Computer Forensics

advertisement
Computer Forensics
Course
Security
Services
Unit VIII
Risk
Management
Technologies
Essential
Question
How do forensic
specialists
investigate and
analyze
computers and
computer-related
crimes?
TEKS
§130.298(c)
(5)(A)(B)
Prior Student
Learning
-Prevention
Analysis
-Role of Analysis
-Overall Roles of
Security
Systems
Estimated Time
4 to 5 hours
Rationale
Computers have permeated society and are used in countless ways with
innumerable applications. Similarly, the role of electronic data in investigative
work has realized exponential growth in the last decade. The usage of
computers and other electronic data storage devices leaves the footprints and
data trails of their users.
Objectives
The students will be able to:
1. Summarize the role of computer applications relating to forensics
investigations.
2. Investigate criminal activity in areas such as cybercrime, the Internet,
and Internet trafficking.
Engage
Divide the class into several small groups and have them brainstorm/discuss
the following questions:
 What are the components of a computer?
 What is your own knowledge of computers? What data might be of
evidentiary value? Where it might be found?
 How would you preserve computer evidence at a crime scene?
 Why is the Internet referred to as “a network of networks” or the
“information superhighway”?
Key Points
I. Computer Forensics Introduction
A. Computer forensics
1. The acquisition, extraction, preservation, and interpretation of
computer data
2. Includes many devices that are capable of storing data
B. Hardware is the physical material that creates a computer
C. Software are the programs and applications that carry out a set of
instructions on the hardware
II.
Elements of Hardware
A. Computer Case/Chassis – the box that typically rests besides the
computer monitor and houses the internal components for the
computer
B. Power Supply – converts the power from the wall outlet to a usable
form for the computer and its components
C. Motherboard – the primary board that contains the main circuitry for
the computer
D. System Bus – a vast complex network of wires that carries data
from one hardware device to another and is located on the
1
Copyright © Texas Education Agency, 2012. All rights reserved.
motherboard
E. Read Only Memory (ROM) – chips that store programs called
firmware and are used to start the boot process and configure a
computer’s components
F. Random Access Memory (RAM) – the location in a computer where
the operating system that is in use can be stored and retrieved for
quick reference by the CPU
G. Central Processing Unit (CPU) – the central component of a
computer where all of the data is processed
H. Input Devices – used to get data into the computer
1. Keyboard
2. Mouse
3. Joy Stick
4. Scanner
I. Output Devices – used to get data from the computer
1. Monitor
2. Printer
3. Speakers
J. Hard Disk Drive (HDD) – the location in a computer where data is
stored and retrieved
III. Data Storage and Retrieval
A. Examiners must be familiar with the file system they are examining
B. Evidence may be found in various computer locations and formats
C. There are two categories for data-related evidence:
1. Visible data
2. Latent data
D. The formatting process initializes portions of the hard drive so that it
can store data, and it creates the structure of the file system
E. Different operating systems map out (partition) HDDs in different
manners
F. RAM
G. Sector – the smallest unit of data addressable by a hard disk drive,
generally consisting of 512 bytes (Saferstein, 2009)
H. Cluster – a group of sectors in multiples of two, typically the
minimum space allocated in a file (Saferstein, 2009)
IV. Processing the Computerized Crime Scene
A. Similar to processing a traditional crime scene (i.e. warrants,
documentation, investigation techniques)
B. Documentation is a significant component in the computerized
crime scene
1. The scene should be initially documented in as much detail as
possible before any evidence is moved and examined
2. Crime scene documentation is accomplished through two
actions:
a) Sketching – the crime scene must be thoroughly
diagramed and sketched in a floor plan format
b) Photographing – from all locations and all possible
2
Copyright © Texas Education Agency, 2012. All rights reserved.
angles, and include wide and close-up images
C. After documentation is complete, a label should be placed on the
cord of each peripheral, with a corresponding label placed on the
port to which it is connected
D. At a computerized crime scene most, if not all of the equipment will
be seized, but before the peripherals are disconnected from the
computer, a decision must be made about whether or not a live
acquisition of the data is necessary (i.e. shutdown or unplug the
computer)
1. Example: unplugging the computer is imprudent
a) If it will initiate data encryption, rendering it unreadable
without a password or key
b) If crucial evidentiary data exists in RAM that is not saved
to the HDD will be lost with discontinuation of power to
the system
V.
