1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.

Slides:



Advertisements
Similar presentations
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Advertisements

COEN 252 Computer Forensics
Evidence Collection & Admissibility Computer Forensics BACS 371.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
BACS 371 Computer Forensics
Identifying & Collecting Physical Evidence
Processing a Crime Scene
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
Guide to Computer Forensics and Investigations Fourth Edition
Computer Forensics Principles and Practices
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
Chapter 14: Computer and Network Forensics
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
By Drudeisha Madhub Data Protection Commissioner Date:
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
Guide to Computer Forensics and Investigations, Second Edition
Phases of Computer Forensics 1 Computer Forensics BACS Management Information Systems for the Information Age 5e, Haag, Cummings, McCubbrey, 2005,
Evidence Collection and Crime Scene Investigation.
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
Computer Forensics Iram Qureshi, Prajakta Lokhande.
Digital Crime Scene Investigative Process
Forensic Science: Fundamentals & Investigations, Chapter 2 1 Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you.
Evidence Collection 3 rd Grade Workshop. When a crime has been committed, a team of policemen usually called investigators are sent to the scene of the.
Computer Forensics Principles and Practices
Introduction to Digital Forensics Florian Buchholz.
Criminal Investigations 1.The Crime Scene 2.ID Suspect 3.Informants.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How.
Forensic Science: Fundamentals & Investigations, Chapter 2 1 What Makes a Good Observer? 1.Describe how I moved the first 3 objects in detail. 2.How many.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
STANKIEWICZ. Essential Questions and Learning What is the purpose of criminal Investigation? What are the basic steps in criminal investigations? What.
1 Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you will be able to: summarize Locard’s exchange principle identify.
Crime Scene Investigation & Evidence Collection
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University September 28, 2007.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
1 Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you will be able to: o Summarize Locard’s exchange principle o.
Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you will be able to: summarize Locard’s exchange principle.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA Search.
Forensic Science: Fundamentals & Investigations, Chapter 2 1 Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you.
Forensic Science: Fundamentals & Investigations, Chapter 2 1 Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
CIT 180 Security Fundamentals Computer Forensics.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
#CRIME SCENE INVESTIGATION SHERLOCK INSTITUTE OF FORENSIC SCIENCE INDIA (SIFS INDIA)
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you will be able to: Summarize Locard’s exchange principle.
CSI and Evidence.
Chapter 3 First Response.
Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you will be able to: Summarize Locard’s exchange principle.
Computer Forensics 1 1.
Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you will be able to: summarize Locard’s exchange principle.
Guide to Computer Forensics and Investigations Fifth Edition
Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you will be able to: Summarize Locard’s exchange principle.
Do Now 9/24 Take out your questions for “The Bone Collector” and finish the last two. Forensic Science: Fundamentals & Investigations, Chapter 2.
Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you will be able to: summarize Locard’s exchange principle.
Digital Forensics CJ
Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you will be able to: Summarize Locard’s exchange principle.
Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you will be able to: Summarize Locard’s exchange principle.
Presentation transcript:

1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence Preserving Evidence Analysis of Digital Evidence Analysis of Digital Evidence Writing Investigative Reports Writing Investigative Reports Proven Security Protocols and Best Practices Proven Security Protocols and Best Practices

2J. M. Kizza - Ethical And Social Issues Introduction Computer forensics – (Computer Crime Investigation) as is the application of forensic science investigative techniques to computer-based material used as evidence. Computer forensics – (Computer Crime Investigation) as is the application of forensic science investigative techniques to computer-based material used as evidence. The search technique helps to reconstruct a sequence of activities of what happened. The search technique helps to reconstruct a sequence of activities of what happened. The investigation process involves the extraction, documentation, examination, preservation, analysis, evaluation, and interpretation of computer-based material to provide relevant and valid information as evidence in civil, criminal, administrative, and other cases The investigation process involves the extraction, documentation, examination, preservation, analysis, evaluation, and interpretation of computer-based material to provide relevant and valid information as evidence in civil, criminal, administrative, and other cases

