SlideShare a Scribd company logo
1
Computer Forensics:
Basics
The Context of
Computer Forensics
By Sakshi Alex
Parul University 2022
2
Debate
 Is digital forensics a “real” scientific
discipline?
– What is digital forensics
– How do you define a scientific discipline?
– Does it really matter?
3
Learning Objectives
 At the end of this section you will be able to:
– Describe the science of digital forensics.
– Categorize the different communities and areas within
digital forensics.
– Explain where computer forensics fits into DFS
– Describe criminalistics as it relates to the investigative
process
– Discuss the 3 A’s of the computer forensics
methodology
– Critically analyze the emerging area of cyber-
criminalistics
– Explain the holistic approach to cyber-forensics
4
Computer Forensics
Fundamentals
Military
Acquisition
Analysis
Examination
Report
Investigation
Criminal
FRYE
FRE 702
Daubert/Kumho
Civil
Federal Rules of Civil Procedure
Sedona
Rowe
Rules of Evidence
Expert Witness
Friend of the Court
Technical Expert
Presentation
Standards & Guidelines
Law Enforcement Private Sector
Computer Forensics
5
Concept Map
Context/Domain
Legal
Technical
Standards & Guidelines
Data Hiding
Profili ng & Issues
Criminal Civil
Disks Structures Filesystem
Bag/tag Acquire Analysis Examine
6
Criminalistics
7
Criminalistics
 Fancy term for Forensic Science
 Forensic Science
– The application of science to those criminal and
civil laws that are enforced by police agencies in a
criminal justice system (Saferstein, 2004)
 Think Sherlock Holmes!!
8
History & Development
 Francis Galton (1822-1911)
– First definitive study of fingerprints
 Sir Arthur Conan Doyle (1887)
– Sherlock Holmes mysteries
 Leone Lattes (1887-1954)
– Discovered blood groupings (A,B,AB, & 0)
 Calvin Goddard (1891-1955)
– Firearms and bullet comparison
 Albert Osborn (1858-1946)
– Developed principles of document examination
 Hans Gross (1847-1915)
– First treatise on using scientific disciplines in criminal
investigations.
9
History & Development
 Edmond Locard (1877-1966)
– Principle of Exchange
 “..when a person commits a crime something is always left at the
scene of the crime that was not present when the person arrived.”
– The purpose of an investigation is to locate identify and
preserve evidence-data on which a judgment or conclusion
can be based.
 FBI (1932)
– National Lab to provide forensic services to all law
enforcement agencies in the country
10
Crime Lab
 Basic services provided
– Physical Science Unit
 Chemistry, physics, geology
– Biology Unit
 DNA, blood, hair & fiber, body fluids, botanical
– Firearms Unit
– Document Examination
– Photography Unit
11
Crime Lab
 Optional Services
– Toxicology Unit
– Latent Fingerprint Unit
– Polygraph Unit
– Voice Print Analysis Unit
– Evidence Collection Unit (Rather new)
12
Other Forensic Science Services
 Forensic Pathology
– Sudden unnatural or violent deaths
 Forensic Anthropology
– Identification of human skeletal remains
 Forensic Entomology
– Insects
 Forensic Psychiatry
 Forensic Psychology
 Forensic Odontology
– Dental
 Forensic Engineering
 ***Digital Forensics***
13
Digital Forensic Science
 Digital Forensic Science (DFS):
“The use of scientifically derived and proven methods toward the
preservation, collection, validation, identification, analysis,
interpretation, documentation and presentation of digital evidence
derived from digital sources for the purpose of facilitating or
furthering the reconstruction of events found to be criminal, or
helping to anticipate unauthorized actions shown to be disruptive to
planned operations.”
Source: (2001). Digital Forensic Research Workshop (DFRWS)
14
Communities
 There at least 3 distinct communities within
Digital Forensics
– Law Enforcement
– Military
– Business & Industry
 Possibly a 4th – Academia
15
Digital Forensic Science
16
Community Objectives
17
The Process
 The primary activities of DFS are investigative in nature.
 The investigative process encompasses
– Identification
– Preservation
– Collection
– Examination
– Analysis
– Presentation
– Decision
18
Investigative Process
19
Subcategories of DFS
 There is a consensus that there are at least 3
distinct types of DFS analysis
– Media Analysis
 Examining physical media for evidence
– Code Analysis
 Review of software for malicious signatures
– Network Analysis
 Scrutinize network traffic and logs to identify and locate
20
Media Analysis
 May often be referred to as computer
forensics.
 More accurate to call it media analysis as the
focus is on the various storage medium (e.g.,
hard drives, RAM, flash memory, PDAs,
diskettes etc.)
 Excludes network analysis.
21
Computer Forensics
 Computer forensics is the scientific
examination and analysis of data held on,
or retrieved from, computer storage
media in such a way that the information
can be used as evidence in a court of law.
22
Computer Forensic Activities
 Computer forensics activities commonly include:
– the secure collection of computer data
– the identification of suspect data
– the examination of suspect data to determine details
such as origin and content
– the presentation of computer-based information to
courts of law
– the application of a country's laws to computer
practice.
23
The 3 As
 The basic methodology consists of the 3
As:
