity,corporateinformationprotection,intrusiondete
ction
systems,incidentresponse,andVPNtechnology.Priortojoiningthe
CIAS,heservedasDirectorofConsultingforSecureLogixCorporatio
n,
wherehedirectedandprovidedsecurityassessmentandintegration
servicestoFortune100,government,publicutility,oilandgas,financi
al,
andtechnologyclients.Mr.Williamsgraduatedin1993fromBaylor
UniversitywithaBachelorofArtsinComputerScience.Mr.Williams
isa
CertifiedInformationSystemsSecurityProfessional(CISSP),Comp
TIA
AdvancedSecurityPractitioner(CASP),andcoauthorofMcGraw-
Hill’s
VoiceandDataSecurity,CompTIASecurity+All-in-
OneExamGuide,and
CASPCompTIAAdvancedSecurityPractitionerCertificationStudy
Guide.
RogerL.Davis,CISSP,CISM,CISA,isanAccountManagerfor
Microsoft.HehasservedaspresidentoftheUtahchapterofthe
InformationSystemsSecurityAssociation(ISSA)andvariousboard
positionsfortheUtahchapteroftheInformationSystemsAuditand
ControlAssociation(ISACA).HeisaretiredAirForcelieutenantcolo
nel
with35yearsofmilitaryandinformationsystems/securityexperience
.Mr.
DavisservedonthefacultyofBrighamYoungUniversityandtheAir
ForceInstituteofTechnology.HecoauthoredMcGraw-
Hill’sCompTIA
Security+All-in-
OneExamGuideandVoiceandDataSecurity.Heholds
aMaster’sdegreeinComputerSciencefromGeorgeWashington
University,aBachelor’sdegreeinComputerSciencefromBrigham
YoungUniversity,andperformedpost-graduatestudiesinelectrical
engineeringandcomputerscienceattheUniversityofColorado.
ChuckCothren,CISSP,isaPrincipal
Solution
sSpecialistatSymantec
Corporationapplyingawidearrayofnetworksecurityexperience,
includingperformingcontrolledpenetrationtesting,incidentrespon
se,and
securitymanagementtoassistawidevarietyofclientsintheprotection
of
theircriticaldata.HehasalsoanalyzedsecuritymethodologiesforVoi
ce
overInternetProtocol(VoIP)systemsandsupervisorycontrolanddat
a
acquisition(SCADA)systems.HeiscoauthorofthebooksVoiceand
DataSecurity,andCompTIASecurity+All-in-OneExamGuide.
AbouttheTechnicalEditor
BobbyE.RogersisanInformationSecurityEngineerworkingasa
contractorforDepartmentofDefenseagencies,helpingtosecure,cert
ify,
andaccredittheirinformationsystems.Hisdutiesincludeinformatio
n
systemsecurityengineering,riskmanagement,andcertificationand
accreditationefforts.Heretiredafter21yearsintheUnitedStatesAir
Force,servingasanetworksecurityengineerandinstructor,andhas
securednetworksallovertheworld.BobbyhasaMaster’sdegreein
InformationAssurance(IA),andispursuingadoctoraldegreein
CybersecurityfromCapitolTechnologyUniversity,Maryland.Hism
any
certificationsincludeCRISC,CISSP-
ISSEP,C|EH,andMCSE:Security
aswellastheCompTIAA+,Network+,Security+,andMobility+
certifications.
Acknowledgments
Thisbookisdedicatedtothemanysecurityprofessionalswhodaily
worktoensurethesafetyofournation’scriticalinfrastructures.Wewa
nt
torecognizethethousandsofdedicatedindividualswhostrivetoprote
ct
ournationalassetsbutwhoseldomreceivepraiseandoftenareonly
noticedwhenanincidentoccurs.Toyou,wesaythankyouforajobwell
done!
We,theauthorsofPrinciplesofComputerSecurity,FourthEdition,ha
ve
manyindividualswhoweneedtoacknowledge—individualswithout
whomthiseffortwouldnothavebeensuccessful.Thiseditionwouldno
t
havebeenpossiblewithoutTimGreen,whosesupportandfaithinthe
authorsmadethiseditionpossible.Hebroughttogetheranall-star
productionteamthatmadethisbookmorethanjustanewedition,buta
completelearningsystem.
ThelistneedstostartwiththosefolksatMcGraw-HillEducationwho
workedtirelesslywiththeproject’smultipleauthorsandcontributors
and
ledussuccessfullythroughtheminefieldthatisabookscheduleandwh
o
tookourroughchaptersanddrawingsandturnedthemintoafinal,
professionalproductwecanbeproudof.Wethankallthegoodpeople
fromtheAcquisitionsteam,TimGreenandAmyStonebraker;fromthe
EditorialServicesteam,JodyMcKenzieandHowieSeverson;fromth
e
IllustrationandProductionteams,JamesKussowandAmarjeetKuma
rand
thecompositionteamatCenveoPublisherServices.Wealsothankthe
technicaleditor,BobbyRogers;thecopyeditor,BillMcManus;the
proofreader,PaulTyler;andtheindexer,JackLewis;foralltheirattent
ion
todetailthatmadethisafinerworkaftertheyfinishedwithit.
Wealsoneedtoacknowledgeourcurrentemployerswho,toourgreat
delight,haveseenfittopayustoworkinacareerfieldthatweallfind
excitingandrewarding.Thereisneveradullmomentinsecurity,becau
se
itisconstantlychanging.
WewouldliketothankArtConklinforherdingthecatsonthisone.
Finally,wewouldeachliketoindividuallythankthosepeoplewho—
on
apersonalbasis—haveprovidedthecoresupportforusindividually.
Withoutthesespecialpeopleinourlives,noneofuscouldhaveputthis
worktogether.
—TheAuthorTeam
ToSusan,yourloveandsupportiswhatenablesmetodoallthethingsI
do.
—ArtConklin,Ph.D.
Iwouldliketothankmywife,Charlan,forthetremendoussupportsheh
as
alwaysgivenme.Itdoesn’tmatterhowmanytimesIhaveswornthatI’ll
nevergetinvolvedwithanotherbookprojectonlytoreturnwithinmont
hs
toyetanotherone;throughitall,shehasremainedsupportive.
IwouldalsoliketopubliclythanktheUnitedStatesAirForce,which
providedmenumerousopportunitiessince1986tolearnmoreabout
securitythanIeverknewexisted.
Towhoeveritwaswhodecidedtosendmeasayoungcaptain—fresh
fromcompletingmymaster’sdegreeinartificialintelligence—
tomyfirst
assignmentincomputersecurity:thankyou,ithasbeenagreatadventu
re!
—GregoryB.White,Ph.D.
Josie,thankyouforalltheloveandsupport.Macon,John,thisisforyou
.
—ChuckCothren
Geena,thanksforbeingmybestfriendandmygreatestsupport.Anythi
ng
Iamisbecauseofyou.Lovetomykidsandgrandkids!
—RogerL.Davis
Tomywifeandbestfriend,Leah,foryourlove,energy,andsupport—
thankyouforalwaysbeingthere.Here’stomanymoreyearstogether.
—DwayneWilliams
ABOUTTHISBOOK
ImportantTechnologySkills
Informationtechnology(IT)offersmanycareerpaths,andinformatio
n
securityisoneofthefastest-
growingtracksforITprofessionals.Thisbook
providescoverageofthematerialsyouneedtobeginyourexplorationo
f
informationsecurity.InadditiontocoveringalloftheCompTIASecur
ity+
examobjectives,additionalmaterialisincludedtohelpyoubuildasoli
d
introductoryknowledgeofinformationsecurity.
ProvenLearningMethodKeepsYouonTrack
Designedforclassroomuseandwrittenbyinstructorsforuseintheir
