SlideShare a Scribd company logo
INTRODUCTION TO COMPUTER
        FORENSIC
What is Computer Forensics?
• Forensics is the process of using scientific knowledge for
  collecting, analyzing, and presenting evidence to the courts.
  (The word forensics means “to bring to the court.” ).

• Forensics deals primarily with the recovery and analysis of
  latent evidence.

• Latent evidence can take many forms, from fingerprints left
  on a window to DNA evidence recovered from blood stains to
  the files on a hard drive.
What is Computer Forensics? (cont)
• Because computer forensics is a new discipline, there
  is little standardization and consistency across the
  courts and industry.

• “We define computer forensics as the discipline that
  combines elements of law and computer science to
  collect and analyze data from computer systems,
  networks, wireless communications, and storage
  devices in a way that is admissible as evidence in a
  court of law”.
Why is Computer Forensics
              Important?
• From a technical standpoint, the main goal of
  computer forensics is to identify, collect,
  preserve, and analyze data in a way that
  preserves the integrity of the evidence
  collected so it can be used effectively in a legal
  case.
TECHNOLOGY
• Understanding of
  – storage technology
  – operating system features
     •   Windows
     •   Linux
     •   Unix
     •   Mac OS
  – file systems
TECHNOLOGY
• Knowledge of
    – Slack space
    – Host Protected Area (HPA)
    – Device Configuration Overlay (DCO)
•   Disk imaging
•   Data recovery
•   Total data deletion
•   Handling encryption
COLLABORATION
• Computer Forensics investigation requires
  collaboration of
   – Law enforcement
   – Attorneys
   – Computer specialists
• In academia, collaborating units could be:
   –   Computer Science
   –   Criminal Justice
   –   Law
   –   Accounting & Finance
APPLICATIONS
• Email
  – Lasts longer than people believe
  – Businesses monitor employee emails
  – Admissible in legal proceedings
  – Protect using PGP
• E-commerce
  – Exchange of confidential data
  – Impersonation
APPLICATIONS
• Data backup
  – Encrypt
  – Secure transfer of backup media
  – Periodic recovery
Security Issues
•   Data hiding
•   Image hiding
•   Improper destruction of sensitive data
•   Weak authentication tools
    – Created, Accessed, Modified date
    – Boot password
    – Password cracking
What are some typical aspects of a
      computer forensics investigation?
• First, those who investigate computers have to understand
  the kind of potential evidence they are looking for in order to
  structure their search.

• Crimes involving a computer can range across the spectrum
  of criminal activity, from child pornography to theft of
  personal data to destruction of intellectual property.

• Second, the investigator must pick the appropriate tools to
  use. Files may have been deleted, damaged, or encrypted,
  and the investigator must be familiar with an array of
  methods and software to prevent further damage in the
  recovery process.
NATURE OF FORENSIC EVIDENCE
• Two basic types of data are collected in computer forensics.
   – Persistent data is the data that is stored on a local hard drive (or
     another medium) and is preserved when the computer is turned off.

   – Volatile data is any data that is stored in memory, or exists in transit,
     that will be lost when the computer loses power or is turned off.

• Volatile data resides in registries, cache, and random access
  memory (RAM). Since volatile data is ephemeral, it is
  essential an investigator knows reliable ways to capture it.
NATURE OF FORENSIC EVIDENCE
             (Cont’)
• Data must be relevant & reliable

• Reliability of evidence gathered by tools assessed by
  judge in pre-trial hearing aka Daubert Hearing