– Acquire the evidence without altering or
damaging the original
– Authenticate the image
– Analyze the data without modifying it
24
Computer Forensics - History
 1984 FBI Computer Analysis and Response Team
(CART)
 1991 International Law Enforcement meeting to
discuss computer forensics & the need for
standardized approach
 1997 Scientific Working Group on Digital Evidence
(SWGDE) established to develop standards
 2001 Digital Forensic Research Workshop (DFRWS)
development of research roadmap
 2003 Still no standards developed or corpus of
knowledge (CK)
25
Context of Computer Forensics
•Homeland Security
•Information Security
•Corporate Espionage
•White Collar Crime
•Child Pornography
•Traditional Crime
•Incident Response
•Employee Monitoring
•Privacy Issues
•????
Digital Forensics
Computer Forensics
26
Fit with Information Assurance
 Computer Forensics is part of the incident
response (IR) capability
 Forensic “friendly” procedures & processes
 Proper evidence management and handling
 IR is an integral part of IA
27
Incident Response Methodology
(PDCAERF)
Preparation Detection Containment Analysis Eradication Recovery Follow-up
Feed Back
Digital Forensics/Evidence Management
28
(PDCAERF)
 Preparation
– Being ready to respond
– Procedures & policies
– Resources & CSIRT creation
– Current vulnerabilities & counter-measures
 Detection/Notification
– Determining if an incident or attempt has been made
– IDS
– Initial actions/reactions
– Determining the scope
– Reporting process
29
(PDCAERF)
 Containment
– Limit the extent of an attack
– Mitigate the potential damage & loss
– Containment strategies
 Analysis & Tracking
– How the incident occurred
– More in-depth analysis of the event
– Tracing the incident back to its source
30
(PDCAERF)
 Eradication/ Repair-Recovery
– Recovering systems
– Getting rid of the causes of the incident,
vulnerabilities or the residue (rootkits, trojan
horses etc.)
– Hardening systems
– Dealing with patches
31
(PDCAERF)
 Follow-up
– Review the incident and how it was handled
– Postmortem analysis
– Lessons learned
– Follow-up reporting
32
Challenges
 Eric Holder, Deputy Attorney General of the United States
Subcommittee on Crime of the House Committee on the
Judiciary and the Subcommittee on Criminal Oversight of
the Senate Committee on the Judiciary:
 Technical challenges that hinder law enforcement’s ability to
find and prosecute criminals operating online;
 Legal challenges resulting from laws and legal tools needed
to investigate cybercrime lagging behind technological,
structural, social changes; and
 Resource challenges to ensure we have satisfied critical
investigative and prosecutorial needs at all levels of
government.
33
Challenges
 NIJ 2001 Study
 There is near-term window of opportunity for law enforcement
to gain a foothold in containing electronic crimes.
 Most State and local law enforcement agencies report that
they lack adequate training, equipment and staff to meet their
present and future needs to combat electronic crime.
 Greater awareness of electronic crime should be promoted for
all stakeholders, including prosecutors, judges, academia,
industry, and the general public.
34
General Challenges
 Computer forensics is in its infancy
 Different from other forensic sciences as the media that
is examined and the tools/techniques for the examiner
are products of a market-driven private sector
 No real basic theoretical background upon which to
conduct empirical hypothesis testing
 No true professional designations
 Proper training
 At least 3 different “communities” with different
demands
 Still more of a “folk art” than a true science
35
Legal Challenges
 Status as scientific evidence??
 Criteria for admissibility of novel scientific evidence (Daubert
v. Merrell)
– Whether the theory or technique has been reliably tested;
– Whether the theory or technique has been subject to peer review
and publication;
– What is the known or potential rate of error of the method used;
and
– Whether the theory or method has been generally accepted by the
scientific community.
 Kumho Tire extended the criteria to technical knowledge
36
Specific Challenges
 No International Definitions of Computer Crime
 No International agreements on extraditions
 Multitude of OS platforms and filesystems
 Incredibly large storage capacity
– 100 Gig Plus
– Terabytes
– SANs
37
Specific Challenges
 Small footprint storage devices
– Compact flash
– Memory sticks
– Thumb drives
– Secure digital
 Networked environments
 RAID systems
 Grid computing
 Embedded processors
 Other??
38
Specific Challenges
 Where is the “crime scene?”
Perpetrator’s
System
Victim’s
System
Electronic Crime
Scene
Cyberspace
39
Specific Challenges
 What constitutes evidence??
 What are we looking for??
40
Summary
 DFS is a sub-discipline of criminalistics
 DFS is a relatively new science
 3 Communities
– Legal, Military, Private Sector/Academic
 DFS is primarily investigative in nature
 DFS is made up of
– Media Analysis
– Code Analysis
– Network Analysis
41
Summary
 Computer Forensics is a sub-discipline within DFS
 Computer Forensics is part of an IR capability
 3 A’s of the Computer Forensic Methodology
 There are many general and specific challenges
 There is a lack of basic research in this area
 Both DFS and Computer Forensics are immature
emerging areas

