Computer Forensic Learning Guide

download Computer Forensic Learning Guide

of 31

Transcript of Computer Forensic Learning Guide

  • 7/23/2019 Computer Forensic Learning Guide

    1/31

    Qystik Nmtrusncm emf Ackputir Ocrimsna

    Kcfudi Acfi7 AQK2

  • 7/23/2019 Computer Forensic Learning Guide

    2/31

    nn | \ e ` i

    2

  • 7/23/2019 Computer Forensic Learning Guide

    3/31

    nnn | \ e ` i

    VVeebbddii ccooAAccmmttiimmttss

    ^CYR DIAVYRIR--------------------------------------------------------------------------------------------------------------- 9

    YMNV Q\IANONAEVNCMQ------------------------------------------------------------------------------------------------------- 9

    DIQQCM \DEM ------------------------------------------------------------------------------------------------------------------- ?

    EQQIQQKIMV KIVHCFQ ------------------------------------------------------------------------------------------------- 52

    EQQN@MKIMV(ACYRQIPCRJ.-------------------------------------------------------------------------------------------------------------------------52

    VIQVQ----------------------------------------------------------------------------------------------------------------------------------------------------------------51

    IXEKNMEVNCMQ------------------------------------------------------------------------------------------------------------------------------------------------51

    KCFYDI CBGIAVN_IQ ----------------------------------------------------------------------------------------------------- 59

    YMNV 57 NMOCRKEVNCM QIAYRNV^ OYMFEKIMVEDQ------------------------------------------------------- 5?

    NMVRCFYAVNCM----------------------------------------------------------------------------------------------------------------------------------------------------- 5?

    VC\NAQ VC BI AC_IRIF------------------------------------------------------------------------------------------------------------------------------------------5?FNQAYQQNCM UYIQVNCMQ ---------------------------------------------------------------------------------------------------------------------------------------- 5?

    YMNV 27 EFFRIQQNM@ VHRIEVQ-------------------------------------------------------------------------------------- 50

    NMVRCFYAVNCM----------------------------------------------------------------------------------------------------------------------------------------------------- 50

    VC\NAQ VC BI AC_IRIF------------------------------------------------------------------------------------------------------------------------------------------50

    FNQAYQQNCM UYIQVNCMQ ---------------------------------------------------------------------------------------------------------------------------------------- 50

    YMNV 17 BEAJFCCRQ$ _NRYQ EMF PCRKQ-------------------------------------------------------------------- 58

    NMVRCFYAVNCM----------------------------------------------------------------------------------------------------------------------------------------------------- 58

    VC\NAQ VC BI AC_IRIF------------------------------------------------------------------------------------------------------------------------------------------58

    FNQAYQQNCM UYIQVNCMQ ---------------------------------------------------------------------------------------------------------------------------------------- 58

    YMNV 67 VHI HEAJNM@ A^ADI ----------------------------------------------------------------------------------------- 20 Kerjitnm` Keme`ikimt Emedysns \demmnm`$Nkpdikimtetncm$ emf Acmtrcd >

    thifm- \rimtnai Hedd Nmtirmetncmed-

    >- Ritenm e phctcacpy co ycur acursi essn`mkimt-5

  • 7/23/2019 Computer Forensic Learning Guide

    14/31

    56 | \ e ` i

    IXEKNMEVNCMQ

    Ixeknmetncms eri acmfuatif et thi imf co ieah tirk nm em ixek hedd sittnm`- Vhi

    furetncm co ixeknmetncms ns mcrkeddy 1 hcurs-

    Ahiaj thi ixek tnkitebdi wnth thi Qahccd-

    Vhi ixek rubrna key ahem`i orck tnki+tc+tnki emf orck kcfudi emf kcfudi- Fcubdi

    ahiaj onmed rubrna wnth ycur Qahccd-

  • 7/23/2019 Computer Forensic Learning Guide

    15/31

    59 | \ e ` i

    KKccffuuddii CCbbggiiaattnnvviiss

    Et thi ackpditncm co thns kcfudi e stufimt shcudf bi ebdi tc7

    Ymfirstemf thi issimtneds co systik nmtrusncm emf ackputir ocrimsnanmvistn`etncm

    Ackprihimf thi prcaissis emf tccds usif by prcoissncmeds es widd espimitretncm tistir-

