ETI Unit3 Notes Msbte Store
ETI Unit3 Notes Msbte Store
Rule 5. The examination must be conducted in such a way as to prevent any modification of the
evidence.
Rule 6. The chain of the custody of all evidence must be clearly maintained to provide an audit log of
whom might have accessed the evidence and at what time.
3,14 Definition of Digital Forensics
Digital forensics is a series of steps to uncover and analyses electronic data through scientific
method. Major goal of the process is to duplicate original data and preserve original evidence and
then performing the series of investigation by collecting, identifying and validating digital information
for the purpose of restructuring past events.
3.1.5 Digital Forensic Investigation
Digital forensic investigation (DFI) is a special type of investigation where the scientific
procedures and techniques used will be allowed to view the result- digital evidence- to be admissible
in a court of law.
3.1.6 Goals of Digital Forensic Investigation:
The main objective computer forensic investigation is to examine digital evidences and to
ensure that they have not been tampered in any manner. To achieve this goal investigation must be
able to handle all below obstacles:
1. Handle and locate certain amount of valid data from large amount of files stored in computer
system.
2. It is viable that the information has been deleted, I such situation searching inside the file is
worthless.
3. If the files are secured by some passwords, investigators must find a way to read the protected data
in an unauthorized manner.
4. Data may be stored in damaged device but the investigator searches the data in working devices.
5. Major obstacle is that, each and every case is different identifying the techniques and tools will take
long time.
6. The digital data found should be protected from being modified. It is very tedious to prove that data
under examination is unaltered.
7. Common procedure for investigation and standard techniques for collecting and preserving digital
evidences are desired.
3.2 Models of Digital Forensics
3.2.1 Road map for Digital Forensic Research (RMDFR)
Palmar designed a framework with the following indexed processes shown in Figure 3.1.
Identification
Preservation
Collection
Examination
Analysis
Presentation
Fig. 3.1 Roadmap of Digital Forensic Research
Six Phases of RMDFR are as follows:
1. Identification: It recognizes an incident from indicators and determines its type.
2. Preservation: Preservation stage corresponds to \freezing the crime scene". It consists in stopping
or preventing any activities that can damage digital information being collected. Preservation involves
operations such as preventing people from using computers during collection, stopping ongoing
deletion processes, and choosing the safest way to collect information.
3. Collection: Collection stage consists in finding and collecting digital information that may be
relevant to the investigation. Since digital information is stored in computers, collection of digital
information means either collection of the equipment containing the information, or recording the
information on some medium. Collection máy involve removal of personal computers from the crime
scene, copying or printing out contents of files from a server, recording of network traffic, and so on.
4. Examination: Examination stage consists in a \in-depth systematic search of evidence" relating to
the incident being investigated. The outputs of examination are data objects found in the collected
information. They may include logfiles, data files containing a in specific phrases, times-stamps, and
so on.
5. Analysis: The aim of analysis is to "draw conclusions based on evidence found".
6. Reporting: This entails writing a report outlining the examination process and pertinent and
data recovered from the overall investigation.
3.2.2 Abstract Digital Forensic Model (ADFM)
Reith, Carr, Gunsh proposed Abstract Digital Forensic model in 2002.
Identification
Preservation
Approach Strategy
Preservation
Collection
Examination
Analysis
Presentation
Returning Evidences
3.2 Abstract Digital Forensic Model(ADFM)
Phases of ADFM model are as follows:
1. Identification -it recognizes an incident from indicators and determines its type.
2. Preparation -it involves the preparation of tools, techniques, search warrants and monitoring
authorization and management support
3. Approach strategy -formulating procedures and approach to use in order to maximize the collection
of untainted evidence while minimizing the impact to the victim.
4. Preservation-it involves the isolation, securing and preserving the state of physicaland digital
evidence.
5. Collection -This is to record the physical scene and duplicate digital evidence usingstandardized and
accepted procedures
6. Examination -An in-depth systematic search of evidence relating to the suspected crime. This
focuses on identifying and locating potential evidence.
7. Analysis -This determines importance and probative value to the case of the examined product
8. Presentation -Summary and explanation of conclusion
9. Returning Evidence -Physical and digital property returned to proper owner.
3.2.3 Integrated Digital Investigation Process (IDIP)
DFPM along with5 groups and 17 phases are proposed by Carrier and
Safford. DFPM is named the Integrated Digital Investigation Process (IDIP). The groups are indexed as
shown in following Figure 2.3.
Identification
Preservation
Collection
Examination
Analysis
Presentation
Fig 3.4 End to End Digital Investigation Process
3.2.5 An Extended Model of Cybercrime Investigation (EMCI)
The DFPM proposed by S. O. Ciardhuain- an Extended Model of Cybercrime Investigation (EMCI )-
is more likely the most comprehensive till date.
Phases of EMCI: The EMCI follows waterfall model as every activity occurs in sequence. The
sequence of examine, hypothesis, present, and prove/defend are bound to be repeated as the
evidence heap increases during the investigation.
1. Awareness is the phase during which the investigator are informed that a crime ha staken place;
the crime is reported to some authority. An intrusion detection system may also triggered such
awareness.
2. Authorization is the stage where the nature of investigation has been identified and the
unplanned authorization may be required to procced and the authorization is obtain internally or
externally.
3. Planning is impacted by information from which and outside the organization that will affect
the investigation. Internal factors are the organization policies, procedures, and former
investigative knowledge while outside factors consist of legal and other requirements not known
by the investigators.
Phases of UMDFPM:
Kohn and Oliver made use of UML and case diagram (Figure 2.6) to demonstrate all the phases
and its interaction with all investigators. Two processes have been added to the activity diagram
to club with Kohn framework. These are "prepare" in the preparation phase and "present" in
presentation phase.
1. The whole process is trigged by criminal activity, which constitutes of starting point, Prepare is
the first step. The rest of the processes follow logically from prepare to collect, authenticate,
examination and the analyze.
2. Authentication is introduce between examination and collection phase to make sure that the
data integrity of the data before the examination is started is preserved.
3. Examination can alter the contents of data such as in the case of compressed files hidden files
and other forms of data incomprehension.
The primary investigator will consider whether to analyze more data or to extract more data from
the original source. After reaching this decision points an evidence report is compiled part of the
report procedure. Whole document is compiled during the investigation phase. The evidence
document is the output of investigation phase.
3.3 Ethical issues in Digital Forensic
Ethics in digital forensic field can be defined as set of moral principles that regulate the use of
computers. Ethical decision making in digital forensic work comprises of one or more of the
following:
1. Honesty towards the investigation
2. Prudence means carefully handling the digital evidences
3. Compliance with the law and professional norms.
3.3.1 General ethical norms for investigator
Investigator should satisfy the following points:
1. To contribute to the society and human being
2. To avoid harm to others
3. To be honest and trustworthy
4. To be fair and take action nót to discriminate
5. To honor property rights, including copyrights and patents
6. To give proper credit to intellectual property
7. To respect the privacy of others
8. To honor confidentiality
9.