• Assesses Methodology to gather evidence
   – Sound scientific practices?
   – Reliable evidence?
PRE-TRIAL HEARINGS
• Frye Test – past method
  – Responsibility on scientific community
  – Defined acceptable evidence gathering
    procedures
  – Used Peer Reviewed Journals
• Daubert Hearing – current method
  – Offers additional methods to test quality of
    evidence
DAUBERT HEARING PROCESS
• Testing – Is this procedure tested?
• Error Rate – What is the error rate of this
  procedure?
• Publication – Has procedure been published
  and reviewed by peers?
• Acceptance – Is the procedure generally
  accepted within the relevant scientific
  community?
TYPES OF FORENSIC SOFTWARE
•   Acquisition Tools
•   Data Discovery Tools
•   Internet History Tools
•   Image Viewers
•   E-mail Viewers
•   Password Cracking Tools
•   Open Source Tools
•   Mobile Device tools (PDA/Cell Phone)
•   Large Storage Analysis Tools
MORE ABOUT ELECTRONIC DATA DISCOVERY
                TOOLS

• Analyze data
• Retrieve data from different media
• Convert between different media and file
  formats
• Extract text & data from documents
• Create images of the documents
• Print documents
• Archive documents
INTERNET HISTORY TOOLS

• Reads Information in Complete History
  Database
• Displays List of Visited Sites
• Opens URLs in Internet Explorer
• Adds URLs to Favorites
• Copies URLs
• Prints URLS
• Saves Listing/Ranges as Text File
IMAGE & E-MAIL VIEWERS


•   Views Files
•   Converts Files
•   Catalogs Files
•   Side by Side File
    Comparisons
PASSWORD CRACKING TOOLS


 • Password Recovery
 • Allows access to computers
 • 3 Methods to Crack Passwords
     – Dictionary Attack
     – Hybrid Attack
     – Brute Force Attack


Source: http://www-128.ibm.com/developerworks/library/s-crack/
OPEN SOURCE TOOLS

• Free tools available to Computer Forensic
  Specialists
• Cover entire scope of forensic tools in use
• May more clearly and comprehensively meet
  the Daubert guidelines than closed source tools
• Among the most widely used

Source:
http://software.newsforge.com/software/05/04/05/2052235.shtml?tid=129&tid=136&t
MOBILE DEVICE TOOLS

• Number and variety of toolkits considerably
  more limited than for computers
• Require examiner to have full access to device
• Most tools focus on a single function
• Deleted data remains on PDA until successful
  HotSync with computer

Sources: http://csrc.nist.gov/publications/nistir/nistir-7100-PDAForensics.pdf
http://www.cs.ucf.edu/courses/cgs5132/spring2002/presentation/weiss.ppt#5
FORENSIC TOOL SUITES

                                – Parben
• Provide a lower cost way to
                                – The Coroner’s
  maximize the tools
                                  Toolkit (TCT)
• Typically include the most    – The Sleuth Kit
  often used tools                (TSK)
                                – EnCase
                                – Forensic Toolkit
                                  (FTK)
                                – Maresware
OVERVIEW OF SYSTEMS SECURITY
•    Ten guidelines:
     –   Remove personally identifiable data from storage media
     –   Store an identical copy of any evidentiary media given to
         law enforcement
     –   Limit search to goal of investigation
     –   Handle time stamped events in strictest confidence
     –   On networks, packet acknowledgement be via the use of
         tokens than IP addresses
OVERVIEW OF SYSTEMS SECURITY
              (Cont’)
•    Safe storage of all internal logs
•    Preservation of event logs in external nodes
•    Put policies in place for actionable items related to
     attacks
•    Put policies in place for safeguarding backed up
     data related to an investigation
•    Handle disposal of sensitive data in a secure
     manner
COMPUTER FORENSICS AS A
          PROFESSION?
• Attitudes to computer forensics
  – Academic
  – Application of computer science
  – Application of forensic science
  – Narrow specialism
  – Aligned to computer security
  – Core discipline
ETHICAL BEHAVIOUR IN COMPUTER
           FORENSICS
• There is a very fine line between what is
  acceptable and what is deemed to be
  malpractice
• Computer Forensics exists in an ethical grey
  area
• Often need to balance self motivation
  versus legal constraints and procedural
  considerations
Ethical Behaviour in Computer
             Forensics
• Need to understand the ethical responsibility
  in Computer Forensics work is to:
  –   Self
  –   Profession
  –   Clients
  –   Subjects
  –   Courts
  –   Society
COMPUTER FORENSICS ETHICAL
          STANDARDS
• What is worse?
   – Failing to convict the guilty
   – Convicting the innocent
• The role of the investigator is to expose the
  evidence from a neutral point of view
• The Auld Report states that
   – “It is the duty of an expert to help the court on the
     matters within his expertise. The duty overrides
     any obligation to the person from whom he has
     received instruction or by whom he is paid”
PSYCHOLOGY OF INVESTIGATION

• Evaluate the allegation
  – Who made it ?
  – Is there a hidden agenda ?
• Avoid presumption of guilt
• Avoid desire to win
• Show all the evidence both contrary and
  supporting the accusation
PSYCHOLOGY OF INVESTIGATION

• Ask yourself the questions
  – Could the person be innocent ?
  – Could someone else have done it ?
• Keep an open mind
• Be impartial
• Be rigorous and professional
COMPUTER FORENSICS PRACTITIONERS
        REQUIRE AWARENESS

• To help in making decisions about “doing
  the right thing”.
• To provide material in defending or
  justifying a particular position.
• To protect you as a practitioner.
• To consider in terms of practitioner and
  system liability.
• To maintain evidential integrity.
QUESTIONING THE LAW

•   Is the law always ethical ?
•   Is the law good and just ?
•   Was apartheid legislation ethical ?
•   Just because an act or set of circumstances
    is permitted in computing does not mean
    that it is ethical.
AREAS OF KNOWLEDGE

• What laws to consider ?
• What impact the laws might have on a
  particular activity
• Critical analysis
  – Are the laws appropriate ?
  – Are there contradictions in legal provision?
  – Can the laws be applied to computer
    forensics ?
  – Should the laws be challenged ?
EXAMPLE OF REGULATIONS TO
           CONSIDER
• Data Protection Act 1998
  – Right of access, Right to prevent processing,
    Right to compensation
• Computer Misuse Act 1990 and Computer
  Misuse (Amendment) Act 2002
• Regulation of Investigatory Powers Act
  2000
Example of Regulations to
           Consider
• Human Rights Act 1998
• Disability Discrimination Act (1995) and
  Special Educational Needs and Disability
  Act 2001
Example of Regulations to
           Consider
• Anti-terrorism, Crime and Security Act 2001
  – ISPs (Internet Service Providers) keep track of
    their customers’ activities over a period of 12
    months
• Freedom of Information Act 2000 and
  Freedom of Information (Scotland) Act
  2002
Example of Regulations to
             Consider
•   Theft Act 1968, 1978
•   Protection from Harassment Act 1997
•   Obscene Publications Act 1959
•   Protection of Children Act 1978
•   Criminal Justice Act 1988
EXAMPLE OF REGULATIONS TO
           CONSIDER
• Sexual Offences Act 2003
• Anti-terrorism, Crime and Security Act 2001
• Patents Act 1977 and the Copyright,
  Designs and Patents Act 1988
  – Intellectual Property, Copyright Law, Patent
    Law, Trademarks and Passing-off
• Design Right (Semiconductor Regulations)
  1989
PROFESSIONAL BEHAVIOUR IN
      COMPUTER FORENSICS
• Enhance the resolution of crime involving
  computers and reduce cyber crime
• Ensure robust, reliable, valid and safe
  processes and procedures
• Comply with ethical and legal expectations
PROFESSIONAL BEHAVIOUR IN
      COMPUTER FORENSICS

• Enhance public confidence in computer
  forensics
• Enhance computer security
• Promote awareness and understanding
• Requires the ability and competence to
  make appropriate decisions
AREAS OF PROFESSIONAL
              RESPONSIBILITY
• Litigation and Liability
• Certification and Licence to practice
• Compliance
    – For example web sites with Disability Discrimination Act
•   Audit
•   Dealing with contradictions
•   Professional and ethical responsibility
•   Organisational regulation and policy
    – computing action may be legal but against company policy,
      e.g. Internet transactions on work computers, e-mail
      language

