Chapter Four
Chapter Four
Chapter Four
Computer Forensics
1
What do we mean forensics?
• Forensics is the process of using scientific knowledge for
collecting, analyzing, and presenting evidence to the courts.
2
Computer forensics
3
Computer / Digital Forensics
• Emerging discipline in computer security
• Investigation that takes place after an incident has
happened
4
Purpose of Digital Forensics
• The most common use of digital forensics is to support or
disprove a hypothesis in a criminal or civil court:
6
Benefits of forensics
• Computer forensics assists in Law Enforcement. This can
include:
1. Recovering deleted files such as documents, graphics,
and photos
8
Objectives of computer forensics
11
Process of computer forensics
1. Identification
– It is the first step in the forensic process.
– The identification process mainly includes things like what
evidence is present, where it is stored, and lastly, how it is
stored (in which format).
– Electronic storage media can be personal computers,
Mobile phones, PDAs, etc.
2. Preservation
– In this phase, data is isolated, secured, and preserved.
– It includes preventing people from using the digital device
so that digital evidence is not tampered with.
12
Process of Computer forensics
3. Analysis
– In this step, investigation agents reconstruct fragments of
data and draw conclusions based on evidence found.
– However, it might take numerous iterations of examination
to support a specific crime theory.
4. Documentation
– In this process, a record of all the visible data must be
created.
– It helps in recreating the crime scene and reviewing it.
– It Involves proper documentation of the crime scene along
with photographing, sketching, and crime-scene mapping.
13
Process of Computer forensics
5. Presentation
– process of summarization and explanation of conclusions
is done.
– should be written in a layperson’s terms using abstracted
terminologies.
14
Types of Computer Forensics
1. Disk Forensics
– It deals with extracting data from storage media by
searching active, modified, or deleted files.
2. Network Forensics
– It is a sub-branch of digital forensics.
– It is related to monitoring and analysis of computer
network traffic to collect important information and legal
evidence.
3. Wireless Forensics
– It is a division of network forensics.
– The main aim of wireless forensics is to offers the tools
need to collect and analyze the data from wireless network
15
Types of Computer Forensics
4. Database Forensics
– It is a branch of digital forensics relating to the study and
examination of databases and their related metadata.
5. Malware Forensics:
– This branch deals with the identification of malicious code,
to study their payload, viruses, worms, etc.
6. Email Forensics
– Deals with recovery and analysis of emails, including
deleted emails, calendars, and contacts.
16
Types of Computer Forensics
7. Memory Forensics
– It deals with collecting data from system memory (system
registers, cache, RAM) in raw form and then carving the
data from Raw dump.
17
Computer Crimes
• Alternatively referred to as
– cyber crime,
– e-crime,
– electronic crime, or
– hi-tech crime.
• Computer crime is an act performed by a knowledgeable
computer user, sometimes referred to as a hacker that illegally
browses or steals a company's or individual's private
information.
• There are more than 3 billion indexed Web pages world wide.
22
22
Challenges of computer forensics (2)
• How to collect the specific, probative, and case-related
information from very large groups of files?
– Link analysis
– Visualization
23
23
Challenges of computer forensics (3)
• Computer forensics must also adapt quickly to new products
and innovations with valid and reliable examination and
analysis techniques.
• The increase of PC’s and extensive use of internet access
• Easy availability of hacking tools
• Lack of physical evidence makes prosecution difficult.
• The large amount of storage space into Terabytes that makes
this investigation job difficult.
• Any technological changes require an upgrade or changes to
solutions.
24
24
Advantages of Digital forensics
Thanks
27