Lecture 1 Introduction to Digital Forensics
Lecture 1 Introduction to Digital Forensics
Lecture 1
Introduction to Digital Forensics
COURSE INFORMATION
This module provides students with an
introduction to Digital Forensic Science and the
systematic process of acquiring, identifying,
analysing and reporting digital evidence.
Additionally, we will cover the topics of
eDiscovery, Data Retention, Data Disposal,
Litigation, Internal Investigations and Incident
Response will also be discussed within the
context of Digital Forensics.
COURSE INFORMATION
The module covers a variety of topics:
• Introduction to basic concepts of digital forensic
science
• Exploration of mobile, network and memory
forensics
• Examining the role of digital forensics in public
and private investigations
• Examining the potential benefits, limitations and
risks of digital forensics
• Increasing awareness of managerial issues
raised by the use of digital forensics
• Introduction to commercial and open-source
forensic tools
COURSE INFORMATION
• Textbook:
Guide to Computer Forensics and Investigations:
Processing Digital Evidence, 5th Ed, Cengage, B.
Nelson, A. Phillips, and C. Steuat, 2019
• Assignments:
There are two assignments designed to help reinforce
the material that has been covered in the lecture.
• Exams:
There will be an exam.
Objectives
• Define computer crime
• Define digital forensics and describe the
phases of a forensic investigation
• Describe ways in which corporations use
digital forensics
Introduction
• Computers are involved in crime in two
ways
– As the targets of misdeeds
– As weapons or tools of misdeeds
• Computer crimes can be committed
– Inside the organization
– Outside the organization
Overview of a Computer Crime
• Computer crime – a crime in which a computer,
or computers, play a significant part in the
execution of the crime.
• Computers can contain information that helps
law enforcement determine:
– Chain of events leading to a crime
– Evidence that can lead to a conviction
Overview of a Computer Crime
• Law enforcement officers should follow proper
procedure when acquiring the evidence
– Digital evidence can be easily altered by an
overeager investigator
• A potential challenge: information on hard disks
might be password protected so forensics tools
may be need to be used in your investigatio
Examples of Computer Crimes
Types of Computer Crime
• Identity Theft
Phishing
Spyware
Discarded information
• Hacking
SQL injection
Password cracking (E.g., Ophcrack)
• Cyberstalking and Harassment
Types of Computer Crime
(Cont.)
• Fraud
Investment offer
Privacy and intellectual property
• Non-Access Computer Crime
DoS and DDoS
Viruses
Logic bombs
• Cyberterrorism
Crimes in Which Computers
Usually Play a Part
Types of Malware
• Malware – software designed to harm you
computer or computer security
– Viruses
– Worms
– Misleading e-mail
• Types of Malware
– Denial-of-service attacks
– Web defacing
– Malware bots
Viruses
• Computer virus (virus) – software that
was written with malicious intent to cause
annoyance or damage
• Worm – a computer virus that replicates
and spreads itself from computer to
computer
The Love Bug Worm
Stand-Alone Viruses
31
Forensic Types –
Email Forensics
• E-mail forensics is the study of source and
content of electronic mail as evidence.
– It includes the process of identifying the actual
sender and recipient of a message, the date and time
it was sent, and where it was sent from.
– E.g. Outlook Express 4 - *.mbx
Outlook Express 5 & 6 – *.dbx
Microsoft Outlook - *.pst
Netscape – check inbox
Eudora Mail - *.mbx
32
Forensic Types –
Internet/Social Media Forensics
•Internet or Web Forensics is the process of
piecing together where and when a user
has been on the Internet.
– For example, it is used to determine whether
the download of pornography was accidental
or not.
– The information can be obtained from web
browser cache and history
• Index.dat
33
Digital Evidence
• Digital evidence is any information stored
or transmitted in binary form that may be
relied on in court.
• Real: HD, USB, etc.
• Documentary: Word files, emails, etc
– Testimonial: System log files, history , etc.
• Demonstrative: Chart, pictures, etc
• ISO 27037 Information technology -- Security
techniques -- Guidelines for identification,
collection, acquisition and preservation of digital
evidence
Volatility of Digital Evidence
Evidence that is only present while the computer is
running is called volatile evidence and must be
collected using live forensic methods.
This includes evidence that is in the system's RAM
(Random Access Memory), such as a program that
only is present in the computer's memory.
• Registers and cache
• Routing table
• ARP (Address Resolution Protocol) cache
• Process table
• Kernel statistics and modules
• Main memory
• Temporary file systems
• Secondary memory
• Router configuration
• Network topology
Information Security Principles
37
Computer Forensics Principles
• Evidential Integrity
– What is examined must be an exact copy of
the original.
– Use disk imaging techniques.
• Continuity of Evidence
– Requires that all actions taken during an
investigation be recorded.
38
Computer Forensics Principles
• Ability to re-produce evidence.
– Any copy created must be the same with
original evidence.
– Used Cyclical Redundancy Check (CRC) or
Message Digest (MD) to confirm.
• Testing:
– Has this software tool/procedure been tested?
• Error Rate:
– Is there a known error rate of the procedure?
• Tool Implementation Error is from bugs in the code or from
using the wrong specification.
• Publication:
– Has the tool/procedure been published and subject to peer
review?
– Is this a commercially offered tool/technique or something
developed in house?
– OpenSource vs. proprietary software
• Acceptance:
– Is this tool technique used by experts in the field?
Digital Forensics and Other
Related Disciplines
• Investigating digital devices includes:
– Collecting data securely
– Examining suspect data to determine details such as
origin and content
– Presenting digital information to courts
– Applying laws to digital device practices
• Digital forensics is different from data
recovery
– Which involves retrieving information that was deleted
by mistake or lost during a power surge or server
crash
Digital Forensics and Other
Related Disciplines
• Forensics investigators often work as part
of a team, known as the investigations
triad
Investigations Triad