SlideShare a Scribd company logo
Chapter 19 Forensic Science and the Internet
Introduction ,[object Object],[object Object],[object Object]
A Network of Networks ,[object Object],[object Object],[object Object],[object Object],[object Object]
A Network of Networks ,[object Object]
The World Wide Web ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Electronic Mail (e-Mail) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Cache ,[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Cookies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet History ,[object Object],[object Object],[object Object],[object Object]
Bookmarks and Favorite Places ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Communications ,[object Object],[object Object],[object Object],[object Object]
Value of the IP address ,[object Object],[object Object],[object Object]
IP Address Locations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Difficulty with IP Addresses ,[object Object],[object Object],[object Object],[object Object]
Hacking ,[object Object],[object Object],[object Object],[object Object]
Locations of Concentration ,[object Object],[object Object],[object Object],[object Object]
Logs ,[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Intrusion Investigation ,[object Object],[object Object],[object Object],[object Object]
Intrusion Investigation ,[object Object],[object Object],[object Object]
Live Network Traffic ,[object Object],[object Object],[object Object],[object Object]
The Destination IP Address ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

How internet works
How internet worksHow internet works
How internet works
ANurag Kumar
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Works
ftz 420
 
internet principles of operation By ZAK
internet principles of operation By ZAKinternet principles of operation By ZAK
internet principles of operation By ZAK
Tabsheer Hasan
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
Urvi Talaty
 
How the Internet Works
How the Internet WorksHow the Internet Works
How the Internet Works
Sharique Masood
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
sumit kumar
 
How the Internet Works
How the Internet WorksHow the Internet Works
How the Internet Works
Lionnel Yamentou
 
Lesson+3 v2.0 slide_show [autosaved]
Lesson+3 v2.0 slide_show [autosaved]Lesson+3 v2.0 slide_show [autosaved]
Lesson+3 v2.0 slide_show [autosaved]
gmidavis
 
Internet
InternetInternet
Internet
groversimrans
 
How the-internet-works
How the-internet-worksHow the-internet-works
How the-internet-works
Rashmi Kaul
 
InterneT
InterneTInterneT
InterneT
Sanjeev Patel
 
Introduction to the internet
Introduction to the internetIntroduction to the internet
Introduction to the internet
Arti Parab Academics
 
Introduction of Internet Hindi Notes
Introduction of Internet Hindi NotesIntroduction of Internet Hindi Notes
Introduction of Internet Hindi Notes
SirajRock
 
Introduction to the internet
Introduction to the internetIntroduction to the internet
Introduction to the internet
Folasade Adedeji
 
Reconnaissance
ReconnaissanceReconnaissance
Reconnaissance
maroti164
 
Internet principles of operation
Internet principles of operationInternet principles of operation
Internet principles of operation
Inqilab Patel
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
Anish Thomas
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
ASIT Education
 
Internet and url by marivic s. manlagnit jmames ict coordinator
Internet and url  by  marivic s. manlagnit jmames ict coordinatorInternet and url  by  marivic s. manlagnit jmames ict coordinator
Internet and url by marivic s. manlagnit jmames ict coordinator
Marivic Manlagnit
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
PravinGhosekar
 

What's hot (20)

How internet works
How internet worksHow internet works
How internet works
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Works
 
internet principles of operation By ZAK
internet principles of operation By ZAKinternet principles of operation By ZAK
internet principles of operation By ZAK
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 
How the Internet Works
How the Internet WorksHow the Internet Works
How the Internet Works
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 
How the Internet Works
How the Internet WorksHow the Internet Works
How the Internet Works
 
Lesson+3 v2.0 slide_show [autosaved]
Lesson+3 v2.0 slide_show [autosaved]Lesson+3 v2.0 slide_show [autosaved]
Lesson+3 v2.0 slide_show [autosaved]
 
Internet
InternetInternet
Internet
 
How the-internet-works
How the-internet-worksHow the-internet-works
How the-internet-works
 
InterneT
InterneTInterneT
InterneT
 
Introduction to the internet
Introduction to the internetIntroduction to the internet
Introduction to the internet
 
Introduction of Internet Hindi Notes
Introduction of Internet Hindi NotesIntroduction of Internet Hindi Notes
Introduction of Internet Hindi Notes
 
Introduction to the internet
Introduction to the internetIntroduction to the internet
Introduction to the internet
 
Reconnaissance
ReconnaissanceReconnaissance
Reconnaissance
 
Internet principles of operation
Internet principles of operationInternet principles of operation
Internet principles of operation
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Internet and url by marivic s. manlagnit jmames ict coordinator
Internet and url  by  marivic s. manlagnit jmames ict coordinatorInternet and url  by  marivic s. manlagnit jmames ict coordinator
Internet and url by marivic s. manlagnit jmames ict coordinator
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 

