+ All Categories
Home > Documents > DIGITAL FORENSICS_PRESENTATION

DIGITAL FORENSICS_PRESENTATION

Date post: 19-Aug-2015
Category:
Upload: amina-b
View: 98 times
Download: 1 times
Share this document with a friend
Popular Tags:
11
DIGITAL FORENSICS An Overview
Transcript
Page 1: DIGITAL FORENSICS_PRESENTATION

DIGITAL FORENSICS

An Overview

Page 2: DIGITAL FORENSICS_PRESENTATION

BASICS OF EVERY FORENSICS CASE

1.Make an Image

2.Conduct the Investigation

3.Bookmark relevant/important discoveries

4.Prepare a report of the findings

Page 3: DIGITAL FORENSICS_PRESENTATION

HISTORY

• 1984 Started with the FBI’s Media Magnet Program• 3 Cases handled that year

• 1991 The program later became the Computer Analysis Response Team (CART)

• 1995 International Organization on Computer Evidence (IOCE) was formed.

• 2001 CART renamed to Regional Computer Forensics Laboratory (RCFL)• FBI’s full service forensics laboratory devoted to examining and supporting criminal

investigations. The RCFL’s support state, local and federal cases

• 2001 Computer Forensics renamed to Digital Forensics – 16 centers as of today

Page 4: DIGITAL FORENSICS_PRESENTATION

WHAT IS IT?

• The practice of determining the past actions that have taken place on a computer system using computer forensic techniques and understanding artifacts.

• Science, and the techniques that you learn and, in the future, possibly discover must be documented, tested, and verified if you expect them to hold up to scrutiny. 

• Often confused with Incident Response (IR).

• Incident Response is a function that strictly belongs within information technology support services and is often looking for a cause or the break associated with the violation as it relates to a system or network and the overall computer infrastructure, rather than the actions of a person; which is what Digital Forensic does.

Page 5: DIGITAL FORENSICS_PRESENTATION

WHAT CAN IT DO?

• Recovering deleted files.

• Determine what programs have been run.

• Recover what web pages users have viewed.

• Recover the webmail that users have read.

• Determine what file servers users have used.

• Discover the hidden history of documents.

• Recover deleted private chat conversations between users.

• Recover call records and Short Message Service (SMS) messages from mobile devices.

Page 6: DIGITAL FORENSICS_PRESENTATION

TOOLS & EQUIPMENTS

• Forensic Workstations: There are many available on the market, but what is essential is that the workstations have the processing and memory power to perform the examination you need. As the business/lab grows, access to servers might be needed as well purchasing an actual forensics work station.

• SIFT: Vmware developed by SANS for Ubuntu

• Write Blockers: An external device that allows acquisition and allows read commands, but blocks writing commands.

• Anti-static Bags: Prevent static and shock from damaging the evidence/components you have gathered for your investigation.

• EnCase: Used for data acquisition and analysis

• FTK: Forensics Tool Kit scans hard-drives looking for various information and even recovering items. This is also used to make computer images.

• ProDiscover: Creates a computer image and can turn an image into a bootable VMware.

Page 7: DIGITAL FORENSICS_PRESENTATION

PREPARING FOR A CASE

• What type of case is it?• Administrative, Civil, Criminal

• Public/Private

• What is being investigated?• Crime/Violation

• OS/Device

• Who will be involved & at what level?

Page 8: DIGITAL FORENSICS_PRESENTATION

PERFORMING & DOCUMENTING THE INVESTIGATION

• Industry Tools, Processes & Guidelines Used within the investigation

• Reporting Findings• Forensic Examiners do not make interpretation, but report their

findings

• If during a non criminal investigation certain information is uncovered, like child pornography, the case will become criminal and case will need to be revaluated

• Preparing Reports for legal use • Outcome

Page 9: DIGITAL FORENSICS_PRESENTATION

RECENT & SAMPLE CASES

• Target Data Breaches• Network Intrusion/Hacking

• Personal and financial data was compromised

• Resactor

• Sold Credit Card Numbers

• Timberwolves Player : Dante Cunningham

• Romania Bank Transfer Case: Local Non-Profit • Zeus

Page 10: DIGITAL FORENSICS_PRESENTATION

HOW TO BECOME A FORENSICS EXAMINER?

• Formal Training: Credibility• Academic

• Certifications

• Experience

• Skillset: Competency• Tools

• Industry Best Practices

• Methodologies

• Personality: Success• Analytical

• Detailed

• Strong/Emotional Stable

• Patient


Recommended