3J. M. Kizza - Ethical And Social Issues Digital Evidence Evidence is something tangible needed to prove a fact. Evidence is something tangible needed to prove a fact. Tangible evidence to prove a claim or an assertion can be from one of following sources: Tangible evidence to prove a claim or an assertion can be from one of following sources: From an eye witness who provides a testimony From an eye witness who provides a testimony From physical evidence as traces of the sequence of activities leading to the claim or assertion. From physical evidence as traces of the sequence of activities leading to the claim or assertion. Digital evidence as digital footprints of the digital sequence of activities leading to the claim or assertion. Digital evidence as digital footprints of the digital sequence of activities leading to the claim or assertion. Digital evidence is digital footprints left after every digital activity form a cybertrail Digital evidence is digital footprints left after every digital activity form a cybertrail

4J. M. Kizza - Ethical And Social Issues Looking for Digital Evidence Looking for digital evidence is difficulty and is comparable to searching for bits of evidence data from a haystack. Looking for digital evidence is difficulty and is comparable to searching for bits of evidence data from a haystack. The evidence usually sought includes binary data fixed in any medium such as on CDs, memory, and floppies, residues of things used in the committing of a crime and physical materials such as folders, letters, and scraps of papers. The evidence usually sought includes binary data fixed in any medium such as on CDs, memory, and floppies, residues of things used in the committing of a crime and physical materials such as folders, letters, and scraps of papers. At the start of the investigation, the examiner must decide on things to work with like written and technical policies, permissions, billing statements, and system application and device logs. At the start of the investigation, the examiner must decide on things to work with like written and technical policies, permissions, billing statements, and system application and device logs. Also decide early on what to monitor, if this is needed. This may include employer and employee computing activities, Internet , and chat rooms. Also decide early on what to monitor, if this is needed. This may include employer and employee computing activities, Internet , and chat rooms.

5J. M. Kizza - Ethical And Social Issues Digital Evidence Previewing and Acquisition Dealing with digital evidence requires a lot of care because it is very volatile. The two processes previewing and acquiring of data may disturb the data evidence to a point of changing its status, thus creating doubt to its credibility. Dealing with digital evidence requires a lot of care because it is very volatile. The two processes previewing and acquiring of data may disturb the data evidence to a point of changing its status, thus creating doubt to its credibility. To make sure that this does not happen, a strict sequence of steps must be followed in handling the evidence. To make sure that this does not happen, a strict sequence of steps must be followed in handling the evidence.

6J. M. Kizza - Ethical And Social Issues Handling Evidence – through tracing the sequence of events by looking for answers the following questions: Handling Evidence – through tracing the sequence of events by looking for answers the following questions: Who extracted the evidence, how, and when? Who extracted the evidence, how, and when? Who packaged it and when? Who packaged it and when? Who stored it, how, when and where? Who stored it, how, when and where? Who transported it, where and when? Who transported it, where and when? Previewing Image Files - allows the investigator to view the evidence media in order to determine if a full investigation is warranted. Previewing Image Files - allows the investigator to view the evidence media in order to determine if a full investigation is warranted. Evidence Acquisition is the process of evidence extraction Evidence Acquisition is the process of evidence extraction

7J. M. Kizza - Ethical And Social Issues Preserving Evidence Given that digital evidence is very fluid in that it can disappear or change so fast, extra care must be taken in preserving digital evidence. Given that digital evidence is very fluid in that it can disappear or change so fast, extra care must be taken in preserving digital evidence. One way of preserving evidence is to strictly follow the following procedures: One way of preserving evidence is to strictly follow the following procedures: secure the evidence scene from all parties that have no relevancy to it. This is to avoid contamination usually from deposit of hairs, fibers or trace material from clothing, footwear or fingerprints. secure the evidence scene from all parties that have no relevancy to it. This is to avoid contamination usually from deposit of hairs, fibers or trace material from clothing, footwear or fingerprints. Securely catalog and package evidence in strong anti-static, well-padded, and labelled evidence bags. Securely catalog and package evidence in strong anti-static, well-padded, and labelled evidence bags. Image all suspected media as evidence to create a back up. Try to make several copies of each evidence item. Image all suspected media as evidence to create a back up. Try to make several copies of each evidence item. Make a checksums of the original evidence disk before and after each copy. After imaging, the two checksums must agree. Make a checksums of the original evidence disk before and after each copy. After imaging, the two checksums must agree. Institute a good security access control system to make sure that those handling the evidence are the only ones authorized to handle the evidence. Institute a good security access control system to make sure that those handling the evidence are the only ones authorized to handle the evidence. Secure the evidence by encryption, where and if possible. Encryption ensures the confidentiality of the evidence. Secure the evidence by encryption, where and if possible. Encryption ensures the confidentiality of the evidence.

