Lect 2 computer forensics

14
Intro to Computer Forensics Mr. Islahuddin Jalal MS (Cyber Security) – UKM Malaysia Research Title – 3C-CSIRT Model for Afghanistan BAKHTAR UNIVERSITY ن و ت ن ه و پ ر ت خ ا دب

Transcript of Lect 2 computer forensics

Page 1: Lect 2 computer forensics

Intro to Computer Forensics

Mr. Islahuddin JalalMS (Cyber Security) – UKM Malaysia

Research Title – 3C-CSIRT Model for Afghanistan

BAKHTAR UNIVERSITY باخترپوهنتون د

Page 2: Lect 2 computer forensics

Outline• Key Steps in Forensics Investigation• Roles of Forensics investigator• Accessing Computer forensics Resources• Role of Digital Evidence• Understanding Corporate Investigation• Legal Issues• Reporting the Result

Page 3: Lect 2 computer forensics

Key Steps in Forensics Investigation [CHFI]

Page 4: Lect 2 computer forensics

Key Steps in Forensics Investigation [CHFI]

Page 5: Lect 2 computer forensics

Roles of Forensics Investigator • Confirms the compromise• Determines the extent of damage• Answers the WH questions• Gathers evidence in a forensically sound manner• Analyzes the evidence data found and protects it from damage• Prepares the analysis report• Presents acceptable evidence in the court

Page 6: Lect 2 computer forensics

Accessing Computer Forensics Resources• You can obtain resources by joining various discussion groups such as:• Computer Technology investigators• High Technology Crime investigation Association

• Joining a network of computer forensic experts and other professionals on social media, blogs, websites etc• News devoted to computer forensics can also be a powerful resource• Other resources• Journals of forensics investigation• Actual case studies

Page 7: Lect 2 computer forensics

Role of Digital Evidence [CHFI]

Page 8: Lect 2 computer forensics

Understanding Corporate Investigations• Involve private companies who address company’s policy violations

and litigation disputes• Company procedures should continue without any interruption from

the investigation• After the investigation, the company should minimize or eliminate

similar litigations• Industrial espionage is the foremost crime in corporate investigations

Page 9: Lect 2 computer forensics

Approach to Forensics Investigation: A Case Study

1. An incident occurs in which the company’s server is compromised2. The client contacts the company’s advocate for legal advice3. The advocate contacts an external forensic investigator4. The forensic investigator prepares first response of procedures5. The forensic investigator seizes the evidence at the crime scene and

transports it back to the forensics lab6. The forensics investigator prepares the bit-stream images of the file7. The forensic investigator creates the hash of the files

Page 10: Lect 2 computer forensics

Continued….8. The forensics investigator examine the evidence files for proof of a crime9. The FI prepares investigation reports, concludes the investigation and enables the advocate to identify the required proofs10. The FI handles the sensitive report of the client in a secure manner11. The advocate studies the report and might press charges against the offensive in the court of law12. The forensic investigator usually destroys the evidence

Page 11: Lect 2 computer forensics

Legal Issues• It is not always possible for a computer forensics expert to separate

the legal issues surrounding the evidence from the practical aspects of the computer forensics• Examples: the issues related to

• Authenticity • Reliability• Completeness• convincing

Page 12: Lect 2 computer forensics

Continued…..• The approach of investigation diverges with changes in technology• Evidence shown is to be untampered with and fully accounted for,

from the time of collection to the time of presentation to the court; hence, it must meet the relevant evidence laws

Page 13: Lect 2 computer forensics

Reporting the Results [CHFI]

Page 14: Lect 2 computer forensics

Thank YouFor Your Patience