Viewers also liked

Camera
CameraCamera
Camera
Camacho Melendo
 
Volcano 1
Volcano 1Volcano 1
Volcano 1
Camacho Melendo
 
Thanksgiving
ThanksgivingThanksgiving
Thanksgiving
Camacho Melendo
 
Typewriter
TypewriterTypewriter
Typewriter
Camacho Melendo
 
Volcano and more
Volcano and moreVolcano and more
Volcano and more
Camacho Melendo
 
Fs Ch 17
Fs Ch 17Fs Ch 17
Fs Ch 17
warren142
 
Chapter02
Chapter02Chapter02
Chapter02
warren142
 
Fs Ch 17
Fs Ch 17Fs Ch 17
Fs Ch 17
warren142
 
Ch 8 fingerprints
Ch 8 fingerprintsCh 8 fingerprints
Ch 8 fingerprints
warren142
 

Viewers also liked (9)

Camera
CameraCamera
Camera
 
Volcano 1
Volcano 1Volcano 1
Volcano 1
 
Thanksgiving
ThanksgivingThanksgiving
Thanksgiving
 
Typewriter
TypewriterTypewriter
Typewriter
 
Volcano and more
Volcano and moreVolcano and more
Volcano and more
 
Fs Ch 17
Fs Ch 17Fs Ch 17
Fs Ch 17
 
Chapter02
Chapter02Chapter02
Chapter02
 
Fs Ch 17
Fs Ch 17Fs Ch 17
Fs Ch 17
 
Ch 8 fingerprints
Ch 8 fingerprintsCh 8 fingerprints
Ch 8 fingerprints
 

Similar to Fs Ch 19

Fs Ch 19
Fs Ch 19Fs Ch 19
Fs Ch 19
warren142
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit Chandra
Amit Chandra
 
The Internet
The InternetThe Internet
The Internet
webhostingguy
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appli
Theon Jum
 
Chapter 3 using_the_internet[1]
Chapter 3 using_the_internet[1]Chapter 3 using_the_internet[1]
Chapter 3 using_the_internet[1]
mhuntsman0002
 
Networking
NetworkingNetworking
Networking
sumitbhaskar0007
 
Internet.ppt
Internet.pptInternet.ppt
Internet.ppt
Yesan Sellan
 
Crimeppt
CrimepptCrimeppt
Crimeppt
Kalaiselvi k
 
CS1308 - 02/08/10
CS1308 - 02/08/10CS1308 - 02/08/10
CS1308 - 02/08/10
Megan Goldner Martinez
 
Computer networks
Computer networksComputer networks
Computer networks
John Cook
 
Internet
InternetInternet
Internet
Naman Goel
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
Tallat Satti
 
2 internet essentials
2 internet essentials2 internet essentials
2 internet essentials
chris30931
 
internetEven though the internet is still a young technology
internetEven though the internet is still a young technologyinternetEven though the internet is still a young technology
internetEven though the internet is still a young technology
Anware Kade
 
NME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdfNME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdf
SeethaDinesh
 
Internet.pptx
Internet.pptxInternet.pptx
Internet.pptx
SIMNchannel
 
unit 1(chapter1).pdf
unit 1(chapter1).pdfunit 1(chapter1).pdf
unit 1(chapter1).pdf
ArunArun542872
 
Internet web & eCommerce
Internet web & eCommerce Internet web & eCommerce
Internet web & eCommerce
PIT COMPUTER EDUCATION
 
CIS 1203 Introduction to the Web
CIS 1203 Introduction to the WebCIS 1203 Introduction to the Web
CIS 1203 Introduction to the Web
Ross University School of Medicine
 
Internet
InternetInternet
Internet
Aryan Ajmer
 

Similar to Fs Ch 19 (20)

Fs Ch 19
Fs Ch 19Fs Ch 19
Fs Ch 19
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit Chandra
 
The Internet
The InternetThe Internet
The Internet
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appli
 
Chapter 3 using_the_internet[1]
Chapter 3 using_the_internet[1]Chapter 3 using_the_internet[1]
Chapter 3 using_the_internet[1]
 
Networking
NetworkingNetworking
Networking
 
Internet.ppt
Internet.pptInternet.ppt
Internet.ppt
 
Crimeppt
CrimepptCrimeppt
Crimeppt
 
CS1308 - 02/08/10
CS1308 - 02/08/10CS1308 - 02/08/10
CS1308 - 02/08/10
 
Computer networks
Computer networksComputer networks
Computer networks
 
Internet
InternetInternet
Internet
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
2 internet essentials
2 internet essentials2 internet essentials
2 internet essentials
 
internetEven though the internet is still a young technology
internetEven though the internet is still a young technologyinternetEven though the internet is still a young technology
internetEven though the internet is still a young technology
 