  • 7/23/2019 Computer Forensic Learning Guide

    16/31

    5? | \ e ` i

    YYmmnntt 5577 NNmmooccrrkkeettnnccmm QQiiaauurrnnttyy OOuummffeekkiimmtteeddss

    Nmtrcfuatncm

    Vhns cpimnm` disscm 5 istebdnshis thi ocumfetncm ocr umfirstemfnm` thi brcefir onidf co

    nmocrketncm siaurnty- Vhns ns eaackpdnshif by fionmnm` jiy tirks$ ixpdenmnm` issimtned

    acmaipts$ emf rivniwnm` thi crn`nms co thi onidf emf nts nkpeat cm thi umfirstemfnm` co

    nmocrketncm siaurnty-

    Vcpnas tc bi Acvirif

    Nmocrketncm Qiaurnty Cvirvniw Phy Qiaurnty3 Vhi Nmocrketncm Qiaurnty \rnmanpdis Ithnaed Heajnm` Vrimfs nm Qiaurnty Issimtned Virknmcdc`y Qtetnstnas Ridetif tc Qiaurnty Nmocrketncm Qiaurnty Dews / Ri`udetncmsFnsaussncm Uuistncms

    5- Qierah sivired `cvirmkimt Pib sntis ocr NV+ridetif gcb cpimnm`s- Phet jnmfs co gcbs aemycu onmf3 Phet ns thi stertnm` sedery co ieah3 Phet eri thi ifuaetncmed riqunrikimts3

    Arieti e dnst co ycur onmfnm`s tc sheri wnth thi adess-

    2- Ysnm` e dnbrery wnth aurrimt pirncfnaeds$ onmf e riaimt miws ertnadi ebcut e tcpna ridetif tcnmocrketncm siaurnty- Prnti e cmi+ tc twc+pe`i rivniw co thi ertnadi emf hcw nt ns ridetif

    tc thi prnmanpdis co nmocrketncm siaurnty nmtrcfuaif nm thns disscm-

  • 7/23/2019 Computer Forensic Learning Guide

    17/31

    50 | \ e ` i

    YYmmnntt 2277 EEffffrriissssnnmm` VVhhrriieettss

    Nmtrcfuatncm

    Disscm 2 ixeknmis aurrimt miifs ocr siaurnty nm cr`emnzetncms emf tiahmcdc`y- Vhns disscm

    edsc ixeknmis thi verncus thriets oeanm` cr`emnzetncms- Vhi disscm acmtnmuis wnth e fitendif

    ixeknmetncm co thi typis co etteajs thet acudf caaur orck thisi thriets$ emf hcw thiy acudf

    nkpeat thi cr`emnzetncms nmocrketncm emf systiks-

    Vcpnas tc bi Acvirif

    Phet ns e Vhriet3

    _udmirebndnty Ixpcsuris Etteajs Kednancus Acfi Etteaj FisarnptncmFnsaussncm Uuistncms

    5- Phet ns thi fnooirimai bitwiim e thriet emf em etteaj32- Hcw fc ixpdcnts rideti tc vudmirebndntnis31- Ns thiri em ithnaeddy eaaiptebdi riescm tc stufy emf usi thi verncus etteaj kithcfs

    fisarnbif nm thns kcfudi3

  • 7/23/2019 Computer Forensic Learning Guide

    18/31

    58 | \ e ` i

    YYmmnntt 1177 BBeeaajjffccccrrss$$ __nnrruuss eemmff PPccrrkkss

    Nmtrcfuatncm

    Vhns disscm 1 istebdnshis thi ocumfetncm ocr umfirstemfnm` thi brcefir onidf co Kedweri nm