Forensic Image Acquisition
A. After the crime scene has been processed, the computer needs to
be analyzed
B. All electronic devices will be processed in the same manner
C. The examination process that the forensic investigator uses on the
computer must be intrusive
D. All evidence (data) must be obtained without altering or destroying
it
E. Because booting a HDD to its operating system changes many files
and could destroy evidentiary data, the data is generally obtained
by removing the HDD from the system and placing it in a laboratory
forensic computer so that a forensic image can be created
F. Occasionally, in cases with specialized or unique
equipment/systems the image of the HDD must be obtained by
using the seized computer
G. The examiner must be able to extract all forensic data/images and
cause no changes to the HDD
H. A signature or fingerprint of the drive is taken before and after
imaging
1. This fingerprint is created by using a Message Digest 5 (MD5),
a Secure Hash Algorithm (SHA) or a similarly validated
algorithm
2. Before imaging the drive the algorithm is run and a 32character alphanumeric string is produced based on the
drive’s contents
3. The same algorithm is then run against the created forensic
image which will result in the same alphanumeric string if none
of the original content is changed
VI. Visible Data
A. Data from a computer that is openly visible and easily available to
users
B. Can encompass (from an evidentiary standpoint) any type of user3
Copyright © Texas Education Agency, 2012. All rights reserved.
C.
D.
E.
F.
created data like
1. Word processing documents
2. Spreadsheets
3. Accounting records
4. Databases
5. Pictures
Most criminal cases involving computers relate to financial
investigations (or white collar crimes) which require any data
related to personal and business finance
Advances in printer technology have made high quality color
printing affordable and common, which creates criminal
opportunities
1. Counterfeiting
2. Check Fraud
3. Document Fraud
Investigators must become familiar with the various computer
applications that are used for criminal activities
The ability to recognize the data produced by these applications
and to display the images is essential to identifying the evidence
VII. Temporary Files
A. Can be valuable as evidence
B. Can sometimes be recovered during a forensic examination
including some of the data that may have been altered from a
previous version
C. Can be recovered when created through unsaved means (such as
a computer being shut off manually)
D. Most programs automatically save a temporary copy of the file in
progress
E. After working on a file or document, the user can save the changes,
which promotes the temporary copy to a saved (or actual) file
F. Another type of temporary file valuable to the computer investigator
is the printer spool
1. When a print job is sent to the printer a spooling process
delays the sending of the data so the application can continue
to work while the printing takes place in the background
2. When the print job occurs, a temporary print spool file is
created
3. This file contains a copy of all of the data from the printer
VIII. Latent Data
A. The areas of files and disks that are typically not apparent to the
computer user (and often not to the operating system), but contain
data nonetheless (Saferstein, 2009); the data which the operating
system has hidden
B. One of the reasons a forensic image of the media is created is
because a standard copy only captures the logical data (that which
the operating system is aware)
C. Can be evidentiary data
4
Copyright © Texas Education Agency, 2012. All rights reserved.
D. Includes the data in the
1. Swap space (used to conserve the valuable RAM within the
computer system)
2. RAM slack – the area from the end of the logical file to the end
of the sector
3. File slack – the remaining area from the end of the final sector
containing data to the end of the cluster
4. Unallocated space – the space on a hard drive that contains
available space; the space may also contain temporary and
deleted files
IX. Defragmenting/Swap File/Swap Space
A. Defragmenting a HDD involves reconnecting noncontiguous data
B. The HDD has minimum space reservation requirements (i.e. a file
might require 100 bytes of space, but the operating system
allocates much more)
C. If a file grows past the allocated amount, another cluster is required
D. If a different file occupies the next cluster, the operating system
must find another place for the first file on the drive
E. The file is said to be fragmented because data for the same file is
contained in noncontiguous clusters
F. The constant shuffling of data through deletion, defragmentation,
swapping, etc., is one of the ways data is orphaned in latent areas
G. Fragmentation of numerous files can degrade the performance of a
HDD, causing the read/write heads to have to traverse the platters
to locate the data
H. The constant read and write operations of RAM cause a constant
change in the swap file or swap space
X.
