0% found this document useful (0 votes)
48 views54 pages

CH 01

Uploaded by

mumairs3636
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views54 pages

CH 01

Uploaded by

mumairs3636
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 54

GUIDE TO COMPUTER FORENSICS AND

INVESTIGATIONS
6TH EDITION
CHAPTER 1
UNDERSTANDING THE DIGITAL FORENSICS PROFESSION AND INVESTIGATIONS
Digital Forensics is the application of
computer science and
investigative procedures for a
legal purpose involving the
analysis of digital evidence
(information of probative value that is

DIGITAL stored or transmitted in binary form)


after proper search authority, chain
of custody, validation with

FORENSIC mathematics (hash function), use


of validated tools, repeatability,
reporting and possible expert
presentation.
(The former director of the Defense
Computer Forensics Laboratory, Ken
Zatyko).
DIGITAL FORENSIC (NIST’S DEFINITION)

 “The application of science to the


identification, collection, examination,
and analysis of data while preserving the
integrity of the information and
maintaining a strict chain of custody for
the data.”
 NIST SP800-86 (Guide to Integrating
Forensic
Techniques into Incident Response)
https://csrc.nist.gov/publications/detail/sp/8
00-86/final
DIGITAL
FORENSICS
STANDARDS
ISO 27037

 “Information technology — Security


techniques — Guidelines for
identification, collection, acquisition and
preservation of digital evidence”
www.iso.org/standard/44381.html
CART

 FBI Computer Analysis and Response


Team (CART)
 Formed in 1984 to handle the increasing
number of cases involving digital
evidence

https://www2.fbi.gov/hq/lab/org/cart.htm
DIGITAL FORENSICS
VS. OTHER RELATED
DISCIPLINES
DIGITAL FORENSICS VS NETWORK FORENSICS
 Network Forensics
 yields information about how attackers gain access
 Digital Forensics: to a network along with files they might have
 copied
 investigate data that can be retrieved  examined
from a  or tampered with
computer’s hard drive or other storage  examiners use log files to determine:
media  when users logged on
 information retrieved might already be  which URLs users accessed
on the drive, but it might not be easy to  how they logged on to
find or decipher the network
 and from what location.
 Determines:
 what tracks or new files were left behind on a victim’s
computer
 what changes were made
DIGITAL FORENSICS VS DATA RECOVERY

 Digital forensics is the task of recovering  Data recovery involves retrieving


data that users have hidden or deleted, information that was deleted by mistake
with the goal of ensuring that the or lost during a power surge or server
recovered data is valid so that it can be crash
used as evidence  In data recovery you know what you’re
 In digital forensics you are looking for any looking for
possible evidence
DIGITAL FORENSICS VS DISASTER RECOVERY

 Task of recovering data that users have


hidden or deleted and using it as  For disaster recovery investigator uses
evidence digital forensics techniques to retrieve
 Evidence can be inculpatory information their clients have lost
(“incriminating”) or exculpatory
DIGITAL
INVESTIGATION
 Investigators often work as
a team to make computers
and networks secure in an
organization
 Each side of the triad in
represents a group or
department responsible for
performing the associated
tasks
 The digital investigations
group manages
investigations and conducts
forensics analysis of
systems suspected of:
 containing evidence related
to an incident or a crime
BRIEF
HISTORY OF
DIGITAL
FORENSICS
HISTORY OF DIGITAL FORENSICS (1/6)

 By the 1970s, electronic crimes were increasing, especially in the financial sector
 Most law enforcement officers didn’t know enough about computers to ask the right questions
 Or to preserve evidence for trial
 One-half cent crime

 1980s
 PCs gained popularity and different OSs emerged
 Disk Operating System (DOS) was available
 Forensics tools were simple, and most were generated by government agencies
HISTORY OF DIGITAL FORENSICS (2/6)

 Mid-1980s
 Xtree Gold appeared on the market
 Recognized file types and retrieved lost or deleted files
 Norton DiskEdit soon followed
 And became the best tool for finding deleted file

 1987
 Apple produced the Mac SE
 A Macintosh with an external EasyDrive hard disk with 60 MB of storage
HISTORY OF DIGITAL FORENSICS (3/6)
HISTORY OF DIGITAL FORENSICS (4/6)

