1 Introduction To Cyber Forensics
1 Introduction To Cyber Forensics
1 Introduction To Cyber Forensics
AWT Page 1
1. Introduction to cyber Forensics
2. Evaluation:
At this stage, the computer forensics team receives their instructions about the
Cyber-attack they are going to investigate. This involves the following:
The allocation/assignment of roles and resources which will be devoted
throughout the course of the entire investigation;
Any known facts, details, or particulars about the Cyber-attack which has just
transpired;
The identification of any known risks during the course of the investigation.
3. Collection:
This component is divided into two distinct sub phases:
AWT Page 2
1. Introduction to cyber Forensics
Acquisition:
This involves the actual collection of the evidence and the latent data from the
computer systems and another part of the business or corporation which may have also
been impacted by the Cyber-attack. Obviously, there are many tools and techniques
which can be used to collect this information, but at a very high level, this sub phase
typically involves the identification and securing of the infected devices, as well as
conducting any necessary, face to face interviews with the IT staff of the targeted entity.
Typically, this sub phase is conducted on site.
Collection:
This is the part where the actual physical evidence and any storage devices which are
used to capture the latent data are labeled and sealed in tamper resistant bags. These
are then transported to the forensics laboratory where they will be examined in much
greater detail. As described before, the chain of custody starts to become a critical
component at this stage.
4. Analysis:
This part of the computer forensics investigation is just as important as the previous
step. It is here where all of the collected evidence and the latent data are researched in
excruciating detail to determine how and where the Cyber-attack originated from, whom
the perpetrators are, and how this type of incident can be prevented from entering the
defence perimeters of the business or corporation in the future. Once again, there are
many tools and techniques which can be used at this phase, but the analysis must meet
the following criteria:
It must be accurate;
Every step must be documented and recorded;
It must be unbiased and impartial;
As far as possible, it must be completed within the anticipated time frames and
the resources which have been allocated to accomplish the various analyses
functions and tasks.
The tools and the techniques which were used to conduct the actual analyses must
be justifiable by the forensics team.
5. Presentation:
Once the analyses have been completed, a summary of the findings is then
presented to the IT staff of the entity which was impacted by the Cyber-attack. Probably
one of the most important components of this particular document is the
recommendations and strategies which should be undertaken to mitigate any future risks
from potential Cyber-attacks.
Also, a separate document is composed which presents these same findings to a
court of law in which the forensic evidence is being presented.
AWT Page 3
1. Introduction to cyber Forensics
and verified with the original in preparation for legal proceedings that involve discovery,
depositions, or actual litigation.
Computer forensics has become its own area of scientific expertise, with
accompanying coursework and certification. The key points of corporate cyber forensics
that are required to explain the many challenges investigators face within the corporate
environment.
The information technology (IT) environment of a large corporation can be daunting
to characterize. Large corporations are often composed of a mixture of IT components
ranging from legacy production systems to bleeding-edge laboratory systems.
Additionally, business acquisitions, partnering, and nonstandard IT implementations
usually bring additional variety to the mix.
The most important aspect of successfully managing cyber forensics in a corporate
environment is cooperation. Upper management must support a designated corporate
forensics team working all such cases, and the corporation as a whole must be aware of
the proper policies and procedures relating to incident response and digital forensics.
Take, for example, intrusion cases, which have life cycles with the following phases:
preparation, identification, containment, eradication, recovery, and follow-up.
The complexity of the corporate IT environments means that many parties must work
together to handle cases such as these.
For example, legal departments, application owners, application developers, system
administrators, network engineers, firewall administrators, and many others must
cooperate.
Steps to keep in mind
Using all the information related to the incident, investigators must try to identify,
preserve, and acquire all possible sources of potential evidence. The following steps are
important:
1. Ensure that system administrators do not start their own investigation. Many times,
administrators have accidentally corrupted evidence themselves or, in looking for
evidence, were noticed by the hackers, who then deleted log files and their hacker
tools before logging off the system.
2. Ask the network architects for the network diagrams and descriptions of the affected
network.
3. Indentify critical business components related to the affected network (for example,
financial, contractual, legal).
4. Determine if disaster recovery plans exist and can permit certain systems or even the
whole portal to be restored in a clean state without interfering with the ability for the
investigators to complete forensic analysis of the affected systems.
5. Ask the security organization for any recent security audit reports of the affected
network, systems, and applications.
6. Establish the initial goals of the investigation. Goals are not always the same;
however, they would generally include these:
Identify and preserve evidence.
Determine, as accurately as possible, the method, time frame, and the scope
of the compromise.
Provide feedback about containment, remediation, and security enhancement.
Perform the investigation with as little disruption to the corporation as
possible.
Identify, immediately, the firewall logs, centralized syslogs, router logs,
IDS/IPS logs, sniffer data, application logs, and any other data that could help
in the investigation.
Implement, immediately, a plan for the preservation of logs so that historical
evidence is not deleted.
Identify, immediately, the available data storage to handle copies of all the
logs. Note that this is often a challenge because corporations do not always
have available and accessible storage handy. Sometimes, the easy answer is
to ship out large-capacity USB external hard drives.
AWT Page 4
1. Introduction to cyber Forensics
AWT Page 5
1. Introduction to cyber Forensics
AWT Page 6