SlideShare a Scribd company logo
1 of 50
Download to read offline
Module I - Computer Forensics in
Today’s World
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Scenario
Jacob, the Vice President (Sales) of a software giant located in Canada, was
responsible for the growth of the software service sector of his company.
He had a team of specialists assisting him in several assignments and
signing deals across the globe.
Rachel was a new recruit to Jacob’s specialist team; she handled client
relations. Rachel accused Jacob of demanding sexual favors in return for
her annual performance raise; she claimed that Jacob sent her a vulgar
email. Rachel lodged a complaint against Jacob at the district police
department and provided a copy of the complaint to the management of
the software giant.
The company management called in Ross, a computer forensic
investigator, to find out the truth. If found guilty, Jacob could have lost his
job and reputation, and could have faced up to three years of
imprisonment along with a fine of $15,000.
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News: Businesses Urged to Devise
Digital-Forensics Plans
Source: http://news.zdnet.co.uk/
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Objective
• Definition of Computer Forensics
• Need for Computer Forensics
• Objectives of Computer Forensics
• Benefits of Forensic Readiness
• Forensic Readiness Planning
• Cyber crime
• Types of Computer Crimes
• Key Steps in Forensic Investigation
• Need for Forensic Investigator
• Stages of Forensic Investigation in Tracking Cyber Criminals
• Enterprise Theory of Investigation (ETI)
• Legal Issues
• Reporting the Results
This module will familiarize you with:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
Need for Forensic
Investigator
Legal Issues
Enterprise Theory of
Investigation (ETI)
Reporting the Results
Stages of Forensic
Investigation in Tracking
Cyber Criminals
Need for Computer
Forensics
Definition of Computer
Forensics
Key Steps in Forensic
Investigation
Objectives of Computer
Forensics
Types of Computer
Crimes
Benefits of Forensic
Readiness
Forensic Readiness
Planning
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Computer Forensics
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Forensic Science
Definition:
• “Application of physical sciences to law in the search
for truth in civil, criminal, and social behavioral
matters to the end that injustice shall not be done to
any member of society”
Aim:
• Determining the evidential value of the crime scene
and related evidence
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Computer Forensics
“A methodical series of techniques and procedures for
gathering evidence, from computing equipment and
various storage devices and digital media, that can be
presented in a court of law in a coherent and meaningful
format”
- Dr. H.B. Wolfe
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Computer Forensics (cont’d)
“The preservation, identification, extraction, interpretation, and documentation of
computer evidence, to include the rules of evidence, legal processes, integrity of
evidence, factual reporting of the information found, and providing expert opinion
in a court of law or other legal and/or administrative proceeding as to what was
found.”
"Forensic Computing is the science of capturing, processing, and investigating
data from computers using a methodology whereby any evidence discovered is
acceptable in a Court of Law.”
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Security Incident Report
The INFORMATION SECURITY BREACHES SURVEY 2008, by PricewaterhouseCoopers (PwC)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Aspects of Organizational Security
• Application security
• Computing security
• Data security
• Information security
• Network security
IT Security
• Facilities security
• Human security
Physical Security
• Security from frauds
Financial Security
• National security
• Public security
Legal Security
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Evolution of Computer Forensics
Francis Galton (1822-1911)
• Made the first recorded study of fingerprints
Leone Lattes (1887-1954)
• Discovered blood groupings (A,B,AB, & 0)
Calvin Goddard (1891-1955)
• Allowed Firearms and bullet comparison for solving many pending court cases
Albert Osborn (1858-1946)
• Developed essential features of document examination
Hans Gross (1847-1915)
• Made use of scientific study to head criminal investigations
FBI (1932)
• A lab was set up to provide forensic services to all field agents and other law
authorities across the country
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Evolution of Computer Forensics
(cont’d)
CART (1984 )
• Computer Analysis and Response Team (CART) was developed to
provide support to FBI field offices in the search of computer
evidence
1993
• First International Conference on computer evidence was held
IOCE (1995)
• International Organization on Computer Evidence (IOCE) formed
1998
• International Forensic Science Symposium formed to provide forum
for forensic manager
2000
• First FBI Regional Computer Forensic Laboratory was established
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Objectives of Computer Forensics
To recover, analyze, and preserve computer and
related materials in such a way that it can be
presented as evidence in a court of law
To identify the evidence in short time, estimate the
potential impact of the malicious activity on the
victim, and assess the intent and identity of the
perpetrator
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Need for Computer Forensics
To ensure the overall integrity and the continued
existence of an organization’s computer system and
network infrastructure
To extract, process, and interpret the factual evidence
so that it proves the attacker’s actions in the court
To efficiently track down perpetrators from different
parts of the world
To hoard the organization’s money and valuable time
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Evidence can be gathered to act in the company's defense if subject to a lawsuit
In the event of a major incident, a fast and efficient investigation can be conducted and
corresponding actions can be followed with minimal disruption to the business
Forensic readiness can extend the target of information security to the wider threat from
cybercrime, such as intellectual property protection, fraud, or extortion
Fixed and structured approach for storage of evidence can considerably reduce the expense
