01 computer%20 forensics%20in%20todays%20world


Published on

Published in: Technology, Education
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

01 computer%20 forensics%20in%20todays%20world

  1. 1. SAK 4801 SPECIAL TOPICS IN COMPUER SCIENCE II Chapter 1 Computer Forensics in Today’s World Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science and Information Technology University Putra of Malaysia Room No: 2.28 Portions of the material courtesy EC-Council
  2. 2. Computer Forensics and Investigations
  3. 3. Learning Objectives <ul><li>At the end of this chapter, you will be able to: </li></ul><ul><ul><li>Understand the concept of computer forensics </li></ul></ul><ul><ul><li>Describe how to prepare for computer investigations </li></ul></ul><ul><ul><li>Explain the difference between law enforcement (public) agency and corporate (private) investigations </li></ul></ul><ul><ul><li>Explain the importance of maintaining professional conduct </li></ul></ul>
  4. 4. Chapter 1 Outline <ul><li>1. Computer Forensics in Today’s World </li></ul><ul><ul><li>1.1. Introduction to Computer Forensics </li></ul></ul><ul><ul><li>1.2. History of Computer Forensics </li></ul></ul><ul><ul><li>1.3. Computer Forensics Flaws and Risks </li></ul></ul><ul><ul><li>1.4. Cyber crime </li></ul></ul><ul><ul><li>1.5. Reason for Cyber Attacks </li></ul></ul><ul><ul><li>1.6. Modes of Attacks </li></ul></ul><ul><ul><li>1.7. Role of Computer Forensics </li></ul></ul>
  5. 5. 1.1 Introduction to Computer Forensics
  6. 6. 1. 1 Introduction to Computer Forensics <ul><li>Computer combined with Internet has become an important part of everyday life of the general public. </li></ul><ul><li>Nowadays, more and more people are using computers and devices with computing capability. </li></ul><ul><li>The combination of the growth in the number of computerization of business processes and Internet users has created new opportunities for criminal. </li></ul><ul><li>According to the EC-Council: </li></ul><ul><ul><li>85% of business and government agencies detected security breaches </li></ul></ul><ul><ul><li>FBI estimates that the United States loses up to $10 billion a year to cyber crime. </li></ul></ul>
  7. 7. 1. 1 Introduction to Computer Forensics (Cont.) <ul><li>The digital age has produced many new professions, but one of the most unusual is computer forensics. </li></ul><ul><li>Computer forensics deals with the application of law to a science. </li></ul><ul><ul><li>Although it is similar to other forms of legal forensics, the computer forensics process requires a vast knowledge of computer hardware and software in order to avoid the accidental invalidation or destruction of evidence and to preserve the evidence for later analysis. </li></ul></ul>
  8. 8. 1.2 History of Computer Forensics
  9. 9. 1. 2.1 Forensics Science <ul><li>Forensics science has been around since the dawn of justice . </li></ul><ul><ul><li>Francis Galton (1822–1911) made the first recorded study of fingerprints, </li></ul></ul><ul><ul><li>Leone Lattes (1887–1954) discovered blood groupings (A, B,AB, and 0), </li></ul></ul><ul><ul><li>Calvin Goddard(1891–1955) allowed firearms and bullet comparison for solving many pending court cases, </li></ul></ul><ul><ul><li>Albert Osborn (1858–1946) developed essential features of document examination, </li></ul></ul><ul><ul><li>Hans Gross(1847–1915) made use of scientific study to head criminal investigations. </li></ul></ul><ul><ul><li>FBI(1932) set up a lab to provide forensic services to all field agents and other law authorities across the country </li></ul></ul>
  10. 10. 1. 2.2 Evolution Computer Forensics <ul><li>1984 - FBI Computer Analysis and Response Team (CART) emerged </li></ul><ul><li>1991 - International Law Enforcement meeting was conducted to discuss computer forensics & the need for standardized approach </li></ul><ul><li>1994 – Department of Justice ( DOJ) - Federal Guidelines for Searching & Seizing Computers </li></ul><ul><li>1997 - FBI- Scientific Working Group on Digital Evidence (SWGDE) was established to develop standards in computer forensics. </li></ul><ul><li>2001 - USAF - Digital Forensics Research Workshop was held, </li></ul><ul><li>2003 - Academic - International Journal of Digital Forensics & Incident Response, Elsevier </li></ul>