More Related Content

Similar to sakshi Computer_forensics_ppt.ppt

L11 - Intro to Computer Forensics.ppt
L11 - Intro to Computer Forensics.pptL11 - Intro to Computer Forensics.ppt
L11 - Intro to Computer Forensics.ppt
RebeccaMunasheChimhe
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
Dhiren Gala
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
Shashi Mishra
 
Ch 3C Processing Crime and Incident Scenes.ppt
Ch 3C Processing Crime and Incident Scenes.pptCh 3C Processing Crime and Incident Scenes.ppt
Ch 3C Processing Crime and Incident Scenes.ppt
whbwi21Basri
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
Mayank Diwakar
 
Digital&computforensic
Digital&computforensicDigital&computforensic
Digital&computforensic
Rahul Badekar
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
ibraheem ogundele
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
ssuser2bf502
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
DaniyaHuzaifa
 
computer forensics
computer forensicscomputer forensics
computer forensics
shivi123456
 
SFScon19 - Alessandro Farina - Open Source Forensics
SFScon19 - Alessandro Farina - Open Source ForensicsSFScon19 - Alessandro Farina - Open Source Forensics
SFScon19 - Alessandro Farina - Open Source Forensics
South Tyrol Free Software Conference
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
Milap Oza
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
myturtlegame
 
Forensics for IT, final attempt
Forensics for IT, final attemptForensics for IT, final attempt
Forensics for IT, final attempt
j9lai
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecast
j9lai
 
ACC 626 - Forensics for IT
ACC 626 - Forensics for ITACC 626 - Forensics for IT
ACC 626 - Forensics for IT
j9lai
 