and time of an internal investigation
It can improve and simplify law enforcement interface
In case of a major incident, proper and in-depth investigation can be conducted
Benefits of Forensic Readiness
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Goals of Forensic Readiness
To collect acceptable evidence without interfering the
business processes
To gather evidence targeting the potential crimes and
disputes that may adversely impact an organization
To allow an investigation to proceed at a cost in proportion
to the incident
To ensure that evidence makes a positive impact on the
outcome of any legal action
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Forensic Readiness Planning
Define the business states which need digital evidence
Identify the potential evidence available
Determine the evidence collection requirement
Decide the procedure for securely collecting the evidence that meets the
requirement in a forensically sound manner
Establish a policy for securely handling and storing the collected evidence
Ensure that the observation process is aimed to detect and prevent the important
incidents
Ensure investigative staff are capable to complete any task related to handling and
preserving the evidence
Document all the activities performed and its impact
Ensure authorized review to facilitate action in response to the incident
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Cyber Crimes
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Cyber Crime
Cyber crime is defined as “Any illegal act involving a
computer, its systems, or its applications”
The following can be categorized as cyber crime:
• Crime directed against a computer
• Crime where the computer is used as a tool to commit the crime
A cyber crime is intentional and not accidental
“Cyber crime is a term used broadly to describe criminal
activity in which computers or networks are a tool, a target,
or a place of criminal activity. These categories are not
exclusive and many activities can be characterized as falling
in one or more categories.”
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Computer Facilitated Crimes
Dependency on the computer has given way to new
crimes
Computer crimes pose new challenges for
investigators due to their:
• Speed
• Anonymity
• Fleeting nature of evidence
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Modes of Attacks
Cyber crime can be categorized into two types based on the line of
attack:
• Breach of trust from employees within the organizationInsider Attacks:
• Attackers either hired by an insider or by an external
entity to destroy the competitor’s reputation
External Attacks:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Examples of Cyber Crime
Fraud achieved by the manipulation of the computer records
Spamming wherever outlawed completely or where regulations
controlling it are violated
Deliberate circumvention of the computer security systems
Unauthorized access to or modification of programs and data
Intellectual property theft, including software piracy
Industrial espionage by means of access to or theft of computer
materials
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Examples of Cyber Crime (cont’d)
Identity theft which is accomplished by the use of fraudulent
computer transactions
Writing or spreading computer viruses or worms
Salami slicing is the practice of stealing money repeatedly in
small quantities
Denial-of-service attack, where the company’s websites are
flooded with service requests and their website is overloaded
and either slowed or is crashed completely
Making and digitally distributing child pornography
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Types of Computer Crimes
Identity Theft
Hacking
Computer Viruses
Cyber stalking
Drug Trafficking
Phishing/Spoofing
Wrongful Programming
Credit Card Fraud
On-Line Auction Fraud
Email bombing and SPAM
Theft of Intellectual Property
Denial of Service attack
Debt Elimination
Web Jacking
Internet Extortion
Investment Fraud
Escrow Services Fraud
Cyber defamation
Software piracy
Counterfeit Cashier's Check
Escrow Services Fraud
Embezzlement
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
How Serious Are Different Types
of Incidents
Information Security Breaches Survey, 2008
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Disruptive Incidents to the
Business
Information Security Breaches Survey, 2008
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Time Spent Responding to the
Security Incident
Information Security Breaches Survey, 2008
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Cost Expenditure Responding to
the Security Incident
Information Security Breaches Survey, 2008
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Cyber Crime Investigation
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Cyber Crime Investigation
The investigation of any crime involves painstaking collection of clues, forensic evidence and even more of
the white collar’ crime where documentary evidence plays a crucial role
It is inevitable that there will be at least one electronic device found during the course of an investigation
It may be a computer, printer, mobile phone, or a personal organizer
The information held on the computer may be crucial and must be investigated in the proper manner,
especially if any evidence found is to be relied upon the court of law
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Key Steps in Forensic Investigation
1
• Identify the computer crime
2
• Collect preliminary evidence
3
• Obtain court warrant for seizure (if required)
4
• Perform first responder procedures
5
• Seize evidence at the crime scene
6
• Transport them to the forensic laboratory
7
• Create two bit stream copies of the evidence
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Key Steps in Forensic
Investigation (cont’d)
8
• Generate MD5 checksum on the images
9
• Maintain a chain of custody
10
• Store the original evidence in a secure location
11
• Analyze the image copy for evidence
12
• Prepare a forensic report
13
• Submit the report to the client
14
• If required, attend the court and testify as an expert witness
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Minimize the option of examining the original evidence
Follow rules of evidence
Do not tamper with the evidence
Always prepare for a chain of custody
Handle evidence with care
Never exceed the knowledge base
Document any change in evidence
Rules of Forensic Investigation
