Guide to Computer Forensics and Investigations Fifth Edition

Slides:



Advertisements
Similar presentations
Computer Forensics Infosec Pro Guide
Advertisements

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
COEN 252 Computer Forensics
Guide to Computer Forensics and Investigations Fourth Edition
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Guide to Computer Forensics and Investigations, Second Edition
Computer & Network Forensics
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
The M57 Patents Case Investigating criminal activity within m57.biz
Guide to Computer Forensics and Investigations Fifth Edition
Guide to Computer Forensics and Investigations Fourth Edition
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
Guide to Computer Forensics and Investigations Third Edition
Guide to Computer Forensics and Investigations Third Edition
COS/PSA 413 Day 10. Agenda Lab 4 Write-ups are in –Will have corrected by next class Lab 5 write-ups due Oct 19 Assignment 3 posted (due Oct 21) Capstone.
Guide to Computer Forensics and Investigations Fourth Edition
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 5. Agenda Questions? Assignment 2 Redo –Due September 3:35 PM Assignment 3 posted –Due September 3:35 PM Quiz 1 on September.
COS/PSA 413 Lab 4. Agenda Lab 3 write-ups over due –Only got 9 out of 10 Capstone Proposals due TODAY –See guidelines in WebCT –Only got 4 out of 10 so.
COS/PSA 413 Day 5. Agenda Questions? Assignment 2 corrected –Everyone failed this assignment! –Read the questions! Provide answers to THIS case not generic.
COS/PSA 413 Day 2. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Begin.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 9 Data Acquisition.
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
SUMMER BRIDGE PROGRAM DR. HWAJUNG LEE DR. ASHLEY PODHRADSKY Computer Forensics.
Guide to Computer Forensics and Investigations Fourth Edition
Computer Forensics Additional Notes 1. Acknowledgments Dr. David Dampier and the Center for Computer Security Research (CCSR) I downloaded this series.
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
Digital Crime Scene Investigative Process
Introduction to Computer Forensics and Hashing 1.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Computer Forensics Principles and Practices
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University.
Chapter 2 Understanding Computer Investigations
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Guide to Computer Forensics and Investigations Fourth Edition
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Evidence Handling If the evidence is there the case is yours to lose.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Chapter 4 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fifth Edition All slides copyright Cengage Learning with.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
& Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Chapter 3 Data Acquisition Guide to Computer Forensics and Investigations Fifth Edition All slides copyright Cengage Learning with additional info from.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
CIT 180 Security Fundamentals Computer Forensics.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Guide to Computer Forensics and Investigations Fifth Edition
Chapter 7: Investigating Theft Acts
Guide to Computer Forensics and Investigations Fifth Edition
Guide to Computer Forensics and Investigations Third Edition
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Guide to Computer Forensics and Investigations Third Edition
1 Guide to Computer Forensics and Investigations Sixth Edition Chapter 4 Processing Crime and Incident Scenes.
Presentation transcript:

Guide to Computer Forensics and Investigations Fifth Edition Chapter 4 Processing Crime and Incident Scenes Chapter 4 (modified) v2 Processing Crime and Incident Scenes

Documenting Evidence in the Lab Record your activities and findings as you work Maintain a journal to record the steps you take as you process evidence Your goal is to be able to reproduce the same results When you or another investigator repeat the steps you took to collect evidence A journal serves as a reference that documents the methods you used to process digital evidence Documenting Evidence in the Lab Record your activities and findings as you work Maintain a journal to record the steps you take as you process evidence Your goal is to be able to reproduce the same results When you or another investigator repeat the steps you took to collect evidence A journal serves as a reference that documents the methods you used to process digital evidence Guide to Computer Forensics and Investigations Fifth Edition

Processing and Handling Digital Evidence Maintain the integrity of digital evidence in the lab As you do when collecting it in the field Steps to create image files: Copy all image files to a large drive Start your forensics tool to analyze the evidence Run an MD5 or SHA-1 hashing algorithm on the image files to get a digital hash Secure the original media in an evidence locker Processing and Handling Digital Evidence Maintain the integrity of digital evidence in the lab As you do when collecting it in the field Steps to create image files: Copy all image files to a large drive Start your forensics tool to analyze the evidence Run an MD5 or SHA-1 hashing algorithm on the image files to get a digital hash Secure the original media in an evidence locker Guide to Computer Forensics and Investigations Fifth Edition