NME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdfNME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdf
 
Internet.pptx
Internet.pptxInternet.pptx
Internet.pptx
 
unit 1(chapter1).pdf
unit 1(chapter1).pdfunit 1(chapter1).pdf
unit 1(chapter1).pdf
 
Internet web & eCommerce
Internet web & eCommerce Internet web & eCommerce
Internet web & eCommerce
 
CIS 1203 Introduction to the Web
CIS 1203 Introduction to the WebCIS 1203 Introduction to the Web
CIS 1203 Introduction to the Web
 
Internet
InternetInternet
Internet
 

More from warren142

Ch 7
Ch 7Ch 7
Ch 7
warren142
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
warren142
 
Ch 6
Ch 6Ch 6
Ch 6
warren142
 
Ch 6
Ch 6Ch 6
Ch 6
warren142
 
Ch 5
Ch 5Ch 5
Ch 5
warren142
 
Cj 101 ch 4
Cj 101 ch 4Cj 101 ch 4
Cj 101 ch 4
warren142
 
Criminal justice 101 ch 3
Criminal justice 101 ch 3Criminal justice 101 ch 3
Criminal justice 101 ch 3
warren142
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
warren142
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
warren142
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
warren142
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
warren142
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
warren142
 
Ch 14
Ch 14Ch 14
Ch 14
warren142
 
Ch 15
Ch 15Ch 15
Ch 15
warren142
 
Ch 15
Ch 15Ch 15
Ch 15
warren142
 
Ch 14
Ch 14Ch 14
Ch 14
warren142
 
Ch 13
Ch 13Ch 13
Ch 13
warren142
 
Chapter 9
Chapter 9Chapter 9
Chapter 9warren142
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
warren142
 
Ch 7
Ch 7Ch 7
Ch 7
warren142
 

More from warren142 (20)

Ch 7
Ch 7Ch 7
Ch 7
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Ch 6
Ch 6Ch 6
Ch 6
 
Ch 6
Ch 6Ch 6
Ch 6
 
Ch 5
Ch 5Ch 5
Ch 5
 
Cj 101 ch 4
Cj 101 ch 4Cj 101 ch 4
Cj 101 ch 4
 
Criminal justice 101 ch 3
Criminal justice 101 ch 3Criminal justice 101 ch 3
Criminal justice 101 ch 3
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Ch 14
Ch 14Ch 14
Ch 14
 
Ch 15
Ch 15Ch 15
Ch 15
 
Ch 15
Ch 15Ch 15
Ch 15
 
Ch 14
Ch 14Ch 14
Ch 14
 
Ch 13
Ch 13Ch 13
Ch 13
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Ch 7
Ch 7Ch 7
Ch 7
 

Recently uploaded

UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 

Recently uploaded (20)

UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 

Fs Ch 19

  • 1. Chapter 19 Forensic Science and the Internet
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.