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Need for Forensic Investigator
Examination of a computer by the technically inexperienced
person will almost result in rendering any evidence found
inadmissible in a Court of Law
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Role of Forensics Investigator
Protects the victim’s computer from any damage and
viruses
Determines the extent of damage
Gathers evidence in a forensically sound manner
Analyzes the evidence data found and protects it from
the damage
Prepares the analysis report
Presents acceptable evidence in the court
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Accessing Computer Forensic
Resources
You can obtain resources by joining various discussion
groups such as:
• Computer Technology Investigators Northwest
• High Technology Crime Investigation Association
Joining a network of computer forensic experts and
other professionals
News devoted to computer forensics can also be a
powerful resource
Other resources:
• Journals of forensic investigators
• Actual case studies
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Role of Digital Evidence
Examples of cases where digital evidence may assist the
forensic investigator in prosecution or defense of a
suspect:
• Use/abuse of the Internet
• Production of false documents and accounts
• Encrypted/password protected material
• Abuse of systems
• Email contact between suspects/conspirators
• Theft of commercial secrets
• Unauthorized transmission of information
• Records of movements
• Malicious attacks on the computer systems themselves
• Names and addresses of contacts
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Understanding Corporate
Investigations
Involve private companies who address company’s
policy violations and litigation disputes
Company procedures should continue without any
interruption from the investigation
After the investigation, the company should minimize or
eliminate similar litigations
Industrial espionage is the foremost crime in corporate
investigations
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Approach to Forensic
Investigation: A Case Study
The forensic investigator prepares the bit-stream images of the file
The forensic investigator (FI) seizes the evidence in the crime scene and transports them to
the forensics lab
The forensic investigator prepares first response of procedures (FRP)
The advocate contacts an external forensic investigator
The client contacts the company’s advocate for legal advice
An incident occurs in which the company’s server is compromised
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Approach to Forensic Investigation:
A Case Study (cont’d)
The forensic investigator usually destroys all the evidence
The advocate studies the report and might press charges against the offensive in the
Court of Law
The FI handles the sensitive report of the client in a secure manner
The FI prepares investigation reports and concludes the investigation and enables the
advocate to identify the required proofs
The forensic investigator examines the evidence files for proof of a crime
The forensic investigator creates an MD5 of the files
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
When an Advocate Contacts the Forensic
Investigator, He Specifies How to Approach
the Crime Scene
Any liabilities from the incident and how they can be managed
Finding and prosecuting/punishing (internal versus external culprits)
Legal and regulatory constraints on what action can be taken
Reputation protection and PR issues
When to advise partners, customers, and investors
How to deal with employees
Resolving commercial disputes
Any additional measures required
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Why and When do you Use
Computer Forensics
• To provide a real evidence such as reading bar codes,
magnetic tapes
• To identify the occurrence of the electronic
transactions
• To reconstruct an incidence with a sequence of
events
Why?
• If a breach of contract occurs
• If copyright and intellectual property theft/misuse
happens
• Employee’s disputes
• Damage to resources
When?
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Enterprise Theory of Investigation
(ETI)
Rather than viewing criminal acts as isolated
crimes, the ETI attempts to show that individuals
commit crimes in furtherance of the criminal
enterprise itself; which means individuals commit
criminal acts solely to benefit their criminal’s
enterprise
By applying the ETI with favorable state and
federal legislation, law enforcement can target and
dismantle entire criminal enterprises in one
criminal indictment
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Legal Issues
It is not always possible for a computer forensics expert to
separate the legal issues surrounding the evidence from the
practical aspects of the computer forensics
• Ex: The issues related to authenticity, reliability and
completeness, and convincing
The approach of investigation diverges with change in
technology
Evidence shown is to be untampered with and fully
accounted for, from the time of collection to the time of
presentation to the court; hence, it must meet the relevant
evidence laws
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Reporting the Results
• Who has access to the data?
• How could it be made available to an investigation?
• To what business processes does it relate?
Report is based on:
Report should consist of summary of conclusions,
observations, and all appropriate recommendations
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Reporting the Results (cont’d)
• Methods of investigation
• Adequate supporting data and data collection
techniques
• Calculations used
• Error analysis
• Results and comments
• Graphs and statistics
• References
• Appendices
• Acknowledgements
• Litigation support reports
A good investigation report contains:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Summary
Forensic Computing is the science of capturing, processing, and
investigating data from computers using a methodology whereby any
evidence discovered is acceptable in a Court of Law
The need for computer forensics has increased due to the presence of a
majority of the digital documents
Cyber crime is defined as any illegal act involving a computer, its
systems, or its applications
Forensics results report should consist of summary of conclusions,
observations, and all appropriate recommendations
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

