1.0 Overview/Case Summary

Example:

1. On today's date, John Doe contacted my office in regards to imaging a stolen laptop computer running Windows® XP Professional that had been recovered. Doe is requesting a forensic examination to see what company documents may have been stolen by the suspect(s) and is requesting a full forensic examination and report for possible criminal charges & civil litigation.

This section will vary in length. You will include any relevant information regarding what led to you as the forensic examiner/analyst becoming involved with the digital evidence. You may be just receiving the forensic image and someone else conducted the forensic acquisition and this is a good place to document that as this will correlate with your chain of custody information that you immediately started once you came into contact with the digital evidence. Remember, this is an overview and a summary of how the case was initialized and where you as the examiner/analyst became involved.

2.0 Forensic Acquisition & Exam Preparation

Example:

1. On today's date I began the forensic acquisition/imaging process of the stolen laptop. Prior to imaging the stolen laptop, I photographed the laptop, documenting any identifiers (e.g., make, model, serial #), unique markings, visible damage, etc. while maintaining chain of custody.

2. Using a sterile storage media (examination medium) that had been previously forensically wiped and verified by this examiner (MD5 hash value: ed6be165b631918f3cca01eccad378dd) using ABC tool version 1.0. The MD5 hash value for the examination medium yielded the same MD5 hash value as previous forensic wipes to sterilize this media.

3. At this point, I removed the hard drive from the stolen laptop and connected it to my hardware write-blocker, which is running the most recent firmware and has been verified by this examiner. After connecting the hardware write blocker to the suspect hard drive, I connected the hardware write blocker via USB 2.0 to my forensic examination machine to begin the forensic imaging process?

4. Etc, etc.

This section is very important, as you must detail your interaction with the digital evidence and the steps taken to preserve and forensically acquire the evidence. Any additional steps that you take (e.g. forensically wiping storage/examination media, etc.) should be notated in this section of your report. Remember, this section of your report is usually where you as the examiner/analyst came into contact with the digital evidence and thoroughly documenting what you have done is very important to the integrity of the digital evidence and your chain of custody.

Examiner's Tip: You should have a digital camera in your forensic toolkit. Take a picture of the evidence and document each step of the forensic acquisition and preparation process. Regardless, if you include the picture in your report or as an exhibit, this picture is a perfect field note for you as the examiner to reference when completing your report.

• You will also need to include that you verified your forensic image and notate the hash values (e.g., MD5, SHA-1).

• You will also need to briefly describe the process you used when making a working copy from the forensic image of the original evidence.

3.0 Findings and Report (Forensic Analysis)

Example:

1. After completing the forensic acquisition of the stolen laptop I began analyzing the forensic image of the stolen laptop with Forensic Tool

2. I used the following tools for forensic analysis, which are licensed to this examiner:

o Guidance® Software's EnCase® 6.17 o SANS Investigative Forensic Toolkit (SIFT) Version 2.0 o Internet Evidence Finder v3.3 o RegRipper by Harlan Carvey o Microsoft® Excel 2007

3. A review of the Internet history using Internet Evidence Finder, the following data was recovered from sector 117004, which shows a Facebook email between John Doe and Jane Doe. Further analysis shows that a John Doe logged into his Google Mail account. See screenshots below:

John Doe logging into Google Mail account.

John Doe logging into Google Mail account.

This is the most detailed section of your investigation. You will include all artifacts that you find during your analysis relating to the case.

Examiner's Tip: A very good practice when you are including your evidence into your report is to include hyperlinks within your report to link to pictures, documents, etc. Make sure you test and validate that the hyperlinks work properly so when your report is being reviewed, the reader can navigate easily to the evidence that you are including in your report.

4.0 Conclusion In this section, you are basing your conclusion off the forensic evidence. Remember, the goal of the forensic examination is to report the facts, regardless if the evidence is inculpatory or exculpatory in nature.

Ref: https://www.sans.org/blog/intro-to-report-writing-for-digital-forensics/

Basic SQL

Dr. Buleje

Slide 6- 1

Outline

 SQL Data Definition and Data Types

 Specifying Constraints in SQL

 Basic Retrieval Queries in SQL

 INSERT, DELETE, and UPDATE Statements in

SQL

Slide 6- 3

Basic SQL

 SQL language

 SQL Origin

 SQL Actually comes from the word “SEQUEL” which was the original term used in the paper: “SEQUEL TO SQUARE”

Slide 6- 4

SQL Data Definition, Data Types,

Standards

 Terminology:

 Table, row, and column

 CREATE statement

 Main SQL command for data definition

Slide 6- 5

SQL Standards

 SQL-86 or SQL 1.A.

 SQL-92 is referred to as SQL-2.

 Later standards (from SQL-1999) are divided into

core specification and specialized extensions.

 SQL-2006 added XML features

 SQL-3

Slide 6- 6

Schema and Catalog Concepts in

SQL

 We cover the basic standard SQL syntax

 SQL schema

 Schema elements include

 Tables, constraints, views, domains, and other

constructs

Slide 6- 6

Schema and Catalog Concepts in

SQL (cont’d.)

 CREATE SCHEMA statement

 CREATE SCHEMA COMPANY AUTHORIZATION

‘Jsmith’;

 Catalog

Slide 6- 8

The CREATE TABLE Command in

SQL

 Specifying a new relation

 Can optionally specify schema:

 CREATE TABLE COMPANY.EMPLOYEE ...

or

 CREATE TABLE EMPLOYEE ...