Deleted Files
A. Another source of latent data to be examined by forensic
investigators
B. The actions that occur when a file is deleted vary among file
systems
C. When a user deletes files, the data typically remains behind
1. The first character in the files directory entry (its name) is
replaced with the Greek letter sigma
2. When the sigma replaces the first character, the file is no
longer viewable through conventional methods and the
operating system views the space previously occupied by the
file as available
D. Data will remain in the computer even though attempts are made to
delete it
E. When files in a Recycle Bin are deleted, the data remains there as
well, until it is overwritten
XI. The Internet
A. A computer network that provides information globally (also called
the “information superhighway”)
5
Copyright © Texas Education Agency, 2012. All rights reserved.
B. Affects all subjects and professions including law enforcement and
security services
C. Can be considered a series of networks
1. A single network consists of two or more computers that are
connected to share information
2. The Internet connects thousands of these networks so all of
the information can be exchanged worldwide
D. Includes various methods of connection
1. Wire
a) Modem – a device that allows computers to exchange
and transmit information through telephone lines
b) Cable lines or DSL telephone lines – provide higher
speed broadband connections
2. Wireless (Wi-Fi)
E. Each computer that connects to the Internet has a unique
numerical Internet Provider (IP) address and usually a name
XII. The World Wide Web and E-Mail
A. The World Wide Web
1. The most popular area of the Internet
2. Considered a depository of information stored in the
computers connected to the Internet across the world
3. Web browsers allow the user to search all the information
available on the web and retrieve any web pages the viewer
wishes to explore
4. Several directories and indexes on the Internet, known as
search engines, are available to assist the user in locating a
particular topic from the hundreds of thousands of web sites
located on the Internet
5. Keywords or phrases entered into a search engine will locate
sites on the Internet that are relevant to that subject
6. Commercial Internet service providers connect computers to
the Internet while offering the user an array of options
B. Electronic mail (e-mail)
1. The service most commonly used in conjunction with the
Internet
2. Carries messages across the world in a matter of seconds
XIII. Internet Crimes
A. There are more cybercriminals than available law enforcement
agents
B. Cybercriminals feel safe committing crimes in a “comfort zone” and
often from the privacy of their own homes
C. Law enforcement faces new challenges with Internet crimes
1. Most law enforcement officers are not trained in the
technologies
2. Internet crimes span multiple jurisdictions
3. There is a need to retrofit new crimes to existing laws
D. Computers are used to commit a variety of crimes
6
Copyright © Texas Education Agency, 2012. All rights reserved.
1. Identity theft
2. Fraud
3. Industrial espionage
4. Child pornography
5. Harassment
6. Gambling
7. Piracy
8. Computer viruses and spam
E. There are numerous methods and techniques criminals use to hide
their crimes and evidence, which include
1. Deleting files and emails
2. Hiding files with encryption
3. Password protection
4. Embedding information in unrelated files
5. Using WI-FI networks and cyber cafes to cover tracks
F. The task of forensic investigators includes
1. Restoring deleted files and emails
2. Finding the hidden files through complex password encryption
programs and searching techniques
3. Tracking criminals through the digital trail — IP addresses, to
ISPs, to the offender
Activities
1. Have the students process an electronic crime scene by creating a sketch
complete with the appropriate measurements (see the Electronic Crime
Scene Sketch Sample). The activity can best be conducted in the school
library or computer lab with students taking measurements, obtaining
photographs, and illustrating a diagram of the computer room. Students
will identify and label all items located, including modems, ports, printers,
and connecting wires. This activity can be completed either individually or
in small work groups. Use the Individual Work Rubric, the Group
Evaluation Rubric and the Peer Evaluation Rubric as needed for
assessment.
2. Have the students write a research paper and/or a computer-based
presentation regarding a cybercrime of their choice (identity theft,
harassment, piracy, etc). Use the Research Rubric and/or the
Presentation Rubric for assessment.