More Related Content

What's hot (20)

File000176
File000176File000176
File000176
 
File000172
File000172File000172
File000172
 
File000166
File000166File000166
File000166
 
File000164
File000164File000164
File000164
 
File000163
File000163File000163
File000163
 
File000173
File000173File000173
File000173
 
File000170
File000170File000170
File000170
 
File000162
File000162File000162
File000162
 
File000171
File000171File000171
File000171
 
File000168
File000168File000168
File000168
 
Ce hv6 module 55 preventing data loss
Ce hv6 module 55 preventing data lossCe hv6 module 55 preventing data loss
Ce hv6 module 55 preventing data loss
 
File000138
File000138File000138
File000138
 
File000139
File000139File000139
File000139
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
 
CS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IVCS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IV
 
Ce hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersCe hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computers
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warez
 
Ce hv6 module 52 hacking rss and atom
Ce hv6 module 52 hacking rss and atomCe hv6 module 52 hacking rss and atom
Ce hv6 module 52 hacking rss and atom
 

Similar to File000114

Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1anilinvns
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricsMayank Diwakar
 
Latihan2 comp-forensic
Latihan2 comp-forensicLatihan2 comp-forensic
Latihan2 comp-forensicsabtolinux
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1Jinalkakadiya
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeCSCJournals
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and InvestigationNeha Raju k
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop newforensicsnation
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshopforensicsnation
 
