Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.

Slides:



Advertisements
Similar presentations
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Advertisements

Computer Forensics.
COEN 252 Computer Forensics
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations, Second Edition
Computer & Network Forensics
BACS 371 Computer Forensics
Guide to Computer Forensics and Investigations Fourth Edition
COS 413 DAY 2. Agenda Questions? Assignment 1 due next class Finish Discussion on Preparing for Computing Investigations Begin Discussion on Understanding.
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
Guide to Computer Forensics and Investigations Third Edition
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
COS/PSA 413 Day 5. Agenda Questions? Assignment 2 Redo –Due September 3:35 PM Assignment 3 posted –Due September 3:35 PM Quiz 1 on September.
COS/PSA 413 Lab 4. Agenda Lab 3 write-ups over due –Only got 9 out of 10 Capstone Proposals due TODAY –See guidelines in WebCT –Only got 4 out of 10 so.
COS/PSA 413 Day 2. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Begin.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
By Drudeisha Madhub Data Protection Commissioner Date:
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
COEN 252 Computer Forensics
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 9 Data Acquisition.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
The Impact of Physical Security on Network Security
Guide to Computer Forensics and Investigations, Second Edition
Phases of Computer Forensics 1 Computer Forensics BACS Management Information Systems for the Information Age 5e, Haag, Cummings, McCubbrey, 2005,
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
Guide to Computer Forensics and Investigations Fourth Edition
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
SUMMER BRIDGE PROGRAM DR. HWAJUNG LEE DR. ASHLEY PODHRADSKY Computer Forensics.
Guide to Computer Forensics and Investigations Fourth Edition
Mohd Taufik Abdullah Department of Computer Science
Preserving Evidence ● Number one priority ● Must also find incriminating evidence ● Must search the contents of the hard drive ● Can not change the hard.
Chapter 13 Troubleshooting and Maintenance Fundamentals.
Digital Crime Scene Investigative Process
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Computer Forensics Principles and Practices
Chapter 2 Understanding Computer Investigations
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Guide to Computer Forensics and Investigations Fourth Edition
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
& Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Guide to Computer Forensics and Investigations Fifth Edition Topic 1 Understanding The Digital Forensics Profession and Investigations All slides copyright.
By: Jeremy Henry. Road Map  What is a cybercrime?  Statistics.  Tools used by an investigator.  Techniques and procedures used.  Specific case.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
CIT 180 Security Fundamentals Computer Forensics.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Guide to Computer Forensics and Investigations Fifth Edition
Guide to Computer Forensics and Investigations Fifth Edition
Guide to Computer Forensics and Investigations Fifth Edition
Guide to Computer Forensics and Investigations Third Edition
File Managements.
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Digital Forensics Dr. Bhavani Thuraisingham
Forensic Recovery of Evidence Device (FRED)
1 Guide to Computer Forensics and Investigations Sixth Edition Chapter 1 Understanding The Digital Forensics Profession and Investigations.
Presentation transcript:

Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition

Guide to Computer Forensics and Investigations2 Taking a Systematic Approach Steps for problem solving –Make an initial assessment about the type of case you are investigating –Determine a preliminary design or approach to the case –Create a detailed checklist –Determine the resources you need –Obtain and copy an evidence disk drive

Guide to Computer Forensics and Investigations3 Taking a Systematic Approach (continued) Steps for problem solving (continued) –Identify the risks –Mitigate or minimize the risks –Test the design –Analyze and recover the digital evidence –Investigate the data you recover –Complete the case report –Critique the case

Guide to Computer Forensics and Investigations4 Assessing the Case Systematically outline the case details –Situation –Nature of the case –Specifics of the case –Type of evidence –Operating system –Known disk format –Location of evidence

Guide to Computer Forensics and Investigations5 Assessing the Case (continued) Based on case details, you can determine the case requirements –Type of evidence –Computer forensics tools –Special operating systems