Assessments
Computer Forensics Exam and Key
Discussion Rubric
Group Evaluation Rubric
Individual Work Rubric
Peer Evaluation Rubric
Presentation Rubric
Research Rubric
Materials
7
Copyright © Texas Education Agency, 2012. All rights reserved.
Computer Forensics computer-based presentation
Computer Forensics Key Terms
Electronic Crime Scene Sketch Sample
White board/chalk board
Computer with Internet Access
Resources
0135158494, Forensic Science: From the Crime Scene to the Crime Lab,
Richard Saferstein, Prentice Hall, 2008
0205592406, Introduction to Private Security: Theory Meets Practice, Cliff
Roberson and Michael L. Birzer, Prentice Hall, 2009
0750684321, Introduction to Security, Robert J. Fischer and Gion Green,
Butterworth-Heinemann, 2008
Investigator/Officer’s Personal Experience
Accommodations for Learning Differences
For reinforcement, the students will research and explain the difference
between hardware and software. Use the Individual Work Rubric for
assessment.
For enrichment, the students will write a research paper about the instruments
that cybercriminals use to commit their crimes. Use the Research Rubric for
assessment.
State Education Standards
Texas Essential Knowledge and Skills for Career and Technical Education
§130.298. Security Services (One to Two Credits).
(5)
The student analyzes the role of computer forensics in security
operations. The student is expected to:
(A)
summarize the role of computer applications relating to
forensics investigations; and
(B)
investigate criminal activity in areas such as cyber crime,
the Internet, and Internet trafficking.
College and Career Readiness Standards
Mathematics Standards
III. Geometric Reasoning
A. Figures and their properties
1. Identify and represent the features of plane and space figures.
IV. Measurement Reasoning
A. Measurement involving physical and natural attributes
1. Select or use the appropriate type of unit for the attribute being
measured.
8
Copyright © Texas Education Agency, 2012. All rights reserved.
Computer Forensics Key Terms
Bit – short for binary digit; takes the form of either a one or a zero; the smallest unit of
information on a machine (Saferstein, 2009)
Byte – a group of eight bits (Saferstein, 2009)
Central Processing Unit (CPU) – the central component of a computer where all of the data is
processed
Cluster – a group of sectors in multiples of two, typically the minimum space allocated in a file
(Saferstein, 2009)
Computer Case/Chassis – the box that typically rests besides the computer monitor and houses
the internal components of the computer
File Slack – the area that begins at the end of the last sector that contains logical data and
terminates at the end of the cluster (Saferstein, 2009)
Hard Disk Drive (HDD) – the location in a computer where data is stored and retrieved
Hardware – the physical material that comprises a computer
Input Devices – used to get data into the computer
Internet – (a.k.a. information superhighway) a computer network that provides information
globally
Latent Data – areas of files and disks that are typically not apparent to the computer user (and
often not to the operating system), but contain data nonetheless (Saferstein, 2009)
Message Digest 5 (MD5) Secure Hash Algorithm – a software algorithm used to “fingerprint” a
file or the contents of a disk; used to verify the integrity of data (Saferstein, 2009)
Motherboard – the primary board that contains the main circuitry for the computer
Operating System (OS) – essentially, the software that directs basic functions and operations
within a computer
Output Devices – used to get data from the computer
Partition – the process of dividing a hard disc drive into different independent sections
Power Supply – converts the power from the wall outlet to a usable form for the computer and
its components
RAM Slack – the area beginning at the end of the logical file and terminating at the end of that
sector; in some older operating systems this area is padded with information in RAM
(Saferstein, 2009)
Random Access Memory (RAM) – the location in a computer where the operating system that is
in use can be stored and retrieved for quick reference by the CPU
Read Only Memory (ROM) – chips that store programs called firmware and are used to start the
boot process and configure a computer’s components
Sector – the smallest unit of data addressable by a hard disk drive, generally consisting of 512
bytes (Saferstein, 2009)
Software – programs and operations that are used by a computer
System Bus – a vast complex network of wires that carries data from one hardware device to
another and is located on the motherboard
Swap File – a file or defined space on the HDD to which data is written or swapped to free RAM
for applications that are in use (Saferstein, 2009)
Temporary Files – files temporarily written by an application to perform a function (Saferstein,
2009)
Unallocated Space – the space on a hard drive that contains available space; the space may
also contain temporary and deleted files
Visible Data – data from a computer that is openly visible and available to users
9
Copyright © Texas Education Agency, 2012. All rights reserved.