Malware analysis
Malware analysisMalware analysis
Malware analysisAnne ndolo
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptSurajgroupsvideo
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxVaishnaviBorse8
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesBRNSSPublicationHubI
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 

Similar to File000114 (20)

CHFI.pdf
CHFI.pdfCHFI.pdf
CHFI.pdf
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
 
Latihan2 comp-forensic
Latihan2 comp-forensicLatihan2 comp-forensic
Latihan2 comp-forensic
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptx
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 

More from Desmond Devendran (20)

Siam key-facts
Siam key-factsSiam key-facts
Siam key-facts
 
Siam foundation-process-guides
Siam foundation-process-guidesSiam foundation-process-guides
Siam foundation-process-guides
 
Siam foundation-body-of-knowledge
Siam foundation-body-of-knowledgeSiam foundation-body-of-knowledge
Siam foundation-body-of-knowledge
 
Enterprise service-management-essentials
Enterprise service-management-essentialsEnterprise service-management-essentials
Enterprise service-management-essentials
 
Service Integration and Management
Service Integration and Management Service Integration and Management
Service Integration and Management
 
Diagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_enDiagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_en
 
CHFI 1
CHFI 1CHFI 1
CHFI 1
 
File000175
File000175File000175
File000175
 
File000174
File000174File000174
File000174
 
File000169
File000169File000169
File000169
 
File000167
File000167File000167
File000167
 
File000165
File000165File000165
File000165
 
File000161
File000161File000161
File000161
 
File000160
File000160File000160
File000160
 
File000159
File000159File000159
File000159
 
File000158
File000158File000158
File000158
 
File000157
File000157File000157
File000157
 
File000156
File000156File000156
File000156
 
File000155
File000155File000155
File000155
 
File000154
File000154File000154
File000154
 

Recently uploaded

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Recently uploaded (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