More Related Content

What's hot

Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
Suchita Rawat
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
Cleverence Kombe
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
Bhupeshkumar Nanhe
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
Ambuj Kumar
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Vidoushi B-Somrah
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
Filip Maertens
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
Yansi Keim
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
Operating System Forensics
Operating System ForensicsOperating System Forensics
Operating System Forensics
ArunJS5
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Anti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionAnti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and prevention
Seccuris Inc.
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Mithileysh Sathiyanarayanan
 
Anti forensic
Anti forensicAnti forensic
Anti forensicMilap Oza
 
Memory forensics
Memory forensicsMemory forensics
Memory forensicsSunil Kumar
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
Online
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
unnilala11
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its roleSudeshna Basak
 

What's hot (20)

Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Operating System Forensics
Operating System ForensicsOperating System Forensics
Operating System Forensics
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Anti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionAnti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and prevention
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Anti forensic
Anti forensicAnti forensic
Anti forensic
 
Memory forensics
Memory forensicsMemory forensics
Memory forensics
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its role
 

Viewers also liked

Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Somya Johri
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
deaneal
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensicsRahul Baghla
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
Sarwar Hossain Rafsan
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
Lalit Garg
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
OWASP Khartoum
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays Worldgueste0d962
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
prashant3535
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic Softwares
Dhruv Seth
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
Shreya Singireddy
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
Vi Tính Hoàng Nam
 
Computer forensic
Computer forensicComputer forensic
Computer forensicbhavithd
 
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic ExaminersBoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesIsaiah Edem
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
Kabul Education University
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
Dhiren Gala
 
Document clustering for forensic analysis an approach for improving compute...
Document clustering for forensic   analysis an approach for improving compute...Document clustering for forensic   analysis an approach for improving compute...
Document clustering for forensic analysis an approach for improving compute...
Madan Golla
 

Viewers also liked (20)

Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic Softwares
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic ExaminersBoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting Crimes
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Document clustering for forensic analysis an approach for improving compute...
Document clustering for forensic   analysis an approach for improving compute...Document clustering for forensic   analysis an approach for improving compute...
Document clustering for forensic analysis an approach for improving compute...
 

Similar to Introduction to computer forensic

644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
Gnanavi2
 
cyber Forensics
cyber Forensicscyber Forensics
cyber Forensics
Muzzammil Wani
 
Vest Forensics presentation owasp benelux days 2012 leuven
Vest Forensics presentation owasp benelux days 2012 leuvenVest Forensics presentation owasp benelux days 2012 leuven
Vest Forensics presentation owasp benelux days 2012 leuvenMarc Hullegie
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
Manu Mathew Cherian
 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Resilient Systems
 
DigitalForensics.ppt
DigitalForensics.pptDigitalForensics.ppt
DigitalForensics.ppt
TamannaTabassum21
 
DigitalForensics.ppt
DigitalForensics.pptDigitalForensics.ppt
DigitalForensics.ppt
ssuserba01a3
 
Remote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draftRemote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draft
Damir Delija
 
Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science
Damir Delija
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
primeteacher32
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)AltheimPrivacy
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsHiren Selani
 
computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...
pable2
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im finalcavapyta
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im finalcavapyta
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
Online
 

Similar to Introduction to computer forensic (20)

Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
cyber Forensics
cyber Forensicscyber Forensics
cyber Forensics
 
CF.ppt
CF.pptCF.ppt
CF.ppt
 
Vest Forensics presentation owasp benelux days 2012 leuven
Vest Forensics presentation owasp benelux days 2012 leuvenVest Forensics presentation owasp benelux days 2012 leuven
Vest Forensics presentation owasp benelux days 2012 leuven
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a Panacea
 
DigitalForensics.ppt
DigitalForensics.pptDigitalForensics.ppt
DigitalForensics.ppt
 
DigitalForensics.ppt
DigitalForensics.pptDigitalForensics.ppt
DigitalForensics.ppt
 