Storing Digital Evidence The media you use to store digital evidence usually depends on how long you need to keep it CDs, DVDs, DVD-Rs, DVD+Rs, or DVD-RWs The ideal media Capacity: up to 17 GB Lifespan: 2 to 5 years Magnetic tapes - 4-mm DAT Capacity: 40 to 72 GB Lifespan: 30 years Costs: drive: $400 to $800; tape: $40 Storing Digital Evidence The media you use to store digital evidence usually depends on how long you need to keep it CDs, DVDs, DVD-Rs, DVD+Rs, or DVD-RWs The ideal media Capacity: up to 17 GB Lifespan: 2 to 5 years Magnetic tapes - 4-mm DAT Capacity: 40 to 72 GB Lifespan: 30 years Costs: drive: $400 to $800; tape: $40 Guide to Computer Forensics and Investigations Fifth Edition

Storing Digital Evidence Super Digital Linear Tape (Super-DLT or SDLT) Specifically designed for large RAID data backups Can store more than 1 TB of data Smaller external SDLT drives can connect to a workstation through a SCSI card Don’t rely on one media storage method to preserve your evidence Make two copies of every image to prevent data loss Use different tools to create the two images Storing Digital Evidence Super Digital Linear Tape (Super-DLT or SDLT) Specifically designed for large RAID data backups Can store more than 1 TB of data Smaller external SDLT drives can connect to a workstation through a SCSI card Don’t rely on one media storage method to preserve your evidence Make two copies of every image to prevent data loss Use different tools to create the two images Guide to Computer Forensics and Investigations Fifth Edition

Evidence Retention and Media Storage Needs To help maintain the chain of custody for digital evidence Restrict access to lab and evidence storage area Lab should have a sign-in roster for all visitors Maintain logs for a period based on legal requirements You might need to retain evidence indefinitely Check with your local prosecuting attorney’s office or state laws to make sure you’re in compliance Evidence Retention and Media Storage Needs To help maintain the chain of custody for digital evidence Restrict access to lab and evidence storage area Lab should have a sign-in roster for all visitors Maintain logs for a period based on legal requirements You might need to retain evidence indefinitely Check with your local prosecuting attorney’s office or state laws to make sure you’re in compliance Guide to Computer Forensics and Investigations Fifth Edition

Evidence Retention and Media Storage Needs Figure 4-5 A sample log file Guide to Computer Forensics and Investigations Fifth Edition

Documenting Evidence Create or use an evidence custody form An evidence custody form serves the following functions: Identifies the evidence Identifies who has handled the evidence Lists dates and times the evidence was handled You can add more information to your form Such as a section listing MD5 and SHA-1 hash values Documenting Evidence Create or use an evidence custody form An evidence custody form serves the following functions: Identifies the evidence Identifies who has handled the evidence Lists dates and times the evidence was handled You can add more information to your form Such as a section listing MD5 and SHA-1 hash values Guide to Computer Forensics and Investigations Fifth Edition

Documenting Evidence Include any detailed information you might need to reference Evidence bags also include labels or evidence forms you can use to document your evidence Use antistatic bags for electronic components Documenting Evidence Include any detailed information you might need to reference Evidence bags also include labels or evidence forms you can use to document your evidence Use antistatic bags for electronic components Guide to Computer Forensics and Investigations Fifth Edition

Obtaining a Digital Hash Cyclic Redundancy Check (CRC) Mathematical algorithm that determines whether a file’s contents have changed Not considered a forensic hashing algorithm Message Digest 5 (MD5) Mathematical formula that translates a file into a hexadecimal code value, or a hash value If a bit or byte in the file changes, it alters the hash value, which can be used to verify a file or drive has not been tampered with Obtaining a Digital Hash Cyclic Redundancy Check (CRC) Mathematical algorithm that determines whether a file’s contents have changed Not considered a forensic hashing algorithm Message Digest 5 (MD5) Mathematical formula that translates a file into a hexadecimal code value, or a hash value If a bit or byte in the file changes, it alters the hash value, which can be used to verify a file or drive has not been tampered with Guide to Computer Forensics and Investigations Fifth Edition

Obtaining a Digital Hash Three rules for forensic hashes: You can’t predict the hash value of a file or device No two hash values can be the same If anything changes in the file or device, the hash value must change Secure Hash Algorithm version 1 (SHA-1) A newer hashing algorithm Developed by the National Institute of Standards and Technology (NIST) Obtaining a Digital Hash Three rules for forensic hashes: You can’t predict the hash value of a file or device No two hash values can be the same If anything changes in the file or device, the hash value must change Secure Hash Algorithm version 1 (SHA-1) A newer hashing algorithm Developed by the National Institute of Standards and Technology (NIST) Guide to Computer Forensics and Investigations Fifth Edition