  11. 11. 1. 2.3 Definition of Forensics Science <ul><ul><li>Forensic science is “the Application of physical sciences to law in the search for truth in civil, criminal and social behavioral matters to the end that injustice shall not be done to any member of society ” (Source: Handbook of Forensic Pathology College of American Pathologists 1990) </li></ul></ul><ul><ul><li>Forensic science is “ the application of scientific techniques and principles to provide evidence to legal or related investigations and determinations ” (Forensic science : an encyclopedia of history, methods, and techniques, 2006) </li></ul></ul><ul><ul><li>Aim : </li></ul></ul><ul><ul><ul><li>determining the evidential value of crime scene and related evidence </li></ul></ul></ul>
  12. 12. <ul><li>Computer forensics is defined as “a methodical series of techniques and procedures for gathering evidence, from computing equipment and various storage devices and digital media, that can be presented in a court of law in a coherent and meaningful format ” (Dr. H.B. Wolfe) </li></ul><ul><li>A ccording to Steve Hailey, Cybersecurity Institute, computer forensics is “ The preservation, identification, extraction, interpretation, and documentation of computer evidence, to include the rules of evidence, legal processes, integrity of evidence, factual reporting of the information found, and providing expert opinion in a court of law or other legal and/or administrative proceeding as to what was found.” </li></ul>1. 2.4 Definition of Computer Forensics
  13. 13. <ul><li>FBI defines computer forensics as an application of science and engineering to the legal problem of digital evidence. </li></ul><ul><li>James Borek (2001), computer forensics is “ equivalent of surveying a crime scene or performing an autopsy on a victim ”. </li></ul><ul><li>Computer forensics is “ the use of scientifically derived and proven methods toward the preservation , collection , validation , identification , analysis , interpretation , documentation and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations .” (DFRWS 2001) </li></ul>1. 2.4 Definition of Computer Forensics (Cont.)
  14. 14. 1. 2.5 Computer Forensics Versus Other Related Disiplines <ul><ul><li>Computer forensics versus network forensics </li></ul></ul><ul><ul><ul><li>Computer forensics involves scientifically examining and analyzing data from computer storage media so that the data can be used as evidence in court. (DIBS USA, Inc. – a corporation specializing n computer forensics) </li></ul></ul></ul><ul><ul><ul><ul><li>Computer forensics investigates data that can be retrieved from a computer’s hard disk or other storage media. </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Investigating computers includes collecting computer data securely, examining suspect data to determine details such as origin and content, presenting computer-based information to courts, and applying laws to computer practice. </li></ul></ul></ul></ul>
  15. 15. <ul><ul><ul><ul><li>Computer forensics investigators retrieve information from a computer or its component parts. </li></ul></ul></ul></ul><ul><ul><ul><ul><li>The information might not be easy to find or decipher though it might already be on the disk. </li></ul></ul></ul></ul><ul><ul><ul><li>Network forensics produces information about how a culprit or an hacker gained access to a network. </li></ul></ul></ul><ul><ul><ul><ul><li>Network forensics investigates logs files and also tries to determine what tracks or new files were left behind on a victim’s computer or what changes were made. </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Network forensics investigators use log files to determine when users logged on and try to determine which URLs users accessed, how they logged on to the network, and from what location. </li></ul></ul></ul></ul>1. 2.5 Computer Forensics Versus Other Related Disiplines (Cont.)