Remote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draftRemote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draft
 
Sujit
SujitSujit
Sujit
 
Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...computer forensics, involves the preservation, identification, extraction, an...
computer forensics, involves the preservation, identification, extraction, an...
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im final
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im final
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 

More from Online

Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3
Online
 
Philosophy of early childhood education 2
Philosophy of early childhood education 2Philosophy of early childhood education 2
Philosophy of early childhood education 2
Online
 
Philosophy of early childhood education 1
Philosophy of early childhood education 1Philosophy of early childhood education 1
Philosophy of early childhood education 1
Online
 
Philosophy of early childhood education 4
Philosophy of early childhood education 4Philosophy of early childhood education 4
Philosophy of early childhood education 4
Online
 
Operation and expression in c++
Operation and expression in c++Operation and expression in c++
Operation and expression in c++
Online
 
Functions
FunctionsFunctions
Functions
Online
 
Formatted input and output
Formatted input and outputFormatted input and output
Formatted input and output
Online
 
Control structures selection
Control structures   selectionControl structures   selection
Control structures selection
Online
 
Control structures repetition
Control structures   repetitionControl structures   repetition
Control structures repetition
Online
 
Introduction to problem solving in c++
Introduction to problem solving in c++Introduction to problem solving in c++
Introduction to problem solving in c++
Online
 
Optical transmission technique
Optical transmission techniqueOptical transmission technique
Optical transmission technique
Online
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
Online
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
Online
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technology
Online
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocols
Online
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
Online
 
Application protocols
Application protocolsApplication protocols
Application protocols
Online
 
Addressing
AddressingAddressing
Addressing
Online
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
Online
 
Leadership
LeadershipLeadership
Leadership
Online
 

More from Online (20)

Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3
 
Philosophy of early childhood education 2
Philosophy of early childhood education 2Philosophy of early childhood education 2
Philosophy of early childhood education 2
 
Philosophy of early childhood education 1
Philosophy of early childhood education 1Philosophy of early childhood education 1
Philosophy of early childhood education 1
 
Philosophy of early childhood education 4
Philosophy of early childhood education 4Philosophy of early childhood education 4
Philosophy of early childhood education 4
 
Operation and expression in c++
Operation and expression in c++Operation and expression in c++
Operation and expression in c++
 
Functions
FunctionsFunctions
Functions
 
Formatted input and output
Formatted input and outputFormatted input and output
Formatted input and output
 
Control structures selection
Control structures   selectionControl structures   selection
Control structures selection
 
Control structures repetition
Control structures   repetitionControl structures   repetition
Control structures repetition
 
Introduction to problem solving in c++
Introduction to problem solving in c++Introduction to problem solving in c++
Introduction to problem solving in c++
 
Optical transmission technique
Optical transmission techniqueOptical transmission technique
Optical transmission technique
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technology
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocols
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Application protocols
Application protocolsApplication protocols
Application protocols
 
Addressing
AddressingAddressing
Addressing
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Leadership
LeadershipLeadership
Leadership
 

Recently uploaded

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 

Recently uploaded (20)

