Week 1 Webinar Slides (1)

30
SCHOOL OF COMPUTING & MATHEMATICS Digital Forensics Free Short Course – Week1

description

week 1

Transcript of Week 1 Webinar Slides (1)

Page 1: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS

Digital Forensics

Free Short Course – Week1

Page 2: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS

About the presenter

Page 3: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS3

Page 4: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS

An important note

This short course is a mini version of ITC597-Digital Forensics. A subject offered at Charles Sturt University.

Most material used in this short course will be from ITC597 textbook:

Nelson, B., Phillips, A., & Steuart, C. (2015). Guide to Computer Forensics and Investigations (5/e). Cengage

Learning, Boston, MA

4

Page 5: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS

Week 1

5

Digital forensics and investigation

Page 6: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS

Week 1 Objectives• The investigative process • Role of digital forensics investigator• Corporate Vs. criminal investigation • Content search using ProDiscover Basic

6

Page 7: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS7

Understanding Computer ForensicsComputer forensics

• Involves obtaining and analyzing digital information • As evidence in civil, criminal, or administrative

cases

Page 8: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS

Source: Google images

Page 9: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS

Source: Google images

Page 10: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS

Forensic:• “…a characteristic of evidence that satisfies its

suitability for admission as fact and its ability to persuade based upon proof (or high statistical confidence).”

The aim of forensic science is: • “…to demonstrate how digital evidence can be used

to reconstruct a crime or incident, identify suspects, apprehend the guilty, defend the innocent, and understand criminal motivations.”

Ref: Casey, “Digital Evidence and Computer Crime”,2nd ed., section 1.6, p20.

Definition

Page 11: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS11

Computer Forensics Versus Other Related DisciplinesComputer forensics

• Investigates data that can be retrieved from a computer’s hard disk or other storage media

Network forensics• Yields information about how a perpetrator or an

attacker gained access to a networkData recovery

• Recovering information that was deleted by mistake• Or lost during a power surge or server crash

• Typically you know what you’re looking for

Page 12: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS12

Computer Forensics Versus Other Related Disciplines (Cont)Computer forensics

• Task of recovering data that users have hidden or deleted and using it as evidence

• Evidence can be inculpatory (“incriminating”) or exculpatory

Disaster recovery• Uses computer forensics techniques to retrieve

information their clients have lostInvestigators often work as a team to make

computers and networks secure in an organization

Page 13: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS13

Understanding Case LawTechnology is evolving at an exponential pace

• Existing laws and statutes can’t keep up changeCase law used when statutes or regulations don’t

existCase law allows legal counsel to use previous

cases similar to the current one• Because the laws don’t yet exist

Each case is evaluated on its own merit and issues

Page 14: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS14

Developing Computer Forensics ResourcesYou must know more than one computing platform

• Such as DOS, Windows 9x, Linux, Macintosh, and current Windows platforms

Join as many computer user groups as you can• AISA – Digital Forensics Group (aisa.org.au)• Forensics Focus (forensicfocus.com)• Magnet Forensics (magnetforensics.com)• High Tech Crime Group

Page 15: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS15

Developing Computer Forensics Resources (continued)High Technology Crime Investigation Association

(HTCIA)• Exchanges information about techniques related to

computer investigations and securityUser groups can be helpfulBuild a network of computer forensics experts and

other professionals• And keep in touch through emails / OSNs

Outside experts can provide detailed information you need to retrieve digital evidence

Page 16: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS16

Preparing for Computer InvestigationsComputer investigations and forensics falls into

two distinct categories• Public investigations• Private or corporate investigations

Public investigations• Involve government agencies responsible for criminal

investigations and prosecution• Organizations must observe legal guidelines

Law of search and seizure• Protects rights of all people, including suspects

Page 17: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS17

Preparing for Computer Investigations (continued)Private or corporate investigations

• Deal with private companies, non-law-enforcement government agencies, and lawyers

• Aren’t governed directly by criminal law• Governed by internal policies that define expected

employee behavior and conduct in the workplacePrivate corporate investigations also involve

litigation disputesInvestigations are usually conducted in civil cases

Page 18: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS18

Understanding Law Enforcements Agency InvestigationsIn a criminal case, a suspect is tried for a criminal

offense• Such as burglary, murder, or molestation

Computers and networks are only tools that can be used to commit crimes• Many states have added specific language to criminal

codes to define crimes involving computersFollowing the legal process

• Legal processes depend on local custom, legislative standards, and rules of evidence