File000114

  • 1. Module I - Computer Forensics in Today’s World
  • 2. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Scenario Jacob, the Vice President (Sales) of a software giant located in Canada, was responsible for the growth of the software service sector of his company. He had a team of specialists assisting him in several assignments and signing deals across the globe. Rachel was a new recruit to Jacob’s specialist team; she handled client relations. Rachel accused Jacob of demanding sexual favors in return for her annual performance raise; she claimed that Jacob sent her a vulgar email. Rachel lodged a complaint against Jacob at the district police department and provided a copy of the complaint to the management of the software giant. The company management called in Ross, a computer forensic investigator, to find out the truth. If found guilty, Jacob could have lost his job and reputation, and could have faced up to three years of imprisonment along with a fine of $15,000.
  • 3. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited News: Businesses Urged to Devise Digital-Forensics Plans Source: http://news.zdnet.co.uk/
  • 4. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Objective • Definition of Computer Forensics • Need for Computer Forensics • Objectives of Computer Forensics • Benefits of Forensic Readiness • Forensic Readiness Planning • Cyber crime • Types of Computer Crimes • Key Steps in Forensic Investigation • Need for Forensic Investigator • Stages of Forensic Investigation in Tracking Cyber Criminals • Enterprise Theory of Investigation (ETI) • Legal Issues • Reporting the Results This module will familiarize you with:
  • 5. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Flow Need for Forensic Investigator Legal Issues Enterprise Theory of Investigation (ETI) Reporting the Results Stages of Forensic Investigation in Tracking Cyber Criminals Need for Computer Forensics Definition of Computer Forensics Key Steps in Forensic Investigation Objectives of Computer Forensics Types of Computer Crimes Benefits of Forensic Readiness Forensic Readiness Planning
  • 6. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Computer Forensics
  • 7. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Forensic Science Definition: • “Application of physical sciences to law in the search for truth in civil, criminal, and social behavioral matters to the end that injustice shall not be done to any member of society” Aim: • Determining the evidential value of the crime scene and related evidence
  • 8. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Computer Forensics “A methodical series of techniques and procedures for gathering evidence, from computing equipment and various storage devices and digital media, that can be presented in a court of law in a coherent and meaningful format” - Dr. H.B. Wolfe
  • 9. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Computer Forensics (cont’d) “The preservation, identification, extraction, interpretation, and documentation of computer evidence, to include the rules of evidence, legal processes, integrity of evidence, factual reporting of the information found, and providing expert opinion in a court of law or other legal and/or administrative proceeding as to what was found.” "Forensic Computing is the science of capturing, processing, and investigating data from computers using a methodology whereby any evidence discovered is acceptable in a Court of Law.”
  • 10. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Security Incident Report The INFORMATION SECURITY BREACHES SURVEY 2008, by PricewaterhouseCoopers (PwC)
  • 11. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Aspects of Organizational Security • Application security • Computing security • Data security • Information security • Network security IT Security • Facilities security • Human security Physical Security • Security from frauds Financial Security • National security • Public security Legal Security
  • 12. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Evolution of Computer Forensics Francis Galton (1822-1911) • Made the first recorded study of fingerprints Leone Lattes (1887-1954) • Discovered blood groupings (A,B,AB, & 0) Calvin Goddard (1891-1955) • Allowed Firearms and bullet comparison for solving many pending court cases Albert Osborn (1858-1946) • Developed essential features of document examination Hans Gross (1847-1915) • Made use of scientific study to head criminal investigations FBI (1932) • A lab was set up to provide forensic services to all field agents and other law authorities across the country
  • 13. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Evolution of Computer Forensics (cont’d) CART (1984 ) • Computer Analysis and Response Team (CART) was developed to provide support to FBI field offices in the search of computer evidence 1993 • First International Conference on computer evidence was held IOCE (1995) • International Organization on Computer Evidence (IOCE) formed 1998 • International Forensic Science Symposium formed to provide forum for forensic manager 2000 • First FBI Regional Computer Forensic Laboratory was established
  • 14. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Objectives of Computer Forensics To recover, analyze, and preserve computer and related materials in such a way that it can be presented as evidence in a court of law To identify the evidence in short time, estimate the potential impact of the malicious activity on the victim, and assess the intent and identity of the perpetrator
  • 15. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Need for Computer Forensics To ensure the overall integrity and the continued existence of an organization’s computer system and network infrastructure To extract, process, and interpret the factual evidence so that it proves the attacker’s actions in the court To efficiently track down perpetrators from different parts of the world To hoard the organization’s money and valuable time
  • 16. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Evidence can be gathered to act in the company's defense if subject to a lawsuit In the event of a major incident, a fast and efficient investigation can be conducted and corresponding actions can be followed with minimal disruption to the business Forensic readiness can extend the target of information security to the wider threat from cybercrime, such as intellectual property protection, fraud, or extortion Fixed and structured approach for storage of evidence can considerably reduce the expense and time of an internal investigation It can improve and simplify law enforcement interface In case of a major incident, proper and in-depth investigation can be conducted Benefits of Forensic Readiness
