Chapter 2 Intro To Digital Forensics
Chapter 2 Intro To Digital Forensics
Chapter 2 Intro To Digital Forensics
• It provides the forensic team with the best techniques and tools to
solve complicated digital-related cases.
After 40 years of history, Digital Forensics is
heading towards a crisis
Early years (1970s- „Golden years“ Era of crisis
1990s) (1990s-2000s) (2010s-...)
•Hans Gross (1847 -1915): First use of scientific study to head criminal investigations
•FBI (1932): Set up a lab to offer forensics services to all field agents and other law authorities across the USA.
•In 1978 the first computer crime was recognized in the Florida Computer Crime Act.
•In 1992, the term Computer Forensics was used in academic literature.
•In 2000, the First FBI Regional Computer Forensic Laboratory established.
•In 2002, Scientific Working Group on Digital Evidence (SWGDE) published the first book about digital forensic called
“Best practices for Computer Forensics”.
•It helps to recover, analyze, and preserve computer and related materials in such a manner that it helps the
investigation agency to present them as evidence in a court of law.
•It helps to postulate the motive behind the crime and identity of the main culprit.
•Designing procedures at a suspected crime scene which helps you to ensure that the digital evidence obtained is not
corrupted.
•Data acquisition and duplication: Recovering deleted files and deleted partitions from digital media to extract the
evidence and validate them.
•Helps you to identify the evidence quickly, and also allows you to estimate the potential impact of the malicious
activity on the victim
•Producing a computer forensic report which offers a complete report on the investigation process.
• Identification
• Preservation
• Analysis
• Documentation
• Presentation
Identification
It is the first step in the forensic process. The identification process mainly includes things like what evidence is
present, where it is stored, and lastly, how it is stored (in which format).
Electronic storage media can be personal computers, Mobile phones, PDAs, etc.
Preservation
In this phase, data is isolated, secured, and preserved. It includes preventing people from using the digital device
so that digital evidence is not tampered with.
Analysis
In this step, investigation agents reconstruct fragments of data and draw conclusions based on evidence found.
However, it might take numerous iterations of examination to support a specific crime theory.
Documentation
In this process, a record of all the visible data must be created. It helps in recreating the crime scene and reviewing
it. It Involves proper documentation of the crime scene along with photographing, sketching, and crime-scene
mapping.
Presentation
In this last step, the process of summarization and explanation of conclusions is done.
Several commercial and open source tools for digital
forensics are available
FTK LiveView
The
Helix
Sleuth Kit
... ...
Types of Digital Forensics
Disk Forensics:
It deals with extracting data from storage media by searching active, modified, or deleted files.
Network Forensics:
It is a sub-branch of digital forensics. It is related to monitoring and analysis of computer network traffic to collect
important information and legal evidence.
Wireless Forensics:
It is a division of network forensics. The main aim of wireless forensics is to offers the tools need to collect and analyze
the data from wireless network traffic.
Database Forensics:
It is a branch of digital forensics relating to the study and examination of databases and their related metadata.
Malware Forensics:
This branch deals with the identification of malicious code, to study their payload, viruses, worms, etc.
Email Forensics
Deals with recovery and analysis of emails, including deleted emails, calendars, and contacts.
Memory Forensics:
It deals with collecting data from system memory (system registers, cache, RAM) in raw form and then carving the data
from Raw dump.
Mobile Phone Forensics:
It mainly deals with the examination and analysis of mobile devices. It helps to retrieve phone and SIM contacts, call
logs, incoming, and outgoing SMS/MMS, Audio, videos, etc.
Challenges faced by Digital Forensics
•The large amount of storage space into Terabytes that makes this investigation job difficult.
In recent time, commercial organizations have used digital forensics in following a type of cases:
•Industrial espionage
•Employment disputes
•Fraud investigations
•Bankruptcy investigations
•Digital evidence accepted into court. However, it is must be proved that there is no tampering
•Producing electronic records and storing them is an extremely costly affair
•Legal practitioners must have extensive computer knowledge
•Need to produce authentic and convincing evidence
•If the tool used for digital forensic is not according to specified standards, then in the court of law, the evidence
can be disapproved by justice.
•Lack of technical knowledge by the investigating officer might not offer the desired result
Summary:
•Digital Forensics is the preservation, identification, extraction, and documentation of computer evidence which can
be used in the court of law
•Different types of Digital Forensics are Disk Forensics, Network Forensics, Wireless Forensics, Database Forensics,
Malware Forensics, Email Forensics, Memory Forensics, etc.
•Digital forensic Science can be used for cases like 1) Intellectual Property theft, 2) Industrial espionage 3)
Employment disputes, 4) Fraud investigations.
What is Incident Response?
• Incident
• “an event or occurrence”
• Data breach
• Cyber attack
• Response
• “a reaction to something”
• The process one uses to handle a cyber attack or data breach
Incident Response 15
WHAT IS INCIDENT RESPONSE?
Any unlawful action when the evidence of such action may be stored on computer
media such as fraud, threats, and traditional crimes.
Phases of an Incident Response
• Includes preparation time, from even before the breach occurs
• Identifying the incident
• Cleaning up the incident and remediation
• A period to look back at the lessons learned during the incident
Incident Response 18
GOALS OF INCIDENT RESPONSE?
• Confirm whether an incident occurred
• ■ Promotes accumulation of accurate information
• ■ Establishes controls for proper retrieval and handling of evidence
• ■ Protects privacy rights established by law and policy
• ■ Minimizes disruption to business and network operations
• ■ Allows for criminal or civil action against perpetrators
• ■ Provides accurate reports and useful recommendations
• ■ Provides rapid detection and containment
• ■ Minimizes exposure and compromise of proprietary data
• ■ Protects your organization’s reputation and assets
• ■ Educates senior management
• ▲ Promotes rapid detection and/or prevention of such incidents in the future (via
lessons learned, policy changes, and so on)
WHO IS INVOLVED IN THE INCIDENT RESPONSE PROCESS?
Initially, the incident may be reported by an end user, detected by a system administrator,
identified by IDS alerts, or discovered by many other means.
Some of the functional business areas involved in detection and some common in-
dicators of a computer security incident are