ownclasses,PrinciplesofComputerSecurityisstructuredtogiveyou
comprehensiveknowledgeofinformationsecurity.Thetextbook’s
activelearningmethodologyguidesyoubeyondmererecalland—
throughthought-provokingactivities,labs,andsidebars—helpsyou
developcritical-thinking,diagnostic,andcommunicationskills.
EffectiveLearningTools
Thisfeature-
richtextbookisdesignedtomakelearningeasyandenjoyable
andtohelpyoudeveloptheskillsandcritical-
thinkingabilitiesthatwill
enableyoutoadapttodifferentjobsituationsandtotroubleshoot
problems.Writtenbyinstructorswithdecadesofcombinedinformati
on
securityexperience,thisbookconveyseventhemostcomplexissuesi
nan
accessible,easy-tounderstandformat.
Eachchapterincludes
LearningObjectivesthatsetmeasurablegoalsforchapter-by-
chapterprogress
Illustrationsthatgiveyouaclearpictureoftheconceptsand
technologies
TryThis!,CrossCheck,andTechTipsidebarsthatencourage
youtopracticeandapplyconceptsinreal-worldsettings
Notes,Tips,andWarningsthatguideyou,andExamTipsthat
giveyouadviceorprovideinformationspecificallyrelatedto
preparingfortheexam
ChapterSummariesandKeyTermsListsthatprovideyouwith
aneasywaytoreviewimportantconceptsandvocabulary
ChallengingEnd-of-ChapterTeststhatincludevocabulary-
buildingexercises,multiple-choicequestions,essayquestions,and
on-the-joblabprojects
CompTIAAPPROVEDQUALITYCONTENT
ItPaystoGetCertified
Inadigitalworld,digitalliteracyisanessentialsurvivalskill.Certific
ation
demonstratesthatyouhavetheknowledgeandskilltosolvetechnicalo
r
businessproblemsinvirtuallyanybusinessenvironment.CompTIA
certificationsarehighlyvaluedcredentialsthatqualifyyouforjobs,
increasedcompensation,andpromotion.
CompTIASecurity+CertificationHelpsYour
Career
Securityisoneofthehighestdemandjobcategories,growingin
importanceasthefrequencyandseverityofsecuritythreatscontinues
tobeamajorconcernfororganizationsaroundtheworld.
Jobsforsecurityadministratorsareexpectedtoincreaseby18%
—theskillsetrequiredforthesetypesofjobsmapstotheCompTIA
Security+certification.
NetworkSecurityAdministratorscanearnasmuchas$106,000per
year.
CompTIASecurity+isthefirststepinstartingyourcareerasa
NetworkSecurityAdministratororSystemsSecurityAdministrator.
Morethan250,000individualsworldwideareCompTIASecurity+
certified.
CompTIASecurity+isregularlyusedinorganizationssuchas
HitachiSystems,FujiXerox,HP,Dell,andavarietyofmajorU.S.
governmentcontractors.
ApprovedbytheU.S.DepartmentofDefense(DoD)asoneofthe
requiredcertificationoptionsintheDoD8570.01-Mdirective,for
InformationAssuranceTechnicalLevelIIandManagementLevelI
jobroles.
StepstoGettingCertifiedandStayingCertified
1.Reviewtheexamobjectives.Reviewthecertificationobjectivesto
makesureyouknowwhatiscoveredintheexam:
http://certification.comptia.org/examobjectives.aspx
2.Practicefortheexam.Afteryouhavestudiedforthecertification
exam,reviewandanswersamplequestionstogetanideaofwhattype
ofquestionsmightbeontheexam:
http://certification.comptia.org/samplequestions.aspx
3.Purchaseanexamvoucher.Youcanpurchaseexamvouchersonthe
CompTIAMarketplace,www.comptiastore.com.
4.Takethetest!GotothePearsonVUEwebsite,
www.pearsonvue.com/comptia/,andscheduleatimetotakeyour
exam.
5.Staycertified!EffectiveJanuary1,2011,newCompTIASecurity+
certificationsarevalidforthreeyearsfromthedateofcertification.
Thereareanumberofwaysthecertificationcanberenewed.Formore
informationgotohttp://certification.comptia.org/ce.
ForMoreInformation
VisitCompTIAonlineGoto
http://certification.comptia.org/home.aspxtolearnmoreaboutgetti
ng
CompTIAcertified.
ContactCompTIAPleasecall866-835-8020andchooseOption2,
ore-mail[email protected]
ConnectwithCompTIAFindCompTIAonFacebook,LinkedIn,
Twitter,andYouTube.
http://certification.comptia.org/examobjectives.aspx
http://certification.comptia.org/samplequestions.aspx
http://www.comptiastore.com
http://www.pearsonvue.com/comptia/
http://certification.comptia.org/ce
http://certification.comptia.org/home.aspx
mailto:[email protected]
ContentSealofQuality
ThiscoursewarebearsthesealofCompTIAApprovedQualityConten
t.
Thissealsignifiesthiscontentcovers100percentoftheexamobjectiv
es
andimplementsimportantinstructionaldesignprinciples.CompTIA
recommendsmultiplelearningtoolstohelpincreasecoverageofthe
learningobjectives.
CAQCDisclaimer
ThelogooftheCompTIAApprovedQualityContent(CAQC)progra
m
andthestatusofthisorothertrainingmaterialas“Approved”underthe
CompTIAApprovedQualityContentprogramsignifiesthat,in
CompTIA’sopinion,suchtrainingmaterialcoversthecontentof
CompTIA’srelatedcertificationexam.
ThecontentsofthistrainingmaterialwerecreatedfortheCompTIA
Security+examcoveringCompTIAcertificationobjectivesthatwere
currentasofthedateofpublication.
CompTIAhasnotreviewedorapprovedtheaccuracyofthecontentsof
thistrainingmaterialandspecificallydisclaimsanywarrantiesof
merchantabilityorfitnessforaparticularpurpose.CompTIAmakesn
o
guaranteeconcerningthesuccessofpersonsusinganysuch“Approve
d”or
othertrainingmaterialinordertoprepareforanyCompTIAcertificati
on
exam.
CONTENTSATAGLANCE
Chapter1 IntroductionandSecurityTrends
Chapter2 GeneralSecurityConcepts
Chapter3 OperationalandOrganizationalSecurity
Chapter4 TheRoleofPeopleinSecurity
Chapter5 Cryptography
Chapter6 PublicKeyInfrastructure
Chapter7 PKIStandardsandProtocols
Chapter8 PhysicalSecurity
Chapter9 NetworkFundamentals
Chapter10 InfrastructureSecurity
Chapter11 AuthenticationandRemoteAccess
Chapter12 WirelessSecurityandMobileDevices
Chapter13 IntrusionDetectionSystemsandNetworkSecurity
Chapter14 SystemHardeningandBaselines
Chapter15 TypesofAttacksandMaliciousSoftware
Chapter16 E-MailandInstantMessaging
Chapter17 WebComponents
Chapter18 SecureSoftwareDevelopment
Chapter19 BusinessContinuityandDisasterRecovery,and
OrganizationalPolicies
Chapter20 RiskManagement
Chapter21 ChangeManagement
Chapter22 IncidentResponse
Chapter23 ComputerForensics
Chapter24 LegalIssuesandEthics
Chapter25 Privacy
AppendixA CompTIASecurity+ExamObjectives:SY0-401
AppendixB AbouttheDownload
Glossary
Index
CONTENTS
Foreword
Preface
Introduction
InstructorWebSite
Chapter1
IntroductionandSecurityTrends
TheComputerSecurityProblem
DefinitionofComputerSecurity
HistoricalSecurityIncidents
