1 / 0

Intro to Computer Forensics

Intro to Computer Forensics. CSC 485/585. Objectives. Understand the roles and responsibilities of a computer forensic examiner. Understand the “Safety Net” concept. What is a Computer Forensic Examiner?.

lela
Télécharger la présentation

Intro to Computer Forensics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Intro to Computer Forensics

    CSC 485/585
  2. Objectives Understand the roles and responsibilities of a computer forensic examiner. Understand the “Safety Net” concept.
  3. What is a Computer Forensic Examiner? A CF examiner is not a computer expert, but rather a specialist in the preservation, recovery and authentication of evidence originating from electronic media.You are a critical member of an investigative team. Exact roles and responsibilities will depend on whether you work in a criminal law enforcement position or as a civil litigation/private examiner. Your roles and responsibilities impact on all stages of an investigation or engagement. The sooner you become involved in the investigation/engagement, the better!
  4. Roles & Responsibilities…in preparation for the seizure of electronic evidence Recommend and/or assist in securing information from witnesses, informants, complainants, or others, which will help determine the volume, complexity, and role of any computers and/or media you will be seizing. For LE, assist in the preparation of the Affidavit and Search Warrant. Ensure proper legal basis for seizure Acquiring the resources (logistics) which may be necessary to handle the engagement or seizure and secure the anticipated electronic evidence.
  5. Roles & Responsibilities…in seizing electronic evidence Document all evidence seized Document all relevant information, including what you did, where, how, and any deviation from standard procedures. Proper seizure and continuing Chain of Custody Inventory and secure Arrange safe transportation and storage of media Avoid heat and moisture Magnetic fields Physical care: Handling, bumping, jiggling Searching and securing items unique to electronic media Searching for passwords Securing and seizing manuals and original software for unique programs Printer, webcam, scanner, digital camera, iPod, cell phone, etc. (any of which may be relevant to your investigation/engagement)
  6. Roles & Responsibilities…in seizing electronic evidence Interviewing Subjects, Witnesses, System Administrators, etc. Determine whether media/systems may be seized and taken back to your forensic lab or if analysis and/or backup is to be done on-site. Proper accessing of original evidence The creation of a “Safety Net” (more on this later) Use standard and tested procedures and tools, when possible and practical.
  7. Roles & Responsibilities…in the analysis of media ALWAYS protect against changes to the original evidence media. Make bit-for-bit forensic images (copies) of all original evidence media. Analyze only a duplicate “working” copy of the original. Prepare investigative worksheets/documentation In some cases, restoration of your bit-for-bit forensic image is necessary to perform analysis. Restore Images to VMWare or other virtual machine Some proprietary computer systems (i.e. PlayStation 3) require restoration to a duplicate physical hard drive that is re-inserted into the computer in place of the original. Analysis performed by “running” the copy of the original in the original machine. Review for and recovery of hidden or deleted files, directories, and data. Review for and recovery of data from unallocated space or previous/lost file systems. Conduct searches by filename, by file type (using extension and/or file headers), by hash value or by string of characters/bytes. Overcome encryption and password protected files, directories, drives, etc.
  8. Roles & Responsibilities…in the analysis of media Preparing reports from accounting, database or other complex programs with proprietary file formats. Review the boot process for any deviations which may represent overt acts in attempting to destroy or conceal evidence Reconstruct computer and user activity via “time line” analysis and/or recovery and analysis of Operating System artifacts left by a user’s computer usage. Identify malware/virus/trojan…or lack thereof . Maintain investigative documentation and report findings to investigative team. Authentication of any exhibited evidence items.
  9. Roles & Responsibilities…in trial prep and testimony Review exhibits and documentation Discuss testimony with attorneys Prepare copies of physical exhibits and media for defense/opposing counsel. CD/DVD copies, image restoration, make copy of images, etc. Testify Emphasize custody control and actions that you took in ensuring the evidence would be preserved in its’ original form. Maintain your credibility
  10. Additional Responsibilities Cleaning media and systems Wiping “target” media prior to use Virus checking any media provided to investigators, prosecutors, defense, etc. Keeping your systems clean and up-to-date Calibrating your equipment Running validation checks to ensure equipment is in proper working order Continued professional development to keep up-to-date on new technology, new potential computer forensic challenges, and legal developments. Education of peers and new computer forensic examiners.
  11. The “Safety Net” Concept Procedures and actions taken to insure that Electronic Evidence… is not altered or destroyed. is properly preserved and protected. can be authenticated. is maintained with a chain of custody. The “Safety Net” is an broad concept and not a specific list of “Thou Shall” and “Thou shall not.”In computer forensics there are often exceptions to standard policy/procedure…..be able to articulate any deviation from standard policies.
  12. Why the “Safety Net”? So judicial challenges to the authenticity of evidence may be met. So that steps taken to recover evidence may be reproduced at a later date – for trial, or by another examiner. To help protect against examiner liability issues – following proper procedures helps protect you from liability should something go wrong.
  13. Safety Net Procedures Documentation – be able to recount what you did, how, when, where, with what tools, etc. Take digital pictures and keep in your case file. System Checking (BIOS date/time, boot order, attached hardware, configuration, etc.) Controlled Boot Process If booting the subject’s computer, use a self-validated control boot disk and procedures…you will learn about this later. Hardware or Software Disk Write Protection If removing subject drive(s) from subject computer, ensure media is protected from your OS and any inadvertent writes. Test and self-validate your hardware or software write blockers before use on original evidence.
  14. Safety Net Procedures (cont.) Bit-for-bit copy using tested and approved forensic imaging software or devices. Physical image when possible…not logical image or file copying unless specific reason to do so. Be able to authenticate all evidence (via hash values, documentation, and your recollection). Data Transfer and Storage Protect seized equipment and data from bumping, dropping, extreme heat, moisture and unforeseen circumstances (leaking pipes or A/C dripping on equipment, flooding, etc.) Maintain Chain-of-Custody!!! Do NOT leave seized evidence in your car (or elsewhere) unattended after you leave the seizure location…secure it! Virus Checking Do not provide virus infected evidence files to investigators, attorneys, or others. You do not want to be responsible for infecting their systems.
  15. Summary Your role is to: Protect the Integrity of the Original Evidence and Authentic any Evidence Originating from an Electronic Source All of the methodologies, procedures and tools have been designed for the accomplishment of these two basic roles, both of which are the basis for the creation of the “Safety Net” Concept. It is the training in preservation and authentication of electronic evidence that make you a unique member of the investigative team and teach you to apply physical world safeguards of evidence to a fragile, electronic environment. Lastly, you must have the credibility necessary for the court to accept a printed document as evidence, where no physical document was seized or received. Testimony must convince the judge and the jury, that the physical representation of this information is complete and accurate. Your actions in EVERYTHING you do will impact on the creditability of your testimony.
  16. Questions ???…as usual, use the discussion board!
More Related