  16. 16. <ul><li>Computer forensics versus data recovery </li></ul><ul><ul><li>Data recovery involves recovering information from a computer, for example, a file that was deleted by mistake or lost during a power surge or server crash. </li></ul></ul><ul><ul><ul><li>In data recovery, an information that you are looking for are known. </li></ul></ul></ul><ul><ul><li>Computer forensics is the task of recovering data that users have hidden or deleted, with the goal of ensuring that the recovered data is valid so that it can be used as evidence. The evidence can be </li></ul></ul><ul><ul><ul><li>inculpatory (in criminal cases, the expression is “incriminating”) or </li></ul></ul></ul><ul><ul><ul><li>exculpatory, meaning it might clear the suspect. </li></ul></ul></ul>1. 2.5 Computer Forensics Versus Other Related Disciplines (Cont.)
  17. 17. <ul><ul><ul><li>Investigators often examine a computer disk not knowing whether it contains evidence—they must search storage media. </li></ul></ul></ul><ul><ul><ul><ul><li>if they find data, they piece it together to produce evidence. </li></ul></ul></ul></ul><ul><ul><ul><li>Various forensics software tools can be used for most cases. </li></ul></ul></ul><ul><ul><ul><ul><li>In extreme cases, investigators can use electron microscopes and other sophisticated equipment to retrieve information from machines that have been damaged or purposefully reformatted. </li></ul></ul></ul></ul>1. 2.5 Computer Forensics Versus Other Related Disciplines (Cont.)
  18. 18. <ul><ul><li>Computer forensics versus computer security </li></ul></ul><ul><ul><ul><li>Computer forensics concerns with the proper acquisition, preservation and analysis of digital evidence, typically after an unauthorized access or use has taken place. </li></ul></ul></ul><ul><ul><ul><li>Computer security the main focus concerns with the prevention of unauthorized access, as well as the maintenance of confidentiality, integrity and availability of computer systems. </li></ul></ul></ul>1. 2.5 Computer Forensics Versus Other Related Disciplines (Cont.)
  19. 19. <ul><li>Need for computer forensics arises from: </li></ul><ul><ul><li>Presence of a majority of electronic documents nowadays. According to a University of California study, during 1999: </li></ul></ul><ul><ul><ul><li>93% of information was generated in digital form, on computers </li></ul></ul></ul><ul><ul><ul><li>7% of information originated in other media, such as paper </li></ul></ul></ul><ul><ul><li>Search and identify data in a computer </li></ul></ul><ul><ul><ul><li>Increasing trail of activities by perpetrators left on computers. </li></ul></ul></ul><ul><ul><li>Digital Evidence is delicate in nature; therefore they must be recorded as early as possible to avoid loss of valuable evidence </li></ul></ul><ul><ul><ul><li>Electronic information can be easily planted, created and stored </li></ul></ul></ul>1. 2.6 Need for Computer Forensics
  20. 20. <ul><ul><li>Law enforcement officials, network and system administrators of IT firms, attorney and also private investigators depend upon qualified computer forensic experts to investigate their and civil cases. </li></ul></ul><ul><ul><ul><li>An appropriate computer forensics specialist is called and extend them as much cooperative assistance as possible because if there is to be any chance of recovering property, locating and successfully prosecuting the criminal, there must be evidence of sufficient quantity and quality. </li></ul></ul></ul><ul><ul><li>For recovering </li></ul></ul><ul><ul><ul><ul><li>Deleted, </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Encrypted or, </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Corrupted files from a system </li></ul></ul></ul></ul><ul><ul><li>This data will be helpful during presenting testimony in the court . </li></ul></ul>1. 2.6 Need for Computer Forensics (Cont.)