 Early 1990s
 Tools for computer forensics were available
 International Association of Computer Investigative Specialists (IACIS)
 Training on software for forensics investigations
 IRS created search-warrant programs
 ExpertWitness for the Macintosh
 First commercial GUI software for computer forensics
 Created by ASR Data
HISTORY OF DIGITAL FORENSICS (156)

 Early 1990s (continued)


 ExpertWitness for the Macintosh
 Recovers deleted files and fragments of deleted files
 Later one partner of ASR left and developed EnCase
 Large hard disks posed problems for investigators
HISTORY OF DIGITAL FORENSICS (6/6)

 Now
 iLook
 Maintained by the IRS, limited to law enforcement
 Can analyze and read special files that are copies of the disk
 EnCase
 Available for public or private use
 AccessData Forensic Toolkit (FTK)
 Available for public or private use (Most Popular)
LAWS AND
RESOURCES
CASE LAW

 Technology is evolving at an exponential pace


 Existing laws and statutes can’t keep up change

 Case law used when statutes or regulations don’t exist

 Case law allows legal counsel to use previous cases similar to the current one
 Because the laws don’t yet exist

 Each case is evaluated on its own merit and issues


DEVELOPING DIGITAL FORENSICS RESOURCES

 You must know more than one computing platform


 Such as DOS, Windows 9x, Linux, Macintosh, and current Windows platforms/
Mobile OS’s

 Join as many computer user groups as you can

 Computer Technology Investigators Network (CTIN)


 Meets monthly to discuss problems that law enforcement and corporations face
PREPARING FOR
DIGITAL
INVESTIGATION
S
DIGITAL
INVESTIGATIONS (1/2)
 Digital investigations
and forensics falls into
two distinct categories
 Public investigations
 Private or corporate
investigations
DIGITAL INVESTIGATIONS (2/2)

 Private or corporate investigations


 Deal with private companies, non-law-enforcement
 Public investigations government agencies, and lawyers
 Aren’t governed directly by criminal law or Fourth
 Involve government agencies Amendment issues
responsible for criminal  Governed by internal policies that define expected

investigations and prosecution employee behavior and conduct in the workplace

 Organizations must observe legal


 Private corporate investigations also involve
guidelines litigation disputes

 Investigations are usually conducted in civil


cases
LAW
ENFORCEMENT
AGENCY
INVESTIGATION
S
UNDERSTANDING LAW ENFORCEMENT AGENCY
INVESTIGATIONS (1/4)

 In a criminal case, a suspect is tried for a criminal offense


 Such as burglary, murder, molestation or fraud
 Digital Involvement/Questions

 Computers and networks are sometimes only tools that can be used to commit
crimes
 Not different then lockpick in a burglar case
 Many states have added specific language to criminal codes to define crimes involving computers,
such as theft of computer data

 Following the legal process


FOLLOWING LEGAL
PROCESS (1/3)

 Legal processes depend


on local custom,
legislative standards,
and rules of evidence
 Criminal case follows
three stages
 The complaint, the
investigation, and
the prosecution
FOLLOWING LEGAL PROCESS (2/3)

 A criminal case begins when someone finds evidence of an illegal act


 Complainant makes an allegation, an accusation or supposition of fact
 A police officer interviews the complainant and writes a report about the crime
 Police blotter provides a record of clues to crimes that have been
committed previously
 Investigators delegate, collect, and process the information related to the
complaint
 After you build a case, the information is turned over to the prosecutor
 In a criminal case, if you have enough info to support a search warrant, the
attorney might ask you to submit an affidavit
FOLLOWING LEGAL PROCESS (3/3)

 Affidavit
 Sworn statement of support of facts about or evidence of a crime
 Submitted to a judge to request a search warrant
 Have the affidavit notarized under sworn oath

 Judge must approve and sign a search warrant


 Before you can use it to collect evidence
CORPORATE
INVESTIGATION
S
UNDERSTANDING PRIVATE SECTOR INVESTIGATIONS

 Private or corporate investigations


 Involve private companies and lawyers who address company policy violations and litigation
disputes