Page 19: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS19

Understanding Corporate InvestigationsPrivate or corporate investigations

• Involve private companies and lawyers who address company policy violations and litigation disputes

Corporate computer crimes can involve:• E-mail harassment• Falsification of data• Gender and age discrimination• Embezzlement• Sabotage• Industrial espionage

Page 20: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS20

Understanding Corporate Investigations (continued)Establishing company policies

• One way to avoid litigation is to publish and maintain policies that employees find easy to read and follow

• Published company policies provide a line of authority • For a business to conduct internal investigations

• Well-defined policies• Give computer investigators and forensic examiners the

authority to conduct an investigation

Displaying Warning Banners• Another way to avoid litigation

Page 21: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS21

Understanding Corporate Investigations (continued)Displaying Warning Banners (continued)

• Warning banner• Usually appears when a computer starts or connects to the

company intranet, network, or virtual private network• Informs end users that the organization reserves the right to

inspect computer systems and network traffic at will• Establishes the right to conduct an investigation

• As a corporate computer investigator• Make sure company displays well-defined warning banner

Page 22: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS22

Understanding Corporate Investigations (continued)Designating an authorized requester

• Authorized requester has the power to conduct investigations

• Policy should be defined by executive management• Groups that should have direct authority to request

computer investigations• Corporate Security Investigations• Corporate Ethics Office• Corporate Equal Employment Opportunity Office• Internal Auditing• The general counsel or Legal Department

Page 23: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS23

Understanding Corporate Investigations (continued)

Conducting security investigations• Types of situations

• Abuse or misuse of corporate assets• E-mail abuse• Internet abuse

• Be sure to distinguish between a company’s abuse problems and potential criminal problems

• Corporations often follow the silver-platter doctrine• What happens when a civilian or corporate investigative agent

delivers evidence to a law enforcement officer

Page 24: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS24

Understanding Corporate Investigations (continued)

Distinguishing personal and company property• Many company policies distinguish between personal

and company computer property• One area that’s difficult to distinguish involves BYODs:

mobile phones, tabs and personal notebook computers• The safe policy is to not allow any personally owned

devices to be connected to company-owned resources• Limiting the possibility of commingling personal and company

data

Page 25: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS25

Maintaining Professional ConductProfessional conduct

• Determines your credibility• Includes ethics, morals, and standards of behavior

Maintaining objectivity means you must form and sustain unbiased opinions of your cases

Maintain an investigation’s credibility by keeping the case confidential• In the corporate environment, confidentiality is critical

In rare instances, your corporate case might become a criminal case as serious as murder

Page 26: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS26

Maintaining Professional Conduct (continued)

• Enhance your professional conduct by continuing your training

• Record your fact-finding methods in a journal• Attend workshops, conferences, and vendor

courses• Membership in professional organizations adds to

your credentials• Achieve a high public and private standing and

maintain honesty and integrity

Page 27: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS27

Understanding Forensics Lab Certification Requirements Digital forensics lab

• Where you conduct your investigation• Store evidence• House your equipment, hardware, and

softwareThe National Association of Testing Authorities,

Australia (NATA) provides lab accreditation services

American Society of Crime Lab Directors (ASCLD)

Page 28: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS28

What you need to be a successful digital forensics practitioner

• Lots of knowledge about computers (technology)• Commonsense• Ability to think outside the box• Attention to detail• Persistence

Page 29: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS

• Digital Forensic Evidence Examination by Fred Cohen (2013) http://fredcohen.net/Books/2013-DFE-Examination.pdf

• ProDiscover Tutorial https://www.youtube.com/watch?v=OvJ3Pcv4YV0

• Forensics Wiki http://forensicswiki.org/wiki/Main_Page• High Tech Crime Investigation Association

https://www.htcia.org/

Some useful links

Page 30: Week 1 Webinar Slides (1)

SCHOOL OF COMPUTING & MATHEMATICS

Next Week

This Week• Digital forensics and investigation • ProDiscover Basic

• Data acquisition and validation• ProDiscover Basic • WinHex

30