  21. 21. 1.3 Computer Forensics Flaws and Risks
  22. 22. 1. 3 Computer Forensics Flaws and Risks <ul><li>Computer forensics is in its early or development stages </li></ul><ul><li>It is different from other forensic sciences as digital evidence is examined </li></ul><ul><li>There is a little theoretical knowledge to base assumptions for analysis and standard empirical hypothesis testing when carried out </li></ul><ul><ul><li>lacks of proper training </li></ul></ul><ul><ul><li>no standardization of tools </li></ul></ul><ul><li>Designations are not entirely professional </li></ul><ul><li>It is still more of an “Art” than a “Science” </li></ul>
  23. 23. 1. 3 Computer Forensics Flaws and Risks (Cont.) <ul><li>According to EC-Council, Corporate Espionage Statistics : </li></ul><ul><ul><li>Corporate computer security budgets increased at an average of 48% in 2002 </li></ul></ul><ul><ul><li>62% of the corporate companies had their systems compromised by virus </li></ul></ul><ul><ul><li>FBI statistics reveal that more than 100 nations are engaged in corporate espionage against US companies </li></ul></ul><ul><ul><li>More than 2230 documented incidents of corporate espionage by the year 2003 </li></ul></ul>
  24. 24. 1.4 Cyber Crime
  25. 25. 1. 4.1 Definition of Cyber Crime <ul><li>Definition </li></ul><ul><ul><li>” Any illegal act involving a computer, its systems, or its applications ” (EC-Council) </li></ul></ul><ul><li>The crime must be intentional and not accidental. </li></ul><ul><li>Cyber crime is divided into 3 T’s </li></ul><ul><ul><li>  Tools of the crime </li></ul></ul><ul><ul><li>  Target of the crime </li></ul></ul><ul><ul><li>  Tangential to the crime </li></ul></ul>
  26. 26. 1. 4.1 Definition of Cyber Crime (Cont.) <ul><li>Tools of the crime </li></ul><ul><ul><li>Involve various hacking tools that have been used to commit a crime. </li></ul></ul><ul><ul><li>Include the computer or workstation from where the crime has been committed. </li></ul></ul><ul><ul><ul><li>Take the whole system include hardware such as the keyboard, mouse and monitor. </li></ul></ul></ul><ul><ul><li>Considered to be the evidence that the computer forensic investigator must analyze, process and then document. </li></ul></ul>
  27. 27. 1. 4.1 Definition of Cyber Crime (Cont.) <ul><li>Target of the crime </li></ul><ul><ul><li>Also termed as the victim </li></ul></ul><ul><ul><ul><li>The victim can be corporate organizations, websites, consultancy agencies and government bodies. </li></ul></ul></ul><ul><ul><li>The target of the crime is usually the location where the computer forensic investigator goes about the process of examining the crime scene </li></ul></ul><ul><li>Tangential of the crime </li></ul><ul><ul><li>Means it was used as a secondary tool. </li></ul></ul><ul><ul><li>The computer creates a unique environment or unique form of assets. </li></ul></ul><ul><ul><li>The computer is not the primary instrument of the crime; it simply facilitates it. </li></ul></ul><ul><ul><li>The computer is used to store the evidence. </li></ul></ul>
  28. 28. 1. 4.2 Digital Evidence <ul><li>  What is Digital Evidence? </li></ul><ul><ul><li>Information of probative value stored or transmitted in digital form </li></ul></ul><ul><ul><ul><li>Probative Value - evidence which is sufficiently useful to prove something important in a trial </li></ul></ul></ul><ul><ul><li>Type of Digital Evidence – What to seize? </li></ul></ul><ul><ul><ul><li>Storage Media (i.e.. floppies, CD’s, thumb drives) </li></ul></ul></ul><ul><ul><ul><li>Computer (CPU) </li></ul></ul></ul><ul><ul><ul><li>Laptops (always seize power supply) </li></ul></ul></ul><ul><ul><ul><li>External Drives & Media </li></ul></ul></ul><ul><ul><ul><ul><li>Corresponding Devices </li></ul></ul></ul></ul><ul><ul><ul><ul><li>i.e. tape/tape drive, jaz disk/jaz drive </li></ul></ul></ul></ul><ul><ul><ul><li>Unique software and operating manuals </li></ul></ul></ul><ul><li>(might need to load software on forensic computer to view files) </li></ul>