    Beajfccrs$ _nrus emf Pcrks- Vhns ns eaackpdnshif by fionmnm` jiy tirks$ ixpdenmnm`

    issimtned acmaipts$ emf rivniwnm` thi crn`nms co thi onidf emf nts nkpeat cm thi umfirstemfnm`

    co Kedweri nm Ackputir Qiaurnty-

    Vcpnas tc bi Acvirif

    Phet ns e Vrcgem3 Pcrjnm` co Vrcgems Cvirt emf Acvirt ahemmids Fnooirimai Bitwiim _nrus emf Pcrk _nrus Hnstcry Phim ns e vnrus mct e vnrus3 Dnoi Ayadi co _nrus Eaaiss Kithcfs co e _nrus Nmfnaetncms co e _nrus etteaj- Ymfir`rcumf Prntirs Kedweri \rctiatncm Emtn+_nrus Qcotweri \cpuder Emtn+_nrus \eaje`isFnsaussncm Uuistncms

    5- \irheps ycu hevi siim thi V_ ackkiraned nm whnah e bcrif coonai wcrjir umthnmjnm`dycpims em i+kend kisse`i$ whnah deumahis e vnrus cm hir ackputir- Vhi vnrus nkkifnetidyspriefs tc hir acwcrjirs' ackputirs emf ahecs briejs cut nm thi coonai- Vhi ackkiraned

    key bi cvirdy freketna (cr ackna$ fipimfnm` cm ycu pcnmt co vniw.$ but nt rensis em

    nkpcrtemt quistncm7 shcudf e wcrjir bi hidf rispcmsnbdi ocr brnm`nm` e vnrus nmtc em

    cr`emnzetncm's mitwcrj$ ivim by eaanfimt3 No sc$ whet pimedtnis wcudf bi riescmebdi3

    Hcw aem cr`emnzetncms privimt suah nmanfimts3

  • 7/23/2019 Computer Forensic Learning Guide

    19/31

    5> | \ e ` i

    2- Ns nt bittir tc hevi ycur Nmtirmit Qirvnai \rcvnfir (NQ\. ondtir ycur i+kend$ buy i+kend vnrussaemmir scotweri ocr ycur \A$ cr gust kemueddy fiditi spek emf i+kend thet acmtenms bef

    etteahkimts3

  • 7/23/2019 Computer Forensic Learning Guide

    20/31

    2< | \ e ` i

    YYmmnntt 6677 VVhhii HHeeaajjnnmm` AAyyaaddii

    Nmtrcfuatncm

    Vhns disscm 6 istebdnshis thi ocumfetncm ocr umfirstemfnm` thi Ithnaed Heajir rcdi nm thi onidf

    co nmocrketncm siaurnty- Vhns ns eaackpdnshif by fionmnm` thi ithnaed heajir prcaiss tc

    nmadufi thi pri+etteaj phesis-

    Vcpnas tc bi Acvirif

    Phet fcis e Kednancus Heajir fc3 Vhi Ithnaed Heajirs \rcaiss \ri+Etteaj \hresisFnsaussncm Uuistncms

    5- Phet ns thi jiy fnooirimai bitwiim bitwiim nmocrketncm `ethirnm` tiahmnquis emfimukiretncm3

    2- Onmf cut emf ripcrt cm thi ocddcwnm` imukiretncm tiahmnquis75- OV\ Imukiretncm$ VA\ 252- Imukiretnm` QKV\$ VA\ 29

    1- FMQ Wcmi Vremsoirs$ VA\ 916- Imukiretnm` VOV\$ VA\#YF\ ?>9- Onm`ir$ VA\#YF\ 0>?- Imukiretnm` HVV\$ VA\ 8- MitBncs Qissncm Imukiretncm$ VA\ 51>5

  • 7/23/2019 Computer Forensic Learning Guide

    21/31

    25 | \ e ` i

    52-Pnmfcws Eatnvi Fnriatcry DFE\ Imukiretncm$ VA\#YF\ 18> emf 12?851-Mcvidd MitPeri Imukiretncm$ VA\ 926 emf N\X56-YMNX R\A Imukiretncm$VA\#YF\ 555 emf 1200559-QUD Riscdutncm Qirvnai Imukiretncm$ YF\ 56165?-MOQ Imkiretncm$ VA\#YF\ 2

