Professional Documents
Culture Documents
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 2 All Rights Reserved.
ENIAC
Developed at the University of Pennsylvania’s
Moore School of Electrical Engineering
Responsible for calculating firing and bombing
tables for the U.S. military
Developed in 1945
Composed of 30 separate unites, coupled with
separate power supplies and air conditioning
units, and weighed 30 tons! It utilized 19,000
vacuum tubes, 1,500 relays, and required 200
kw of electrical power to operate.
Precursor to both mainframes and PC’s.
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 3 All Rights Reserved.
Techno-Lingo
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 4 All Rights Reserved.
Colossus I
1940’s – at a secret government lab in
Buckinghamshire, England by Professor Max
Newman
Designed exclusively for cryptanalysis.
Scanned and analyzed 5,000 charcters per
second
Used in WWII to break “Enigma” codes used
by the Nazi forces
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 5 All Rights Reserved.
Evolution of Computers
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 6 All Rights Reserved.
Computer Language
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 7 All Rights Reserved.
Computer Hardware
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 8 All Rights Reserved.
Hard Drives & Mass Storage Devices
Hard disk drives – mass storage devices which are
designed to permanently store that information which
users intend to keep
Categorized by their storage capacity
Store both software and information input by the user
Advanced exponentially (megabytes to gigabytes to
terabytes and eventually, petabytes)
Types of storage devices – floppies to CD’s to DVD’s to
Zips to Thumb/Pen drives
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 9 All Rights Reserved.
Computer Software
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 10 All Rights Reserved.
Alternatives to DOS:
Popular Operating Systems
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 11 All Rights Reserved.
Application Software
Prepackaged instructions which allow users to
perform a variety of functions, including: word
processing, statistical analysis, etc.
Everything is possible now – games, graphics,
etc.
PUPS – potentially unwanted programs
Malware – malicious programming – code that
causes damage to computer systems
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 12 All Rights Reserved.
A Brief History of the Internet
Relatively new phenomenon
NOT created by Al Gore
1969 - Began with ARPANet – Advanced Research Project Agency
Network by DOD
Designed to overcome threats from a blackout of communication in the
event of a nuclear war
Linked four universities (UCLA, Stanford, UC Santa Barbara & the
University of Utah
Cumbersome – did not provide for interactive sessions
1970’s - Opened to non-military users – universities joined the consortium
Still no e-mail or world wide web
1980’s – introduction of NSF Net – which encouraged communication
between groups
Resulted in a variety of software: UNIX OS, Mosaic Interface, Eudora,
Gopher, Pine, CU-SeeMe
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 13 All Rights Reserved.
A Sampling of Forensic Terminology
Computer forensics – acquisition, authentication,
recovery, and analysis of digital evidence
Data mining – comprehensive analysis of large data
sets designed to uncover patters and relationships.
Analysis tools include, but are not limited to: Statistical
models, mathematical algorithm, and artificial
intelligence
Forensic acquisition – the process of creating a
duplicate copy of computer media.
Forensic authentication – process of proving that an
acquired image is an exact copy of the suspect media.
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 14 All Rights Reserved.
Network Language
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 15 All Rights Reserved.
Realms of the Cyberworld
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 16 All Rights Reserved.