Guide to Computer Forensics and Investigations6 Planning Your Investigation A basic investigation plan should include the following activities: –Acquire the evidence –Complete an evidence form and establish a chain of custody –Transport the evidence to a computer forensics lab –Secure evidence in an approved secure container

Guide to Computer Forensics and Investigations7 Planning Your Investigation (continued) A basic investigation plan (continued): –Prepare a forensics workstation –Obtain the evidence from the secure container –Make a forensic copy of the evidence –Return the evidence to the secure container –Process the copied evidence with computer forensics tools

Guide to Computer Forensics and Investigations8 Planning Your Investigation (continued) An evidence custody form helps you document what has been done with the original evidence and its forensics copies Two types –Single-evidence form Lists each piece of evidence on a separate page –Multi-evidence form

Guide to Computer Forensics and Investigations9 Planning Your Investigation (continued)

Guide to Computer Forensics and Investigations10 Planning Your Investigation (continued)

Guide to Computer Forensics and Investigations11 Securing Your Evidence Use evidence bags to secure and catalog the evidence Use computer safe products –Antistatic bags –Antistatic pads Use well padded containers Use evidence tape to seal all openings –Floppy disk or CD drives –Power supply electrical cord

Guide to Computer Forensics and Investigations12 Securing Your Evidence (continued) Write your initials on tape to prove that evidence has not been tampered with Consider computer specific temperature and humidity ranges

Guide to Computer Forensics and Investigations13 Procedures for Corporate High-Tech Investigations Develop formal procedures and informal checklists –To cover all issues important to high-tech investigations

Guide to Computer Forensics and Investigations14 Understanding Data Recovery Workstations and Software Investigations are conducted on a computer forensics lab (or data-recovery lab) Computer forensics and data-recovery are related but different Computer forensics workstation –Specially configured personal computer –Loaded with additional bays and forensics software To avoid altering the evidence use: –Forensics boot floppy disk –Write-blockers devices

Guide to Computer Forensics and Investigations15 Conducting an Investigation Gather resources identified in investigation plan Items needed –Original storage media –Evidence custody form –Evidence container for the storage media –Bit-stream imaging tool –Forensic workstation to copy and examine your evidence –Securable evidence locker, cabinet, or safe

Guide to Computer Forensics and Investigations16 Gathering the Evidence Avoid damaging the evidence Steps –Meet the IT manager to interview him –Fill out the evidence form, have the IT manager sign –Place the evidence in a secure container –Complete the evidence custody form –Carry the evidence to the computer forensics lab –Create forensics copies (if possible) –Secure evidence by locking the container

Guide to Computer Forensics and Investigations17 Understanding Bit-Stream Copies Bit-stream copy –Bit-by-bit copy of the original storage medium –Exact copy of the original disk –Different from a simple backup copy Backup software only copy known files Backup software cannot copy deleted files, messages or recover file fragments Bit-stream image –File containing the bit-stream copy of all data on a disk or partition –Also known as forensic copy

Guide to Computer Forensics and Investigations18 Understanding Bit-stream Copies (continued) Copy image file to a target disk that matches the original disk’s manufacturer, size and model

Guide to Computer Forensics and Investigations19 Analyzing Your Digital Evidence Your job is to recover data from: –Deleted files –File fragments –Complete files Deleted files linger on the disk until new data is saved on the same physical location Tool –ProDiscover Basic

Guide to Computer Forensics and Investigations20 Completing the Case You need to produce a final report –State what you did and what you found Include ProDiscover report to document your work Repeatable findings –Repeat the steps and produce the same result If required, use a report template Report should show conclusive evidence –Suspect did or did not commit a crime or violate a company policy

Guide to Computer Forensics and Investigations21 Critiquing the Case Ask yourself the following questions: –How could you improve your performance in the case? –Did you expect the results you found? Did the case develop in ways you did not expect? –Was the documentation as thorough as it could have been? –What feedback has been received from the requesting source?

Guide to Computer Forensics and Investigations22 Critiquing the Case (continued) Ask yourself the following questions (continued): –Did you discover any new problems? If so, what are they? –Did you use new techniques during the case or during research?