SNIST Cybersecurity Unit - 2
SNIST Cybersecurity Unit - 2
Definition
What is Computer Forensics??
Computer forensics involves the preservation,
identification, extraction, documentation, and
interpretation of computer media for
evidentiary and/or root cause analysis.
Evidence might be required for a wide range
of computer crimes and misuses
Multiple methods of
Discoveringdata on computer system
Recovering deleted, encrypted, or damaged file
information
Monitoring live activity
Detecting violations of corporate policy
Information collected assists in arrests,
prosecution, termination of employment, and
preventing future illegal activity
Definition (cont)
What Constitutes Digital Evidence?
Any information being subject to human
intervention or not, that can be extracted
from a computer.
Must be in human-readable format or
capable of being interpreted by a person
with expertise in the subject.
Computer Forensics Examples
Recovering thousands of deleted emails
Performing investigation post employment
termination
Recovering evidence post formatting hard
drive
Performing investigation after multiple
users had taken over the system
History of Cyber forensics
• 1969-70 First case of pysical damage of
Computer systems In USA
• 1978 First law for Cyber crimes act
• Termed as digital or computer forensics
• Forensics means characteristics of evidence
• Forensic science – scientifically and proven
methods to study evidences
Reasons For Evidence
Wide range of computer crimes and
misuses
◦Non-Business Environment: evidence collected
by Federal, State and local authorities for crimes
relating to:
Theft of trade secrets
Fraud
Extortion
Industrial espionage
Position of pornography
SPAM investigations
Virus/Trojan distribution
Homicide investigations
Intellectual property breaches
Unauthorized use of personal information
Reasons For Evidence (cont)
Computer related crime and violations
include a range of activities including:
Business Environment:
Theftof or destruction of intellectual property
Unauthorized activity
Tracking internet browsing habits
Reconstructing Events
Inferring intentions
Selling company bandwidth
Wrongful dismissal claims
Sexual harassment
Software Piracy
Who Uses Computer Forensics?
Criminal Prosecutors
Rely on evidence obtained from a computer to
prosecute suspects and use as evidence
Civil Litigations
Personal and business data discovered on a
computer can be used in fraud, divorce,
harassment, or discrimination cases
Insurance Companies
Evidence discovered on computer can be used
to mollify costs (fraud, worker’s compensation,
arson, etc)
Private Corporations
Obtained evidence from employee computers
can be used as evidence in harassment, fraud,
and embezzlement cases
Who Uses Computer Forensics?
Law Enforcement Officials(cont)
Rely on computer forensics to backup search
warrants and post-seizure handling
Individual/Private Citizens
Obtain the services of professional computer
forensic specialists to support claims of
harassment, abuse, or wrongful termination
from employment
Role of Digital Forensics
• Uncover and record evidence
• E-Discovery
• Showing and understanding patterns of events
• Reveal end to end paths of events
• Extract data ie hidden, encrypted , deleted etc.
Typical Scenarios Involved
Emp. Internet abuse
Data leak or breach
Espionage or corporate spying
Fraud
Criminal cases
Copyright Voilation
Organizational Forensic policy
Need for Computer Forensic
Services
Convergence of new Tech./ New online Businesses
New intrusion methods by Hachers
Data culling or discovery , Comparison again known
data
Index of files , recovered files , mail indexing , meta
indexing
Transaction sequencing and history recovery
Extraction of data and cell phone forensics
Recovering deleted data files
Format conversion , pdf to .. , image .. etc
Keyword searching, log history and extarction
Network extractions and Decrypting passwords
Analyzing and comparing limited source code
Demand for deep freeze tools – E-Discovery Tools
[Cobwebs Technologies is a global leader in Web Intelligence (WEBINT) solutions]
The best computer forensics tools
• Media Analysis
• Media Mgt. Analysis- organize media, cloud eta.
• File system Analysis- Disk Partitioning , recovery
of deleted files
• Application Analysis: Application or process
specific information
• Network Analysis- Routing, raw packets analysis,
executables are examined often
• Image Analysis – Steganograhy , searching match
• Video Analysis- Review camera placement,
pictures and video content analysis
6. Reporting
• Post Analysis a report is written
• Very useful for court proceedings
• The elements of the report include :
Identity of the reporting agency
Case no. or identifier
Case investigator
Date of receipt and date of report
Description of list of item under
examination, sequence no, make and model.
Identity and signature of the examiner
Description of steps in examination ,
information kind of searches done,
recoveries of erased files.
Results/Conclusion.
7. Testifying – Post Life Cycle