Name:_________________________
Date:__________________________
Computer Forensics Exam
Matching
a. Bit
b. Byte
c. Central Processing Unit
d. Cluster
e. File Slack
f. Hard Disk Drive
g. Hardware
h. Internet
i. Latent Data
j. Message Digest 5 Secure Hash Algorithm
k. Motherboard
l.
m.
n.
o.
p.
q.
r.
s.
t.
u.
Operating System
Partition
RAM Slack
Random Access Memory
Sector
Software
Swap File
Temporary Files
Unallocated Space
Visible Data
1. _____ The smallest unit of data addressable by a hard disk drive, generally consisting of
512 bytes
2. _____ The location in a computer where the operating system that is in use can be
stored and retrieved for quick reference by the CPU
3. _____ A file or defined space on the HDD to which data is written, or swapped, to free
RAM for applications that are in use
4. _____ The software that directs basic functions and operations within a computer
5. _____ The space on a hard drive that contains available space; the space may also
contain temporary and deleted files
6. _____ Data from a computer that is openly visible and available to users
7. _____ The area beginning at the end of the logical file and terminating at the end of that
sector; in some older operating systems this area is padded with information in
RAM
8. _____ Programs and operations that are used by a computer
9. _____ Files temporarily written by an application to perform a function
10. _____ A group of eight bits
11. _____ Short for binary digit; takes the form of either a one or a zero, and is the smallest
unit of information on a machine
12. _____ The central component of a computer where all of the data is processed
13. _____ The area that begins at the end of the last sector that contains logical data and
terminates at the end of the cluster
10
Copyright © Texas Education Agency, 2012. All rights reserved.
14. _____ A group of sectors in multiples of two, typically the minimum space allocated in a
file
15. _____ A computer network that provides information globally
16. _____ A software algorithm used to “fingerprint” a file or contents of a disk; used to verify
the integrity of data
17. _____ Consists of the physical material that comprises a computer
18. _____ The location in a computer where data is stored and retrieved
19. _____ Areas of files and disks that are typically not apparent to the computer user (and
often not to the operating system), but contain data nonetheless
20. _____ The process of dividing a hard disc drive into different independent sections
21. _____ The primary board that contains the circuitry for the computer
Answer the following multiple choice questions
22. _____ Which of the following is not considered a hardware device?
A. The hard disk drive
B. The mouse
C. The Random Access Memory
D. The monitor
E. The operating system
23. _____ Which of the following describes a motherboard?
A. Connects to every device used by the system
B. Has a socket to accept ram
C. Is the main circuit board within a computer
D. All of the above
E. None of the above
24. _____ The term “bit” is short for which of the following?
A. Byte
B. Tidbit
C. Binary digit
D. Database
E. Beneath image threshold
11
Copyright © Texas Education Agency, 2012. All rights reserved.
25. _____ The primary form of data storage within a personnel computer is which of the
following?
A. The hard disk drive
B. The CD-ROM
C. A thumb drive
D. The recycle bin
E. A zip drive
26. _____ The first thing a crime scene investigator should do when encountering computer
forensic evidence is which of the following?
A. Unplug every device from the CPU to preserve the hard disk drive
B. Take the system to the laboratory for processing
C. Procure a warrant to search
D. Tape each cable to its adjoining component in an effort to preserve the
integrity of the physical connections
E. Document the scene
27. _____ The ultimate goal of obtaining an image of a hard disk drive is to do which of the
following?
A. Locate as much incriminating information as possible
B. Obtain information without altering the drive in any way
C. Preserve the photographs and video stored on the drive
D. Attempt to determine the owner of the computer in question
E. Give priority to the text files on the drive
28. _____ Which of the following is one of the most common places to begin to look for
evidential data?
A. A CAD package
B. The word processing or text based document files
C. Any learn to type tutorial
D. The spreadsheet files
E. A photograph editing program
29. _____ Which of the following is the best definition of latent data?
A. Unallocated space
B. Anything readily available to the use, also known as visible data
C. An automatically saved copy of a file that was recently modified
D. Those data which are typically of little use to forensic investigators
E. Those data that are hidden from view
30. _____ Which of the following describes what happens once a file is deleted by a user?
A. It is obliterated from the system and cannot be recovered
B. It is retained until the disk space it occupies is allocated for another use
C. It may be identified using forensic image acquisition software
D. A and B
E. B and C
12
Copyright © Texas Education Agency, 2012. All rights reserved.
31. _____ Evidentiary data may be recovered from which of the following?
A. Unallocated space on the HDD
B. Slack space on the HDD
C. Ram swap files
D. All of the above
E. None of the above
32. _____ A cluster is a group of _____ in multiples of ______?
A. Sectors, two
B. Partitions, two
C. Disks, four
D. Cylinders, three
E. Tracks, three
33. _____ Which of the following is not considered software?
A. Accounting applications
B. Operating systems
C. Web browsers
D. Word processors
E. Floppy discs
34. _____ Sectors are typically ____________ bytes in size.
A. 1024
B. 126
C. 256
D. 512
E. 2050
35. _____ One should not search for visible data in which of the following?
A. Quicken
B. Temporary files
C. Swab files
D. Windows
E. Unallocated spaces
13
Copyright © Texas Education Agency, 2012. All rights reserved.
Computer Forensics Exam Key
1. P
2. O
3. R
4. L
5. T
6. U
7. N
8. Q
9. S
10. B
11. A
12. C
13. E
14. D
15. H
16. J
17. G
18. F
19. I
20. M
21. K
22. E
23. D
24. C
25. A
26. C
27. B
28. B
29. E
30. E
31. D
32. A
33. E
34. D
35. E
14
Copyright © Texas Education Agency, 2012. All rights reserved.
Name_______________________________
Date________________
Group Evaluation
Group 1
Did the group take the assignment seriously?
No
1
2
3
4
5
6
7
8
9
Yes
10
Could you tell what the group was trying to portray?
No
1
2
3
4
5
6
7
8
9
Yes
10
9
Yes
10
9
Yes
10
Was the group portrayal creative?
No
1
2
3
4
5
6
7
Did the group include the correct elements?
No
1
2
3
4
5
6
7
8
8
Would you like to see this group demonstrate their talent for you in the future?
No
Yes
1
2
3
4
5
6
7
8
9
10
Total Score_______
Group 2
Did the group take the assignment seriously?
No
1
2
3
4
5
6
7
8
Could you tell what the group was trying to portray?
No
1
2
3
4
5
6
7
8
Was the group portrayal creative?
No
1
2
3
4
5
6
7
Did the group include the correct elements?
No
1
2
3
4
5
6
7
8
8
9
Yes
10
9
Yes
10
9
Yes
10
9
Yes
10
Would you like to see this group demonstrate their talent for you in the future?
No
Yes
1
2
3
4
5
6
7
8
9
10
Total Score_______
15
Copyright © Texas Education Agency, 2012. All rights reserved.
Group 3
Did the group take the assignment seriously?
No
1
2
3
4
5
6
7
8
9
Yes
10
Could you tell what the group was trying to portray?
No
1
2
3
4
5
6
7
8
9
Yes
10
Was the group portrayal creative?
No
1
2
3
4
5
6
8
9
Yes
10
8
9
Yes
10
7
Did the group include the correct elements?
No
1
2
3
4
5
6
7
Would you like to see this group demonstrate their talent for you in the future?
No
Yes
1
2
3
4
5
6
7
8
9
10
Total Score_______
Group 4
Did the group take the assignment seriously?
No
1
2
3
4
5
6
7
8
9
Yes
10
Could you tell what the group was trying to portray?
No
1
2
3
4
5
6
7
8
9
Yes
10
Was the group portrayal creative?