  29. 29. 1. 4.2 Digital Evidence <ul><li>  What is Digital Evidence? </li></ul><ul><ul><li>Information of probative value stored or transmitted in digital form </li></ul></ul><ul><ul><ul><li>Probative Value - evidence which is sufficiently useful to prove something important in a trial </li></ul></ul></ul><ul><ul><li>Type of Digital Evidence – What to seize? </li></ul></ul><ul><ul><ul><li>Storage Media (i.e.. floppies, CD’s, thumb drives) </li></ul></ul></ul><ul><ul><ul><li>Computer (CPU) </li></ul></ul></ul><ul><ul><ul><li>Laptops (always seize power supply) </li></ul></ul></ul><ul><ul><ul><li>External Drives & Media </li></ul></ul></ul><ul><ul><ul><ul><li>Corresponding Devices </li></ul></ul></ul></ul><ul><ul><ul><ul><li>i.e. tape/tape drive, jaz disk/jaz drive </li></ul></ul></ul></ul><ul><ul><ul><li>Unique software and operating manuals </li></ul></ul></ul><ul><li>(might need to load software on forensic computer to view files) </li></ul>
  30. 30. 1. 4.3 Examples of Cyber Crime <ul><li>  Theft of intellectual property </li></ul><ul><ul><li>Includes any act that would allow an individuals to get access to patents, trade secret, customer data, sales trends and any other confidential information that can be of monetary gain. </li></ul></ul><ul><li>  Damage of company service networks </li></ul><ul><ul><li>Take place by the attacker planting a trojan horse, conducting a denial of service attack, installing an unauthorized modem in the network to allow insiders a chance to gain access. </li></ul></ul><ul><li>  Financial fraud </li></ul><ul><ul><li>Refers to any type of criminal behavior that uses fraudulent solicitation to prospective victims to conduct fraudulent transactions. </li></ul></ul>
  31. 31. 1. 4.3 Examples of Cyber Crime (Cont.) <ul><li>  Hacker system penetrations </li></ul><ul><ul><ul><li>A network or system penetration occurs when an outsider gets access to the network and changes settings within the network. </li></ul></ul></ul><ul><ul><ul><li>Hacker attacks using tools that take advantage of the vulnerability in the security posture ot the network such as Trojans, rootkits, and sniffers </li></ul></ul></ul><ul><li>  Denial of Service Attacks </li></ul><ul><ul><li>Aim at stopping legitimate requests to a network over the Internet by subjecting the network to illegitae requests. </li></ul></ul><ul><ul><li>Occur when several system take up useful network resources thereby rendering the network inaccessible. </li></ul></ul>
  32. 32. 1. 4.3 Examples of Cyber Crime (Cont.) <ul><li>   Planting of virus and worms </li></ul><ul><ul><li>Virus can affect machines and seek to affect other vulnerable systems through applications such as an email client. </li></ul></ul><ul><ul><li>Worms seek to replicate themselves over the network thereby hogging resources apart from creating malfunctions. </li></ul></ul><ul><ul><li>Trojan horses and backdoors are programs that allow an intruder to retain access to a compromised machine. </li></ul></ul>
  33. 33. 1.5 Reasons for Attacks
  34. 34. 1. 5 Reason for cyber attacks <ul><li>Motivation for cyber attacks </li></ul><ul><ul><li>Experimentation and a desire for script kiddies to learn </li></ul></ul><ul><ul><li>Psychological needs – to leave a mark </li></ul></ul><ul><ul><li>Misguided trust in other individuals </li></ul></ul><ul><ul><li>  Revenge and malicious reasons – disgruntled employee </li></ul></ul><ul><ul><li>  Desire to embarrass the target </li></ul></ul><ul><ul><li>  Espionage - corporate and governmental </li></ul></ul><ul><ul><ul><li>Paid to gain information </li></ul></ul></ul>
  35. 35. 1.6 Modes for Attacks
  36. 36. 1. 6 Modes for attacks <ul><li>Cyber crime falls into two categories depending on the ways attack take place </li></ul><ul><li>Following are the two types of attacks </li></ul><ul><ul><li>Insider Attacks </li></ul></ul><ul><ul><ul><li>Attack from the employee within an organization </li></ul></ul></ul><ul><ul><li>External Attacks </li></ul></ul><ul><ul><ul><li>Attack from the outside by persons who are not within the company </li></ul></ul></ul><ul><ul><ul><li>These involve hackers hired by either an insider or an external entity whose aim is to destroy a competitor’s reputation. </li></ul></ul></ul>