Slide 6- 9

The CREATE TABLE Command in

SQL (cont’d.)

 Base tables (base relations)

 Virtual relations (views)

Slide 6- 10

COMPANY relational database schema

Slide 6- 11

One possible database state for the COMPANY relational database schema

Slide 6- 12

One possible database state for the COMPANY relational database schema – continued

Slide 6- 13

SQL CREATE TABLE data definition statements for defining the COMPANY schema from Figure in Slide 10

continued on next slide

Slide 6- 14

SQL CREATE TABLE data definition statements for defining the COMPANY

schema from Figure in Slide 10 -continued

Slide 6- 15

Attribute Data Types and Domains in

SQL

 Basic data types

 Numeric data types

 Integer numbers: INTEGER, INT, and SMALLINT

 Floating-point (real) numbers: FLOAT or REAL, and

DOUBLE PRECISION

 Character-string data types

 Fixed length: CHAR(n), CHARACTER(n)

 Varying length: VARCHAR(n), CHAR

VARYING(n), CHARACTER VARYING(n)

Slide 6- 17

Attribute Data Types and Domains in

SQL (cont’d.)

 Bit-string data types

 Fixed length: BIT(n)

 Varying length: BIT VARYING(n)

 Boolean data type

 Values of TRUE or FALSE or NULL

 DATE data type

 Ten positions

 Components are YEAR, MONTH, and DAY in the

form YYYY-MM-DD

 Multiple mapping functions available in RDBMSs to

change date formats

Slide 6- 18

Attribute Data Types and Domains in

SQL (cont’d.)

 Additional data types

 Timestamp data type

Includes the DATE and TIME fields

 Plus a minimum of six positions for decimal

fractions of seconds

 Optional WITH TIME ZONE qualifier

 INTERVAL data type

 Specifies a relative value that can be used to

increment or decrement an absolute value of a date,

time, or timestamp

Slide 6- 19

Attribute Data Types and Domains in

SQL (cont’d.)

 Domain

 Example:

 CREATE DOMAIN SSN_TYPE AS CHAR(9);

 TYPE

 User Defined Types (UDTs) are supported for

object-oriented applications.

 Uses the command: CREATE TYPE

Slide 6- 18

Specifying Constraints in SQL

Basic constraints:

 Relational Model has 3 basic constraint types that

are supported in SQL:

 Key constraint

 Entity Integrity Constraint

 Referential integrity constraints

Slide 6- 19

Basic Retrieval Queries in SQL

 SELECT statement

 SQL allows a table to have two or more tuples

that are identical

Slide 6- 20

The SELECT-FROM-WHERE

Structure of Basic SQL Queries

 Basic form of the SELECT statement:

Slide 6- 21

Basic Retrieval Queries

Slide 6- 31

Basic Retrieval Queries (Contd.)

Slide 6- 32

Tables as Sets in SQL

 SQL does not automatically eliminate duplicate tuples in

query results

 For aggregate operations duplicates must be accounted

for

 Use the keyword DISTINCT in the SELECT clause

 Only distinct tuples should remain in the result

Slide 6- 38

Tables as Sets in SQL (cont’d.)

 Set operations

 UNION, EXCEPT (difference), INTERSECT

 Corresponding multiset operations: UNION ALL,

EXCEPT ALL, INTERSECT ALL)

Slide 6- 39

Substring Pattern Matching and

Arithmetic Operators

 LIKE comparison operator

 Used for string pattern matching

 % replaces an arbitrary number of zero or more

characters

 underscore (_) replaces a single character

 Examples: WHERE Address LIKE ‘%Houston,TX%’;

 WHERE Ssn LIKE ‘_ _ 1_ _ 8901’;

 BETWEEN comparison operator

 WHERE(Salary BETWEEN 30000 AND 40000)

AND Dno = 5;

Slide 6- 40

Arithmetic Operations

 Standard arithmetic operators:

 Addition (+), subtraction (–), multiplication (*), and

division (/) may be included as a part of SELECT

Slide 6- 27

Ordering of Query Results

 Use ORDER BY clause

 Keyword DESC

 Keyword ASC

ORDER BY D.Dname DESC, E.Lname ASC,

E.Fname ASC

Slide 6- 28

INSERT, DELETE, and UPDATE

Statements in SQL

 Three commands used to modify the database:

 INSERT, DELETE, and UPDATE

 INSERT

 UPDATE

 DELETE

Slide 6- 44

The INSERT Command (examples)

 Specify the relation name and a list of values for

the tuple. All values including nulls are supplied.

 The variation below inserts multiple tuples where

a new table is loaded values from the result of a

query.

Slide 6- 46

The DELETE Command (examples)

 Removes tuples from a relation

 Includes a WHERE clause to select the tuples to be

deleted. The number of tuples deleted will vary.

Slide 6- 49

UPDATE (example)

 Example: Change the location and controlling

department number of project number 10 to

'Bellaire' and 5, respectively

U5: UPDATE PROJECT

SET PLOCATION = 'Bellaire',

DNUM = 5

WHERE PNUMBER=10

Slide 6- 51

Summary

 SQL

 A Comprehensive language for relational database

management

 Data definition, queries, updates, constraint

specification, and view definition

 Covered :

 Data definition commands for creating tables

 Commands for constraint specification

 Simple retrieval queries

 Database update commands

Slide 6- 55

Get help from top-rated tutors in any subject.

Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com