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 

Introduction to computer forensic

  • 2. What is Computer Forensics? • Forensics is the process of using scientific knowledge for collecting, analyzing, and presenting evidence to the courts. (The word forensics means “to bring to the court.” ). • Forensics deals primarily with the recovery and analysis of latent evidence. • Latent evidence can take many forms, from fingerprints left on a window to DNA evidence recovered from blood stains to the files on a hard drive.
  • 3. What is Computer Forensics? (cont) • Because computer forensics is a new discipline, there is little standardization and consistency across the courts and industry. • “We define computer forensics as the discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is admissible as evidence in a court of law”.
  • 4. Why is Computer Forensics Important? • From a technical standpoint, the main goal of computer forensics is to identify, collect, preserve, and analyze data in a way that preserves the integrity of the evidence collected so it can be used effectively in a legal case.
  • 5. TECHNOLOGY • Understanding of – storage technology – operating system features • Windows • Linux • Unix • Mac OS – file systems
  • 6. TECHNOLOGY • Knowledge of – Slack space – Host Protected Area (HPA) – Device Configuration Overlay (DCO) • Disk imaging • Data recovery • Total data deletion • Handling encryption
  • 7. COLLABORATION • Computer Forensics investigation requires collaboration of – Law enforcement – Attorneys – Computer specialists • In academia, collaborating units could be: – Computer Science – Criminal Justice – Law – Accounting & Finance
  • 8. APPLICATIONS • Email – Lasts longer than people believe – Businesses monitor employee emails – Admissible in legal proceedings – Protect using PGP • E-commerce – Exchange of confidential data – Impersonation
  • 9. APPLICATIONS • Data backup – Encrypt – Secure transfer of backup media – Periodic recovery
  • 10. Security Issues • Data hiding • Image hiding • Improper destruction of sensitive data • Weak authentication tools – Created, Accessed, Modified date – Boot password – Password cracking
  • 11. What are some typical aspects of a computer forensics investigation? • First, those who investigate computers have to understand the kind of potential evidence they are looking for in order to structure their search. • Crimes involving a computer can range across the spectrum of criminal activity, from child pornography to theft of personal data to destruction of intellectual property. • Second, the investigator must pick the appropriate tools to use. Files may have been deleted, damaged, or encrypted, and the investigator must be familiar with an array of methods and software to prevent further damage in the recovery process.
  • 12. NATURE OF FORENSIC EVIDENCE • Two basic types of data are collected in computer forensics. – Persistent data is the data that is stored on a local hard drive (or another medium) and is preserved when the computer is turned off. – Volatile data is any data that is stored in memory, or exists in transit, that will be lost when the computer loses power or is turned off. • Volatile data resides in registries, cache, and random access memory (RAM). Since volatile data is ephemeral, it is essential an investigator knows reliable ways to capture it.
  • 13. NATURE OF FORENSIC EVIDENCE (Cont’) • Data must be relevant & reliable • Reliability of evidence gathered by tools assessed by judge in pre-trial hearing aka Daubert Hearing • Assesses Methodology to gather evidence – Sound scientific practices? – Reliable evidence?
  • 14. PRE-TRIAL HEARINGS • Frye Test – past method – Responsibility on scientific community – Defined acceptable evidence gathering procedures – Used Peer Reviewed Journals • Daubert Hearing – current method – Offers additional methods to test quality of evidence
  • 15. DAUBERT HEARING PROCESS • Testing – Is this procedure tested? • Error Rate – What is the error rate of this procedure? • Publication – Has procedure been published and reviewed by peers? • Acceptance – Is the procedure generally accepted within the relevant scientific community?
  • 16. TYPES OF FORENSIC SOFTWARE • Acquisition Tools • Data Discovery Tools • Internet History Tools • Image Viewers • E-mail Viewers • Password Cracking Tools • Open Source Tools • Mobile Device tools (PDA/Cell Phone) • Large Storage Analysis Tools
  • 17. MORE ABOUT ELECTRONIC DATA DISCOVERY TOOLS • Analyze data • Retrieve data from different media • Convert between different media and file formats • Extract text & data from documents • Create images of the documents • Print documents • Archive documents
  • 18. INTERNET HISTORY TOOLS • Reads Information in Complete History Database • Displays List of Visited Sites • Opens URLs in Internet Explorer • Adds URLs to Favorites • Copies URLs • Prints URLS • Saves Listing/Ranges as Text File
  • 19. IMAGE & E-MAIL VIEWERS • Views Files • Converts Files • Catalogs Files • Side by Side File Comparisons
  • 20. PASSWORD CRACKING TOOLS • Password Recovery • Allows access to computers • 3 Methods to Crack Passwords – Dictionary Attack – Hybrid Attack – Brute Force Attack Source: http://www-128.ibm.com/developerworks/library/s-crack/
  • 21. OPEN SOURCE TOOLS • Free tools available to Computer Forensic Specialists • Cover entire scope of forensic tools in use • May more clearly and comprehensively meet the Daubert guidelines than closed source tools • Among the most widely used Source: http://software.newsforge.com/software/05/04/05/2052235.shtml?tid=129&tid=136&t
