Explain the 13 basic steps in computer investigation:
Discuss the policy and procedure development stage of computer investigation:
Development policies and procedures is an important phase in creating a computer forensic unit. The following are the types of policies and procedures that need to be established:
Does an investigator need a search warrant to carry out an investigation?
Search warrant: This is a written order issued by a judge that directs a law enforecemtn officer to search for a particular piece of evidence at a particular location.
Successful warrants include the particular object the investigator wants to seize and the search strategy used in the investigation.
Can be issued for: An entire company floor/room in a company building a device, car, house any other company property
Searches Without a Warrant:
In certain situations, seartches performed without a warrant may be allowed:
What do warning banners help a user understand?
Should inform an authentic user when monitoring is being used to identify or watch an intruder. Should also indicate when system administrators are monitoring authentic user’s during regular system maintenance.
The following are examples of common phrases on warning banners:
How do you collect evidence (3 step process) ?
Evidence is collected from a live computer by searching the following:
The following are the volatile sources and commands used to capture the evidence on live computers:
The following are computer forensic tools used for data collection:
Explain the various methods of examining digital evidence:
Forensic principles instituted by the National Institute of Justice are enforced.
For conducting examinations, examiners must:
Analysis of recovered data involves interpreting the data and putting it into a logical and useful format. Analysis is the phase in which acquired data turns into evidence. When conducting the evidence examination, use these steps:
Physical- identifies and recovers the data across the entire physical drive without regard to the file system.
Logical- identifies and recovers files and data based on installed operating systems, file systems, and applications. May include data from active files, deleted files, file slack, and unallocated file space.
File slack- the space that exists between the end of the file and the end of the last cluster used by that file.
The investigator should perform the examination process on a bit-stream copy rather than the original computer.
Bit-stream copy- a bit-by-bit copy of the orginal storage medium. An exact duplicate of the orignal disk- a back up copy is nothing but a compressed file stored in a folder. bit-streaming can create an exact image of a disk as it is copied bit by bit.
How do you evaluate a case on the basis of evidence (13 steps)?
Write in detail about evidence assessment
Write in detail about what is involved in a company policy violation
An investigator has to gather the evidence from the suspect’s computer and determine whether a crime or violation of the company policy has occured.
The motive behind company policy violation investigation is not always punitive. Sometimes, employees just need to be educated, as they might not be aware of the fact that they are violating company policy. If the problem persists, the company can take strict action against those employees who continue to violate policy.
In a policy violation case example, describe the:
Bit-stream copy
A bit-by-bit copy of the orginal storage medium. An exact duplicate of the original disk, while a backup copy is nothing but a compressed file stored in a folder. Bit-streaming can create an exact image of a disk, as it is copied bit by bit.
Drive-Spy
A disk-forensic DOS tool designed to emulate and extend the capabilities of DOC to meet forensic needs. Compact enought to fit on a floppy disk. It creates direct disk-to-disk forensic duplicates and can copy a range of sectors within or between drives and process duplicate drives regardless of physical drive geometry or sector translation differences. Uses DOS commands (cd, dir, and others) to navigate the system under investigation and extend the capabilities of the associated DoS commands or add new commands. Searches for, analyzes, and extracts data from floppy disks or hard disks.
Operates in one of the following modes:
System- operates at the BIOs level and permits the navigation and viewing of all disk drives connected to the computer.
Drive- Used while examining an unformatted disk; accesses the physical level, which allows viewing the raw data on a disk
Part mode- aka Partition mode, refers to the logical structure of the disk and can show the directory and files for the file allocation table (FAT)
File slack, AKA flack space
The space that exists between the end of the file and the end of the last cluster used by that file
host protected area (hpa)
an area of the drive where a certain portion of the drive’s contents is hidden from the OS and file system
incident
an event that threatens the security of a computer system or network in an organization
steganography
The art and science of hiding inforamtion by embedding messages in other, seemingly harmless messages