0% found this document useful (0 votes)
8 views

Computer Forensics and Cyber Security - Lesson - 1

Uploaded by

jumba.rebecca
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Computer Forensics and Cyber Security - Lesson - 1

Uploaded by

jumba.rebecca
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 41

COMPUTER FORENSICS AND

CYBER SECURITY
MSC DCT Course Outline
Course outline
• Forensic artifacts created in modern digital life:
(AMK)
– web browsing,
– email and other activities;
• Digital Evidence (EA)
– Requirements for digital evidence
– Admissibility of electronic evidence
– Preparing for collection of digital evidence
– Forensic examination of computers and digital
electronic media
Computer Forensics
• Computer forensics:
– Definition: The application of scientific methods
and techniques in order to recover data from
electronic / digital media.
– Involves the preservation, identification,
extraction, documentation and interpretation of
computer media for evidence and/or root cause
analysis in a legally acceptable manner.
Computer Forensics
• Computer forensics:
– Is a science.
– Evidence is preserved, identified, documented and
presented similar to the “other” forensic sciences.
• DNA, Entomology (bugs), Serology (body
fluids), etc.
– Best conducted in a controlled environment.
– The expansion of network/cloud storage is forcing
the evolution of digital evidence collection (dead-
box vs. live acquisition).
Computer Forensics
• Expertise
Issues with Computer Forensics
• Computer forensics is relatively new hence laws
dictating the validity of evidence are sketchy and
not widely-known.
• Evidence is needed to fully prosecute the
attacker.
• This evidence has to come from the information
security administrator who must ensure the
validity of the evidence.
• The information security administrator must
know the rules that govern the admissibility of
evidence in the territory of jurisdiction (Kenya).
Evidence
• Definition:
– (Simple)Proof of a fact about what did or did not
happen
– Is presented to a judge for use to support or
refute the allegations of a crime or civil wrong
– Is presented to persuade belief in a claim or to
refute it.
– Must be reliable and relevant to the case in order
to be legally admissible.
Digital Investigators
• Role:
– To present supporting facts and probabilities.
– Present objective unbiased truth.
– Not to be an advocate.
– Not to take sides with the person who pays.
– Keep bias, emotion and greed out as much as
possible.
– Court depends on trustworthiness of investigators.
– Accurate, clear, factual and objective
Digital Evidence (DA)
• Is technical information found in a bunch of 1s
and 0s.
Digital Evidence (DA)
• Definition:
– Encompasses any and all digital data that can
establish that a crime has been committed or can
provide a link between a crime and its victim or a
crime and its perpetrator
– Evidence must pass the test of admissibility and
weight.
Admissibility of Evidence
• A measure of whether the evidence is safe to
be put before a jury to be used as foundation
of making decision
– Is a set of legal rules applied by a judge to assess
the item of evidence.
– For instance unauthenticated emails could not
admitted as anyone could create a false email.
– These rules are extensive:
• Relevance, authenticity, not hearsay, best evidence, not
unduly prejudicial.
Admissibility of evidence
• Improper handling and illegal search can prevent
evidence being admissible.
• Digital evidence must be gathered with search
warrants. Warrants have expiry time.
• To obtain a warrant, probable cause must be
established:
– A crime has been committed
– Evidence of crime is in existence
– Evidence is likely to exist at the place to be searched.
• If suspect consented to the search, no need for search
warrant, provided that consent can be substantiated.
Admissibility of evidence
• Evidence collected outside of warrant time
limit is not admissible.
• Evidence collected outside of the scope of the
warrant is not admissible.
Weight of Digital Evidence
• Weight is a measure of the validity and
importance.
– Essentially whether the judge or jury believes the
evidence.
– There are few guidelines except what is convincing
and well presented.
– Evidence must be authentic, accurate, and
complete for it to pass any standard of weight.
Challenges with forensics
• Technical Challenges
• Legal Issues
Technical challenges
• Expansion of data storage systems
– 1994 a 540 MB hard drive = 385 floppy disks
– 1996 a 2 GB hard drive = 1,463 floppy disks
– 1998 a 4 GB hard drive = 2,926 floppy disks
– 2001 a 40 GB hard drive = 29,269 floppy disks
– 2002 a 80 GB hard drive = 58,538 floppy disks
– 2003 a 160 GB hard drive = 117,077 floppy disks
– A Terabyte (TB) of hard drive space = 731,734 floppy disks.
Technical challenges
• The growth of “cloud” computing/storage:
iCloud, Box (50GB free), Carbonite, etc.
Legal Issues
• In the law enforcement world, forensic
examiners will be called to testify in court.
• At a minimum, you must know:
1. The law (clauses and statute)
2. “Best Practices”
3. Your policies and procedure
4. Evolving technology
Requirement of Digital Evidence
• Computer evidence is just like any other
evidence in the sense that it must be:
– Authentic
– Accurate
– Complete
– Convincing to Juries
– In conformity with common law and legislative
rules (admissible)
Authenticity
• Answers the question:
– Does the evidence (material) come from where it
purports?
• To demonstrate that digital evidence is authentic:
– We must show that it was acquired from specific
computer and/or location,
– That a complete and accurate copy of digital evidence
was acquired, and
– That has remained unchanged since it was collected.
– Chain of custody and integrity documentation
(evidence has not been altered) are important.
Reliability
• Answers the questions:
– Can the substance of the story the material tells
be believed and is consistent?
– Are there reasons for doubting the correct
working of the computer?
Completeness
• Is the story that the material purports to tell
complete? Are there other stories that the
material also tells that might have a bearing
on the legal dispute or hearing?
Crime reconstruction
• Is the determination of the actions or events
surrounding the commission of a crime.
• Depends on the evidence recovered from the
crime scene, a suspect or a victim “collected”
as part of the investigation.
• The quality of that evidence and the method
of evidence collection play important role.
• Evidence can be: artifact, Inculpatory or
exculpatory
Artifcat Evidence
• Is any change in crime scene evidence or
addition to crime scene evidence that could
potentially cause the investigator to infer
incorrectly that the “evidence” is related to a
crime.
Inculpatory evidence
• An evidence that either provides leads to
other evidence or corroborates other
evidence.
• Usually this type of evidence supports or helps
confirm a given theory.
Exculpatory evidence
• Opposite of inculpatory
• Contradicts a given theory
Direct Vs. Circumstantial evidence
• Direct evidence establishes a fact,
circumstantial suggests one.
– A computer log is a direct evidence that a given
account was used to log into a system.
– It is circumstantial evidence that the owner used
the computer to gain access.
Classification of Digital Evidence
• Digital evidence can be classified based on:
– Contents – Example:
• Investigators use the contents of an e-mail message to
classify it and to determine which computer it came
from.
• Swap files and slack space contain a random
assortment fragments of digital data than can often be
classified and individualized.
Classification of Digital Evidence
• Function –
– Investigators examine how a program functions to
classify it and sometimes individualize it.
– A program that appears to do something amusing
or useful but actually does something else, is
classified as a Trojan horse program.
Classification of Digital Evidence
• Characteristics – file names, message digests,
and date stamps can be helpful in classifying
and individualizing digital evidence.
Rules of Evidence
• A useful evidence must have the following
properties:
– Admissible
– Authentic
– Complete
– Reliable
– Believable
Rules of Evidence
• Admissible:
– Evidence must be able to be used in court of law.
– Inadmissibility of evidence is the equivalent to
lack of evidence except the cost is higher.
Rules of Evidence
• Authentic:
– Evidence must be tied to the incident in order to
prove something.
– The evidence must be shown to relate to the
incident in a relevant way.
Rules of Evidence
• Complete:
– Not only should you collect evidence that can
prove the attacker’s actions, but also evidence
that could prove their innocence.
– Hence this implies that it’s not enough to collect
evidence that just shows one perspective of the
incident.
– This is called “exculpatory evidence” and it is
important in proving a case.
Rules of Evidence
• Reliable :
– Evidence collection and analysis procedures must
not cast doubt on the evidence’s authenticity and
veracity.
Rules of Evidence
• Believable
– The evidence should be clearly understood and
easy to believe by the judges.
– A binary dump of process memory??
A general procedure of collecting
evidence
• Evidence collection generally involves:
– Identification of evidence
– Preservation of evidence
– Analysis of evidence
– Presentation of evidence
A general procedure of collecting
evidence
• Identification of evidence:
– It must be possible to distinguish between
evidence and junk data.
– Evidence collector should know what the data is,
where it is located, and how it is stored.
A general procedure of collecting
evidence
• Preservation of evidence:
– Evidence found must be preserved as close as
possible to its original state.
– Any changes made during this phase must be
documented and justified.
– All procedures used in the examination should be
auditable, i.e, a suitably qualified independent
expert appointed by the other side of a case
should be able to track all the investigations
carried out by the prosecution’s experts.
A general procedure of collecting
evidence
• Analysis of evidence:
– The stored evidence must then be analyzed to
extract the relevant information and recreate the
chain of events.
A general procedure of collecting
evidence
• Presentation of evidence:
– Refers to communicating the meaning of
evidence.
– You can’t do anything with your evidence unless
you can communicate what it means in a manner
that is understandable to a non-domain expert.
– Through every step of the procedure, it is crucial
to record and document everything that is done
and everything that is used.
– This ensures that the procedure is repeatable.

You might also like