  • 22. MOBILE DEVICE TOOLS • Number and variety of toolkits considerably more limited than for computers • Require examiner to have full access to device • Most tools focus on a single function • Deleted data remains on PDA until successful HotSync with computer Sources: http://csrc.nist.gov/publications/nistir/nistir-7100-PDAForensics.pdf http://www.cs.ucf.edu/courses/cgs5132/spring2002/presentation/weiss.ppt#5
  • 23. FORENSIC TOOL SUITES – Parben • Provide a lower cost way to – The Coroner’s maximize the tools Toolkit (TCT) • Typically include the most – The Sleuth Kit often used tools (TSK) – EnCase – Forensic Toolkit (FTK) – Maresware
  • 24. OVERVIEW OF SYSTEMS SECURITY • Ten guidelines: – Remove personally identifiable data from storage media – Store an identical copy of any evidentiary media given to law enforcement – Limit search to goal of investigation – Handle time stamped events in strictest confidence – On networks, packet acknowledgement be via the use of tokens than IP addresses
  • 25. OVERVIEW OF SYSTEMS SECURITY (Cont’) • Safe storage of all internal logs • Preservation of event logs in external nodes • Put policies in place for actionable items related to attacks • Put policies in place for safeguarding backed up data related to an investigation • Handle disposal of sensitive data in a secure manner
  • 26. COMPUTER FORENSICS AS A PROFESSION? • Attitudes to computer forensics – Academic – Application of computer science – Application of forensic science – Narrow specialism – Aligned to computer security – Core discipline
  • 27. ETHICAL BEHAVIOUR IN COMPUTER FORENSICS • There is a very fine line between what is acceptable and what is deemed to be malpractice • Computer Forensics exists in an ethical grey area • Often need to balance self motivation versus legal constraints and procedural considerations
  • 28. Ethical Behaviour in Computer Forensics • Need to understand the ethical responsibility in Computer Forensics work is to: – Self – Profession – Clients – Subjects – Courts – Society
  • 29. COMPUTER FORENSICS ETHICAL STANDARDS • What is worse? – Failing to convict the guilty – Convicting the innocent • The role of the investigator is to expose the evidence from a neutral point of view • The Auld Report states that – “It is the duty of an expert to help the court on the matters within his expertise. The duty overrides any obligation to the person from whom he has received instruction or by whom he is paid”
  • 30. PSYCHOLOGY OF INVESTIGATION • Evaluate the allegation – Who made it ? – Is there a hidden agenda ? • Avoid presumption of guilt • Avoid desire to win • Show all the evidence both contrary and supporting the accusation
  • 31. PSYCHOLOGY OF INVESTIGATION • Ask yourself the questions – Could the person be innocent ? – Could someone else have done it ? • Keep an open mind • Be impartial • Be rigorous and professional
  • 32. COMPUTER FORENSICS PRACTITIONERS REQUIRE AWARENESS • To help in making decisions about “doing the right thing”. • To provide material in defending or justifying a particular position. • To protect you as a practitioner. • To consider in terms of practitioner and system liability. • To maintain evidential integrity.
  • 33. QUESTIONING THE LAW • Is the law always ethical ? • Is the law good and just ? • Was apartheid legislation ethical ? • Just because an act or set of circumstances is permitted in computing does not mean that it is ethical.
  • 34. AREAS OF KNOWLEDGE • What laws to consider ? • What impact the laws might have on a particular activity • Critical analysis – Are the laws appropriate ? – Are there contradictions in legal provision? – Can the laws be applied to computer forensics ? – Should the laws be challenged ?
  • 35. EXAMPLE OF REGULATIONS TO CONSIDER • Data Protection Act 1998 – Right of access, Right to prevent processing, Right to compensation • Computer Misuse Act 1990 and Computer Misuse (Amendment) Act 2002 • Regulation of Investigatory Powers Act 2000
  • 36. Example of Regulations to Consider • Human Rights Act 1998 • Disability Discrimination Act (1995) and Special Educational Needs and Disability Act 2001
  • 37. Example of Regulations to Consider • Anti-terrorism, Crime and Security Act 2001 – ISPs (Internet Service Providers) keep track of their customers’ activities over a period of 12 months • Freedom of Information Act 2000 and Freedom of Information (Scotland) Act 2002
  • 38. Example of Regulations to Consider • Theft Act 1968, 1978 • Protection from Harassment Act 1997 • Obscene Publications Act 1959 • Protection of Children Act 1978 • Criminal Justice Act 1988
  • 39. EXAMPLE OF REGULATIONS TO CONSIDER • Sexual Offences Act 2003 • Anti-terrorism, Crime and Security Act 2001 • Patents Act 1977 and the Copyright, Designs and Patents Act 1988 – Intellectual Property, Copyright Law, Patent Law, Trademarks and Passing-off • Design Right (Semiconductor Regulations) 1989
  • 40. PROFESSIONAL BEHAVIOUR IN COMPUTER FORENSICS • Enhance the resolution of crime involving computers and reduce cyber crime • Ensure robust, reliable, valid and safe processes and procedures • Comply with ethical and legal expectations
  • 41. PROFESSIONAL BEHAVIOUR IN COMPUTER FORENSICS • Enhance public confidence in computer forensics • Enhance computer security • Promote awareness and understanding • Requires the ability and competence to make appropriate decisions
  • 42. AREAS OF PROFESSIONAL RESPONSIBILITY • Litigation and Liability • Certification and Licence to practice • Compliance – For example web sites with Disability Discrimination Act • Audit • Dealing with contradictions • Professional and ethical responsibility • Organisational regulation and policy – computing action may be legal but against company policy, e.g. Internet transactions on work computers, e-mail language