TheCurrentThreatEnvironment
ThreatstoSecurity
SecurityTrends
TargetsandAttacks
SpecificTarget
OpportunisticTarget
MinimizingPossibleAvenuesofAttack
ApproachestoComputerSecurity
Ethics
AdditionalReferences
Chapter1Review
Chapter2
GeneralSecurityConcepts
BasicSecurityTerminology
SecurityBasics
SecurityTenets
SecurityApproaches
SecurityPrinciples
AccessControl
AuthenticationMechanisms
AuthenticationandAccessControlPolicies
SecurityModels
ConfidentialityModels
IntegrityModels
Chapter2Review
Chapter3
OperationalandOrganizationalSecurity
Policies,Procedures,Standards,andGuidelines
SecurityPolicies
ChangeManagementPolicy
DataPolicies
HumanResourcesPolicies
DueCareandDueDiligence
DueProcess
IncidentResponsePoliciesandProcedures
SecurityAwarenessandTraining
SecurityPolicyTrainingandProcedures
Role-BasedTraining
CompliancewithLaws,BestPractices,andStandards
UserHabits
NewThreatsandSecurityTrends/Alerts
TrainingMetricsandCompliance
InteroperabilityAgreements
ServiceLevelAgreements
BusinessPartnershipAgreement
MemorandumofUnderstanding
InterconnectionSecurityAgreement
TheSecurityPerimeter
PhysicalSecurity
PhysicalAccessControls
PhysicalBarriers
EnvironmentalIssues
FireSuppression
Wireless
ElectromagneticEavesdropping
ModernEavesdropping
Chapter3Review
Chapter4
TheRoleofPeopleinSecurity
People—ASecurityProblem
SocialEngineering
PoorSecurityPractices
PeopleasaSecurityTool
SecurityAwareness
SecurityPolicyTrainingandProcedures
Chapter4Review
Chapter5
Cryptography
CryptographyinPractice
FundamentalMethods
ComparativeStrengthsandPerformanceofAlgorithms
HistoricalPerspectives
SubstitutionCiphers
One-TimePads
Algorithms
KeyManagement
RandomNumbers
HashingFunctions
SHA
RIPEMD
MessageDigest
HashingSummary
SymmetricEncryption
DES
3DES
AES
CAST
RC
Blowfish
Twofish
IDEA
Blockvs.Stream
SymmetricEncryptionSummary
AsymmetricEncryption
Diffie-Hellman
RSA
ElGamal
ECC
AsymmetricEncryptionSummary
Symmetricvs.Asymmetric
QuantumCryptography
Steganography
CryptographyAlgorithmUse
Confidentiality
Integrity
Authentication
Nonrepudiation
CipherSuites
KeyExchange
KeyEscrow
SessionKeys
EphemeralKeys
KeyStretching
SecrecyPrinciples
TransportEncryption
DigitalSignatures
DigitalRightsManagement
CryptographicApplications
UseofProvenTechnologies
Chapter5Review
Chapter6
PublicKeyInfrastructure
TheBasicsofPublicKeyInfrastructures
CertificateAuthorities
RegistrationAuthorities
LocalRegistrationAuthorities
DigitalCertificates
CertificateExtensions
CertificateAttributes
CertificateLifecycles
RegistrationandGeneration
CSR
Renewal
Suspension
Revocation
KeyDestruction
CertificateRepositories
TrustandCertificateVerification
CentralizedandDecentralizedInfrastructures
HardwareSecurityModules
PrivateKeyProtection
KeyRecovery
KeyEscrow
PublicCertificateAuthorities
In-HouseCertificateAuthorities
ChoosingBetweenaPublicCAandanIn-HouseCA
OutsourcedCertificateAuthorities
TyingDifferentPKIsTogether
TrustModels
Certificate-BasedThreats
StolenCertificates
Chapter6Review
Chapter7
PKIStandardsandProtocols
PKIXandPKCS
PKIXStandards
PKCS
WhyYouNeedtoKnowthePKIXandPKCSStandards
X.509
SSL/TLS
CipherSuites
ISAKMP
CMP
XKMS
S/MIME
IETFS/MIMEHistory
IETFS/MIMEv3Specifications
PGP
HowPGPWorks
HTTPS
IPsec
CEP
OtherStandards
FIPS
CommonCriteria
WTLS
ISO/IEC27002(FormerlyISO17799)
SAML
Chapter7Review
Chapter8
PhysicalSecurity
TheSecurityProblem
PhysicalSecuritySafeguards
WallsandGuards
PhysicalAccessControlsandMonitoring
Convergence
PoliciesandProcedures
EnvironmentalControls
FireSuppression
Water-BasedFireSuppressionSystems
Halon-BasedFireSuppressionSystems
Clean-AgentFireSuppressionSystems
HandheldFireExtinguishers
FireDetectionDevices
PowerProtection
UPS
BackupPowerandCableShielding
ElectromagneticInterference
ElectronicAccessControlSystems
AccessTokens
Chapter8Review
Chapter9
NetworkFundamentals
NetworkArchitectures
NetworkTopology
NetworkProtocols
Protocols
Packets
InternetProtocol
IPPackets
TCPvs.UDP
ICMP
IPv4vs.IPv6
PacketDelivery
Ethernet
LocalPacketDelivery
RemotePacketDelivery
IPAddressesandSubnetting
NetworkAddressTranslation
SecurityZones
DMZ
Internet
Intranet
Extranet
FlatNetworks
Enclaves
VLANs
ZonesandConduits
Tunneling
StorageAreaNetworks
iSCSI
FibreChannel
FCoE
Chapter9Review
Chapter10
InfrastructureSecurity
Devices
Workstations
Servers
Virtualization
MobileDevices
DeviceSecurity,CommonConcerns
NetworkAttachedStorage
RemovableStorage
Networking
NetworkInterfaceCards
Hubs
Bridges
Switches
Routers
Firewalls
HowDoFirewallsWork?
Next-GenerationFirewalls
WebApplicationFirewallsvs.NetworkFirewalls
Concentrators
WirelessDevices
Modems
Telephony
VPNConcentrator
SecurityDevices
IntrusionDetectionSystems
NetworkAccessControl
NetworkMonitoring/Diagnostic
LoadBalancers
Proxies
WebSecurityGateways
InternetContentFilters
DataLossPrevention
UnifiedThreatManagement
Media
CoaxialCable
UTP/STP
Fiber
UnguidedMedia
RemovableMedia
MagneticMedia
OpticalMedia
ElectronicMedia
SecurityConcernsforTransmissionMedia
PhysicalSecurityConcerns
CloudComputing
Private
Public
Hybrid
Community
SoftwareasaService
PlatformasaService
InfrastructureasaService
Chapter10Review
Chapter11
AuthenticationandRemoteAccess
User,Group,andRoleManagement
User
Group
Role
PasswordPolicies
DomainPasswordPolicy
SingleSign-On
TimeofDayRestrictions
Tokens
AccountandPasswordExpiration
SecurityControlsandPermissions
AccessControlLists
MandatoryAccessControl(MAC)
DiscretionaryAccessControl(DAC)
Role-BasedAccessControl(RBAC)
Rule-BasedAccessControl
AttributeBasedAccessControl(ABAC)
AccountExpiration
PreventingDataLossorTheft
TheRemoteAccessProcess
Identification
Authentication
Authorization
AccessControl
RemoteAccessMethods
IEEE802.1X
RADIUS
TACACS+
AuthenticationProtocols
FTP/FTPS/SFTP
VPNs
IPsec
VulnerabilitiesofRemoteAccessMethods
ConnectionSummary
Chapter11Review
Chapter12
WirelessSecurityandMobileDevices
IntroductiontoWirelessNetworking
MobilePhones
WirelessApplicationProtocol
3GMobileNetworks
4GMobileNetworks
Bluetooth
BluetoothAttacks
NearFieldCommunication
IEEE802.11Series
802.11:IndividualStandards
Attacking802.11
CurrentSecurityMethods
WirelessSystemsConfiguration
AntennaTypes