 Corporate computer crimes can involve:


 E-mail harassment
 Falsification of data
 Gender and age discrimination
 Embezzlement
 Sabotage
 Industrial espionage
HOW TO REDUCE THE RISK OF LITIGATION ? (1/5)

 Establishing company policies


 One way to avoid litigation is to publish and maintain policies that employees find
easy to read and follow

 Published company policies provide a line of authority


 For a business to conduct internal investigations

 Well-defined policies
 Give computer investigators and forensic examiners the authority to conduct an
investigation
HOW TO REDUCE THE
RISK OF LITIGATION ? (2/5)
 Displaying Warning Banners
 Another way to avoid litigation
 Warning banner
 Usually appears when a computer starts or
connects to the company intranet, network, or
virtual private network
 Informs end users that the organization
reserves the right to inspect computer systems
and network traffic at will
 Establishes the right to conduct an
investigation
 Removes expectation of privacy

 As a corporate computer investigator


 Make sure company displays well-defined
warning banner
HOW TO REDUCE THE RISK OF LITIGATION ? (3/5)

 Designating an authorized requester


 Authorized requester has the power to conduct investigations
 Policy should be defined by executive management
 Groups that should have direct authority to request computer investigations
 Corporate Security Investigations
 Corporate Ethics Office
 Corporate Equal Employment Opportunity Office
 Internal Auditing
 The general counsel or Legal Department
HOW TO REDUCE THE RISK OF LITIGATION ? (4/5)

 Conducting security investigations


 Types of situations
 Abuse or misuse of corporate assets
 E-mail abuse
 Internet abuse

 Be sure to distinguish between a company’s abuse problems and potential


criminal problems
HOW TO REDUCE THE RISK OF LITIGATION ? (5/5)

 Distinguishing personal and company property


 Many company policies distinguish between personal and company computer
property

 One area that’s difficult to distinguish involves PDAs, cell phones, and personal
notebook computers

 The safe policy is to not allow any personally owned devices to be connected to
company-owned resources
 Limiting the possibility of commingling personal and company data
PREPARING
DIGITAL
FORENSIC
INVESTIGATIO
N
SYSTEMATIC APPROACH
 When preparing a case, you can apply standard systems
analysis steps :
 Make an initial assessment about the type of case
you’re investigating
 Determine a preliminary design or approach to the
case
 Create a detailed checklist
 Determine the resources you need
 Obtain and copy an evidence drive
 Identify the risks
 Mitigate or minimize the risks
 Test the design
 Analyze and recover the digital evidence
 Investigate the data you recover
 Complete the case report
 Critique the case
EXAMPLE (DIGITAL
FORENSICS CASE 1)
Manager Steve Billings has been receiving
complaints from customers about the job
performance of one of his sales representatives,
George Montgomery. George has worked as a
representative for several years. He’s been absent
from work for two days but hasn’t called in sick or
told anyone why he wouldn’t be at work. Another
employee, Martha, is also missing and hasn’t
informed anyone of the reason for her absence.
Steve asks the IT Department to confiscate
George’s hard drive and all storage media in his
work area. He wants to know whether any
information on George’s computer and storage
media might offer a clue to his whereabouts and job
performance concerns. To help determine George’s
and Martha’s whereabouts, you must take a
systematic approach to examining and analyzing
the data found on George’s desk.
SOLUTION (DIGITAL FORENSICS CASE 1) (1/5)

 Assessing the case:


 Digital investigator talked to George’s co-workers
 Learned that George has been conducting a personal business on the side using company computers
 Focus of the case has shifted to include possible employee abuse of company resources
 He can begin assessing this case as follows:
 Situation—Employee abuse of resources.
 Nature of the case—Side business conducted on the company computer.
 Specifics of the case—The employee is reportedly conducting a side business on his company computer that
involves registering domain names for clients and setting up their Web sites at local ISPs. Co-workers have
complained that he’s been spending too much time on his own business and not performing his assigned work
duties. Company policy states that all company-owned digital assets are subject to inspection by company
management at any time. Employees have no expectation of privacy when operating company computer
systems.
 Type of evidence—Small-capacity USB drive connected to a company computer.
 Known disk format—NTFS.
 Location of evidence—One USB drive recovered from the employee’s assigned computer.
SOLUTION (DIGITAL FORENSICS CASE 1) (2/5)

