0% found this document useful (0 votes)
68 views28 pages

lecture 1 (2)

Uploaded by

Janaa Ibrahim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views28 pages

lecture 1 (2)

Uploaded by

Janaa Ibrahim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 28

Digital Forensics

"What one man can invent;


another can discover."
Sherlock Holmes
What is Forensics?
• Use of scientific or technological technique to conduct an
investigation or establish facts (evidence) in a criminal
case.
– Judd Robbins, Computer Forensic Legal Standards and
Equipment
Digital Forensics
• Digital Forensics is defined as the process of collecting,
preserving, analyzing, interpreting, and documenting
digital evidence and then presenting the outcomes.

• Used to be called “Computer Forensics”


Digital Investigation focuses on digital
devices
• Computer • PDA
– PC, Laptop, Server • Digital Cameras
• Router, Switch • Thumb Drive (aka USB)
• Phones • Backup Media
• SIM Card – CD, DVD, Tapes
• ATM Machines • Printers
• Game Systems
Preparing a Digital Investigation
• Role of digital forensics professional is to gather evidence
to prove that a suspect committed a crime or violated a
company policy
• Collect evidence that can be offered in court or at a
corporate inquiry
• Investigate the suspect’s computer
• Preserve the evidence on a different computer
• Follow an accepted procedure to prepare a case
Overview of a Digital Crime
• Digital media can contain information that helps law
enforcement determine:
• Chain of events leading to a crime
• Evidence that can lead to a conviction
• Law enforcement officers should follow proper procedure
when acquiring the evidence
• Digital evidence can be easily altered by an overeager
investigator
Examining a
digital crime
Chain of custody
• Route the evidence takes from the time you find it until the case is
closed or goes to court
• Due to the fact digital evidence can theoretically be altered,
attorneys have argued that digital evidence is inherently less
reliable than other forms of evidence. Therefore, chain of custody
must be maintained to preserve the integrity of digital evidence
as it passes through the stages of investigation. For example,
cryptographic hash functions are widely used to ensure digital
evidence integrity. It is crucial to preserve digital crime scene
during a digital investigation.
Chain of custody (continued)
• Chain of custody involves documenting who had control of the
evidence, and what was done to the evidence during what
period of time. Also, the evidence should be appropriately
physically protected.
• Two types:
1. Single-evidence form
- Lists each piece of evidence on a separate page
2. Multi-evidence form
- Lists multiple evidences on a same page
Single-
evidence
form
Multi-
evidence
form
Types of computer
forensics
Types of computer forensics
• File system forensics
• Memory forensics
• Operating System
forensics
• Network forensics
• Malware forensics
• Mobile Device forensics
File system forensics
• Data on a physical medium, such as a hard drive or flash drive, is
organized, labeled, and governed by a file system; FAT, NTFS, and EXT are
the most commonly used file systems, but there are many more, and it is
also possible that a suspect could have created their own file system, in
order to complicate an investigation. File System Forensics is generally
used for discovering the locations of files that are more useful as evidence
than the file system itself; however, the presence of a custom file system, as
well as the presence of anomalies in the locations of data (namely, data
existing where it shouldn’t), are usually proof of immoral activities. Though
not directly punishable, the presence of immoral activities is a very strong
indicator of illegal activities, which warrants further investigation.
Memory forensics
• Despite being called RAM forensics, this term actually
refers to the application of forensic techniques on any/all
volatile memory, which includes RAM, caches (of all
levels), and registers (not to be confused with registries).
Memory forensics must be performed during live analysis,
because the contents of volatile memory are permanently
lost when the system is shut down
Operating System Forensics
• Logfile analysis is a major part of operating system
forensics, because logfile formats differ wildly between
operating systems. The Linux equivalent to the Windows
registry for example is not a hierarchical GUI like the
registry, but a series of organized text files instead. To
perform operating system forensics, the investigator must
have deep and thorough knowledge of multiple operating
systems, as well as the ability to understand the meaning
of logs generated by different operating systems.
Network Forensics
• IP Tracing and Network Traffic Monitoring are the major
components of Network Forensics. The main objective is
to look for evidence of illegal activities that involve a
transfer of files or information. It is important to note that
while most applications of Network Forensics make use of
the Internet, LANs, local ad-hoc networks, and emulated
network connections between virtual machines (VMs) and
their host machines, can all be analyzed with the same
techniques.
Malware Forensics
• Malware Forensics mostly refers to the reverse
engineering of malware, but also covers the detection of
existing or possible malware.
Mobile Device Forensics
• Some mobile devices use proprietary operating systems, such as iOS, Windows
Mobile/CE, and BlackBerry OS, while others are built on opensource systems,
such as Android; an investigator would need to know all of them to be effective
in the field. There are also many different types of mobile devices: smart
phones, PDAs, and digital cameras and all of them use different operating
systems and have different capabilities, storing different types of data. A mobile
phone might contain taped conversations, digital pictures, texts and emails,
contact lists, and sometimes even digital video recordings. It is worth noting
that the manufacture and model also play a role in the methods used, further
complicating the investigation. Even analyzing two devices that are very
comparable in the consumer market could, and usually does, result in using
very different combinations of techniques to retrieve the information required.
Procedures for conducting
digital Forensics investigation
Methodological models
• There exist many methodological (procedures) models
which have been developed in the field of digital forensics.
• Examples of methodological models:
• KRUSE and HEISER model
• Yale University model
• Rodney McKemmish model
Rodney McKemmish model

Identificat Preservati Presentati


Analysis
ion on on
Identification
• The identification of digital evidence is the first step in the
forensic process. Knowing what evidence is present, where
it is stored and how it is stored is vital to determining which
processes are to be employed to facilitate its recovery.
• In addition, the computer forensic examiner must be able to
identify the type of information stored in a device and the
format in which it is stored so that the appropriate
technology can be used to extract it.
Preservation
• The preservation of digital evidence is a critical element in the forensic process.
Given the likelihood of judicial scrutiny in a court of law, it is imperative that any
examination of the electronically stored data be carried out in the least intrusive
manner.
• There are circumstances where changes to data are unavoidable, but it is
important that the least amount of change occurs. In situations where change is
inevitable it is essential that the nature of, and reason for, the change can be
explained. Alteration to data that is of evidentiary value must be accounted for
and justified.
• This applies not only to changes made to the data itself, but also includes physical
changes that are made to the particular electronic device to facilitate access to
the data.
Analysis
• The analysis of digital evidence—the extraction,
processing and interpretation of digital data—is generally
regarded as the main element of forensic computing. Once
extracted, digital evidence usually requires processing
before it can be read by people. For example, when the
contents of a hard disk drive are imaged, the data
contained within the image still requires processing so
that it is extracted in a humanly meaningful manner. The
processing of the extracted product may occur as a
separate step, or it may be integrated with extraction.
Presentation
• The presentation of digital evidence involves the actual
presentation in a court of law. This includes the manner of
presentation, the expertise and qualifications of the
presenter and the credibility of the processes employed to
produce the evidence being tendered.
References
• https://link.springer.com/book/10.1007/978-3-030-00581-8
• Dr. Ali Hadi ashemery slides

You might also like