  • 7/23/2019 Computer Forensic Learning Guide

    22/31

    22 | \ e ` i

    YYmmnntt 9977 AAcckkppuuttiirr OOccrriimmssnnaa OOuummffeekkiimmtteeddss

    Nmtrcfuatncm

    Vcfeys ackputir ocrimsnas ns adierdy e miw pettirm acmonfimai$ eaaiptemai$ emf emedysns thet

    nmvcdvis thi prisirvetncm$ nfimtnonaetncm$ ixtreatncm$ emf fcaukimtetncm co ackputir ivnfimai

    stcrif es fete cr ke`mitnaeddy imacfif nmocrketncm- Ackputir ocrimsna ns ebcut ivnfimai

    orck ackputirs thet ns suoonanimtdy ridnebdi tc stemf up nm acurt emf bi acmvnmanm`- Vhi

    oesanmetnm` pert co sanimai ns thet ackputir ivnfimai ns cotim tremsperimtdy arietif by thi

    ackputirs cpiretnm` systik wnthcut thi jmcwdif`i co thi ackputir cpiretcr- Vhi

    nmocrketncm key eatueddy bi hnffim orck vniw- Vc onmf nt$ spianed ocrimsna scotweri tccds emf

    tiahmnquis eri riqunrif-

    Vcpnas tc bi Acvirif

    Fionmntncm co Ackputir Ocrimsnas Hnstcry co Ocrimsnas Miif ocr Ackputir Ocrimsnas Aybir Arnki Ixekpdis co Aybir Arnki Aybir Arnki Nmvistn`etncm \rcaiss Aheddim`is nm Aybir Arnki Nmvistn`etncms Aybir Dew Epprceahis tc thi Ocrkudetncm co Aybir Dews Qcki Eries Effrissif by Aybir Dew

    Nkpcrtemt Oifired Qtetuis

    Fnsaussncm Uuistncms

    5- Rief emf umfirstemf thi nssuis riodiatif nm thi Mepstir Aesi Qtufy- Fnsauss-

  • 7/23/2019 Computer Forensic Learning Guide

    23/31

    21 | \ e ` i

    YYmmnntt ??77 VVrreeffiikkeerrjjss$$ AAccppyyrrnn`hhtt eemmff \\eettiimmttss

    Nmtrcfuatncm

    Emy sn`m cr emy ackbnmetncm co sn`ms$ aepebdi co fnstnm`unshnm` thi `ccfs cr sirvnais co cmi

    umfirtejnm` orck thcsi co cthir umfirtejnm`s$ shedd bi aepebdi co acmstntutnm` e trefi kerj-

    Quah sn`ms$ nm pertnauder wcrfs nmadufnm` pirscmed mekis$ dittirs$ mukireds$ on`uretnvi

    idikimts emf ackbnmetncms co acdcrs es widd es emy ackbnmetncm co suah sn`ms$ shedd bi

    idn`nbdi ocr ri`nstretncm es trefi kerjs- Phiri sn`ms eri mct nmhirimtdy aepebdi co

    fnstnm`unshnm` thi ridivemt `ccfs cr sirvnais$ Kikbirs key keji ri`nstrebndnty fipimf cm

    fnstnmatnvimiss eaqunrif thrcu`h usi- Kikbirs key riqunri$ es e acmfntncm co ri`nstretncm$

    thet sn`ms bi vnsueddy piraiptnbdi-

    Vcpnas tc bi Acvirif

    Vrefikerjs Vrefikerj Idn`nbndnty emf Bimionts co Ri`nstirnm` nt Vrefikerj Nmornm`ikimt Acpyrn`ht emf Acpyrn`ht Mctnai

    Nmvistn`etnm` Acpyrn`ht Qtetus co e \ertnaudi Pcrj Hcw dcm` fcis e acpyrn`ht dest3 Fcatrnmi co Oenr Ysi \etimts \de`nernsk Vurmntnm \de`nernsk Fitiatncm Vccds

    Fnsaussncm Uuistncms

    5- @nvi ocur (6. riescms MCV tc siij e petimt ocr crn`nmed scotweri2- Dnst et diest 6 weys tc essn`m e acpyrn`ht-