No
1
2
3
4
5
6
8
9
Yes
10
8
9
Yes
10
7
Did the group include the correct elements?
No
1
2
3
4
5
6
7
Would you like to see this group demonstrate their talent for you in the future?
No
Yes
1
2
3
4
5
6
7
8
9
10
Total Score_______
16
Copyright © Texas Education Agency, 2012. All rights reserved.
Group 5
Did the group take the assignment seriously?
No
1
2
3
4
5
6
7
8
9
Yes
10
Could you tell what the group was trying to portray?
No
1
2
3
4
5
6
7
8
9
Yes
10
Was the group portrayal creative?
No
1
2
3
4
5
6
8
9
Yes
10
8
9
Yes
10
7
Did the group include the correct elements?
No
1
2
3
4
5
6
7
Would you like to see this group demonstrate their talent for you in the future?
No
Yes
1
2
3
4
5
6
7
8
9
10
Total Score_______
Group 6
Did the group take the assignment seriously?
No
1
2
3
4
5
6
7
8
9
Yes
10
Could you tell what the group was trying to portray?
No
1
2
3
4
5
6
7
8
9
Yes
10
Was the group portrayal creative?
No
1
2
3
4
5
6
8
9
Yes
10
8
9
Yes
10
7
Did the group include the correct elements?
No
1
2
3
4
5
6
7
Would you like to see this group demonstrate their talent for you in the future?
No
Yes
1
2
3
4
5
6
7
8
9
10
Total Score_______
17
Copyright © Texas Education Agency, 2012. All rights reserved.
Your Name___________________________________ Your Group Number_______
Peer Evaluation
1) Name of Student________________________________________
At what level of seriousness did they take this activity?
Not Very Serious
Very Serious
0
1
2
3
4
Did they make a significant contribution to the brainstorming process?
No
Yes
0
1
2
3
4
Did they make a significant contribution to preparing for the activity?
No
Yes
0
1
2
3
4
What was the level of their participation in the activity(s)?
None
A Lot
0
1
2
3
4
Would you want to work with this person in a group again based on
their level of productivity?
No
Yes
0
1
2
3
4
Total Score_______
2) Name of Student________________________________________
At what level of seriousness did they take this activity?
Not Very Serious
Very Serious
0
1
2
3
4
Did they make a significant contribution to the brainstorming process?
No
Yes
0
1
2
3
4
Did they make a significant contribution to preparing for the activity?
No
Yes
0
1
2
3
4
What was the level of their participation in the activity(s)?
None
A Lot
0
1
2
3
4
Would you want to work with this person in a group again based on
their level of productivity?
No
Yes
0
1
2
3
4
Total Score_______
18
Copyright © Texas Education Agency, 2012. All rights reserved.
3) Name of Student________________________________________
At what level of seriousness did they take this activity?
Not Very Serious
Very Serious
0
1
2
3
4
Did they make a significant contribution to the brainstorming process?
No
Yes
0
1
2
3
4
Did they make a significant contribution to preparing for the activity?
No
Yes
0
1
2
3
4
What was the level of their participation in the activity(s)?
None
A Lot
0
1
2
3
4
Would you want to work with this person in a group again based on
their level of productivity?
No
Yes
0
1
2
3
4
Total Score_______
4) Name of Student________________________________________
At what level of seriousness did they take this activity?
Not Very Serious
Very Serious
0
1
2
3
4
Did they make a significant contribution to the brainstorming process?
No
Yes
0
1
2
3
4
Did they make a significant contribution to preparing for the activity?
No
Yes
0
1
2
3
4
What was the level of their participation in the activity(s)?
None
A Lot
0
1
2
3
4
Would you want to work with this person in a group again based on
their level of productivity?
No
Yes
0
1
2
3
4
Total Score_______
19
Copyright © Texas Education Agency, 2012. All rights reserved.
5) Name of Student________________________________________
At what level of seriousness did they take this activity?
Not Very Serious
Very Serious
0
1
2
3
4
Did they make a significant contribution to the brainstorming process?
No
Yes
0
1
2
3
4
Did they make a significant contribution to preparing for the activity?