ACC 626 - Forensics for IT
ACC 626 - Forensics for ITACC 626 - Forensics for IT
ACC 626 - Forensics for IT
j9lai
 
Forensics for IT - ACC 626
Forensics for IT - ACC 626Forensics for IT - ACC 626
Forensics for IT - ACC 626
j9lai
 
Acc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for ITAcc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for IT
j9lai
 

Similar to sakshi Computer_forensics_ppt.ppt (20)

L11 - Intro to Computer Forensics.ppt
L11 - Intro to Computer Forensics.pptL11 - Intro to Computer Forensics.ppt
L11 - Intro to Computer Forensics.ppt
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Ch 3C Processing Crime and Incident Scenes.ppt
Ch 3C Processing Crime and Incident Scenes.pptCh 3C Processing Crime and Incident Scenes.ppt
Ch 3C Processing Crime and Incident Scenes.ppt
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
 
Digital&computforensic
Digital&computforensicDigital&computforensic
Digital&computforensic
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
SFScon19 - Alessandro Farina - Open Source Forensics
SFScon19 - Alessandro Farina - Open Source ForensicsSFScon19 - Alessandro Farina - Open Source Forensics
SFScon19 - Alessandro Farina - Open Source Forensics
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Forensics for IT, final attempt
Forensics for IT, final attemptForensics for IT, final attempt
Forensics for IT, final attempt
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecast
 
ACC 626 - Forensics for IT
ACC 626 - Forensics for ITACC 626 - Forensics for IT
ACC 626 - Forensics for IT
 
ACC 626 - Forensics for IT
ACC 626 - Forensics for ITACC 626 - Forensics for IT
ACC 626 - Forensics for IT
 
Forensics for IT - ACC 626
Forensics for IT - ACC 626Forensics for IT - ACC 626
Forensics for IT - ACC 626
 
Acc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for ITAcc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for IT
 

Recently uploaded

ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Aggregage
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
roli9797
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
74nqk8xf
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
Bill641377
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
bopyb
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
soxrziqu
 
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
74nqk8xf
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
Sm321
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
AndrzejJarynowski
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
jitskeb
 
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
74nqk8xf
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
v7oacc3l
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
sameer shah
 
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
zsjl4mimo
 
State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
kuntobimo2016
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
g4dpvqap0
 

Recently uploaded (20)

ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
 
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
 
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
 
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
 
State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
 

sakshi Computer_forensics_ppt.ppt

  • 1. 1 Computer Forensics: Basics The Context of Computer Forensics By Sakshi Alex Parul University 2022
  • 2. 2 Debate  Is digital forensics a “real” scientific discipline? – What is digital forensics – How do you define a scientific discipline? – Does it really matter?
  • 3. 3 Learning Objectives  At the end of this section you will be able to: – Describe the science of digital forensics. – Categorize the different communities and areas within digital forensics. – Explain where computer forensics fits into DFS – Describe criminalistics as it relates to the investigative process – Discuss the 3 A’s of the computer forensics methodology – Critically analyze the emerging area of cyber- criminalistics – Explain the holistic approach to cyber-forensics
  • 4. 4 Computer Forensics Fundamentals Military Acquisition Analysis Examination Report Investigation Criminal FRYE FRE 702 Daubert/Kumho Civil Federal Rules of Civil Procedure Sedona Rowe Rules of Evidence Expert Witness Friend of the Court Technical Expert Presentation Standards & Guidelines Law Enforcement Private Sector Computer Forensics
  • 5. 5 Concept Map Context/Domain Legal Technical Standards & Guidelines Data Hiding Profili ng & Issues Criminal Civil Disks Structures Filesystem Bag/tag Acquire Analysis Examine
  • 7. 7 Criminalistics  Fancy term for Forensic Science  Forensic Science – The application of science to those criminal and civil laws that are enforced by police agencies in a criminal justice system (Saferstein, 2004)  Think Sherlock Holmes!!
  • 8. 8 History & Development  Francis Galton (1822-1911) – First definitive study of fingerprints  Sir Arthur Conan Doyle (1887) – Sherlock Holmes mysteries  Leone Lattes (1887-1954) – Discovered blood groupings (A,B,AB, & 0)  Calvin Goddard (1891-1955) – Firearms and bullet comparison  Albert Osborn (1858-1946) – Developed principles of document examination  Hans Gross (1847-1915) – First treatise on using scientific disciplines in criminal investigations.
  • 9. 9 History & Development  Edmond Locard (1877-1966) – Principle of Exchange  “..when a person commits a crime something is always left at the scene of the crime that was not present when the person arrived.” – The purpose of an investigation is to locate identify and preserve evidence-data on which a judgment or conclusion can be based.  FBI (1932) – National Lab to provide forensic services to all law enforcement agencies in the country
  • 10. 10 Crime Lab  Basic services provided – Physical Science Unit  Chemistry, physics, geology – Biology Unit  DNA, blood, hair & fiber, body fluids, botanical – Firearms Unit – Document Examination – Photography Unit
  • 11. 11 Crime Lab  Optional Services – Toxicology Unit – Latent Fingerprint Unit – Polygraph Unit – Voice Print Analysis Unit – Evidence Collection Unit (Rather new)
  • 12. 12 Other Forensic Science Services  Forensic Pathology – Sudden unnatural or violent deaths  Forensic Anthropology – Identification of human skeletal remains  Forensic Entomology – Insects  Forensic Psychiatry  Forensic Psychology  Forensic Odontology – Dental  Forensic Engineering  ***Digital Forensics***
  • 13. 13 Digital Forensic Science  Digital Forensic Science (DFS): “The use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations.” Source: (2001). Digital Forensic Research Workshop (DFRWS)
  • 14. 14 Communities  There at least 3 distinct communities within Digital Forensics – Law Enforcement – Military – Business & Industry  Possibly a 4th – Academia
  • 17. 17 The Process  The primary activities of DFS are investigative in nature.  The investigative process encompasses – Identification – Preservation – Collection – Examination – Analysis – Presentation – Decision
  • 19. 19 Subcategories of DFS  There is a consensus that there are at least 3 distinct types of DFS analysis – Media Analysis  Examining physical media for evidence – Code Analysis  Review of software for malicious signatures – Network Analysis  Scrutinize network traffic and logs to identify and locate
  • 20. 20 Media Analysis  May often be referred to as computer forensics.  More accurate to call it media analysis as the focus is on the various storage medium (e.g., hard drives, RAM, flash memory, PDAs, diskettes etc.)  Excludes network analysis.
  • 21. 21 Computer Forensics  Computer forensics is the scientific examination and analysis of data held on, or retrieved from, computer storage media in such a way that the information can be used as evidence in a court of law.
  • 22. 22 Computer Forensic Activities  Computer forensics activities commonly include: – the secure collection of computer data – the identification of suspect data – the examination of suspect data to determine details such as origin and content – the presentation of computer-based information to courts of law – the application of a country's laws to computer practice.
  • 23. 23 The 3 As  The basic methodology consists of the 3 As: – Acquire the evidence without altering or damaging the original – Authenticate the image – Analyze the data without modifying it
  • 24. 24 Computer Forensics - History  1984 FBI Computer Analysis and Response Team (CART)  1991 International Law Enforcement meeting to discuss computer forensics & the need for standardized approach  1997 Scientific Working Group on Digital Evidence (SWGDE) established to develop standards  2001 Digital Forensic Research Workshop (DFRWS) development of research roadmap  2003 Still no standards developed or corpus of knowledge (CK)
  • 25. 25 Context of Computer Forensics •Homeland Security •Information Security •Corporate Espionage •White Collar Crime •Child Pornography •Traditional Crime •Incident Response •Employee Monitoring •Privacy Issues •???? Digital Forensics Computer Forensics
  • 26. 26 Fit with Information Assurance  Computer Forensics is part of the incident response (IR) capability  Forensic “friendly” procedures & processes  Proper evidence management and handling  IR is an integral part of IA
  • 27. 27 Incident Response Methodology (PDCAERF) Preparation Detection Containment Analysis Eradication Recovery Follow-up Feed Back Digital Forensics/Evidence Management
  • 28. 28 (PDCAERF)  Preparation – Being ready to respond – Procedures & policies – Resources & CSIRT creation – Current vulnerabilities & counter-measures  Detection/Notification – Determining if an incident or attempt has been made – IDS – Initial actions/reactions – Determining the scope – Reporting process
  • 29. 29 (PDCAERF)  Containment – Limit the extent of an attack – Mitigate the potential damage & loss – Containment strategies  Analysis & Tracking – How the incident occurred – More in-depth analysis of the event – Tracing the incident back to its source
  • 30. 30 (PDCAERF)  Eradication/ Repair-Recovery – Recovering systems – Getting rid of the causes of the incident, vulnerabilities or the residue (rootkits, trojan horses etc.) – Hardening systems – Dealing with patches
  • 31. 31 (PDCAERF)  Follow-up – Review the incident and how it was handled – Postmortem analysis – Lessons learned – Follow-up reporting
  • 32. 32 Challenges  Eric Holder, Deputy Attorney General of the United States Subcommittee on Crime of the House Committee on the Judiciary and the Subcommittee on Criminal Oversight of the Senate Committee on the Judiciary:  Technical challenges that hinder law enforcement’s ability to find and prosecute criminals operating online;  Legal challenges resulting from laws and legal tools needed to investigate cybercrime lagging behind technological, structural, social changes; and  Resource challenges to ensure we have satisfied critical investigative and prosecutorial needs at all levels of government.
  • 33. 33 Challenges  NIJ 2001 Study  There is near-term window of opportunity for law enforcement to gain a foothold in containing electronic crimes.  Most State and local law enforcement agencies report that they lack adequate training, equipment and staff to meet their present and future needs to combat electronic crime.  Greater awareness of electronic crime should be promoted for all stakeholders, including prosecutors, judges, academia, industry, and the general public.
  • 34. 34 General Challenges  Computer forensics is in its infancy  Different from other forensic sciences as the media that is examined and the tools/techniques for the examiner are products of a market-driven private sector  No real basic theoretical background upon which to conduct empirical hypothesis testing  No true professional designations  Proper training  At least 3 different “communities” with different demands  Still more of a “folk art” than a true science
  • 35. 35 Legal Challenges  Status as scientific evidence??  Criteria for admissibility of novel scientific evidence (Daubert v. Merrell) – Whether the theory or technique has been reliably tested; – Whether the theory or technique has been subject to peer review and publication; – What is the known or potential rate of error of the method used; and – Whether the theory or method has been generally accepted by the scientific community.  Kumho Tire extended the criteria to technical knowledge
  • 36. 36 Specific Challenges  No International Definitions of Computer Crime  No International agreements on extraditions  Multitude of OS platforms and filesystems  Incredibly large storage capacity – 100 Gig Plus – Terabytes – SANs
  • 37. 37 Specific Challenges  Small footprint storage devices – Compact flash – Memory sticks – Thumb drives – Secure digital  Networked environments  RAID systems  Grid computing  Embedded processors  Other??
  • 38. 38 Specific Challenges  Where is the “crime scene?” Perpetrator’s System Victim’s System Electronic Crime Scene Cyberspace
  • 39. 39 Specific Challenges  What constitutes evidence??  What are we looking for??
  • 40. 40 Summary  DFS is a sub-discipline of criminalistics  DFS is a relatively new science  3 Communities – Legal, Military, Private Sector/Academic  DFS is primarily investigative in nature  DFS is made up of – Media Analysis – Code Analysis – Network Analysis
  • 41. 41 Summary  Computer Forensics is a sub-discipline within DFS  Computer Forensics is part of an IR capability  3 A’s of the Computer Forensic Methodology  There are many general and specific challenges  There is a lack of basic research in this area  Both DFS and Computer Forensics are immature emerging areas