  • 7/23/2019 Computer Forensic Learning Guide

    24/31

    26 | \ e ` i

    YYmmnntt 0077 MMiittwwccrrjj OOccrriimmssnnaa OOuummffeekkiimmtteeddss

    Nmtrcfuatncm

    Mitwcrj ocrimsna ns thi systiketnas treajnm` co nmacknm` emf cut`cnm` treoona cm ycur

    mitwcrj- Mitwcrj ocrimsnas pcsis `rietir aheddim`is es ivnfimai aem bi si`ri`etif earcss

    kudtnpdi systik emf mitwcrj whnah key spem earcss fnooirimt acumtry wnth fnooirimt di`ed

    hnmfremai$ ivnfimai aem bi qunajdy fistrcyif es kemy systik emf mitwcrj prcoissncmed wcrj

    cm thi eooiatif systik emf mitwcrj$ nm turm tekpirnm` wnth thi ivnfimai$ thiri aem bi kemy

    fnooirimt nmvistn`etcrs orck fnooirimt acumtry nmvcdvif$ kejnm` thi ahenm co austcfy

    ackpdnaetnm` emf thi arnki aem bi pirpitretif et `rietir spiif es thi systik emf mitwcrj

    aemmct bi tejim coodnmi ocr ocrimsna ixeknmetncm

    Vcpnas tc bi Acvirif

    + Aheddim`is nm Mitwcrj Ocrimsnas+ Nmtirmit Vhriets+ Ixtirmed Vhriets+

    Eutcketif Ackputir Etteaj

    + Qcurais co Ivnfimai cm e Mitwcrj+ Phet ns e rcutir3+ Oumatncms co e rcutir+ E rcutir nm em CQN+ Vypi co rcutir etteaj+ \eajit Knstrietnm` Etteajs+ Rcutnm` Vebdi \cnscmnm`+ Rcutir Ocrimsnas vs Ackputir Ocrimsnas

  • 7/23/2019 Computer Forensic Learning Guide

    25/31

    29 | \ e ` i

    + Nmanfimt Ripcmsi+ Nmvistn`etnm` Rcutirs+ Eaaissnm` thi Rcutir+ Rcutir Nmvistn`etncm \rcaifuris

    Fnsaussncm Uuistncms

    5- No ycu fnsacvir furnm` ycur nmvistn`etncm thet emcthir ackpemys keahnmis eri binm` usifes pert co e FFCQ etteaj$ whet shcudf ycu fc3

  • 7/23/2019 Computer Forensic Learning Guide

    26/31

    2? | \ e ` i

    YYmmnntt 8877 NNmmaannffiimmttss RRiissppccmmssii eemmff OOccrriimmssnnaass

    Nmtrcfuatncm

    Iviry busnmiss hes nts cwm rnsj imvnrcmkimt emf emy rnsj thet ketirnednzis key nmtirrupt

    fisnrebdi cutacki co busnmiss prcaissis- Emy suah nmtirruptncm ns aeddif em nmanfimt- Vhi

    ocddcwnm` oeatcrs ikphesnzi thi nkpcrtemai co nmanfimt keme`ikimt7 Nm riaimt yiers$ thiri

    hes biim e stiefy trimf co bcth nmariesif caaurrimais emf isaedetnm` dcssis risudtnm` orck

    nmocrketncm siaurnty nmanfimts- Vhisi nmanfimts hevi hef e sirncus nkpeat tc busnmissis emf

    cr`emnzetncm- Vhi nmariesi co vudmirebndntnis nm scotweri cr systiks aem eooiat der`i perts co

    em cr`emnzetncms nmorestruaturi- Oenduri co tiahmnaed siaurnty acmtrcds tc privimt nmanfimts-

    Di`ed emf ri`udetcrs `rcups riqunrnm` thi fividcpkimt co em nmanfimt keme`ikimt aepebndnty-

    @rietir ewerimiss by cr`emnzetncms co rnsj keme`ikimt streti`nis-

    Vcpnas tc bi Acvirif

    Phet ns em nmanfimt3 Hcw tc nfimtnoy em Nmanfimt3 \rcaifuri ocr Hemfdnm` Nmanfimts AQNRV Cvirvniw Onrst Rispcmfir \rcaifuri