Abuse of Company Looking for Employee was USB drive (from


Resources evidence conducting a side George’s
business using computer)
office resources

looking for any USB drive uses


information the NTFS file
related to Web system
sites, ISPs, or
domain names
SOLUTION (DIGITAL FORENSICS CASE 1) (3/5)

Reliable digital
 Now what does investigator need? forensic tool for:
• Duplicating USB
drive
• Finding deleted and
hidden files
SOLUTION (DIGITAL FORENSICS CASE 1) (4/5)

 Planning your investigation:


 Acquire the USB drive from the IT Department, which
bagged and tagged the evidence.
 Complete an evidence form and establish a chain of  Evidence custody form (chain-of-
custody.

evidence-form):
Transport the evidence to your digital forensics' lab.
  Single-evidence form
Place the evidence in an approved secure container.
 Prepare your forensic workstation.  Multi-evidence form
 Retrieve the evidence from the secure container.
 Make a forensic copy of the evidence drive (in this case,
the USB drive).
 Return the evidence drive to the secure container.
 Process the copied evidence drive with your digital
forensics' tools.
SINGLE-
EVIDENCE
FORM
MULTI-
EVIDENCE
FORM
SOLUTION (DIGITAL FORENSICS CASE 1) (5/5)

 Securing your evidence:


 You can use large evidence bags, tape, tags, labels, and other products available from police supply
vendors or office supply stores
 Use anti-static bags
 Place computer evidence in a well-padded container
 As a standard practice, you should write your initials on the tape before applying it to the evidence
 If you transport a computer, place new disks in disk drives to reduce possible drive damage while
you’re moving it
DATA
RECOVERY
WORKSTATIONS
AND SOFTWARE
FORENSIC WORKSTATION (1/2)

 It can use the following operating systems based on the needs:


 MS-DOS 6.22
 Windows 95, 98, or Me
 Windows NT 3.5 or 4.0
 Windows 2000, XP, Vista, 7, 8, or 10
 Linux
 Mac OS X and macOS
FORENSIC WORKSTATION (2/2)

 Following S/W and H/W is must required:


A write-blocker device
Digital forensics acquisition tool
Digital forensics analysis tool
A target drive to receive the source or suspect disk data
Spare PATA and SATA ports
USB ports

 Additional useful items include the following:


 Network interface card (NIC)
 Extra USB ports
 FireWire 400/800 ports
 SCSI card
 Disk editor tool
 Text editor tool
 Graphics viewer program
 Other specialized viewing tools
 Bit-by-bit copy (also known as a “forensic copy”)
 Process is usually referred to as “acquiring an image” or
“making an image”
 A bit-stream image is the file containing the bit-stream
copy of all data on a disk or disk partition

BIT STREAM
COPIES
ANALYZING DIGITAL EVIDENCE

 Disk may contain deleted files and fragments


 The files that were deleted are still on the disk until a new file is saved to the same
physical location, overwriting the original file
 In the meantime, those files can still be retrieved
 Forensics tools such as Autopsy can retrieve deleted files for use as evidence

https://sourceforge.net/projects/autopsy/files/autopsy/4.3.0/
COMPLETING THE CASE

 At the end of findings, a report needs to be generated


 Basic report writing involves answering the six Ws: who, what, when, where, why, and how
 You must also explain computer and network processes
 Some digital forensics tools also generate a log file of all actions taken during your
examination and analysis
READING REFERENCE
MATERIAL

FUNDAMENTALS OF DIGITAL FORENSICS


THEORY, METHODS AND REAL-LIFE APPLICATIONS
2ND EDITION
CHAPTER # 1, 2
ANALYZE GEORGE
MONTGOMERY’S USB
DRIVE.
THE FIRST TASK IS TO
CONFIGURE AUTOPSY
FOR A NEW CASE AND
ANALYZE THE IMAGE
FILE OF GEORGE

LAB TASK MONTGOMERY’S USB


DRIVE

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy