Chapter 1

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 30

CHAPTER 1 : ITT 593 : INTRODUCTION TO

DIGITAL FORENSIC
INTRODUCTION TO
DIGITAL FORENSIC  Key developments
 Digital devices in society
 Technology and culture
 Defining digital forensics
 Digital forensic investigation
process

1 UITM MELAKA, KAMPUS JASIN


ITT 593 : INTRODUCTION TO
DIGITAL FORENSIC
2

KEY DEVELOPMENTS
 Advances in computer usability
 Digital devices being used by everyone
 Increasing dependence on computer in many aspect
 Low cost hardware

 Pervasive computing
 allowing limitless information exchange
 Network evolution – LAN & WAN
 Any types of data that have flexibility to work on different
platform.

 Nano technology
 Smaller devices – end machine and network equipment

UITM MELAKA, KAMPUS JASIN


ITT 593 : INTRODUCTION TO
DIGITAL FORENSICs
3

DIGITAL DEVICES IN SOCIETY


 Results
of 40 years of innovation, today’s society
become technology dependent.
 Vehicle : engine management in modern car
 Entertainment : MP3 player, CD player, Blueray
 Communications : mobile phone
 Lifestyle management : PDA, smartphone
 Anonymity : society operates globally, but
perform activities locally.
 All users including criminals have equals access
to technology, regardless their intention.

UITM MELAKA, KAMPUS JASIN


ITT 593 : INTRODUCTION TO
DIGITAL FORENSICs
4

TECHNOLOGY AND CULTURES


 Technology has been a driven factor of culture
change.
 People share interest globally - common interest
were express through a particular group.
 Fashion are shared worldwide - results of online
business & supportive communication channel.
 Changes of communication – personal and group
communication.

UITM MELAKA, KAMPUS JASIN


ITT 593 : INTRODUCTION TO
DIGITAL FORENSICs
5

UITM MELAKA, KAMPUS JASIN


ITT 593 : INTRODUCTION TO
DIGITAL FORENSICs
6

Computer Forensics
 Determining the past actions that have taken
place on a computer system
 Using artifacts—files, settings, or system changes
that occur when the user or the OS performs a
specific action
 Ex: Creation date of a user's home directory
shows the first time that user logged in
 Testing is essential—don't trust anyone else

UITM MELAKA, KAMPUS JASIN


What You Can Do with Computer
Forensics

 Recover deleted files


 Find out what external devices have been
attached
 Determine what programs have been run
 See what web pages users have viewed, their
email, chat logs
 SMS messages from phones
 Find malware and determine what it has done
IT or Infosec Professionals

 Computer security professionals are drawn into


forensics by incident response
 How did attacker get into a system?
 What damage was done?
 Other issues
 Stalking
 Inappropriate Web use
 Tracking emails
Incident Response vs.
Computer Forensics
 Incident Response examines a live running system
 Computer Forensics classically focused on post-mortem
analysis of a static disk image
 A forensic image is a complete bitwise copy of an entire hard
disk
 Or SSD, flash drive, RAM, etc.
RAM Analysis

 Until recently, forensics focused on the hard disk


and RAM was considered unimportant
 This has reversed in the last few years
 The projects reflect this
 First we do RAM analysis
 Hard disk images come later
Introduction to Forensic General Terms
Information is the quantity required for
preservation/collection. Information is an element of an
organization’s regular operations
Records are a form of information, regardless of the
medium or format, that have value to an organization.
The term is used to describe both documents and
recorded data.
Evidence can be anything (testimony, documents, tangible
objects) that tends to prove or disprove the existence of
an alleged fact .
E-discovery is a related term that has gained use to
incorporate electronically stored information (ESI) into
the discovery process which is compulsory disclosure, at a
party's request, of information that relates to the
litigation.
Authenticity is “the act of proving that something (as a
document) is true or genuine, especially so that it may be
admitted as evidence.
Chain of custody is a process of handling evidence which
creates and maintains a transaction record for each
individual who assumes or releases possession of the
evidence.
The chain of custody record provides both a continuity of
custody from acquisition to presentation and a list of
individuals who have had possession of the evidence.
Integrity of data is defined as “a requirement that information
and programs are changed only in a specified and authorized
manner”. The unauthorized alteration of data occur
intentionally or unintentionally, can affect the weight of the
evidence in court
Hashing is defined as the process of taking an amount of data
(such as a file or the image of a hard drive) and applying a
“complex mathematical algorithm to generate a relatively
compact numerical identifier (the hash value)unique to that
data”. Two non-identical pieces of data generating the same
hash value are remote

C-DAC All Rights Reserved


Key Elements of Computer Forensics

Preliminary Analysis Incident


Awareness
Consultation

Deposition/
Affidavit
Image
Acquisition/
Recovery

Detailed Preliminary/ Presentation


Analysis Final Report
Various Data Types
 Volatiledata, which is in use by a system but not written
to media
 data in memory, network status, and connections and
running processes.
 Semi-volatile data: Data that are overwritten after a
period
 Temporary files, program logs
 System and data backups generated as part of an
organization’s regular operations

C-DAC All Rights Reserved


Workflow of Cyber Crime Investigation
Parties Involve in Different Stages of
Investigation
Search warrant to carry out Investigating officer & legal
search & seize advisor

Search, seizure and Investigating officer


transport of digital principal investigator &
evidence legal advisor

Forensic Analysis of Digital forensic expert


Digital evidence

Preparation of analysis
report Forensic expert with
assistance legal advisor

Preparation and Investigating officer ,


presentation of case in principal investigator &
court of law legal advisor
Cyber Forensic Procedures
Step1
Step 1: Verification

• Verification is concerned with confirming that an


incident or action has occurred that warrants the
initiation of a forensic investigation
• The criteria for verification can come from multiple
sources; an organization’s internal policies, local, state, or
federal law, an organization’s internal policies

C-DAC All Rights Reserved


Cyber Forensic Procedures: Step Two
Step 2: Identification and System Description:

• From an eDiscovery perspective this is the point at which the


triggering event has occurred and been verified . Potential
sources of data (such as systems), subject matter experts
(such as forensic analysts) and other required resources will
be identified and allocated at this point.

• From a forensic investigation perspective this is the point at


which detailed descriptions of the systems in scope will be
collected by the forensic analyst or security practitioner.

C-DAC All Rights Reserved


Cyber Forensic Procedures: Step Three
Step3: Preservation, Collection and Evidence Acquisition:

• concerned with acquiring relevant data in scope in a manner


that minimizes data loss in a manner that is legally defensible,
auditable, proportionate, reasonable and efficient.
• Forensic investigation is primarily concerned with the
following four principles; the minimization of data loss, the
recording of detailed notes, the analysis of collected data
and reporting findings
• Systems and data in scope should be handled in such a way
to avoid data destruction and a preservation plan should be
developed prior to execution
Step 3 Guidelines
Guide lines of step 3
• Consistency of Process: Organizations should perform forensic
investigations using a consistent process to preserve/collect data in a
legally defensible manner.
• Use Forensic Toolkits
• Live Acquisition is Best: When possible, the acquisition of a
“live” system (including volatile data) should be achieved. This type
of acquisition will capture a snapshot of the system in question
including the contents of memory, running processes, and network
connections as well as allocated and deleted file
Step 3 Guidelines
• Bit Stream Imaging: Bit stream imaging (a.k.a. disk imaging)
generates a bit-for-bit copy of the original media including
unallocated (deleted) data. Bit stream imaging requires access to the
entire volume, a requirement more easily accomplished with low-
capacity systems.
Logical backups copy the directories and files from a volume .This
process does not capture additional data from the media, such as
deleted files or residual data stored in slack space.
 Make No Changes: During the preservation/collection process do not
alter, delete or add data within reason. The use of forensic toolkits
will help reduce the impact of acquisition and collection on the
target media in read only mood.
Step 3 Guidelines
 Take Hash Value: After All electronic data should be hashed at
the point of acquisition, transfer of custody and modification .
 MD5, SHA-1 hash algorithm can be used for hashing
 Log Everything: Forensic analysts should keep detailed logs of
the actions they perform through the acquisition and collection
process.
 Logs can be created and maintained either on paper or in electronic
form.
 Record and Preserve Chain of Custody:The chain of custody
should be recorded begin with data acquisition, and be
maintained until acceptance as evidence.
Cyber Forensic Procedures: Step Four
Step 4: Processing/Review/Analysis and Media Analysis,
String/Byte Search, Timeline Analysis, Data Recovery:

 This stage involves analyzing the data that has been


collected during step3.
 Processing this data is the most time consuming portion of the
eDiscovery/Forensic Investigation process.
 This involves applying the details of the incident, the verification
and system description information and making educated
decisions when examining this “snapshot” of data for relevant
evidence
Content Analysis
 Content (what type of data)
 Comparison (against known data)
 Transaction (sequence)
 Extraction (of data)
 Deleted Data Files (recovery)
 Format Conversion
 Keyword Searching
 Password (decryption)
 Limited Source Code (analysis or compare)
 Storage Media (many types)
Content Analysis Flow Diagram
Is there more data No
for analysis
Yes
If item or discovered If new Data Search
Who/What information can generate new Leads generated start
•Who/What application created , modified, sent,
received the file Data Search Leads, document Preparation/Extraction
•Who is this item linked to and identified with new leads to “Data search
Lead List”
Where
•Where was it found/where did it came from
•Does it show where relevant event took place If new source of data
lead” generated start
When If item or discovered
•When was it created, accessed, modified, deleted, sent information can generate “Obtaining Imaging
•Time Analysis: what else happened on the system at the Forensic Data”
same time “New Source of Data” ,
document lead on “new
How source of data lead list”
•How did it originated in the media
•How was it created, transmitted, modified, used Start “Forensic
•Does it show how relevant events occurred
Reporting” to
Mark “Relevent Data” item Document findings
Associated artifacts/ Metadata processed on “Relevent Data
•Registry entry
•Application/System logs analysis List”

Use timeline or other methods to


document findings on “Analysis
Results List”
Cyber Forensic Procedures: Step Five
Step 5 Production

 involves the preparation and production of ESI in a In


order to meet the requirement for ESI to be presented in
an agreed upon and usable format
 ESI may need to be converted into a standardized,
searchable format that has already been agreed to by
the parties
 The usable requirement in the presentation of ESI can
involve factors such as search ability, fielded data,
redaction, metadata and summaries.
Cyber Forensic Procedures: Step Six
Step 6 : Presentation and Reporting Results

 Atthis final stage the ESI that has been identified,


acquired, analyzed and prepared will be displayed to an
audience.
 The goal of this stage is to provide targeted evidence to
prove or disprove statement of facts in the overall
context of eliciting further information, validate
existing facts or positions, or persuade an audience
 Target was hacked with
RAM Scrapers
 Credit card #s are
unencrypted in RAM
 Link Ch 1c
ITT 593 : INTRODUCTION TO
30
DIGITAL FORENSICs

UITM MELAKA, KAMPUS JASIN

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy