Computer Forensics

29
COMPUTER FORENSICS Presented By Paritosh Goldar P08CO979 Guided By DR Patel

description

computer forensics

Transcript of Computer Forensics

Page 1: Computer Forensics

COMPUTER FORENSICS

Presented ByParitosh Goldar

P08CO979

Guided ByDR Patel

Page 2: Computer Forensics

INDEX• Introduction• Components of Computer Forensic

Analysis• The Forensic Investigation Process• Objectives of the Investigative Process.• Applications of Computer Forensics • Security Incidence• Computer Forensic Tools• Conclusion• References

Page 3: Computer Forensics

Introduction

• computer forensics is the collection, preservation, analysis, and presentation of computer-related evidence.

• Real scientific discipline for crime investigation.

• The use of science and technology to investigate and establish facts in criminal or civil courts of law.

Page 4: Computer Forensics

Introduction• Proper Acquisition and Preservation of Computer Evidence.• Authentication of Collected Data for Court Presentation.• Recovery of All Available Data, Including delete files. Computer forensics creates opportunities

to uncover evidence impossible to find using a manual process

Page 5: Computer Forensics

Components of Computer Forensic Analysis

• Preservation– Involves making a forensic copy of the

original data and conducting a comparison between the copy and the original

–Examine the live computer system if possible

– Inspect the surroundings, collect all pertinent physical evidence

–Photograph all devices before examination–Fully document the hardware configuration

Page 6: Computer Forensics

Components of Computer Forensic Analysis

• Identification– Identify the potential containers of

electronic evidence (e.g. hard drives, etc.)– Identify the data pertinent to the case under

investigation• Extraction

–Making electronic and hard copies of relevant data

Page 7: Computer Forensics

Components of Computer Forensic Analysis

• Interpretation–Results of investigation based on data and

tools used must be interpreted by forensic experts

• Documentation–Document everything from start to finish

Page 8: Computer Forensics

Components of Computer Forensic Analysis

• Rules of Evidence–Forensic investigators must consider local

rules of evidence (define conditions for admissibility, reliability, and relevance) that apply to the situation at hand

Page 9: Computer Forensics

The Forensic Investigation Process– Recovery of evidence: recovery of hidden and

deleted information, recovery of evidence from damaged equipment

– Harvesting: Obtaining data about data– Data reduction: Eliminate/filter evidence– Organization and search: Focus on

arguments– Analysis: Analysis of evidence to support

positions– Reporting: Record of the investigation– Persuasion and testimony: In the courts

Page 10: Computer Forensics

Objectives of the Investigative Process• Acceptance: Process has wide

acceptance• Reliability: Methods used can be trusted

to support findings• Repeatability: Process can be

replicated• Integrity: Trust that the evidence has not

been altered• Cause & Effect: Logical relationship

between suspects, events, evidence• Documentation: Recording of evidence

Page 11: Computer Forensics

Applications of Computer Forensics

• High Tech Crime Investigations• Incident Response• Email Recovery & Analysis• Document & File recovery• Law enforcement agencies e.g.

cybercrime• Civil Litigators e.g. IP infringement• Insurance companies

Page 12: Computer Forensics

Security Incidents

• Incident: "A computer security incident, is any adverse event whereby some aspect of computer security could be threatened: loss of data confidentiality, disruption of data or system integrity, or disruption or denial of availability.“

• any security relevant adverse event that might threaten the security of a computer system or a network.

Page 13: Computer Forensics

Security Incidence

Page 14: Computer Forensics

Types of Incidents

• Most incidents point towards: 1. Confidentiality, 2. Integrity, 3. Availability.

Page 15: Computer Forensics

Main Categories of Incidents• Compromise of integrity

–Such as when a virus infects a program or the discovery of a serious system vulnerability.

• Denial of service–Such as when an attacker has

disabled a system or a network worm has saturated network bandwidth.

Page 16: Computer Forensics

Main Categories of Incidents• Misuse

–Such as when an intruder (or insider) makes unauthorized use of an account or information.

• Damage–Such as when a virus destroys

data.• Intrusions

–Such as when an intruder penetrates system security.

Page 17: Computer Forensics

Examples of IncidentsDifferent types of incidents:• Repudiation,• Harassment,• Pornography trafficking,• Organized crime activity,• Subversion.

Page 18: Computer Forensics

Incident Response Methodology

Preparation Detection Containment Analysis Eradication Recovery Follow-up

Feed Back

Digital Forensics/Evidence Management

Page 19: Computer Forensics

Types of Digital Forensics

• “Network” Analysis–Communication analysis–Log analysis–Path tracing

Page 20: Computer Forensics

Types of Digital Forensics• Media Analysis

–Disk imaging–MAC time analysis (Modify,

Access, Create)–Content analysis–Slack space analysis–Steganography

Page 21: Computer Forensics

Types of Digital Forensics

• Code Analysis–Reverse engineering–Malicious code review–Exploit Review

Page 22: Computer Forensics

Computer Forensics Tools

• Filter and search software• Password recovery software• Data recovery• Data elimination• Hashing tools to validate accuracy of

forensic copies

Page 23: Computer Forensics

Computer Forensics Tools

• Imaging Softwares ex. EnCase, SafeBack.

• Data extraction or data mining softwares

Page 24: Computer Forensics

Example of Crime Solved by Computer Forensics

TYPE OF CRIME TYPE OF E-EVIDENCE

Murder Files on computer hard drives and a PDA

Double murder GPS data from his car and cell phone; Internet history

Terrorism E-mail, files from his computers

Page 25: Computer Forensics

Example of Crime Solved by Computer Forensics

TYPE OF CRIME TYPE OF E-EVIDENCE

Serial killer Deleted files on a pen drive used by the criminal at his computer

Kidnapping E-mail communication between the victim and criminal—tracing an IP address to a computer at criminal’s home

Snipers Digital recordings on a device in suspects’ car

Rape E-evidence of pornography on his computer

Page 26: Computer Forensics

Conclusion• Several unique opportunities give

computer forensics the ability to uncover evidence that would be extremely difficult to find using a manual process

• Computer forensics also has a unique set of challenges that are not found in standard evidence gathering, including volume of electronic evidence, how it is scattered in numerous locations, and its dynamic content

Page 27: Computer Forensics

ReferencesBooks :1. Computer Forensics For Dummies®2. Cyber Forensics- A Field Manual for

Collecting, Examining, and Preserving Evidence of Computer Crimes

3. Computer Forensics Computer Crime Scene Investigation

Page 28: Computer Forensics

References

Websites1. http://computer-forensics.safemode.org2. http://www.cybersecurityinstitute.biz/

forensics.htm 3. www.forensics-intl.com4. www.cybersecurityinstitute.biz

Page 29: Computer Forensics

COMPUTER FORENSICS

Questions???

andTHANK YOU!!