Editor's Notes

  1. The Internet, often referred to as the “information superhighway,” has opened a medium for people to communicate and to access millions of pieces of information from computers located anywhere on the globe. No subject or profession remains untouched by the Internet, and this is so for forensic science. A major impact of the Internet will be to bring together forensic scientists from all parts of the world, linking them into one common electronic community.
  2. The Internet can be defined as a “network of networks.” A single network consists of two or more computers that are connected to share information. The Internet connects thousands of these networks so all of the information can be exchanged worldwide. Connections can be made through a modem, a device that allows computers to exchange and transmit information through telephone lines. Higher speed broadband connections are available through cable lines or through DSL telephone lines.
  3. Computers can be linked or networked through wire or wireless (WI-Fi) connections. Computers that participate in the Internet have a unique numerical Internet Provider (IP) address and usually a name.
  4. The most popular area of the Internet is the World Wide Web. It is considered a collection of pages stored in the computers connected to the Internet throughout the world. Web browsers allow the user to explore information stored on the Web and to retrieve Web pages the viewer wishes to read. Several directories and indexes on the Internet, known as search engines, are available to assist the user in locating a particular topic from the hundreds of thousands of web sites located on the Internet. Commercial Internet service providers connect computers to the Internet while offering the user an array of options. A keyword or phrase entered into a search engine will locate sites on the Internet that are relevant to that subject.
  5. The service that is most commonly used in conjunction with the Internet is electronic mail (e-mail). This communication system can transport messages across the world in a matter of seconds. Extensive information relating to forensic science is available on the Internet. The types of Web pages range from simple explanations of the different fields of forensics to intricate details of forensic science specialties.
  6. Evidence of Internet web browsing typically exists in abundance on the user’s computer. Most web browsers (Internet Explorer, Netscape, and Firefox) utilize a system of caching to expedite web browsing and make it more efficient. This web browsing Internet cache is a potential source of evidence for the computer investigator. Portions of, and in some cases, entire visited web pages can be reconstructed. Even if deleted, these cached files can often be recovered.
  7. To appreciate the value of the “cookie” you must first understand how they get onto the computer and their intended purpose. Cookies are placed on the local hard disk drive by the web site the user has visited. This is, of course, if the particular web browser being used is set to allow this to happen. A cookie is used by the web site to track certain information about its visitors. This information can be anything from history of visits or purchasing habits, to passwords and personal information used to recognize the user for later visits.
  8. Most web browsers track the history of web page visits for the computer user. This is probably done merely for a matter of convenience. Like the “recent calls” list on a cell phone, the Internet history provides an accounting of sites most recently visited, with some storing weeks worth of visits. Users have the availability to go back and access sites they most recently visited, just by accessing them through the browser’s history. The history file can be located and read with most popular computer forensic software packages
  9. Another way users can access websites quickly is to store them in their “bookmarks” or “favorite places.” Like a pre-set radio station, Internet browsers allow a user to bookmark websites for future visits. A lot can be learned from the bookmarked sites of a person. Perhaps you might learn what online news a person is interested in or what type of hobbies he/she has. You may also see that person’s favorite child pornography or computer hacking sites bookmarked.
  10. Computer investigations often begin or are centered around Internet communication. It may be: a chat conversation amongst many people, an instant message conversation between just two individuals, or the back and forth of an e-mail exchange. Human communication has long been a source of evidentiary material. Regardless of the type, investigators are typically interested in communication
  11. In our earlier discussion, it was stated that in order to communicate on the Internet a device needs to be assigned an Internet Protocol (IP) address. The IP address is provided by the Internet Service provider from which the device accesses the Internet. Thus it is the IP address that might lead to the identity of a real person. If an IP address is the link to the identity of a real person, then it would quite obviously be very valuable for identifying someone on the Internet
  12. IP addresses are located in different places for different mediums of communications. E-Mail will have the IP address in the header portion of the mail. This may not be readily apparent and may require a bit of configuration to reveal. Each e-mail client is different and needs to be evaluated on a case by case basis. In the case of an Instant Message or Chat session, the particular provider (the one providing the mechanism of chat - AOL, Yahoo, etc.) would be contacted to provide the users IP address).
  13. Finding IP addresses may be difficult. E-mail can be read through a number of clients or software programs. Most accounts offer the ability to access e-mail through a web-based interface as well. Often the majority of chat and instant message conversations are not saved by the parties involved. Each application needs to be researched and the computer forensic examination guided by an understanding of how it functions.
  14. Unauthorized computer intrusion, more commonly referred to as hacking, is the concern of every computer administrator. Hackers penetrate computer systems for a number of reasons. Sometimes the motive is corporate espionage and other times it is merely for bragging rights within the hacker community. Most commonly though, it is a rogue or disgruntled employee, with some knowledge of the computer network, who is looking to cause damage. Despite the motivation, Corporate America is frequently turning to law enforcement to investigate and prosecute these cases.
  15. Generally speaking, when investigating an unauthorized computer intrusion, investigators will concentrate their efforts in three locations: log files volatile memory network traffic
  16. Logs will typically document the IP address of the computer that made the connection. Logs can be located in several locations on computer network. Most servers that exist on the Internet track connections made to them through the use of logs. Additionally the router, ( the device responsible for directing data) might possibly contain logs files detailing connections. Similarly, devices known as firewalls might contain log files which list computers that were allowed access to the network or an individual system.
  17. Many times, in cases of unlawful access to a computer network, some technique is used by the perpetrator to cover the tracks of his IP address. Advanced investigative techniques might be necessary to discover the true identity. Where an intrusion is in progress the investigator might have to capture volatile data (data in RAM). The data existing in RAM at the time of an intrusion may provide valuable clues into the identity of the intruder, or at the very least the method of attack. In the case of the instant message or chat conversation, the data that exists in RAM needs to be acquired
  18. Another standard tactic for investigating intrusion cases is documenting all programs installed and running on a system. By doing this the investigator might discover malicious software installed by the perpetrator to facilitate entry. This is accomplished utilizing specialized software designed to document running processes, registry entries, and any installed files.
  19. The investigator may want to capture live network traffic as part of the evidence collection and investigation process. Traffic that travels the network does so in the form of data packets. In addition to containing data these packets also contain source and destination IP addresses. If the attack requires two-way communication, as in the case of a hacker stealing data, then it needs to be transmitted back to the hacker’s computer.
  20. To get there, the destination IP address is needed. Once this is learned, the investigation can focus on that system. Moreover, the type of data that is being transmitted on the network may be a clue as to what type of attack is being launched, if any important data is being stolen, or types of malicious software, if any, that are involved in the attack.