    Fnsaussncm Uuistncms

    5- ^cur spcusi wcrjs et e prnveti sahccd emf ripcrts rukcurs co e tieahir$ Fr- Wirc$kcdistnm` scki stufimts emf tejnm` nddnant pnaturis co thik- Fr Wirc eddi`ifdy vniws thisi

    pnaturis nm hns coonais- ^cur spcusi wemts ycu tc teji e fnsj nke`i co Fr Wircs ackputir

    fnsj emf onmf cut no thi rukcurs eri trui- Prnti e cmi+ tc twc+ pe`is fitendnm` hcw ycu

    wcudf tidd ycur spcusi tc prcaiif- Edsc$ ixpdenm why wedjnm` nmtc Fr Wircs coonai tc

    eaqunri e fnsj nke`i wcudf mct prisirvi nmti`rnty co thi ivnfimai-

  • 7/23/2019 Computer Forensic Learning Guide

    27/31

    20 | \ e ` i

    YYmmnntt >>77 FFnn`nntteedd IIvvnnffiimmaaii

    Nmtrcfuatncm

    Fn`nted ivnfimai aem bi emy nmocrketncm stcrif cr tremsknttif nm fn`nted ocrk- Vhns ns biaeusi

    ycu aemmct sii cr tcuah fn`nted fete fnriatdy$ nt ns fnoonaudt tc ixpdenm emf fisarnbi nt- Ns fn`nted

    ivnfimai ried cr vnrtued3 Fcis fete cm e fnsj cr cthir stcre`i kifnuk physnaeddy ixnst$ cr

    fcis nt kiridy riprisimt ried nmocrketncm3 Y-Q- acurts eaaipt fn`nted ivnfimai es physnaed

    ivnfimai$ whnah kiems thet fn`nted fete ns e tem`nbdi cbgiat$ suah es e wiepcm$ pepir

    fcaukimt$ cr vnsnbdi nmgury$ thet ns ridetif tc e arnknmed cr anvnd nmanfimt-

    Vcpnas tc bi Acvirif

    Nmtrcfuatncm tc Fn`nted Ivnfimai Fn`nted Ivnfimai Nmvistn`etncm \rcaiss Qiaurnm` Fn`nted Ivnfimai Fcaukimtnm` Ivnfimai \rcaissnm` emf Hemfdnm` Fn`nted Ivnfimai nm e Ocrimsnas Deb Cbtenmnm` Fn`nted Hesh emf Emedyznm` nt

    Qtcrnm` Fn`nted Ivnfimai

    Ivnfimai Ritimtncm emf Kifne Qtcre`i RiqunrikimtsFnsaussncm Uuistncms

    5- Fisarnbi hcw ycu riainvif emf siaurif ivnfimai ebcut thi erscm aesi orck thi nmsuremaiackpemy- Arieti em ivnfimai austcfy ocrk shcwnm` thet ycur onrk riainvif thi nke`i-

    Phet effntncmed stips shcudf ycu teji tc prisirvi thi ivnfimai3

    2- ^cu eri hnrif tc `c thrcu`h thi coonai ackputnm` systiks co em ikpdcyii suspiatif coikbizzdnm` oumfs orck thi onrk- Phet stips fc ycu miif tc teji3 Prnti e cmi+pe`i pepir

    cutdnmnm` thi prcaifuris ycu miif tc ocddcw tc keji suri thi ivnfimai hcdfs up nm acurt-