  37. 37. 1.7 Role of Computer Forensics
  38. 38. 1. 7.1 Stage of Forensic Investigation in Tracking Computer Crime <ul><li>Identifying the crime </li></ul><ul><li>Gathering the evidence </li></ul><ul><li>Building a chain of custody </li></ul><ul><ul><li>In this stage, data have been recovered </li></ul></ul><ul><ul><li>Data once recovered must be duplicated or replicated. </li></ul></ul><ul><li>Analyzing the evidence – use duplicate one </li></ul><ul><li>Presenting the evidence </li></ul><ul><li>Testifying </li></ul><ul><li>Prosecution </li></ul><ul><ul><li>In this stage, computer forensics investigator must act as an expert witness </li></ul></ul>
  39. 39. 1. 7.1 Stage of Forensic Investigation in Tracking Computer Crime (Cont.) <ul><ul><li>An expert witness </li></ul></ul><ul><ul><ul><li>A person who can investigate on a particular case, evaluate all findings, and educate the jury about his/her findings. </li></ul></ul></ul><ul><ul><ul><li>His/her most important functions is to present all his/her findings of the case in court. </li></ul></ul></ul><ul><ul><ul><li>When functioning as an expert witness, the forensic investigator is the actual tool that law enforcement agencies around the world use to track and prosecute cyber criminal. </li></ul></ul></ul>
  40. 40. 1. 7.2 Rules of Computer Forensics <ul><li>A good forensic investigator should always follow these rules: </li></ul><ul><ul><li>Minimize the option of examining the original evidence </li></ul></ul><ul><ul><ul><li>Instead, examine the duplicate evidence </li></ul></ul></ul><ul><ul><li>Obey rules of evidence and do not tamper with the evidence </li></ul></ul><ul><ul><li>Always prepare a chain of custody, and handle evidence with care </li></ul></ul><ul><ul><li>Never exceed the knowledge base of the forensic investigation </li></ul></ul><ul><ul><li>Document any changes in evidence </li></ul></ul>
  41. 41. <ul><li>The 3 As of computer forensics methodologies </li></ul><ul><ul><li>Acquire evidence without modification or corruption </li></ul></ul><ul><ul><li>Authenticate that the recovered evidence is same as the originally seized data </li></ul></ul><ul><ul><li>Analyze data without any alterations </li></ul></ul>1. 7.3 The 3 As of Computer Forensics Methodology
  42. 42. <ul><li>Accessing computer forensics resources </li></ul><ul><ul><li>Resources can be referred by joining various discussion groups such as: </li></ul></ul><ul><ul><ul><li>Computer Technology Investigators Northwest –High Technology Crime Investigation Association </li></ul></ul></ul><ul><ul><li>Joining a network of computer forensic experts and other professionals </li></ul></ul><ul><ul><li>News services devoted to computer forensics can also be a powerful resource </li></ul></ul><ul><ul><li>Other resources: </li></ul></ul><ul><ul><ul><li>Journals of forensic investigators </li></ul></ul></ul><ul><ul><ul><li>Actual case studies </li></ul></ul></ul>1. 7.4 Accessing Computer Forensics Resources
  43. 43. <ul><li>Computing investigations fall under two distinct categories: </li></ul><ul><ul><li>Public Investigation </li></ul></ul><ul><ul><li>Corporate Investigation </li></ul></ul><ul><li>Public (Enforcement agency) investigations include: </li></ul><ul><ul><li>Tools used to commit the crime </li></ul></ul><ul><ul><li>Reason for the crime </li></ul></ul><ul><ul><li>Type of crime </li></ul></ul><ul><ul><li>Infringement on someone else’s rights by cyberstalking </li></ul></ul>1. 7.5 Preparing for Computer Investigations
  44. 44. <ul><ul><li>Corporate investigations include: </li></ul></ul><ul><ul><ul><li>Involve private companies who address company policy violations and litigation disputes </li></ul></ul></ul><ul><ul><ul><li>Company procedures should continue without any interruption from the investigation </li></ul></ul></ul><ul><ul><ul><li>After the investigation the company should minimize or eliminate similar litigations </li></ul></ul></ul><ul><ul><ul><li>Industrial espionage is the foremost crime in corporate investigations </li></ul></ul></ul>1. 7.5 Preparing for Computer Investigations (Cont.)
