DF Unit 1 My Notes
DF Unit 1 My Notes
• The evolution of digital forensics has been driven by the need to secure and analyze digital
information for legal purposes.
• Ken Zatyko de ned digital forensics as the application of computer science and
investigative procedures for legal purposes, involving the analysis of digital evidence.
• Digital forensics encompasses specialties like computer forensics, network forensics, and
video forensics.
• Incident response and research are also part of digital forensics, not necessarily concerned
with prosecution.
• The International Organization for Standardization (ISO) rati ed ISO 27037 to standardize
digital forensics procedures.
• The Federal Rules of Evidence (FRE) and various state laws govern the admissibility of
digital evidence in legal proceedings.
• The Fourth Amendment protects against unreasonable searches and seizures, impacting the
collection of digital evidence.
• Digital forensics involves examining and analyzing data from computer storage media for
legal purposes.
• The National Institute of Standards and Technology (NIST) de nes digital forensics as
applying science to identify, collect, examine, and analyze data while preserving integrity
and maintaining chain of custody.
• Digital forensics investigates data on computer storage media, including retrieving hidden
or deleted information, and presenting it in court.
• It differs from data recovery, which focuses on retrieving accidentally deleted or lost data.
2. Network Intrusion Detection and Incident Response: This function focuses on detecting
and responding to intrusions into the network. Automated tools are utilized to detect intruder
attacks, and network rewall logs are monitored to identify suspicious activities. When an
external attack is detected, the incident response team tracks, locates, and identi es the intrusion
method while preventing further access to the network. In the event of an attack causing damage,
this team collects evidence for potential civil or criminal litigation against the intruder and
implements measures to prevent future intrusions. They may also assist in locating internal users
engaged in illegal acts or policy violations within the network.
Overall, the investigations triad combines complementary functions to address various aspects of
digital technology investigation comprehensively. By integrating vulnerability assessment,
incident response, and digital forensic analysis, organizations can effectively manage risks, detect
and respond to security incidents, and gather evidence for potential litigation. This collaborative
approach ensures that all aspects of digital security and forensic investigation are covered,
enhancing the organization's ability to protect its assets and respond to security threats
effectively.
• Data recovery differs from digital forensics in that data recovery focuses on retrieving data,
while digital forensics involves retrieving hidden or deleted data for legal purposes.
• A forensic workstation, specially con gured with additional bays and forensics software, is
necessary for conducting investigations and analysis.
• The choice of operating system for a forensic workstation depends on the speci c needs of the
investigation, ranging from MS-DOS to modern Windows, Linux, and MacOSX.
• Operating systems can alter evidence disks by writing data during startup, potentially
corrupting evidence integrity.
• Write-blockers, both hardware and software, are used to prevent writing data to evidence
drives during acquisition.
• Hardware write-blockers connect to USB or FireWire ports and are offered by various
vendors, while software write-blockers typically require a bootable DVD or USB ash drive.
• Windows products are available for disk forensics, but Linux is often preferred due to its
capabilities.
• Skills in using various tools and operating systems are necessary for effective digital
investigations, as no single tool or OS can recover everything.
fi
fi
fl
- Setting up your workstation for digital forensics :
• Conducting an Investigation:
You have created a plan for the investigation, set up your forensic workstation, and installed the
necessary forensic analysis software you need to examine the evidence. The type of software to
install includes your pre- ferred analysis tool, such as ProDiscover, EnCase, FTK, or X-Ways
Forensics; an of ce suite, such as LibreOf ce; and a graphics viewer, such as IrfanView. To
begin conducting an investigation, you start by copying the evidence, using a variety of methods.
No single method retrieves all data from a disk, so using several tools to retrieve and analyze
data is a good idea.
Start by gathering the resources you identi ed in your investigation plan. You need the fol-
lowing items:
• Bit-stream imaging tool; in this case, the ProDiscover Basic acquisition utility
fi
fi
fi
• Forensic workstation to copy and examine the evidence
Steps:
1. Arrange to meet the IT manager to interview him and pick up the storage media.
2. After interviewing the IT manager, ll out the evidence form, have him sign it, and then
sign it yourself.
3. Store the storage media in an evidence bag, and then transport it to your forensic facility.
• Acquiring a bit-stream copy is essential for preserving evidence on a disk, as it ensures the
highest chance of successfully retrieving necessary evidence.
• Unlike simple backup copies made by backup software, bit-stream copies include all data
on the disk, including deleted les, e-mails, and le fragments.
• A bit-stream image refers to the le containing the bit-stream copy of the disk, often simply
referred to as an "image" or "image le."
• When creating an exact image of an evidence disk, it's preferable to copy the image to a
target disk that's identical to the original, including manufacturer, model, size in bytes, and
sectors.
• Some image acquisition tools can accommodate target disks of different sizes than the
original, but maintaining identical characteristics is preferable.
fi
fi
fi
fi
fi
fi
• Older digital forensics tools designed for MS-DOS work only on copied disks, while
current GUI tools can work on both disk drives and copied data sets known as "image
saves.”
• Key questions to be answered for the nal report include how George's manager acquired the
disk, whether George conducted work on a personal laptop, the timing of his usage of non-
work-related les, relevant company policies, and any additional considerations.
• The nal report will detail the steps taken and ndings, including the ProDiscover report le to
document the investigation.
• The capability for repeatable ndings is crucial in computing investigations to ensure the
validity of the work product as evidence.
• It's advised to maintain a written journal of all actions taken, as these notes can be used in
court.
• Basic report writing involves answering the six Ws: who, what, when, where, why, and how,
while also providing explanations for computer and network processes tailored to the reader's
level of understanding.
• Organizations may have templates for writing reports, and integrating digital forensics log
reports can enhance the nal report's comprehensiveness.
• Joining computer user groups, both public and private, provides opportunities to
discuss challenges and exchange knowledge. Organizations like the Computer
Technology Investigators Network (CTIN), IACIS, and the High Technology
Crime Investigation Association offer valuable resources and training.
Expert Assistance:
• Seeking assistance from outside experts, such as Macintosh engineers, can provide
detailed information necessary for retrieving digital evidence. A case example
illustrates how collaboration with a Macintosh engineer helped retrieve crucial
evidence from a compressed and erased hard drive, leading to a murder conviction.
• a criminal case follows three stages: the complaint, the investigation, and the
prosecution.
• A Digital Evidence First Responder (DEFR) has the skill and training to arrive on an
incident scene, assess the situation, and take precautions to acquire and preserve
evidence
• A Digital Evidence Specialist (DES) has the skill to analyze the data and determine when
another specialist should be called in to assist with the analysis.
• start by assessing the scope of the case, which includes the device’s OS, hardware, and
peripheral devices. You then determine whether resources are available to process all
the evidence. Determine whether you have the right tools to collect and analyze
evidence and whether you need to call on other specialists to assist in collecting and
processing evidence.
fi
• In a criminal or public-sector case, if the police of cer or investigator has suf cient
cause to support a search warrant, the prosecuting attorney might direct him or her
to submit an af davit
• after a judge approves and signs a search warrant, it’s ready to be executed, meaning a
DEFR can collect evidence as de ned by the warrant.
When preparing a case, you can apply standard systems analysis steps, explained in
the following list, to problem solving. Later in this chapter, you apply these steps to
cases.
• Make an initial assessment about the type of case you’re investigating—To assess
the type of case you’re handling, talk to others involved in the case and ask
questions about the incident. Have law enforcement or company security of cers
already seized the computer, disks, peripherals, and other components? Do you
need to visit an of ce or another location? Was the computer used to commit a
crime, or does it contain evidence about another crime?
• Obtain and copy an evidence drive—In some cases, you might be seizing multiple
computers along with CDs, DVDs, USB drives, mobile devices, and other
removable media. (For the examples in this chapter, you’re using only USB
fi
fi
fi
fi
fi
fi
fi
fi
drives.) Make a forensic copy of the disk.
• Identify the risks—List the problems you normally expect in the type of case
you’re handling. This list is known as a standard risk assessment. For example, if
the suspect seems knowledgeable about computers, he or she might have set up a
logon scheme that shuts down the computer or overwrites data on the hard disk
when someone tries to change the logon password.
• Mitigate or minimize the risks—Identify how you can minimize the risks. For
example, if you’re working with a computer on which the suspect has likely
password-protected the hard drive, you can make multiple copies of the original
media before starting. Then if you destroy a copy during the process of retrieving
information from the disk, you have additional copies.
• Test the design—Review the decisions you’ve made and the steps you’ve
completed. If you have already copied the original media, a standard part of testing
the design involves comparing hash values (discussed in Chapters 3 and 4) to
ensure that you copied the original media correctly.
• Analyze and recover the digital evidence—Using the software tools and other
resources you’ve gathered, and making sure you’ve addressed any risks and
obstacles, examine the disk to nd digital evidence.
• Investigate the data you recover—View the information recovered from the disk,
including existing les, deleted les, e-mail, and Web history, and organize the les
to help nd information relevant to the case.
• Complete the case report—Write a complete report detailing what you did and
what you found.
• Nature of case—A short description of the case. For example, in the private- sector
environment, it might be “data recovery for corporate litigation” or “employee
policy violation case.”
• Location evidence was obtained—The exact location where the evidence was
collected. If you’re using multi-evidence forms, a new form should be created for
each location.
• Description of evidence—A list of the evidence items, such as “hard drive, 250
GB” or “one USB drive, 8 GB.” On a multi-evidence form, write a description for
each item of evidence you acquire and possibly include photos.
• Evidence recovered by—The name of the investigator who recovered the evidence.
The chain of custody for evidence starts with this information. If you insert your
name, for example, you’re declaring that you have taken control of the evidence.
It’s now your responsibility to ensure that nothing damages the evidence and no
one tampers with it. The person placing his or her name on this line is responsible
for preserving, transporting, and securing the evidence.
• Date and time—The date and time the evidence was taken into custody. This
information establishes exactly when the chain of custody starts.
• Page—The forms used to catalog all evidence for each location should have page
numbers. List the page number, and indicate the total number of pages for this
group of evidence. For example, if you collected 15 pieces of evidence at one
location and your form has only 10 lines, you need to ll out two multi-evidence
forms. The rst form is noted as “Page 1 of 2,” and the second page is noted as
“Page 2 of 2.”
fi
fi
fi