No
Yes
0
1
2
3
4
What was the level of their participation in the activity(s)?
None
A Lot
0
1
2
3
4
Would you want to work with this person in a group again based on
their level of productivity?
No
Yes
0
1
2
3
4
Total Score_______
6) Name of Student________________________________________
At what level of seriousness did they take this activity?
Not Very Serious
Very Serious
0
1
2
3
4
Did they make a significant contribution to the brainstorming process?
No
Yes
0
1
2
3
4
Did they make a significant contribution to preparing for the activity?
No
Yes
0
1
2
3
4
What was the level of their participation in the activity(s)?
None
A Lot
0
1
2
3
4
Would you want to work with this person in a group again based on
their level of productivity?
No
Yes
0
1
2
3
4
Total Score_______
20
Copyright © Texas Education Agency, 2012. All rights reserved.
Name_______________________________________
Date_______________________________
Discussion Rubric
Objectives
4 pts.
Excellent
3 pts.
Good
2 pts. Needs Some
Improvement
1 pt. Needs Much
Improvement
N/A
Pts.
Participates in group discussion
Encourages others to join the
conversation
Keeps the discussion progressing
to achieve goals
Shares thoughts actively while
offering helpful recommendations to
others
Gives credit to others for their ideas
Respects the opinions of others
Involves others by asking questions
or requesting input
Expresses thoughts and ideas
clearly and effectively
Total Points (32 pts.)
Comments:
21
Copyright © Texas Education Agency, 2012. All rights reserved.
Name______________________________________
Date_______________________________________
Individual Work Rubric
4 pts.
Excellent
Objectives
3 pts.
Good
2 pts. Needs Some
Improvement
1 pt. Needs Much
Improvement
N/A
Pts.
Follows directions
Student completed the work as directed,
following the directions given, in order and to the
level of quality indicated
Time management
Student used time wisely and remained on task
100% of the time
Organization
Student kept notes and materials in a neat,
legible, and organized manner. Information was
readily retrieved
Evidence of learning
Student documented information in his or her
own words and can accurately answer questions
related to the information retrieved
*Research/Gathering information (if relevant)
Student used a variety of methods and sources
to gather information. Student took notes while
gathering information
Total Points (20 pts.)
Comments:
22
Copyright © Texas Education Agency, 2012. All rights reserved.
Name:____________________________________
Date:_____________________________
Presentation Rubric
Objectives
4 pts.
Excellent
3 pts.
Good
2 pts. Needs Some
Improvement
1 pt. Needs Much
Improvement
N/A
Pts.
Topic/Content
 Topic discussed completely and in-depth
 Includes properly cited sources (if used)
Creativity/Neatness
 Integrates a variety of multimedia effects to
create a professional presentation (transition
and graphics) or appropriate visual aid used
 Title slide, table of contents, bibliography are
included, using acceptable format
Mechanics
 Grammar, spelling, punctuation, and
capitalization are correct
 Image and font size are legible to the entire
audience
Oral Presentation
 Communicates with enthusiasm and eye
contact
 Voice delivery and projection are dynamic
and audible
Audience Interaction
 Presentation holds audience’s attention and
relates a clear message
 Clearly and effectively communicates the
content throughout the presentation
Total Points (20 pts.)
Comments:
23
Copyright © Texas Education Agency, 2012. All rights reserved.
Name______________________________________
Date_______________________________________
Research Rubric
4 pts.
Excellent
Objectives
3 pts.
Good
2 pts. Needs Some
Improvement
1 pt. Needs Much
Improvement
N/A
Pts.
Question/goal
Student identified and communicated a question
or goal of the research
Research/Gathering information (if relevant)
Student used a variety of methods and sources
to gather information. Student took notes while
gathering information
Conclusion/Summary
Student drew insightful conclusions and
observations from the information gathered.
Information is organized in a logical manner
Communication
Student communicated the information gathered
and summary or conclusions persuasively.
Student demonstrated skill in the use of media
used to communicate the results of research
Reflection
Student reflected on the importance of the
research and its potential application
Total Points (20 pts.)
Comments:
24
Copyright © Texas Education Agency, 2012. All rights reserved.
Download