  45. 45. 1. 9 Preparing for Computing Investigations (Cont.) <ul><li>Identification: Detecting/identifying the event/crime. </li></ul><ul><ul><li>Asses the case, ask people questions, and documenting the results in an effort to identify the crime and the location of the evidence </li></ul></ul><ul><li>Preservation of evidence: Chain of Custody/Evidence, Documentation. </li></ul><ul><ul><li>A chain of custody/evidence must be prepared to know who handled the evidence, and every step taken by the forensic investigator must be documented for inclusion in the final report. </li></ul></ul><ul><ul><li>Sometimes a computer and its related evidence can determine the chain of events leading to a crime for the investigator as well as provide the evidence which can lead to conviction. </li></ul></ul>1. 7.6 Investigation Process
  46. 46. <ul><ul><li>Chain of custody is the accurate documentation of the movement and possession of a piece of evidence, from the time it is taken into custody until it is delivered to the court </li></ul></ul><ul><ul><ul><li>Who collected it? </li></ul></ul></ul><ul><ul><ul><li>How and Where? </li></ul></ul></ul><ul><ul><ul><li>Who took possession of it? </li></ul></ul></ul><ul><ul><ul><li>How as it stored and protected? </li></ul></ul></ul><ul><ul><ul><li>Who took it out of storage and why? </li></ul></ul></ul>1. 7.6 Investigation Process (Cont.)
  47. 47. <ul><li>Collection: Data recovery, evidence collection. </li></ul><ul><ul><li>Finding the evidence, discovering relevant data, preparing an Order of Volatility, eradicating external avenues of alteration, gathering the evidence, and preparing a chain of custody </li></ul></ul><ul><ul><li>Create MD5 hash of the evidence collected </li></ul></ul><ul><ul><li>Prior to collection, one should do preliminary assessment to search for the evidence. </li></ul></ul><ul><ul><li>Collect and seize the equipment used in committing the crime, document the items collected, such as floppy disks, thumb drives, CDs, DVDs, and external back up drives. </li></ul></ul>1. 7.6 Investigation Process (Cont.)
  48. 48. <ul><ul><li>Take photo of the crime scene before removing the evidence using Single len Reflex (SLR) camera. </li></ul></ul><ul><li>Examination: Tracing, Filtering, Extracting hidden data. </li></ul><ul><ul><li>Review registers and cache, routing tables, ARP, cache, process tables, and kernel statistics and modules </li></ul></ul><ul><li>Analysis </li></ul><ul><ul><li>Analyzing evidence </li></ul></ul><ul><ul><li>Can be carried out using various forensic analysis tools such Encase, Access Data etc. </li></ul></ul>1. 7.6 Investigation Process (Cont.)
  49. 49. <ul><li>Presentation : Investigation report, Expert witness </li></ul><ul><ul><li>Include what was done and the results in the final report. This include: </li></ul></ul><ul><ul><ul><li>Who, what, when, where, and how of the crime. </li></ul></ul></ul><ul><ul><ul><li>Explain the computer and network processes </li></ul></ul></ul><ul><ul><ul><li>The log files generated by forensic tools to keep track of all the steps taken. </li></ul></ul></ul><ul><li>Decision </li></ul><ul><ul><li>Report </li></ul></ul>1. 7.6 Investigation Process (Cont.)