  • 17. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Goals of Forensic Readiness To collect acceptable evidence without interfering the business processes To gather evidence targeting the potential crimes and disputes that may adversely impact an organization To allow an investigation to proceed at a cost in proportion to the incident To ensure that evidence makes a positive impact on the outcome of any legal action
  • 18. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Forensic Readiness Planning Define the business states which need digital evidence Identify the potential evidence available Determine the evidence collection requirement Decide the procedure for securely collecting the evidence that meets the requirement in a forensically sound manner Establish a policy for securely handling and storing the collected evidence Ensure that the observation process is aimed to detect and prevent the important incidents Ensure investigative staff are capable to complete any task related to handling and preserving the evidence Document all the activities performed and its impact Ensure authorized review to facilitate action in response to the incident
  • 19. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Cyber Crimes
  • 20. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Cyber Crime Cyber crime is defined as “Any illegal act involving a computer, its systems, or its applications” The following can be categorized as cyber crime: • Crime directed against a computer • Crime where the computer is used as a tool to commit the crime A cyber crime is intentional and not accidental “Cyber crime is a term used broadly to describe criminal activity in which computers or networks are a tool, a target, or a place of criminal activity. These categories are not exclusive and many activities can be characterized as falling in one or more categories.”
  • 21. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Computer Facilitated Crimes Dependency on the computer has given way to new crimes Computer crimes pose new challenges for investigators due to their: • Speed • Anonymity • Fleeting nature of evidence
  • 22. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Modes of Attacks Cyber crime can be categorized into two types based on the line of attack: • Breach of trust from employees within the organizationInsider Attacks: • Attackers either hired by an insider or by an external entity to destroy the competitor’s reputation External Attacks:
  • 23. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Examples of Cyber Crime Fraud achieved by the manipulation of the computer records Spamming wherever outlawed completely or where regulations controlling it are violated Deliberate circumvention of the computer security systems Unauthorized access to or modification of programs and data Intellectual property theft, including software piracy Industrial espionage by means of access to or theft of computer materials
  • 24. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Examples of Cyber Crime (cont’d) Identity theft which is accomplished by the use of fraudulent computer transactions Writing or spreading computer viruses or worms Salami slicing is the practice of stealing money repeatedly in small quantities Denial-of-service attack, where the company’s websites are flooded with service requests and their website is overloaded and either slowed or is crashed completely Making and digitally distributing child pornography
  • 25. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Types of Computer Crimes Identity Theft Hacking Computer Viruses Cyber stalking Drug Trafficking Phishing/Spoofing Wrongful Programming Credit Card Fraud On-Line Auction Fraud Email bombing and SPAM Theft of Intellectual Property Denial of Service attack Debt Elimination Web Jacking Internet Extortion Investment Fraud Escrow Services Fraud Cyber defamation Software piracy Counterfeit Cashier's Check Escrow Services Fraud Embezzlement
  • 26. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited How Serious Are Different Types of Incidents Information Security Breaches Survey, 2008
  • 27. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Disruptive Incidents to the Business Information Security Breaches Survey, 2008
  • 28. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Time Spent Responding to the Security Incident Information Security Breaches Survey, 2008
  • 29. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Cost Expenditure Responding to the Security Incident Information Security Breaches Survey, 2008
  • 30. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Cyber Crime Investigation
  • 31. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Cyber Crime Investigation The investigation of any crime involves painstaking collection of clues, forensic evidence and even more of the white collar’ crime where documentary evidence plays a crucial role It is inevitable that there will be at least one electronic device found during the course of an investigation It may be a computer, printer, mobile phone, or a personal organizer The information held on the computer may be crucial and must be investigated in the proper manner, especially if any evidence found is to be relied upon the court of law
  • 32. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Key Steps in Forensic Investigation 1 • Identify the computer crime 2 • Collect preliminary evidence 3 • Obtain court warrant for seizure (if required) 4 • Perform first responder procedures 5 • Seize evidence at the crime scene 6 • Transport them to the forensic laboratory 7 • Create two bit stream copies of the evidence
  • 33. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Key Steps in Forensic Investigation (cont’d) 8 • Generate MD5 checksum on the images 9 • Maintain a chain of custody 10 • Store the original evidence in a secure location 11 • Analyze the image copy for evidence 12 • Prepare a forensic report 13 • Submit the report to the client 14 • If required, attend the court and testify as an expert witness
  • 34. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Minimize the option of examining the original evidence Follow rules of evidence Do not tamper with the evidence Always prepare for a chain of custody Handle evidence with care Never exceed the knowledge base Document any change in evidence Rules of Forensic Investigation