Editor's Notes

  1. Electronic data discovery tools are not limited to simply finding the data and metadata. Some of the functions of data acquisition tools are listed above.
  2. Internet history tools are useful in tracking how users have used the internet and sites on the internet that were accessed. This is limited, however, in that there is no way to be sure a site was not accessed by simple searches unless there are multiple sites that are similar in content.
  3. Image and E-mail viewers allow the forensic investigator to view images and E-mails and capture as evidence. Most image and E-mail viewers have the capability to view and access multiple image and E-mail formats.
  4. Dictionary Attack - A dictionary file (a text file full of dictionary words) is loaded into a cracking application, which is run against user accounts located by the application. Because the majority of passwords are often simplistic, running a dictionary attack is often sufficient to to the job. Hybrid Attack - A hybrid attack will add numbers or symbols to the filename to successfully crack a password. Many people change their passwords by simply adding a number to the end of their current password. The pattern usually takes this form: first month password is "cat"; second month password is "cat1"; third month password is "cat2"; and so on. Brute Force Attack - A brute force attack is the most comprehensive form of attack, though it may often take a long time to work depending on the complexity of the password. Some brute force attacks can take a week depending on the complexity of the password.
  5. Open Source tools are often classified as freeware and shareware. They are easily and readily available on the internet. The reason open source tools may more clearly and comprehensively meet the Daubert guidelines is because of their extensive use and the fact that the code can be viewed and assessed by experts in the field to verify its value.
  6. Digital forensic investigation of mobile devices is beginning to come into its own. Because these devices have some differences with computers, different tools are needed and the scope of the tools has not yet matured. Therefore, there are fewer tools available for this type of investigation.
  7. Forensic tool suites are typically an enterprise type of application. While some suites are a collection of separately used tools, called upon as needed, other suites are a collection of integrated software that require the investigator to follow a process and use the different applications sequentially. Many commercially available tool suites can be quite costly and intricate. The Coroner’s Toolkit and The Sleuth Kit are the only open source suites listed above.