  50. 50. <ul><li>Use computer forensics when: </li></ul><ul><ul><li>there is a need to provide real evidence such as reading bar codes, magnetic tapes and to identify the occurrence of electronic transactions and reconstruct an incidence with sequence of events. </li></ul></ul><ul><ul><li>a breach of contract occurs, or if copyright and intellectual property theft/misuse happens or during employee disputes where there is damage to resources. </li></ul></ul>1. 7.7 Where and When Do You Use Computer Forensics
  51. 51. <ul><li>Professional conduct determines the credibility of a forensic investigator </li></ul><ul><li>Investigators must display the highest level of ethics and moral integrity </li></ul><ul><li>M aintaining objectivity </li></ul><ul><ul><li>Sustain unbiased opinions of your cases </li></ul></ul><ul><li>Confidentiality is an essential feature which all forensic investigators must display </li></ul><ul><li>Avoid making conclusions about the findings until all reasonable leads have been exhausted </li></ul><ul><li>Considered all the available facts </li></ul><ul><li>Ignore external biases to maintain the integrity of the fact-finding in all investigations </li></ul>1. 7.8 Maintaining Professional Conduct
  52. 52. <ul><li>Discuss the case at hand only with person who has the right to know </li></ul><ul><li>Stay current with the latest technical changes in computer hardware and software, networking, and forensic tools </li></ul><ul><li>Learn about the latest investigation techniques that can be applied to the case </li></ul><ul><li>Record fact-finding methods in a journal </li></ul><ul><ul><li>Include dates and important details that serve as memory triggers </li></ul></ul><ul><ul><li>Develop a routine of regularly reviewing the journal to keep past achievements fresh </li></ul></ul>1. 7.8 Maintaining Professional Conduct (Cont.)
  53. 53. <ul><li>Attend workshops, conferences, and vendor-specific courses conducted by software manufacturers </li></ul><ul><li>Monitor the latest book releases and read as much as possible about computer investigations and forensics </li></ul>1. 7.8 Maintaining Professional Conduct (Cont.)
  54. 54. Summary <ul><li>The need for computer forensics has grown to a large extent due to the presence of a majority of digital documents </li></ul><ul><li>Differs from network forensics, data recovery, and disaster recovery in scope, technique, and objective </li></ul><ul><li>A computer can be used as a tool for investigation or as evidence </li></ul><ul><li>Minimize the option of examining the original evidence </li></ul><ul><li>3A’s of Computer forensics methodologies are – Acquire, Authenticate, and Analyze </li></ul><ul><li>A computer forensic investigator must be aware of the steps involved in the investigative process </li></ul>
  55. 55. Summary (Cont.) <ul><li>To be successful, you must be familiar with more than one computing platform </li></ul><ul><li>To supplement your knowledge, develop and maintain contact with computer, network, and investigative professionals </li></ul><ul><li>Public investigations typically require a search warrant before the digital evidence is seized </li></ul><ul><li>During public investigations, you search for evidence to support criminal allegations </li></ul><ul><li>During private investigations, search for evidence to support allegations of abuse of a company or person’s assets and, in some cases, criminal complaints </li></ul><ul><li>Forensics investigators must maintain an impeccable reputation to protect credibility </li></ul>
  56. 56. Summary (Cont.) <ul><li>Most information is stored on hard disks, floppy disks, and CD-ROMs in a nonvolatile manner </li></ul><ul><li>Peripheral components (video adapter cards, sound cards, mice, keyboards, NICs) attach to mainboard via an expansion slot or port </li></ul><ul><li>All peripherals must have a unique IRQ and I/O address to communicate with the processor </li></ul><ul><li>Hardware information can be gathered from computer manuals, BIOS, or other Oss </li></ul><ul><li>Computer forensics investigators must maintain professional conduct to protect their credibility </li></ul>
  57. 57. End of Chapter 1