AntennaPlacement
PowerLevelControls
SiteSurveys
CaptivePortals
SecuringPublicWi-Fi
MobileDevices
MobileDeviceSecurity
BYODConcerns
LocationServices
MobileApplicationSecurity
Chapter12Review
Chapter13
IntrusionDetectionSystemsandNetworkSecurity
HistoryofIntrusionDetectionSystems
IDSOverview
IDSModels
Signatures
FalsePositivesandFalseNegatives
Network-BasedIDSs
AdvantagesofaNIDS
DisadvantagesofaNIDS
Activevs.PassiveNIDSs
NIDSTools
Host-BasedIDSs
AdvantagesofHIDSs
DisadvantagesofHIDSs
Activevs.PassiveHIDSs
ResurgenceandAdvancementofHIDSs
IntrusionPreventionSystems
HoneypotsandHoneynets
Tools
ProtocolAnalyzer
SwitchedPortAnalyzer
PortScanner
Passivevs.ActiveTools
BannerGrabbing
Chapter13Review
Chapter14
SystemHardeningandBaselines
OverviewofBaselines
OperatingSystemandNetworkOperatingSystemHardening
OSSecurity
HostSecurity
MachineHardening
OperatingSystemSecurityandSettings
OSHardening
HardeningMicrosoftOperatingSystems
HardeningUNIX-orLinux-BasedOperatingSystems
Updates(a.k.a.Hotfixes,ServicePacks,andPatches)
Antimalware
WhiteListingvs.BlackListingApplications
TrustedOS
Host-basedFirewalls
HardwareSecurity
HostSoftwareBaselining
Host-BasedSecurityControls
Hardware-BasedEncryptionDevices
DataEncryption
DataSecurity
HandlingBigData
CloudStorage
StorageAreaNetwork
Permissions/ACL
NetworkHardening
SoftwareUpdates
DeviceConfiguration
SecuringManagementInterfaces
VLANManagement
IPv4vs.IPv6
ApplicationHardening
ApplicationConfigurationBaseline
ApplicationPatches
PatchManagement
HostSoftwareBaselining
GroupPolicies
SecurityTemplates
AlternativeEnvironments
SCADA
EmbeddedSystems
PhonesandMobileDevices
Mainframe
GameConsoles
In-VehicleComputingSystems
AlternativeEnvironmentMethods
NetworkSegmentation
SecurityLayers
ApplicationFirewalls
ManualUpdates
FirmwareVersionControl
Wrappers
ControlRedundancyandDiversity
Chapter14Review
Chapter15
TypesofAttacksandMaliciousSoftware
AvenuesofAttack
MinimizingPossibleAvenuesofAttack
MaliciousCode
Viruses
Worms
PolymorphicMalware
TrojanHorses
Rootkits
LogicBombs
Spyware
Adware
Botnets
BackdoorsandTrapdoors
Ransomware
MalwareDefenses
AttackingComputerSystemsandNetworks
Denial-of-ServiceAttacks
SocialEngineering
NullSessions
Sniffing
Spoofing
TCP/IPHijacking
Man-in-the-MiddleAttacks
ReplayAttacks
TransitiveAccess
Spam
Spim
Phishing
SpearPhishing
Vishing
Pharming
ScanningAttacks
AttacksonEncryption
AddressSystemAttacks
CachePoisoning
PasswordGuessing
Pass-the-HashAttacks
SoftwareExploitation
Client-SideAttacks
AdvancedPersistentThreat
RemoteAccessTrojans
Tools
Metasploit
BackTrack/Kali
Social-EngineeringToolkit
CobaltStrike
CoreImpact
BurpSuite
Auditing
PerformRoutineAudits
Chapter15Review
Chapter16
E-MailandInstantMessaging
HowE-MailWorks
E-MailStructure
MIME
SecurityofE-Mail
MaliciousCode
HoaxE-Mails
UnsolicitedCommercialE-Mail(Spam)
SenderIDFramework
DomainKeysIdentifiedMail
MailEncryption
S/MIME
PGP
InstantMessaging
ModernInstantMessagingSystems
Chapter16Review
Chapter17
WebComponents
CurrentWebComponentsandConcerns
WebProtocols
Encryption(SSLandTLS)
TheWeb(HTTPandHTTPS)
HTTPSEverywhere
HTTPStrictTransportSecurity
DirectoryServices(DAPandLDAP)
FileTransfer(FTPandSFTP)
Vulnerabilities
Code-BasedVulnerabilities
BufferOverflows
Java
JavaScript
ActiveX
SecuringtheBrowser
CGI
Server-SideScripts
Cookies
BrowserPlug-ins
MaliciousAdd-ons
SignedApplets
Application-BasedWeaknesses
SessionHijacking
Client-SideAttacks
Web2.0andSecurity
Chapter17Review
Chapter18
SecureSoftwareDevelopment
TheSoftwareEngineeringProcess
ProcessModels
SecureDevelopmentLifecycle
SecureCodingConcepts
ErrorandExceptionHandling
InputandOutputValidation
Fuzzing
BugTracking
ApplicationAttacks
Cross-SiteScripting
Injections
DirectoryTraversal/CommandInjection
BufferOverflow
IntegerOverflow
Cross-SiteRequestForgery
Zero-Day
Attachments
LocallySharedObjects
Client-SideAttacks
Arbitrary/RemoteCodeExecution
OpenVulnerabilityandAssessmentLanguage
ApplicationHardening
ApplicationConfigurationBaseline
ApplicationPatchManagement
NoSQLDatabasesvs.SQLDatabases
Server-Sidevs.Client-SideValidation
Chapter18Review
Chapter19
BusinessContinuityandDisasterRecovery,andOrganizational
Policies
BusinessContinuity
BusinessContinuityPlans
BusinessImpactAnalysis
IdentificationofCriticalSystemsandComponents
RemovingSinglePointsofFailure
RiskAssessment
SuccessionPlanning
ContinuityofOperations
DisasterRecovery
DisasterRecoveryPlans/Process
CategoriesofBusinessFunctions
ITContingencyPlanning
Test,Exercise,andRehearse
RecoveryTimeObjectiveandRecoveryPointObjective
Backups
AlternativeSites
Utilities
SecureRecovery
CloudComputing
HighAvailabilityandFaultTolerance
FailureandRecoveryTiming
Chapter19Review
Chapter20
RiskManagement
AnOverviewofRiskManagement
ExampleofRiskManagementattheInternationalBankingLevel
RiskManagementVocabulary
WhatIsRiskManagement?
RiskManagementCulture
BusinessRisks
ExamplesofBusinessRisks
ExamplesofTechnologyRisks
RiskMitigationStrategies
ChangeManagement
IncidentManagement
UserRightsandPermissionsReviews
DataLossorTheft
RiskManagementModels
GeneralRiskManagementModel
SoftwareEngineeringInstituteModel
NISTRiskModels
ModelApplication
QualitativelyAssessingRisk
QuantitativelyAssessingRisk
AddingObjectivitytoaQualitativeAssessment
RiskCalculation
Qualitativevs.QuantitativeRiskAssessment
Tools
Cost-EffectivenessModeling
RiskManagementBestPractices
SystemVulnerabilities
ThreatVectors
Probability/ThreatLikelihood
Risk-Avoidance,Transference,Acceptance,Mitigation,Deterrence
RisksAssociatedwithCloudComputingandVirtualization
Chapter20Review
Chapter21
ChangeManagement
WhyChangeManagement?
TheKeyConcept:SeparationofDuties
ElementsofChangeManagement
ImplementingChangeManagement
Back-outPlan
ThePurposeofaChangeControlBoard
CodeIntegrity
TheCapabilityMaturityModelIntegration
Chapter21Review
Chapter22
IncidentResponse
FoundationsofIncidentResponse
IncidentManagement
AnatomyofanAttack
GoalsofIncidentResponse
IncidentResponseProcess
Preparation
SecurityMeasureImplementation
IncidentIdentification/Detection
InitialResponse
IncidentIsolation
StrategyFormulation
Investigation
Recovery/ReconstitutionProcedures
