Chapter 1 Introduction to Computer Crime & Digital forensic
Chapter 1 Introduction to Computer Crime & Digital forensic
FORENSIC
CHAPTER ONE : INTRODUCTION
• Computer crime
• Computer crime characteristic and category
• Computer Crime and Law
• Computer crime & Cyber security
• Computer crime & digital forensic investigation
• Digital Evidence
• Digital forensic investigation procedure
COMPUTER CRIME
• Financially Motivated
• Steal Data/Information stored or transfer over the network
• Many cyber crimes have an international component
• Suspect –victim- server are in the same country
• Suspect- victim in one country and server in another country
• Suspect –victim- server in different country
• Different type of Individual/ organization commit crime
COMPUTER CRIME CATEGORIES
• Cyber Security : Attempt to protect networks, computer programs and data from
attack, damage or unauthorized access.
• Confidentiality
• Authorized Person access confidential information
• Integrity
• Maintain Consistency, Accuracy and trustworthiness of data
• Availability
• Those who should have access data can access data when they want
COMPUTER CRIME AND CYBER SECURITY(CONT.…)
• Digital Investigation
• Process to answer questions about digital states and events
• Digital Evidence
• Data that proves or disproves a hypothesis that was formulated during an investigation
REQUIRED CHARACTERISTICS FOR DIGITAL
FORENSICS
• Observation
• Critical Thinking
• Relational Analysis
• Timeline Analysis
• Functional Analysis
DIGITAL EVIDENCE
1. Basic Procedure
1. Acquiring data without altering or damaging the original
2. Verify recovered data is the same as original
3. Analyze the data without modifying it.
4. Clearly report findings
DIGITAL FORENSIC INVESTIGATION PROCEDURES (CONT.…)
1. Identification
• Identify that a crime (or event) has taken place
• Crime detection
• Complaint
• Anomaly detection (IDS)
• Audit Analysis
2. Preservation
• Is the device on
• Chain of custody
DIGITAL FORENSIC INVESTIGATION PROCEDURES (CONT.…)
2. Examination
Do not modify the data
Extraction (convert into human readable)
Examination checklist
Preprocessing
Filtering technique
Pattern matching
Hidden data discovery
DIGITAL FORENSIC INVESTIGATION PROCEDURES (CONT.…)
• Analysis
• What the information tells
• How does it related to the hypothesis and to the overall question
• Data must be analyzed in context
• Analysis type
• Relational Analysis
• Functional analysis
• Temporal analysis
DIGITAL FORENSIC INVESTIGATION PROCEDURES (CONT.…)
• Presentation
• Result must be communicated well
• Summary key result first
• Comprehensive report about all action
• Conclusion reached
• Ensure documentation is detailed so that it is reproducible by another investigator
• Decision
DIGITAL FORENSIC
• Prerequisites
• Operating system concepts.
• Linux command Line
• Windows command Line
• no need to know programming