chapter 3 cmp forensic

38
Computer Forensics

Upload: shahhardik27

Post on 14-Jan-2015

1.977 views

Category:

Technology


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Chapter 3 cmp forensic

Computer Forensics

Page 2: Chapter 3 cmp forensic

Computer Forensics

Page 3: Chapter 3 cmp forensic

Computer Forensics

A process of applying scientific and analytical

techniques to computer Operating Systems

and File Structures to determining the

potential Legal Evidence.

Page 4: Chapter 3 cmp forensic

Computer Forensics

It is the practice of lawfully establishing evidence and facts.

This is science involving legal evidence that is found in digital storage mediums and in computers.

Subdivisions: -Disk forensicsNetwork forensicsMobile forensics

Page 5: Chapter 3 cmp forensic

Role of Computer forensic investigator

Evidence Collection and Chain of Custody

Who Who handled the evidence? What What procedures were performed on

the evidence? When When was the evidence collected

and/or transferred to another party? Where Where was the evidence collected

and stored? How How was the evidence collected and

stored? Why For what purpose was the evidence

collected?

Page 6: Chapter 3 cmp forensic

Acquire data to be examined

Photographs

Make an image

Review of logical file structure

Review of unallocated space and file slack

Recover deleted data (If any)

Report

Expert testimony

Forensics process

Page 7: Chapter 3 cmp forensic

Importance of Evidence

"Evidence" is anything the judge allows a jury to

consider in reaching a verdict.

This can include the testimony of witnesses,

photographs of the scene and "demonstrative evidence"

such as charts or sample equipment.

Page 8: Chapter 3 cmp forensic

Source of Evidence

Slack, Free, Swap, Recycle Bin

Event Logs

Registry

Application files, temp files

E-mail

Browser history and cache

Page 9: Chapter 3 cmp forensic

Live Forensics Non - Live Forensics

Post Acquisition Analysis Technologies

Types of Forensics

Page 10: Chapter 3 cmp forensic

Live Forensics •Recovery of volatile data•Gathering system information•Gathering USB device history•System Explorer•Imaging and Cloning

Non - Live Forensics•Imaging •Cloning

Post Acquisition Analysis

•Mathematical authentication of data (Hash)•Virtualization•Malware analysis•Detection of obscene content•Image ballistics •Use of spyware (keyloggers) in investigations•Digital Evidence Analysis

Page 11: Chapter 3 cmp forensic

Forensic Imaging & Cloning

Page 12: Chapter 3 cmp forensic

Select source medium

Page 13: Chapter 3 cmp forensic

Select source medium

Page 14: Chapter 3 cmp forensic

Select destination for the image file

Page 15: Chapter 3 cmp forensic

Post Acquisition Analysis

Page 16: Chapter 3 cmp forensic

Mathematical Authentication of Data

Page 17: Chapter 3 cmp forensic

Mathematical Authentication of Data

Page 18: Chapter 3 cmp forensic

Select the algorithm

•The Information Technology (Certifying Authorities) Amendment Rules, 2009 amended Rule 6 of the Information Technology (Certifying Authorities) Rules, 2000

•It is advised that mathematical authentication of digital evidence must be done using either SHA-1 or SHA-2.

•MD5 must not be used as such evidence may be unacceptable in a court of law.

Page 19: Chapter 3 cmp forensic

Mathematical authentication of digital evidence achieved by using SHA-2.

Page 20: Chapter 3 cmp forensic

Mathematical authentication of data

Input SHA1 Hash Digest

Apple 476432a3e85a0aa21c23f5abd2975a89b6820d63

apple d0be2dc421be4fcd0172e5afceea3970e2f3d940

Apple 476432a3e85a0aa21c23f5abd2975a89b6820d63

a 86f7e437faa5a7fce15d1ddcb9eaeaea377667b8

Page 21: Chapter 3 cmp forensic

Mathematical Authentication of Data

www.crypo.com

Page 22: Chapter 3 cmp forensic

Virtualization

Page 23: Chapter 3 cmp forensic
Page 24: Chapter 3 cmp forensic
Page 25: Chapter 3 cmp forensic
Page 26: Chapter 3 cmp forensic

Life Cycle of Computer Evidence

Page 27: Chapter 3 cmp forensic

Destroy

Create Capture Preserve Collect Process Review Produce

Evidence Life Cycle Management

Electronic Discovery ServicesDocument Management

Enterprise Repositori

es

Evidence Repository

Document Creation Preservation Obligation Document Production Request

Page 28: Chapter 3 cmp forensic

Evidence Rule

Admissible

Reliable

Authentic

Complete (no tunnel vision)

Believable

Page 29: Chapter 3 cmp forensic

Types of Evidence

Direct Evidence

Real Evidence

Documentary Evidence

Demonstrative Evidence

Page 30: Chapter 3 cmp forensic

Computer Evidence Processing Guidelines

Pull the Plug

Document the Hardware Configuration of the

System

Transport the Computer System to a Secure

Location (Forensics lab)

Make Bit Stream Backups of Hard Disks and

Floppy Disks

Page 31: Chapter 3 cmp forensic

Mathematically Authenticate Data on

all storage devices (Hash)

Document the System Date and Time

Make a List of Key Search Words

Evaluate the Windows Swap File

Evaluate File Slack

Computer Evidence Processing Guidelines

Page 32: Chapter 3 cmp forensic

Evaluate Unallocated Space (Erased

Files)

Search Files, File Slack and

Unallocated Space for Key Words

Document File Names, Dates and

Times

Identify File, Program and Storage

Anomalies

Computer Evidence Processing Guidelines

Page 33: Chapter 3 cmp forensic

Evaluate Program

Functionality

Document Your Findings

Retain Copies of Software

Used

Computer Evidence Processing Guidelines

Page 34: Chapter 3 cmp forensic

Incidence Response

Computer security Incident

Page 35: Chapter 3 cmp forensic

Confirms or dispels whether an incident occurred

Promotes accumulation of accurate information

Establishes controls for proper retrieval and handling

of evidence

Protects privacy rights established by law and policy

Minimizes disruption to business and network

operations

Why forensics?

Page 36: Chapter 3 cmp forensic

Why forensics?

Allows for criminal or civil action against perpetrators

Provides accurate reports and useful recommendations

Provides rapid detection and containment

Minimizes exposure and compromise of proprietary data

Page 37: Chapter 3 cmp forensic

Why forensics?

Protects your organization’s reputation and assets

Educates senior management

Promotes rapid detection and/or prevention of such incidents in the future (via lessons learned, policy changes, and so on)

Page 38: Chapter 3 cmp forensic

Cyber Crime Investigation Lifecycle

Incident Awareness Consultation

Preliminary Analysis

ImageAcquisition/

Recovery

Detailed Analysis

Preliminary/Final Report

Containment

Expert WitnessTestimony

Deposition/Affidavit

Presentation

PreventionTechnologies

Improved ProcessesNew Security Policies

Improved Configurations