Lesson 18 Flashcards
Key Aspects of Digital Forensics
DEFINITION: Collecting evidence from computer systems to a standard that will be accepted in a court of law
Evidence, documentation, and admissibility
•Latent evidence
•Collection must be documented
•Due process
Legal hold
Chain of custody
•Integrity and proper handling of evidence from collection, to analysis, to storage, and finally to presentation
Digital Forensics
DEFINITION: Collecting evidence from computer systems to a standard that will be accepted in a court of law
Evidence, documentation, and admissibility
•Latent evidence
•Collection must be documented
•Due process
Evidence, documentation, and admissibility
•Latent evidence - Latent means that the evidence
cannot be seen with the naked eye; rather, it must be interpreted using a machine or
process. This means that great care must be taken to ensure the admissibility of digital
evidence.
•Collection must be documented - requires documentation showing how the evidence was collected and analyzed without
tampering or bias.
•Due process - people only
be convicted of crimes following the fair application of the laws of the land. More
generally, due process can be understood to mean having a set of procedural
safeguards to ensure fairness.
Legal hold
Legal hold refers to the fact that information that may be relevant to a court case
must be preserved. Information subject to legal hold might be defined by regulators
or industry best practice, or there may be a litigation notice from law enforcement or
lawyers pursuing a civil action. This means that computer systems may be taken as
evidence, with all the obvious disruption to a network that entails.
Chain of Custody
Chain of custody
•Integrity and proper handling of evidence from collection, to analysis, to storage, and finally to presentation
Digital Forensics Reports
- Summarizes contents of the digital data
- Conclusions from the investigator’s analysis
- Professional ethics
- Analysis must be performed without bias
- Analysis methods must be repeatable
- Evidence must not be changed or manipulated
E-discovery
•Electronically Stored Information (ESI)
Some software does the following for e-discovery
•Identify and de-duplicate files and metadata
•Search
•Tags
•Security
•Disclosure
E-discovery is a means of filtering the relevant
evidence (From ESI) produced from all the data gathered by a forensic examination and storing
it in a database in a format such that it can be used as evidence in a trial.
Video and Witness Interviews
Video
•Record all actions
•Log/video steps taken
Witness interviews
•Informal statements
•Avoid leading questions
•Formal questioning
Timelines
A significant part of a forensic investigation will involve tying events to specific times
to establish a consistent and verifiable narrative. The visual representation of events
happening in chronological order is called a timeline.
- Sequence of events
- Time stamps
- OS/file system methods for recording time
- Correct synchronization of local time source
- Time offset
- Coordinated Universal Time (UTC)
- Local time
- Date/time settings tampering
Event Logs and Network Traffic
•Collect data from network logging servers
•Packet captures
•Retrospective Network Analysis (RNA) - A Retrospective Network Analysis (RNA)
solution provides the means to record network events at either a packet header or
payload level.
•Record collection methods to establish provenance
Strategic Intelligence and Counterintelligence
In some cases, an organization may conduct a forensics investigation without the
expectation of legal action. As well as being used in a legal process, forensics has a
role to play in cybersecurity. It enables the detection of past intrusions or ongoing but
unknown intrusions by close examination of available digital evidence.
- Re-examine logs for signs of intrusion
- Counterintelligence
- Analyze adversary tactics, techniques, and procedures (TTP)
- Develop better control configurations
- Strategic intelligence
- Inform risk management and security control provisioning to build mature cybersecurity capabilities
Data Aquisition
process of obtaining a forensically clean copy of data from a device
held as evidence. If the computer system or device is not owned by the organization,
there is the question of whether search or seizure is legally valid. This impacts bringyour-
own-device (BYOD) policies
Computer on/off state
Data acquisition is also complicated by the fact that it is more difficult to capture
evidence from a digital crime scene than it is from a physical one. Some evidence will
be lost if the computer system is powered off; on the other hand, some evidence may
be unobtainable until the system is powered off. Additionally, evidence may be lost
depending on whether the system is shut down or “frozen” by suddenly disconnecting
the power.
Order of volatility (CRSH)
CRSH CPU Registers and cache memory RAM (Memory) Swap file Hard Drive
Data acquisition usually proceeds by using a tool to make an image from the data
held on the target device. An image can be acquired from either volatile or nonvolatile
storage. The general principle is to capture evidence in the order of volatility, from
more volatile to less volatile.
1.CPU registers and cache memory
2.Non-persistent system memory (RAM)
3.Data on persistent storage
•Partition data and file system artefacts
•Cached system memory data (pagefiles and hibernation files)
•Temporary file caches
•User, application, and OS files and directories
4.Remote logging and monitoring data
5.Physical configuration and network topology
6.Archival media
Digital Forensics Software
- EnCase Forensic and The Forensic Toolkit (FTK)
- Commercial case management and evidence acquisition and analysis
- The Sleuth Kit/Autopsy
- Open-source case management and evidence acquisition and analysis
- WinHex
- Forensic recovery and analysis of binary data
- The Volatility Framework
- System memory analysis
System Memory acquisition
System memory is volatile data held in Random Access Memory (RAM) modules.
Volatile means that the data is lost when power is removed. A system memory
dump creates an image file that can be analyzed to identify the processes that are
running, the contents of temporary file systems, registry data, network connections,
cryptographic keys, and more. It can also be a means of accessing data that is
encrypted when stored on a mass storage device