  • 35. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Need for Forensic Investigator Examination of a computer by the technically inexperienced person will almost result in rendering any evidence found inadmissible in a Court of Law
  • 36. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Role of Forensics Investigator Protects the victim’s computer from any damage and viruses Determines the extent of damage Gathers evidence in a forensically sound manner Analyzes the evidence data found and protects it from the damage Prepares the analysis report Presents acceptable evidence in the court
  • 37. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Accessing Computer Forensic Resources You can obtain resources by joining various discussion groups such as: • Computer Technology Investigators Northwest • High Technology Crime Investigation Association Joining a network of computer forensic experts and other professionals News devoted to computer forensics can also be a powerful resource Other resources: • Journals of forensic investigators • Actual case studies
  • 38. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Role of Digital Evidence Examples of cases where digital evidence may assist the forensic investigator in prosecution or defense of a suspect: • Use/abuse of the Internet • Production of false documents and accounts • Encrypted/password protected material • Abuse of systems • Email contact between suspects/conspirators • Theft of commercial secrets • Unauthorized transmission of information • Records of movements • Malicious attacks on the computer systems themselves • Names and addresses of contacts
  • 39. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Understanding Corporate Investigations Involve private companies who address company’s policy violations and litigation disputes Company procedures should continue without any interruption from the investigation After the investigation, the company should minimize or eliminate similar litigations Industrial espionage is the foremost crime in corporate investigations
  • 40. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Approach to Forensic Investigation: A Case Study The forensic investigator prepares the bit-stream images of the file The forensic investigator (FI) seizes the evidence in the crime scene and transports them to the forensics lab The forensic investigator prepares first response of procedures (FRP) The advocate contacts an external forensic investigator The client contacts the company’s advocate for legal advice An incident occurs in which the company’s server is compromised
  • 41. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Approach to Forensic Investigation: A Case Study (cont’d) The forensic investigator usually destroys all the evidence The advocate studies the report and might press charges against the offensive in the Court of Law The FI handles the sensitive report of the client in a secure manner The FI prepares investigation reports and concludes the investigation and enables the advocate to identify the required proofs The forensic investigator examines the evidence files for proof of a crime The forensic investigator creates an MD5 of the files
  • 42. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited When an Advocate Contacts the Forensic Investigator, He Specifies How to Approach the Crime Scene Any liabilities from the incident and how they can be managed Finding and prosecuting/punishing (internal versus external culprits) Legal and regulatory constraints on what action can be taken Reputation protection and PR issues When to advise partners, customers, and investors How to deal with employees Resolving commercial disputes Any additional measures required
  • 43. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Why and When do you Use Computer Forensics • To provide a real evidence such as reading bar codes, magnetic tapes • To identify the occurrence of the electronic transactions • To reconstruct an incidence with a sequence of events Why? • If a breach of contract occurs • If copyright and intellectual property theft/misuse happens • Employee’s disputes • Damage to resources When?
  • 44. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Enterprise Theory of Investigation (ETI) Rather than viewing criminal acts as isolated crimes, the ETI attempts to show that individuals commit crimes in furtherance of the criminal enterprise itself; which means individuals commit criminal acts solely to benefit their criminal’s enterprise By applying the ETI with favorable state and federal legislation, law enforcement can target and dismantle entire criminal enterprises in one criminal indictment
  • 45. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Legal Issues It is not always possible for a computer forensics expert to separate the legal issues surrounding the evidence from the practical aspects of the computer forensics • Ex: The issues related to authenticity, reliability and completeness, and convincing The approach of investigation diverges with change in technology Evidence shown is to be untampered with and fully accounted for, from the time of collection to the time of presentation to the court; hence, it must meet the relevant evidence laws
  • 46. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Reporting the Results • Who has access to the data? • How could it be made available to an investigation? • To what business processes does it relate? Report is based on: Report should consist of summary of conclusions, observations, and all appropriate recommendations
  • 47. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Reporting the Results (cont’d) • Methods of investigation • Adequate supporting data and data collection techniques • Calculations used • Error analysis • Results and comments • Graphs and statistics • References • Appendices • Acknowledgements • Litigation support reports A good investigation report contains:
  • 48. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Summary Forensic Computing is the science of capturing, processing, and investigating data from computers using a methodology whereby any evidence discovered is acceptable in a Court of Law The need for computer forensics has increased due to the presence of a majority of the digital documents Cyber crime is defined as any illegal act involving a computer, its systems, or its applications Forensics results report should consist of summary of conclusions, observations, and all appropriate recommendations
  • 49. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 50. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited