Computer Forensics and Investigations As A Profession
Computer Forensics and Investigations As A Profession
INVESTIGATIONS AS A
PROFESSION
Lecture 1a – 1b
2
Objectives
• Define digital forensics
• Describe how to prepare for computer investigations and
explain the difference between law enforcement agency
and corporate investigations
• List the roles of digital forensics investigator
Expected
• Attend labs
• Ask if you do not know
• Read lecture notes (E-lecture), reference book
(before coming for labs)
• Do the review questions at the end of lecture.
• Get interested in this subject.
3
Assumptions:
• Basic Computer background
• Basic knowledge on Windows and Linux Operating System
• Binary, Hex number system
5
Academic - plagiarism issue
•no Certified Copying And
Paste (CCNP) from Internet
or Google and among
students
6
Teaching Team
7
8
• Computer forensics
• Investigates data that can be retrieved from a computer’s hard disk or other storage
media
• Mobile forensics
• Investigates data that can be retrieved from a mobile handset’s storage media
• Multimedia forensics
• Investigates data that can be retrieved from a multimedia such as Closed-circuit television
(CCTV)
10
Source: http://tinyurl.com/ndr4jff
Virtual Systems and network
• Virtual machine provider
• VMware, Citrix, Huawei and Microsoft
• Methods of VM forensics
• Through host machine (lnk files)
• Through native application’s files (.vmem)
• Normal viewing through mounting from forensics software
Source: http://www.forensicfocus.com/downloads/virtual-machines-forensics-analysis.pdf
http://www.fedtechmagazine.com/article/2011/02/digital-forensics-virtualized-environment
Business application in the cloud (mobile)
• The total market for cloud-based applications in the
mobile space is predicted to grow from $400 million
back in 2009 to an estimated $9.5 billion by 2014 (and
nearly $39 billion by 2016)
• Forever changing landscape for mobile devices
• Both iOS and Android mostly use remote resources
• Proper forensics understanding of platform apps
• Mobile platforms, or Mobile Enterprise Application
Platforms (MEAP)
• Logical or physical
Question: Could the forensics examiner access the web data across the national
border without the user consent ?
25
Source: http://www.gartner.com/newsroom/id/2996817
27
1,004,67
Android 5 80.7 761,288 78.5
iOS 191,426 15.4 150,786 15.5
Windows 35,133 2.8 30,714 3.2 Android
81%
BlackBerry 7,911 0.6 18,606 1.9
Other OS 5,745 0.5 8,327 0.9
1,244,89
Total 0 100.0 969,721 100.0
Source: http://www.gartner.com/newsroom/id/2996817,
http://fortune.com/2014/03/13/a-mobile-os-war-looms-in-asia
Source: http://www.gartner.com/newsroom/id/2996817,
28
Source: https://technology.ihs.com/458951/mobile-phones-electronics-report-china-h2-2014
Source: https://technology.ihs.com/458951/mobile-phones-electronics-report-china-h2-2014
29
Cell phones
30
• Mostly repeatable ??
• Nokia mobile phone – date and time setting, call logs lost
• BlackBerry – kept emails for the past number of days
• Password / Passcode protected
• How is computer forensics different from mobile
forensics?
34
Summary
• Computer forensics applies forensics procedures to digital
evidence
• To be a successful computer forensics investigator, you
must know more than one computing platform
• Public and private computer investigations are different