Obtaining a Digital Hash In both MD5 and SHA-1, collisions have occurred Most digital forensics hashing needs can be satisfied with a nonkeyed hash set A unique hash number generated by a software tool, such as the Linux md5sum command Keyed hash set Created by an encryption utility’s secret key You can use the MD5 function in FTK Imager to obtain the digital signature of a file Or an entire drive Obtaining a Digital Hash In both MD5 and SHA-1, collisions have occurred Most digital forensics hashing needs can be satisfied with a nonkeyed hash set A unique hash number generated by a software tool, such as the Linux md5sum command Keyed hash set Created by an encryption utility’s secret key You can use the MD5 function in FTK Imager to obtain the digital signature of a file Or an entire drive Guide to Computer Forensics and Investigations Fifth Edition

Obtaining a Digital Hash Figure 4-6 Using FTK Imager to verify hash values Guide to Computer Forensics and Investigations Fifth Edition

Reviewing a Case General tasks you perform in any computer forensics case: Identify the case requirements Plan your investigation Conduct the investigation Complete the case report Critique the case Reviewing a Case General tasks you perform in any computer forensics case: Identify the case requirements Plan your investigation Conduct the investigation Complete the case report Critique the case Guide to Computer Forensics and Investigations Fifth Edition

Sample Civil Investigation Most cases in the corporate environment are considered low-level investigations Or noncriminal cases Common activities and practices Recover specific evidence Suspect’s Outlook e-mail folder (PST file) Covert surveillance Its use must be well defined in the company policy Risk of civil or criminal liability Sniffing tools for data transmissions Sample Civil Investigation Most cases in the corporate environment are considered low-level investigations Or noncriminal cases Common activities and practices Recover specific evidence Suspect’s Outlook e-mail folder (PST file) Covert surveillance Its use must be well defined in the company policy Risk of civil or criminal liability Sniffing tools for data transmissions Guide to Computer Forensics and Investigations Fifth Edition

Sample Criminal Investigation Computer crimes examples Fraud Check fraud Homicides Need a warrant to start seizing evidence Limit searching area Sample Criminal Investigation Computer crimes examples Fraud Check fraud Homicides Need a warrant to start seizing evidence Limit searching area Guide to Computer Forensics and Investigations Fifth Edition

Sample Criminal Investigation Figure 4-7 Search warrant limits Guide to Computer Forensics and Investigations Fifth Edition

Reviewing Background Information for a Case Throughout the book, you use data files from the hypothetical M57 Patents case A new startup company doing art patent searches A computer sold on Craigslist was discovered to contain “kitty” porn It was traced back to M57 Patents An employee is suspected of downloading the porn Reviewing Background Information for a Case Throughout the book, you use data files from the hypothetical M57 Patents case A new startup company doing art patent searches A computer sold on Craigslist was discovered to contain “kitty” porn It was traced back to M57 Patents An employee is suspected of downloading the porn Guide to Computer Forensics and Investigations Fifth Edition

Planning Your Investigation Background information on the case Main players: Pat McGoo, CEO Terry, the IT person Jo and Charlie, the patent researchers Police made forensic copies of: The image of the computer sold on Craigslist Images of five other machines found at M57 Images of four USB drives found at M57 Planning Your Investigation Background information on the case Main players: Pat McGoo, CEO Terry, the IT person Jo and Charlie, the patent researchers Police made forensic copies of: The image of the computer sold on Craigslist Images of five other machines found at M57 Images of four USB drives found at M57 Guide to Computer Forensics and Investigations Fifth Edition

Planning Your Investigation Police made forensic copies of (cont’d): RAM from the imaged machines Network data from the M57 Patents servers Planning Your Investigation Police made forensic copies of (cont’d): RAM from the imaged machines Network data from the M57 Patents servers Guide to Computer Forensics and Investigations Fifth Edition

Conducting the Investigation: Acquiring Evidence with OSForensics Follow the steps outlined on pages 168-172 of the text To use OSForensics to analyze an image file Conducting the Investigation: Acquiring Evidence with OSForensics Follow the steps outlined on pages 168-172 of the text To use OSForensics to analyze an image file Guide to Computer Forensics and Investigations Fifth Edition