Reporting
Follow-up/LessonsLearned
StandardsandBestPractices
StateofCompromise
NIST
DepartmentofJustice
IndicatorsofCompromise
CyberKillChain
MakingSecurityMeasurable
Chapter22Review
Chapter23
ComputerForensics
Evidence
TypesofEvidence
StandardsforEvidence
ThreeRulesRegardingEvidence
ForensicProcess
AcquiringEvidence
IdentifyingEvidence
ProtectingEvidence
TransportingEvidence
StoringEvidence
ConductingtheInvestigation
Analysis
ChainofCustody
MessageDigestandHash
HostForensics
FileSystems
WindowsMetadata
LinuxMetadata
DeviceForensics
NetworkForensics
E-Discovery
ReferenceModel
BigData
Cloud
Chapter23Review
Chapter24
LegalIssuesandEthics
Cybercrime
CommonInternetCrimeSchemes
SourcesofLaws
ComputerTrespass
SignificantU.S.Laws
PaymentCardIndustryDataSecurityStandard(PCIDSS)
Import/ExportEncryptionRestrictions
Non-U.S.Laws
DigitalSignatureLaws
DigitalRightsManagement
Ethics
Chapter24Review
Chapter25
Privacy
PersonallyIdentifiableInformation(PII)
SensitivePII
Notice,Choice,andConsent
U.S.PrivacyLaws
PrivacyActof1974
FreedomofInformationAct(FOIA)
FamilyEducationRecordsandPrivacyAct(FERPA)
U.S.ComputerFraudandAbuseAct(CFAA)
U.S.Children’sOnlinePrivacyProtectionAct(COPPA)
VideoPrivacyProtectionAct(VPPA)
HealthInsurancePortability&AccountabilityAct(HIPAA)
Gramm-Leach-BlileyAct(GLBA)
CaliforniaSenateBill1386(SB1386)
U.S.BankingRulesandRegulations
PaymentCardIndustryDataSecurityStandard(PCIDSS)
FairCreditReportingAct(FCRA)
FairandAccurateCreditTransactionsAct(FACTA)
Non-FederalPrivacyConcernsintheUnitedStates
InternationalPrivacyLaws
OECDFairInformationPractices
EuropeanLaws
CanadianLaws
AsianLaws
Privacy-EnhancingTechnologies
PrivacyPolicies
PrivacyImpactAssessment
WebPrivacyIssues
Cookies
PrivacyinPractice
UserActions
DataBreaches
Chapter25Review
AppendixA
CompTIASecurity+ExamObjectives:SY0-401
AppendixB
AbouttheDownload
SystemRequirements
DownloadingTotalTesterPremiumPracticeExamSoftware
TotalTesterPremiumPracticeExamSoftware
InstallingandRunningTotalTester
TechnicalSupport
TotalSeminarsTechnicalSupport
McGraw-HillEducationContentSupport
Glossary
Index
FOREWORD
Selectingabookistrickyforme.Ifitisforpersonalreading,willIlike
readingit?Ifitisformyprofessionaldevelopment,willitmeettheneed
?
Ifitisformystudents,willitbeclearandconcise?Thisneweditionof
PrinciplesofComputerSecuritypassesallthreetestswithflyingcolor
s.I
enjoyedreadingit.IfIneededtopasstheCompTIASecurity+orother
practitionerexamination,itwouldprepareme.Andfinally,basedon
personalexperience,studentswilllikethisbookandfindittobevaluab
le
readingandstudymaterial.Itevenhaspracticeexamsforcertification
for
myconvenience.
Formorethan40yearsIhaveworkedinsomevarietyofcomputer
security.Whenpeopleaskmewhatdefinesmyjob,Irespondwith“Idon
’t
knowuntilIreadthemorningnewspaperbecausethesecurityenviron
ment
changesrapidly.”Ifyouwanttogetintothecomputersecurityindustry
,
readingandunderstandingthisbookisagreatintroduction.Nowinits
fourthedition,the25chaptersofPrinciplesofComputerSecurityfocu
son
abroadspectrumofimportanttopicstopreparethereadertobeacertifi
ed
computersecuritypractitioner.Therealdealmakerformeisthefurthe
r
endorsementofthecontents:thebookisbasedonCompTIAApproved
QualityContent(CAQC)andservesasbothanexampreparationguide
andausefulreference.
Dr.Conklinandhisteamofcoauthorseasethereaderintothemeatof
thetopicbyreviewingbothsecuritytrendsandconcepts.Theythen
addresssecurityfromtwodifferentperspectives.Firsttheyfocusonth
e
organization’sneedforsecurity,andthenfocusontheimportantroleo
f
people.Thesetwoperspectivesareintertwined;itisessentialforasecu
rity
practitionertounderstandthesecurityenvironmentandhowthepeopl
e
makeitwork.
Everypractitionerneedstounderstandtheunderlyingtechnologyand
toolsofcomputersecurity.Someindividualshaveanideaaboutsecuri
ty
topicsbutdonothavetheessentialknowledgeneededtoaddressthemi
n
depth.Theauthorshaveprovidedninemasterfulchaptersintroducing
thesekeyconcepts.Forexample,inasinglechaptertheyprovidetheba
sis
forthereadertodealwithsecurityofnetworks.Thischaptersupports
everythingthereaderneedstoknowtoaddressstandardsandprotocols
,
infrastructuresecurity,remoteaccessandauthentication,aswellas
wireless.Theauthorsintegratetheseconceptstosupportpublickey
infrastructure(PKI)andintrusiondetectionsystemsfornetworksecu
rity
withoutforgettingtheimportanceofphysicalsecurityinprotectingth
e
informationsystemaswellasinfrastructure.
Oneofthemostdebatedtopicsinsecurityistheimportanceof
cryptography.Somewouldassertthatalmostalldigitalsecuritycanbe
accomplishedwithcryptography,thatsecurityandcryptographyare
inseparable,withcryptographybeingthecornerstoneofsecuringdata
in
bothtransmissionandstorage.However,ifcomputersecuritywereas
easy
as“encrypteverything,”thiswouldbeaveryshortbook.While
cryptographyisveryimportantandaverycomplexsecuritymeasure,it
is
notapanacea—butitdoesprovideforlivelydiscussions.Theauthors
bringallthesecomponentstogetherwithacomprehensivechapteron
intrusiondetectionandprevention.
Oncethereaderhasmasteredthebasics,theauthorsaddresse-mail,
malicioussoftware,instantmessaging,andwebcomponentsinsucha
way
thatthereadercanapplyhisorherknowledgeofnetworksandsecurity
fundamentals.Thereaderwillthenbeprovidedwithanoverviewofsec
ure
softwaredevelopment.In2015,boththeU.S.DepartmentofHomelan
d
SecurityandCSOmagazineconcludedthatpoorlydevelopedsoftwar
eis
oneofthebiggestcyberthreats—
perhaps90percentofthethreatscome
throughpoorsoftwaredesign.
Inthefinalanalysis,securityisreallyallaboutriskmanagement.What
isyourorganization’sappetiteforriskandhowisthatriskmanaged?T
he
chapterscoveringriskmanagementleadthereaderthroughtheseless
technicalissuestogainanunderstandinghowtheseimpactthe
organization.Baselinesandchangemanagementareessentialto
understandingwhatassetsarebeingsecuredandhowtheyarebeing
changed.Areaderwholearnstheseskillswellwillbeabletoworkin
incidentresponse,disasterrecovery,andbusinesscontinuity.
Understandingtheseprocessesandhowtheyworkwithtechnicalissue
s
expandscareeropportunities.
Theauthorsconcludetheirreviewoftheprinciplesofcomputersecurit
y
withanexaminationofprivacy,legalissues,andethics.Althoughthes
e
topicsappearattheendofthebook,theyarecrucialissuesinthemodern
world.Remember,asacomputersecuritypractitioner,youwillhavele
gal
accesstomoredataandinformationthananyelseintheorganization.
Althoughnotthelastchapterinthebook,Ihavedecidedtocommenton
forensicslast.Theauthorshavedoneawonderfuljobofaddressingthis
complextopic.Butwhymentionitlast?Becausemanytimesforensicsi
s
whatonedoesaftercomputersecurityfails.Itmakesagoodepitaphfor
a
wonderfulbook.
Tonightitis15degreesandsnowingoutsidewhileIsitinmystudy—
warm,dry,andcomfortable;myhomeismycastle.Notbadformid-
winterinIdaho;however,IshouldnotforgetthatonereasonIam
comfortableisbecausecertifiedcomputersecuritypractitionersare
protectingmyinformationandprivacyaswellasthecriticalinfrastruc
ture
thatsupportsit.
ForInstructors
Ihavetaughtfromprioreditionsofthisbookandhaveuseditscompani
on
laboratorymanualforseveralyears.BothPrinciplesofComputerSec
urity,
FourthEditionandPrinciplesofComputerSecurityLabManual,Four
th
EditionhaveinstructormaterialsonacompanionWebsiteavailableto
adoptinginstructors.Instructormanuals,includingtheanswerstothe
end-
of-
chapterquestions,PowerPointslides,andthetestbankofquestionsfor
useasquizzesorexams,makepreparationasnap.
CoreyD.Schou,PhD
SeriesEditor
UniversityProfessorofInformatics
ProfessorofComputerScience
DirectoroftheNationalInformationAssuranceTrainingandEducati
on
Center
IdahoStateUniversity
PREFACE
Informationandcomputersecurityhasmovedfromtheconfinesof
academiatomainstreamAmericainthe21stcentury.Databreaches,
informationdisclosures,andhigh-profilehacksinvolvingthetheftof
informationandintellectualpropertyseemtobearegularstapleofthe
news.Ithasbecomeincreasinglyobvioustoeverybodythatsomething
needstobedonetosecurenotonlyournation’scriticalinfrastructureb
ut
alsothebusinesseswedealwithonadailybasis.Thequestionis,“Wher
e
dowebegin?”Whatcantheaverageinformationtechnologyprofessio
nal
dotosecurethesystemsthatheorsheishiredtomaintain?One
immediateansweriseducationandtraining.Ifwewanttosecureour
computersystemsandnetworks,weneedtoknowhowtodothisandwh
at
securityentails.
Ourwayoflife,fromcommercetomessagingtobusiness
communicationsandevensocialmedia,dependsontheproperfunctio
ning
ofourworldwideinfrastructure.Acommonthreadthroughoutallofth
ese,
however,istechnology—
especiallytechnologyrelatedtocomputersand
communication.Thus,anindividual,organization,ornationwhowan
ted
tocausedamagetothisnationcouldattackitnotjustwithtraditional
weaponsbutwithcomputersthroughtheInternet.Complacencyisnot
an
optionintoday’shostilenetworkenvironment.Theprotectionofour
networksandsystemsisnotthesoledomainoftheinformationsecurity
professional,butrathertheresponsibilityofallwhoareinvolvedinthe
design,development,deployment,andoperationofthesystemsthatar
e
nearlyubiquitousinourdailylives.Withvirtuallyeverysystemwe
dependupondailyatrisk,theattacksurfaceandcorrespondingriskpro
file
isextremelylarge.Informationsecurityhasmaturedfromaseriesof
technicalissuestoacomprehensiveriskmanagementproblem,andthi
s
bookprovidesthefoundationalmaterialtoengageinthefieldina
professionalmanner.
So,wheredoyou,theITprofessionalseekingmoreknowledgeon
security,startyourstudies?Thisbookoffersacomprehensivereviewo
f
theunderlyingfoundationsandtechnologiesassociatedwithsecurin
gour
systemsandnetworks.TheITworldisoverflowingwithcertifications
that
canbeobtainedbythoseattemptingtolearnmoreabouttheirchosen
profession.Theinformationsecuritysectorisnodifferent,andthe
CompTIASecurity+examoffersabasiclevelofcertificationforsecur
ity.
Inthepagesofthisbookyouwillfindnotonlymaterialthatcanhelpyou
preparefortakingtheCompTIASecurity+exambutalsothebasic
informationthatyouwillneedinordertounderstandtheissuesinvolve
din
securingyourcomputersystemsandnetworkstoday.Innowayisthis
bookthefinalsourceforlearningallaboutprotectingyourorganizatio
n’s
systems,butitservesasapointfromwhichtolaunchyoursecuritystudi
es
andcareer.
Onethingiscertainlytrueaboutthisfieldofstudy—itnevergets
boring.Itconstantlychangesastechnologyitselfadvances.Somethin
g
elseyouwillfindasyouprogressinyoursecuritystudiesisthatnomatte
r
howmuchtechnologyadvancesandnomatterhowmanynewsecurity
devicesaredeveloped,atitsmostbasiclevel,thehumanisstilltheweak
linkinthesecuritychain.Ifyouarelookingforanexcitingareatodelve
into,thenyouhavecertainlychosenwisely.Securityoffersachallengi
ng
blendoftechnologyandpeopleissues.Andsecuringthesystemsof
tomorrowwillrequireeveryonetoworktogether,notjustsecurity,but
developers,operators,andusersalike.We,theauthorsofthisbook,wi
sh
youluckasyouembarkonanexcitingandchallengingcareerpath.
Wm.ArthurConklin,Ph.D.
GregoryB.White,Ph.D.
INTRODUCTION
Computersecurityisbecomingincreasinglyimportanttodayasthe
numberofsecurityincidentssteadilyclimbs.Manycorporationsaren
ow
spendingsignificantportionsoftheirbudgetsonsecurityhardware,
software,services,andpersonnel.Theyarespendingthismoneynot
becauseitincreasessalesorenhancestheproducttheyprovide,but
becauseofthepossibleconsequencesshouldtheynottakeprotective
actions.Securityhasbecomeacomprehensiveriskmanagementexerc
ise
infirmsthattaketherisksseriously.
WhyFocusonSecurity?
Securityisnotsomethingthatwewanttohavetopayfor;itwouldbenice
ifwedidn’thavetoworryaboutprotectingourdatafromdisclosure,
modification,ordestructionfromunauthorizedindividuals,butthati
snot
theenvironmentwefindourselvesintoday.Instead,wehaveseenthec
ost
ofrecoveringfromsecurityincidentssteadilyrisealongwiththerisein
the
numberofincidentsthemselves.Sincehackershavelearnedhowto
monetizehacks,theplayingfieldhasbecomesignificantlymore
dangerous.Therearenowincentivesforaprofessionalclassofhacker
withtheintentofreapingbenefitsbothlongandshortterm.Withthe
adventofadvancedpersistentthreats,theriseofnation-
statehacking,and
theincreaseincriminalactivityfrombotnetstoransomware,theIT
playingfieldisnowviewedasacontestedenvironment,onewhere
hackingcanresultingains.Lawenforcementistoooverwhelmedand
under-
resourcedtomakeadentintheproblem,andtheresultisaneedfor
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx
chapter23 ComputerForensicsHowoftenhaveIsaidto.docx

