11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

102 computer forensicsa device processes input data or comm<strong>and</strong>s, the applicablest<strong>and</strong>ards must be met. Finally, cost is always an issue.Moving beyond hardware to operating system (OS)design, computer engineers must deal with many additionalquestions, including the file system, how the OS will communicatewith devices (or device drivers), <strong>and</strong> how applicationswill obtain data from the OS (such as the contents <strong>of</strong>input buffers). Today’s operating systems include hundreds<strong>of</strong> system functions. Since the 1980s, the provision <strong>of</strong> allthe objects needed for a st<strong>and</strong>ard user interface (such aswindows, menus, <strong>and</strong> dialog boxes) has been consideredto be part <strong>of</strong> the OS design. Finally, the building <strong>of</strong> securityfeatures into both hardware <strong>and</strong> operating systems hasbecome an integral part <strong>of</strong> computer engineering (see, forexample, biometrics <strong>and</strong> encryption).TrendsIn the early days <strong>of</strong> mainframe computing (<strong>and</strong> again atthe beginning <strong>of</strong> microcomputing) many distinctive systemarchitectures entered the market in rapid succession. Forexample, the Apple II (1977), IBM PC (1981), <strong>and</strong> AppleMacintosh (1984) (see ibm pc <strong>and</strong> Macintosh). Becausearchitectures are now so complex (<strong>and</strong> so much has beeninvested in legacy hardware <strong>and</strong> s<strong>of</strong>tware), wholly newarchitectures seldom emerge today. Because <strong>of</strong> the complexity<strong>and</strong> cost involved in creating system architectures,development tends to be incremental, such as adding PCIcard slots to the IBM PC architecture while retaining olderISA slots, or replacing IDE controllers with EIDE.The growing emphasis on networks in general <strong>and</strong> theInternet in particular has probably diverted some effort <strong>and</strong>resources from the design <strong>of</strong> st<strong>and</strong>-alone PCs to network<strong>and</strong> telecommunications engineering. At the same time,new categories <strong>of</strong> personal computing devices have emergedover the years, including the suitcase-size “transportable”PC, the laptop, the book-sized notebook PC, the h<strong>and</strong>heldPDA (personal digital assistant), as well as network-orientedPCs <strong>and</strong> “appliances.” (See portable computers <strong>and</strong>smartphone.)As computing capabilities are built into more traditionaldevices (ranging from cars to home entertainment centers),computer engineering has increasingly overlapped otherfields <strong>of</strong> engineering <strong>and</strong> design. This <strong>of</strong>ten means thinking<strong>of</strong> devices in nontraditional ways: a car that is able to plantravel, for example, or a microwave that can keep track <strong>of</strong>nutritional information as it prepares food (see embeddedsystem). The computer engineer must consider not only therequired functionality but the way the user will access thefunctions (see user interface).Further ReadingIEEE <strong>Computer</strong> Society. Available online. URL: http://www.computer.orgPatterson, D. A. <strong>and</strong> J. L. Hennessy. <strong>Computer</strong> Organization <strong>and</strong>Design. 3rd ed. San Francisco: Morgan Kaufmann, 2004.“PC Guide.” Available online. URL: www.pcguide.com. AccessedJune 18, 2007.Stokes, John. Inside the Machine: An Illustrated Introduction toMicroprocessors <strong>and</strong> <strong>Computer</strong> Architecture. San Francisco: NoStarch Press, 2007.computer forensics<strong>Computer</strong> forensics is the process <strong>of</strong> uncovering, documenting,analyzing, <strong>and</strong> preserving criminal evidence thathas been stored on (or created using) a computer system.(For the use <strong>of</strong> computers by police, see law enforcement<strong>and</strong> computers.)In general, computer forensics involves both adherenceto legal evidentiary st<strong>and</strong>ards <strong>and</strong> the use <strong>of</strong> sophisticatedtechnical tools. The legal st<strong>and</strong>ards requirepractices similar to those used in obtaining other types<strong>of</strong> criminal evidence (observing expectations <strong>of</strong> privacy,knowing when a warrant is needed to search <strong>and</strong> seizeevidence, <strong>and</strong> so on).Once there is a go-ahead for a search, the first step is todocument the layout <strong>and</strong> nature <strong>of</strong> the equipment (generallyby photographing it) <strong>and</strong> to identify both devices thatmight be problematic or notes or other materials that mightreveal passwords for encrypted data.If the system is running it may be viewed or scanned todetermine what applications are running <strong>and</strong> what networkconnections may be active. However, this has to be done asunobtrusively as possible, since some machines can detectphysical intrusions.Step by step, the forensic technician must documenteach s<strong>of</strong>tware program or other tool used, <strong>and</strong> why it isjustified (such as the possibility that simply shutting downthe system might lead to loss <strong>of</strong> data in RAM). There are avariety <strong>of</strong> such tools, particularly for UNIX/Linux environments,some <strong>of</strong> which have been ported to Windows. (Insome cases a Linux “live” CD might be booted <strong>and</strong> used toexplore a Windows file system.)The next step is to collect the evidence from storagemedia in such a way as to ensure that it is accurately <strong>and</strong>completely preserved. A running machine must generallyfirst be shut down in such a way as to prevent triggeringany “trip wire” or intrusion-detection or self-destructmechanism that may have been installed.As a practical matter, once the system has been properlyshut down or immobilized, it is usually taken to the forensiclaboratory for extraction, copying, <strong>and</strong> documenting <strong>of</strong>the evidence (such as files on a hard drive or other storagedevice).Once the data has been collected, each file or documentmust be analyzed to determine if it is relevant to the criminalinvestigation <strong>and</strong> what key information it contains. Forexample, e-mail headers may be analyzed to determine thesource <strong>and</strong> routing <strong>of</strong> the message.Some Typical Cases<strong>Computer</strong>-based evidence may be relevant for almost anytype <strong>of</strong> crime, but certain kinds <strong>of</strong> crimes are more likely toinvolve computer forensics. These include:• financial crimes, such as embezzlement• corporate crimes such as insider trading, where e-mails may reveal who knew what <strong>and</strong> when• data or identity theft, including online scams orphishing

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!