  • 7/23/2019 Computer Forensic Learning Guide

    28/31

    28 | \ e ` i

    YYmmnntt 55

  • 7/23/2019 Computer Forensic Learning Guide

    29/31

    2> | \ e ` i

    efknmnstretcr kimtncms thet cthir -afi ondis hevi biim simf thrcu`h em OV\ sirvir tc

    emcthir snti- Dnst thi stips ocr fitirknmnm` thi acmtimts co thi -afi ondi-

  • 7/23/2019 Computer Forensic Learning Guide

    30/31

    1< | \ e ` i

    YYmmnntt 555577 EEmmeeddyyssnnmm` DDcc`ss

    Nmtrcfuatncm

    Mitwcrjs pirocrk kemy nkpcrtemt prcaissis eutcketnaeddy emf nm thi beaj`rcumf$ emf nt ns

    thi gcb co thi mitwcrj efknmnstretcr tc keji suri thet whet ns suppcsif tc hevi biim fcmi

    hes biim fcmi$ wnthcut irrcr emf wnthcut prcbdiks- Cmi co thi kcst aheddim`nm`$ yit

    riwerfnm`$ espiats co pirnkitir siaurnty ns mitwcrj dc` ondi emedysns- Vhns prcaiss nmvcdvis

    trynm` tc nfimtnoy nmtrusncms emf nmtrusncm ettikpts thrcu`h vn`ndemt kcmntcrnm` emf emedysns

    co verncus dc` ondis emf thim acrridetnm` ivimts ekcm` thcsi ondis- Vhiri eri kemy fnooirimt

    typis co mitwcrj dc` ondis tc rivniw$ orck mitwcrj onriwedds$ rcutirs$ emf peajit ondtirs tc

    hcst+besif onriwedds emf nmtrusncm fitiatncm systiks (NFQs.-

    Vcpnas tc bi Acvirif

    + Vhi Nkpcrtemai co Mitwcrj Dc` Ondis+ Ahereatirnstnas co Dc` Ondis+ Ivimt Dc`+ \urpcsis co Dc` Ondis+

    Dc` Emedysns Besnas+ Vnkistekps+ Mitwcrj Keme`ikimt \rcfuats+ \rctcacd Emedyzir

    Fnsaussncm Uuistncms

    5- E usir cm ycur mitwcrj aedds$ tc ackpdenm thet hir ac+wcrjirs eri riainvnm` i+kendorck hir thet shi fnf mct simf- Phet typi co etteaj ns thns3 Phc fc ycu miif tc

    nmocrk tc privimt nt orck spriefnm`3 Hcw fc ycu emedysi usnm` thi fnooirimt typi co

    dc` ondis3

  • 7/23/2019 Computer Forensic Learning Guide

    31/31

    YYmmnntt 552277 IIkkeenndd AArrnnkkii eemmff AAcckkppuuttiirr OOccrriimmssnnaass

    Nmtrcfuatncm

    I+kend hes tremsaimfif scaned bcumfernis emf kcvif orck e acmvimnimt wey tc ackkumnaeti

    tc e acrpcreti riqunrikimt- Nm kemy aesis$ nmarnknmetnm` umnmtimtncmed fcaukimtetncm co

    picpdis eatnvntnis emf ettntufis aem bi ocumf thrcu`h ackputir ocrimsnas co i+kend- Nm

    \reatnai7 I+Kend nm Qimeti Nmvistn`etncms co Onmemai Ackpemnis Onmemaned nmstntutncms hidpif

    Imrcm kemnpudeti nts mukbirs emf knsdief nmvistcrs- I+kend prcvif thet bemjs suah es

    G\Kcr`em Ahesi jmiw viry widd hcw Imrcm wes hnfnm` nts fibt

    Vcpnas tc bi Acvirif

    Nkpcrtemai co I+Kend es IvnfimaiPcrjnm` wnth I+KendPcrjnm` wnth PibkendPcrjnm` wnth Kend QirvirsIxeknmnm` I+Kends ocr IvnfimaiPcrjnm` wnth Nmstemt Kisse`nm`

    Fnsaussncm Uuistncms

    5- E kcthir aedds ycu tc ripcrt thet hir 59+yier cdf feu`htir hes rum ewey orck hcki-Vhi kcthir hes eaaiss tc hir feu`htirs i+kend emf seys thet hir feu`htir hes e

    mukbir co i+kend kisse`is nm hir Nmbcx su``istnm` thet shi hes rum ewey tc bi wnth e

    19+yier wckem- Prnti e brnio ripcrt cm hcw ycu shcudf prcaiif-