More Related Content

Similar to chapter23 ComputerForensicsHowoftenhaveIsaidto.docx

Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Hamisi Kibonde
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Mahdi_Fahmideh
 
Digital 101 MCQ (1).pdf
Digital 101 MCQ (1).pdfDigital 101 MCQ (1).pdf
Digital 101 MCQ (1).pdf
rajkumar234953
 
Hygiene first
Hygiene firstHygiene first
Hygiene first
Rupali Ghogle
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
Ulf Mattsson
 
Butler
ButlerButler
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityArtificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber Security
IRJET Journal
 
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET Journal
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
Brianna Johnson
 
Will factory cybersecurity keep up with the accelerating IoT.docx
Will factory cybersecurity keep up with the accelerating IoT.docxWill factory cybersecurity keep up with the accelerating IoT.docx
Will factory cybersecurity keep up with the accelerating IoT.docx
Virha Tiku
 
𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇
𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇
𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇
Infosec train
 
The Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EHThe Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EH
InfosecTrain Education
 
Free Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdfFree Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdf
infosecTrain
 
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
priyanshamadhwal2
 
CEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdfCEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdf
infosec train
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
Patricia M Watson
 
Ethical hacking1
Ethical hacking1Ethical hacking1
Ethical hacking1
Faheen Ahmed
 
CISSP Domain 03 Security Architecture and Engineering.pptx
CISSP Domain 03 Security Architecture and Engineering.pptxCISSP Domain 03 Security Architecture and Engineering.pptx
CISSP Domain 03 Security Architecture and Engineering.pptx
gealehegn
 
3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docx3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docx
asharshaikh8
 
Bpf cyber security contribution for igf 2018 by shreedeep rayamajhi
Bpf cyber security  contribution for igf 2018 by shreedeep rayamajhiBpf cyber security  contribution for igf 2018 by shreedeep rayamajhi
Bpf cyber security contribution for igf 2018 by shreedeep rayamajhi
Shreedeep Rayamajhi
 

Similar to chapter23 ComputerForensicsHowoftenhaveIsaidto.docx (20)

Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
 
Digital 101 MCQ (1).pdf
Digital 101 MCQ (1).pdfDigital 101 MCQ (1).pdf
Digital 101 MCQ (1).pdf
 
Hygiene first
Hygiene firstHygiene first
Hygiene first
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Butler
ButlerButler
Butler
 
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityArtificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber Security
 
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 
Will factory cybersecurity keep up with the accelerating IoT.docx
Will factory cybersecurity keep up with the accelerating IoT.docxWill factory cybersecurity keep up with the accelerating IoT.docx
Will factory cybersecurity keep up with the accelerating IoT.docx
 
𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇
𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇
𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇
 
The Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EHThe Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EH
 
Free Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdfFree Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdf
 
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
 
CEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdfCEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdf
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
 
Ethical hacking1
Ethical hacking1Ethical hacking1
Ethical hacking1
 
CISSP Domain 03 Security Architecture and Engineering.pptx
CISSP Domain 03 Security Architecture and Engineering.pptxCISSP Domain 03 Security Architecture and Engineering.pptx
CISSP Domain 03 Security Architecture and Engineering.pptx
 
3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docx3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docx
 
Bpf cyber security contribution for igf 2018 by shreedeep rayamajhi
Bpf cyber security  contribution for igf 2018 by shreedeep rayamajhiBpf cyber security  contribution for igf 2018 by shreedeep rayamajhi
Bpf cyber security contribution for igf 2018 by shreedeep rayamajhi
 

More from tiffanyd4

CHAPTER 3Understanding Regulations, Accreditation Criteria, and .docx
CHAPTER 3Understanding Regulations, Accreditation Criteria, and .docxCHAPTER 3Understanding Regulations, Accreditation Criteria, and .docx
CHAPTER 3Understanding Regulations, Accreditation Criteria, and .docx
tiffanyd4
 
Chapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docx
Chapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docxChapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docx
Chapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docx
tiffanyd4
 
CHAPTER 13Contributing to the ProfessionNAEYC Administrator Co.docx
CHAPTER 13Contributing to the ProfessionNAEYC Administrator Co.docxCHAPTER 13Contributing to the ProfessionNAEYC Administrator Co.docx
CHAPTER 13Contributing to the ProfessionNAEYC Administrator Co.docx
tiffanyd4
 
Chapter 4Legal Construction of the Employment Environment©vi.docx
Chapter 4Legal Construction of the Employment Environment©vi.docxChapter 4Legal Construction of the Employment Environment©vi.docx
Chapter 4Legal Construction of the Employment Environment©vi.docx
tiffanyd4
 
Chapter 2 The Law of EducationIntroductionThis chapter describ.docx
Chapter 2 The Law of EducationIntroductionThis chapter describ.docxChapter 2 The Law of EducationIntroductionThis chapter describ.docx
Chapter 2 The Law of EducationIntroductionThis chapter describ.docx
tiffanyd4
 
CHAPTER 1 Legal Heritage and the Digital AgeStatue of Liberty,.docx
CHAPTER 1 Legal Heritage and the Digital AgeStatue of Liberty,.docxCHAPTER 1 Legal Heritage and the Digital AgeStatue of Liberty,.docx
CHAPTER 1 Legal Heritage and the Digital AgeStatue of Liberty,.docx
tiffanyd4
 
CHAPTER 1 BASIC CONCEPTS AND DEFINITIONS OF HUMAN SERVICESPAUL F.docx
CHAPTER 1 BASIC CONCEPTS AND DEFINITIONS OF HUMAN SERVICESPAUL F.docxCHAPTER 1 BASIC CONCEPTS AND DEFINITIONS OF HUMAN SERVICESPAUL F.docx
CHAPTER 1 BASIC CONCEPTS AND DEFINITIONS OF HUMAN SERVICESPAUL F.docx
tiffanyd4
 
CHAPTER 20 Employment Law and Worker ProtectionWashington DC.docx
CHAPTER 20 Employment Law and Worker ProtectionWashington DC.docxCHAPTER 20 Employment Law and Worker ProtectionWashington DC.docx
CHAPTER 20 Employment Law and Worker ProtectionWashington DC.docx
tiffanyd4
 
Chapter 1 Global Issues Challenges of GlobalizationA GROWING .docx
Chapter 1 Global Issues Challenges of GlobalizationA GROWING .docxChapter 1 Global Issues Challenges of GlobalizationA GROWING .docx
Chapter 1 Global Issues Challenges of GlobalizationA GROWING .docx
tiffanyd4
 
CHAPTER 23 Consumer ProtectionRestaurantFederal and state go.docx
CHAPTER 23 Consumer ProtectionRestaurantFederal and state go.docxCHAPTER 23 Consumer ProtectionRestaurantFederal and state go.docx
CHAPTER 23 Consumer ProtectionRestaurantFederal and state go.docx
tiffanyd4
 
Chapter 18 When looking further into the EU’s Energy Security and.docx
Chapter 18 When looking further into the EU’s Energy Security and.docxChapter 18 When looking further into the EU’s Energy Security and.docx
Chapter 18 When looking further into the EU’s Energy Security and.docx
tiffanyd4
 
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docxCHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
tiffanyd4
 
Chapter 13 Law, Ethics, and Educational Leadership Making the Con.docx
Chapter 13 Law, Ethics, and Educational Leadership Making the Con.docxChapter 13 Law, Ethics, and Educational Leadership Making the Con.docx
Chapter 13 Law, Ethics, and Educational Leadership Making the Con.docx
tiffanyd4
 
Chapter 12 presented strategic planning and performance with Int.docx
Chapter 12 presented strategic planning and performance with Int.docxChapter 12 presented strategic planning and performance with Int.docx
Chapter 12 presented strategic planning and performance with Int.docx
tiffanyd4
 
ChapterTool KitChapter 7102715Corporate Valuation and Stock Valu.docx
ChapterTool KitChapter 7102715Corporate Valuation and Stock Valu.docxChapterTool KitChapter 7102715Corporate Valuation and Stock Valu.docx
ChapterTool KitChapter 7102715Corporate Valuation and Stock Valu.docx
tiffanyd4
 
