Cyber Forensics Unit - 1 Computer Forensics
Cyber Forensics Unit - 1 Computer Forensics
Unit – 1
Computer Forensics
• If the evidence suggests that a crime or policy violation has been committed, you
begin to prepare a case, which is a collection of evidence you can offer in court or
at a corporate inquiry.
Computer Forensics
• This process involves investigating the suspect’s computer and then preserving
the evidence on a different computer.
• Before you begin investigating, however, you must follow an accepted procedure
to prepare a case. By approaching each case methodically, you can evaluate the
evidence thoroughly and document the chain of evidence, or chain of custody,
which is the route the evidence takes from the time you find it until the case is
closed or goes to court.
[email protected]
An Overview of a Computer Crime
• Law enforcement officers often find computers and computer components as
they’re investigating crimes, gathering other evidence, or making arrests.
raided a suspected drug dealer’s home and found a computer, several floppy
disks and USB drives (also called keychain drives or memory sticks), a personal
digital assistant (PDA), and a cell phone in a bedroom. The computer was “bagged
and tagged,” meaning it was placed in evidence bags along with the storage
media and then labeled with tags as part of the search and seizure.
[email protected]
An Overview of a Company Policy Violation
• Companies often establish policies for employee use of computers. Employees
surfing the Internet, sending personal e-mail, or using company computers for
personal tasks during work hours can waste company time.
• Because lost time can cost companies millions of dollars, computer forensics
specialists are often used to investigate policy violations. The following example
describes a company policy violation.
Computer Forensics
[email protected]
Taking a Systematic Approach
• Make an initial assessment about the type of case you’re investigating
[email protected]
Taking a Systematic Approach
• Investigate the data you recover
[email protected]
Assessing the Case
• You can begin assessing this case as follows:
clients and setting up their Web sites at local ISPs. Co-workers have
complained that he’s been spending too much time on his own business and
not performing his assigned work duties. Company policy states that all
company-owned computing assets are subject to inspection by company
management at any time. Employees have no expectation of privacy when
operating company computer systems.
[email protected]
Assessing the Case
• Operating system—Microsoft Windows XP.
Based on these details, you can determine the case requirements. You now know
that the nature of the case involves employee abuse of company assets, and you’re
looking for evidence that an employee was conducting a side business using his
employer’s computers. On the USB drive retrieved from George’s computer, you’re
looking for any information related to Web sites, ISPs, or domain names. You know
that the computer OS is Windows XP, and the USB drive uses the FAT16 file system.
To duplicate the USB drive and find deleted and hidden files, you need a reliable
computer forensics tool. Because the USB drive has already been retrieved, you
don’t need to seize the drive yourself.
[email protected]
Assessing the Case
• You call this case the Domain Name case and determine that your task is to
gather data from the storage media seized to confirm or deny the allegation
that George is conducting a side business on company time and computers.
Remember that he’s suspected only of asset abuse, and the evidence you
obtain might be exculpatory—meaning it could prove his innocence. You
must always maintain an unbiased perspective and be objective in your fact-
findings. If you are systematic and thorough, you’re more likely to produce
Computer Forensics
[email protected]
Planning Your Investigation
• Now that you have identified the requirements of the Domain Name case, you
can plan your investigation. You have already determined the kind of evidence
you need; now you can identify the specific steps to gather the evidence,
establish a chain of custody, and perform the forensic analysis. These steps
become the basic plan for your investigation and indicate what you should do and
when. To investigate the Domain Name case, you should perform the following
general steps. Most of these steps are explained in more detail in the following
sections.
Computer Forensics
[email protected]
Planning Your Investigation
• The first rule for all investigations is to preserve the evidence, which means it
should not be tampered with or contaminated. Because the IT Department staff
confiscated the storage media, you need to go to them for the evidence. The IT
Department manager confirms that the storage media has been locked in a
secure cabinet since it was retrieved from George’s desk. Keep in mind that even
though this case is a corporate policy matter, many cases are thrown out because
the chain of custody can’t be proved or has been broken. When this happens,
there’s the possibility that the evidence has been compromised.
Computer Forensics
• To document the evidence, you record details about the media, including who
recovered the evidence and when and who possessed it and when. Use an
evidence custody form, also called a chain-of-evidence form, which helps you
document what has and has not been done with the original evidence and
forensic copies of the evidence.
• Depending on whether you’re working in law enforcement or private corporate
security, you can create an evidence custody form to fit your environment. This
form should be easy to read and use. It can contain information for one or several
pieces of evidence. Consider creating a single-evidence form (which lists each
piece of evidence on a separate page) and a multi evidence form, depending on
the administrative needs of your investigation.
[email protected]
Computer Forensics
Assessing the Case
[email protected]
An evidence custody form usually contains the following
information:
• Case number—The number your organization assigns when an investigation is
initiated.
• Nature of case—A short description of the case. For example, in the corporate
environment, it might be “Data recovery for corporate litigation” or “Employee
policy violation case.”
• Location evidence was obtained—The exact location where the evidence was
collected. If you’re using multi-evidence forms, a new form should be created for
each location.
[email protected]
An evidence custody form usually contains the following
information:
• Description of evidence—A list of the evidence items, such as “hard drive, 20 GB”
or “one USB drive, 128 MB.” On a multi-evidence form, write a description for
each item of evidence you acquire.
• Model number or serial number—List the model number or serial number (if
available) of the computer component. Many computer components, including
hard drives, memory chips, and expansion slot cards, have model numbers but
not serial numbers.
[email protected]
An evidence custody form usually contains the following
information:
• Date and time—The date and time the evidence was taken into custody. This
information establishes exactly when the chain of custody starts.
another authorized investigator retrieves evidence from the evidence locker for
processing and analysis, list the item number and your name, and then describe
what was done to the evidence.
• Page—The forms used to catalogue all evidence for each location should have
page numbers. List the page number, and indicate the total number of pages for
this group of evidence. For example, if you collected 15 pieces of evidence at one
location and your form has only 10 lines, you need to fill out two multi-evidence
forms. The first form is noted as “Page 1 of 2,” and the second page is noted as
“Page 2 of 2.”
[email protected]
Computer Forensics
Assessing the Case
[email protected]
Securing Your Evidence
• Computing investigations demand that you adjust your procedures to suit the
case. For example, if the evidence for a case includes an entire computer system
and associated storage media, such as floppy disks, Zip and Jaz cartridges, 4 mm
DDS digital audio tape (DAT), and USB drives, you must be flexible when you
account for all these items. Some evidence is small enough to fit into an evidence
bag. Other items, such as the CPU cabinet, monitor, keyboard, and printer, are
too large.
• To secure and catalogue the evidence contained in large computer components,
you can use large evidence bags, tape, tags, labels, and other products available
Computer Forensics
from police supply vendors or office supply stores. When gathering products to
secure your computer evidence, make sure they are safe and effective to use on
computer components. Be cautious when handling any computer component to
avoid damaging the component or coming into contact with static electricity,
which can destroy digital data. For this reason, make sure you use antistatic bags
when collecting computer evidence. Consider using an antistatic pad with an
attached wrist strap, too.
• Both help prevent damage to computer evidence. Be sure to place computer
evidence in a well-padded container. Padding prevents damage to the evidence
as you transport it to your secure evidence locker, evidence room, or computer
lab. Save discarded hard drive boxes, antistatic bags, and packing material for
computer hardware when you or others acquire computer devices.
[email protected]