Module 1 Introduction to Computer Forensic
Module 1 Introduction to Computer Forensic
Introduction To
Digital Forensics
CYB 205
4
Computer Crime
5
Computer is Used to Commit a Crime
6
Computer Forensic Goal
7
Computer Security Incident
8
Goals of Incident Response
▪ Accumulation of accurate information
▪ Establishment of control for proper retrieval and
handling of evidence
▪ Protection of privacy rights established by law and
policy
▪ Minimization of disruption to business and network
operations
▪ Preparation of accurate reports and useful
recommendations
▪ Minimization of exposure and compromise of
proprietary data
▪ Protection of organization reputation and assets
▪ Education of senior management
▪ Promotion of rapid detection/or prevention of such
incidents in the future (via lessons learned, policy
changes, etc) 9
Computer Forensics Classification
10
Computer Forensics Definitions (1)
12
Background: Computer Forensic
13
Background: Computer Forensic
15
Background: Computer Forensic
16
Forensic Science
▪ Definition:
▪ Application of Physical Sciences to Law in the
search for truth in civil, criminal, and social
behavioral matters to the end that injustice shall
not be done to any member of society.(Source:
Handbook of Forensic Pathology, College of
American Pathologists, 1990.)
▪ Sciences: chemistry, biology, physics, geology, …
▪ Goal: determining the evidential value of crime scene
and related evidence.
Forensic Science (Contd)
▪ Definition:
▪ Preservation, identification, extraction, documentation,
and interpretation of computer media for evidentiary
and/or root cause analysis using well-defined
methodologies and procedures.
▪ Methodology:
▪ Acquire the evidence without altering or damaging the
original.
▪ Authenticate that the recovered evidence is the same
as the original seized.
▪ Analyze the data without modifying it.
(Warren, G. Kruse ii and Jay G. Heiser, 2002, Computer Forensics – Incident Response Essentials, Addison Wesley)
Computer and Digital Forensics
▪ Definition
▪ The study of network traffic to search for truth in
civil, criminal, and administrative matters to
protect users and resources from exploitation,
invasion of privacy, and any other crime fostered
by the continual expansion of network
connectivity.
(Source: Kevin Mandia & Chris Prosise, Incident
response,Osborne/McGraw-Hill, 2001. )
Category of Digital Evidence
▪ Hardware
▪ Software
▪ Data
▪ Programs
▪ Files
Machine learning (ML) based techniques that can be
used to ease the process of Digital Forensics (DF)
principally in the field of malware, network forensics,
image/video forensics, and mobile/memory forensics
Digital Evidence
▪ Definition
▪ Digital data that can establish that a crime has been
committed or can provide a link between a crime and its
victim or a crime and its perpetrator.(source: Casey,
Eoghan, Digital Evidence and Computer Crime: Forensic
Science, Computer and the Internet,Academic Press,
2000.)
▪ Categories
▪ Text
▪ Audio
▪ Image
▪ Video
Forensic Methodology
▪ Practical on Autopsy
▪ Use of Autopsy tool for forensic analysis and
evidence extraction in the digital media
Challenges of Computer Forensics
crime
scene
network
evidence
Cybertrail
Cyberwar or Information Warfare
CONCLUSION:
Computer is used to commit a crime.
Computer itself is a target of a crime.
Computer is the victim !!