CHAPTER 12Working with Families and CommunitiesNAEYC Administr.docx
CHAPTER 12Working with Families and CommunitiesNAEYC Administr.docxCHAPTER 12Working with Families and CommunitiesNAEYC Administr.docx
CHAPTER 12Working with Families and CommunitiesNAEYC Administr.docx
tiffanyd4
 
Chapter 10. Political Socialization The Making of a CitizenLear.docx
Chapter 10. Political Socialization The Making of a CitizenLear.docxChapter 10. Political Socialization The Making of a CitizenLear.docx
Chapter 10. Political Socialization The Making of a CitizenLear.docx
tiffanyd4
 
Chapters one and twoAnswer the questions in complete paragraphs .docx
Chapters one and twoAnswer the questions in complete paragraphs .docxChapters one and twoAnswer the questions in complete paragraphs .docx
Chapters one and twoAnswer the questions in complete paragraphs .docx
tiffanyd4
 
ChapterTool KitChapter 1212912Corporate Valuation and Financial .docx
ChapterTool KitChapter 1212912Corporate Valuation and Financial .docxChapterTool KitChapter 1212912Corporate Valuation and Financial .docx
ChapterTool KitChapter 1212912Corporate Valuation and Financial .docx
tiffanyd4
 
Chapters 4-6 Preparing Written MessagesPrepari.docx
Chapters 4-6  Preparing Written MessagesPrepari.docxChapters 4-6  Preparing Written MessagesPrepari.docx
Chapters 4-6 Preparing Written MessagesPrepari.docx
tiffanyd4
 

More from tiffanyd4 (20)

CHAPTER 3Understanding Regulations, Accreditation Criteria, and .docx
CHAPTER 3Understanding Regulations, Accreditation Criteria, and .docxCHAPTER 3Understanding Regulations, Accreditation Criteria, and .docx
CHAPTER 3Understanding Regulations, Accreditation Criteria, and .docx
 
Chapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docx
Chapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docxChapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docx
Chapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docx
 
CHAPTER 13Contributing to the ProfessionNAEYC Administrator Co.docx
CHAPTER 13Contributing to the ProfessionNAEYC Administrator Co.docxCHAPTER 13Contributing to the ProfessionNAEYC Administrator Co.docx
CHAPTER 13Contributing to the ProfessionNAEYC Administrator Co.docx
 
Chapter 4Legal Construction of the Employment Environment©vi.docx
Chapter 4Legal Construction of the Employment Environment©vi.docxChapter 4Legal Construction of the Employment Environment©vi.docx
Chapter 4Legal Construction of the Employment Environment©vi.docx
 
Chapter 2 The Law of EducationIntroductionThis chapter describ.docx
Chapter 2 The Law of EducationIntroductionThis chapter describ.docxChapter 2 The Law of EducationIntroductionThis chapter describ.docx
Chapter 2 The Law of EducationIntroductionThis chapter describ.docx
 
CHAPTER 1 Legal Heritage and the Digital AgeStatue of Liberty,.docx
CHAPTER 1 Legal Heritage and the Digital AgeStatue of Liberty,.docxCHAPTER 1 Legal Heritage and the Digital AgeStatue of Liberty,.docx
CHAPTER 1 Legal Heritage and the Digital AgeStatue of Liberty,.docx
 
CHAPTER 1 BASIC CONCEPTS AND DEFINITIONS OF HUMAN SERVICESPAUL F.docx
CHAPTER 1 BASIC CONCEPTS AND DEFINITIONS OF HUMAN SERVICESPAUL F.docxCHAPTER 1 BASIC CONCEPTS AND DEFINITIONS OF HUMAN SERVICESPAUL F.docx
CHAPTER 1 BASIC CONCEPTS AND DEFINITIONS OF HUMAN SERVICESPAUL F.docx
 
CHAPTER 20 Employment Law and Worker ProtectionWashington DC.docx
CHAPTER 20 Employment Law and Worker ProtectionWashington DC.docxCHAPTER 20 Employment Law and Worker ProtectionWashington DC.docx
CHAPTER 20 Employment Law and Worker ProtectionWashington DC.docx
 
Chapter 1 Global Issues Challenges of GlobalizationA GROWING .docx
Chapter 1 Global Issues Challenges of GlobalizationA GROWING .docxChapter 1 Global Issues Challenges of GlobalizationA GROWING .docx
Chapter 1 Global Issues Challenges of GlobalizationA GROWING .docx
 
CHAPTER 23 Consumer ProtectionRestaurantFederal and state go.docx
CHAPTER 23 Consumer ProtectionRestaurantFederal and state go.docxCHAPTER 23 Consumer ProtectionRestaurantFederal and state go.docx
CHAPTER 23 Consumer ProtectionRestaurantFederal and state go.docx
 
Chapter 18 When looking further into the EU’s Energy Security and.docx
Chapter 18 When looking further into the EU’s Energy Security and.docxChapter 18 When looking further into the EU’s Energy Security and.docx
Chapter 18 When looking further into the EU’s Energy Security and.docx
 
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docxCHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
 
Chapter 13 Law, Ethics, and Educational Leadership Making the Con.docx
Chapter 13 Law, Ethics, and Educational Leadership Making the Con.docxChapter 13 Law, Ethics, and Educational Leadership Making the Con.docx
Chapter 13 Law, Ethics, and Educational Leadership Making the Con.docx
 
Chapter 12 presented strategic planning and performance with Int.docx
Chapter 12 presented strategic planning and performance with Int.docxChapter 12 presented strategic planning and performance with Int.docx
Chapter 12 presented strategic planning and performance with Int.docx
 
ChapterTool KitChapter 7102715Corporate Valuation and Stock Valu.docx
ChapterTool KitChapter 7102715Corporate Valuation and Stock Valu.docxChapterTool KitChapter 7102715Corporate Valuation and Stock Valu.docx
ChapterTool KitChapter 7102715Corporate Valuation and Stock Valu.docx
 
CHAPTER 12Working with Families and CommunitiesNAEYC Administr.docx
CHAPTER 12Working with Families and CommunitiesNAEYC Administr.docxCHAPTER 12Working with Families and CommunitiesNAEYC Administr.docx
CHAPTER 12Working with Families and CommunitiesNAEYC Administr.docx
 
Chapter 10. Political Socialization The Making of a CitizenLear.docx
Chapter 10. Political Socialization The Making of a CitizenLear.docxChapter 10. Political Socialization The Making of a CitizenLear.docx
Chapter 10. Political Socialization The Making of a CitizenLear.docx
 
Chapters one and twoAnswer the questions in complete paragraphs .docx
Chapters one and twoAnswer the questions in complete paragraphs .docxChapters one and twoAnswer the questions in complete paragraphs .docx
Chapters one and twoAnswer the questions in complete paragraphs .docx
 
ChapterTool KitChapter 1212912Corporate Valuation and Financial .docx
ChapterTool KitChapter 1212912Corporate Valuation and Financial .docxChapterTool KitChapter 1212912Corporate Valuation and Financial .docx
ChapterTool KitChapter 1212912Corporate Valuation and Financial .docx
 
Chapters 4-6 Preparing Written MessagesPrepari.docx
Chapters 4-6  Preparing Written MessagesPrepari.docxChapters 4-6  Preparing Written MessagesPrepari.docx
Chapters 4-6 Preparing Written MessagesPrepari.docx
 

Recently uploaded

220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
Kalna College
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
Payaamvohra1
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
Nguyen Thanh Tu Collection
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapitolTechU
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
OH TEIK BIN
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
Celine George
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
RandolphRadicy
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
Kalna College
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
ShwetaGawande8
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
Kalna College
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
Celine George
 

Recently uploaded (20)

220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
 

chapter23 ComputerForensicsHowoftenhaveIsaidto.docx