8J. M. Kizza - Ethical And Social Issues Two common network configuration models - the centralized and distributed Two common network configuration models - the centralized and distributed Computer networks- centralized or distributed, come in different sizes depending on the number of computers and other devices the network has. Computer networks- centralized or distributed, come in different sizes depending on the number of computers and other devices the network has. The number of devices, computers or otherwise, in a network and the geographical area covered by the network determine the network type: The number of devices, computers or otherwise, in a network and the geographical area covered by the network determine the network type: Local Area Network (LAN) Local Area Network (LAN) Wide Area Networks (WANs) Wide Area Networks (WANs) Metropolitan Area Networks (MANs) Metropolitan Area Networks (MANs)

9J. M. Kizza - Ethical And Social Issues Analysis of Digital Evidence Evidence analysis is the most difficult and demanding task for investigators Evidence analysis is the most difficult and demanding task for investigators It involves: It involves: Analyzing Data Files Analyzing Data Files File Directory Structure File Directory Structure File Patterns File Patterns Metadata Metadata Content Content Application Application User Configuration User Configuration

10J. M. Kizza - Ethical And Social Issues Analysis Based on Digital Media Analysis Based on Digital Media Deleted Files Deleted Files 2 Hidden Files 2 Hidden Files Slack Space Slack Space Bad Blocks Bad Blocks Steganography Utilities Steganography Utilities Compressed and Coded Files Compressed and Coded Files Encrypted Files Encrypted Files Password-Protected Files Password-Protected Files Analysis Based on Operating Systems Analysis Based on Operating Systems Microsoft–Based File Systems Microsoft–Based File Systems UNIX and LINUX File Systems UNIX and LINUX File Systems Macintosh File System Macintosh File System

11J. M. Kizza - Ethical And Social Issues Relevance and Validity of Digital Evidence There a need to establish relevancy of the evidence. There a need to establish relevancy of the evidence. The relevancy of the digital evidence depends on; The relevancy of the digital evidence depends on; the requesting agency, the requesting agency, nature of the request, nature of the request, type of the case in question. type of the case in question. The question of validity of data is tied up with the relevance of data. The question of validity of data is tied up with the relevance of data. It is also based on the process of authentication of that data. It is also based on the process of authentication of that data.

12J. M. Kizza - Ethical And Social Issues Writing Investigative Reports A report is a summary of all findings of the investigation and it comes from all the documentation that has been made throughout the investigation. A report is a summary of all findings of the investigation and it comes from all the documentation that has been made throughout the investigation. Report should include the following documents[4]: Report should include the following documents[4]: All notes taken during meetings and contacts that led to the investigation All notes taken during meetings and contacts that led to the investigation All forms used in the investigation including the chain of custody forms All forms used in the investigation including the chain of custody forms Copies of search warrants and legal authority notes granting permission to conduct searches Copies of search warrants and legal authority notes granting permission to conduct searches Notes, video recordings, and pictures taken at the incident scene describing the scene Notes, video recordings, and pictures taken at the incident scene describing the scene Notes and any documentation made to describe the computer components including description of peripherals and all devices. Notes and any documentation made to describe the computer components including description of peripherals and all devices.

13J. M. Kizza - Ethical And Social Issues Documentation and notes describing the networking of suspect’s devices Documentation and notes describing the networking of suspect’s devices Notes made on what was discovered including passwords, pass phrases, encryption and any data hiding. Notes made on what was discovered including passwords, pass phrases, encryption and any data hiding. Any changes to the suspect’s scene configuration authorized or not. Any changes to the suspect’s scene configuration authorized or not. Names of everyone at the suspect’s scene Names of everyone at the suspect’s scene Procedures used to deal with the scene including acquisition, extraction, and analysis of evidence. Procedures used to deal with the scene including acquisition, extraction, and analysis of evidence. Any observed or suspected irregularities including those outside the scope of the techniques in use. Any observed or suspected irregularities including those outside the scope of the techniques in use.