CH 7 Basic Cyber Forensics
CH 7 Basic Cyber Forensics
BASIC CONCEPTS
Ditionary meaning of forensics
"scientific tests or techniques used in connection with the detection of crime".
174
Basic Cyber Forensic
"relating to the use of scientific knowledge or methods in
"Relating gto or denotingthe application of scientific methods sol
andv ing
i crimes'
the investigation of crime".
"related to scientific methods of solving crimes,involving
or substances that are involved in the crime".
techniquest
gexamining edijects
the
o
Dictionary meaning of Cyber forensics
"the application of scientifically proven methods to gather, process,
and to use digital evidence to provide a conclusive description of
activities". ,interpret,
cyber crime
Definitions of Cyber Forensics
Advancements in technologies have given rise to a new ategory of crimos
known as Cyber crimes which in turn has given rise to a new
"Cyber Forensics". discipline called
C
"Cyber forensics is the science of obtaining, preserving and documentino
evidence from digital electronicstorage devices, such as computers, PDA
digital caneras, mobile phones and various memory storage devices. AI
must be done in a manner designed to preserve the probative value of the
evidence and to assure its admissibility in a legal proceeding'".
(Source: Awhite paper by ISFS, http://www.isfs.org.hk/publications/
ComputerForensics_partl.pd1]
"Cyber Forensics is the process of identifying, preserving, analyzing and
presenting digital evidence in a manner that is legally acceptable". (Rodney
McKemmish 1999)
Cyber forensics is used to deal with cyber crimes such as hacking, money
laundering, counterfeiting etc. Cyber forensice is used to conduct
investigations of computer related incidents. Cyber forensics is used to
identify digital evidences (information stored or transferred in digital form)
when computers are used in committing acrime.
Cyber forensics isthe application of science to the identification, collection,
examination and analysis of digital data while preserving the integrity of
the data and maintaining a strict chain of custody for the data. All these
tasks are performed by forensic specialists. Forensic Specialist is a
professional who locates, identifies, collects, analyzes, and examines data
while preserving the integrity and maintaining a strict chain of custody of
information discovered. The task of gathering information during cyber
forensics is not simple, average computer users can't extract the data required
for examination. Data may include the files that are encrypted, files that are
winenies
ldentification
Preservation
Collectign
Examination
Analysis
Presentation
Identification
This is the preliminary step of a Cyber Forensic Process. Cyber forensic
investigation starts to respond to an incident. In this phase, the type of incident
(cyber crime) which has occurred is identified and characteristics of the incident
are identified. Examples of incidents are: Cyber crimes such as hacking, mongy
laundering and counterfeiting etc. In this phase location of critical information and
key data are identified. The other tasks which are performed in this phase are: to
identify where key data is likely to be located, what is the issue (or incident), what
is the aim of investigation and what output is expected. So, in this phase, forensis
experts should iderntify where and how the keydata is located, which operating
system is being used. Bàsed on this information the forensic investigator can identify
the appropriate recovery methods and the tools to be used in investigation proces.
Preservation
In this phase, the approach to be followed for preservation of data is defined to
make sure that no unauthorized individual can access the computers or stord
isolated,secured
devices involved in the investigation. Key data must be properly
Forensh
evidences
ontanination. In this phase, data
are not damaged. A should be isolated so that
177
lata.
Sometimes, the properischain of custody is
whole system
software
and set offline
because mai
performing system maintenance may destroyn tained to
entering data,
certain
ollection
phase,the approach to be
this
retrieve
kresiCeAperts retrieve
relevant followed for collection of data is
active data on thedata from all storage
jnUNSIble media,active defined.
and unused media, deleted data including
and/ or
data from
data, deleted email,
Forensicpassword protected and encrypted files,
tive
ina databasesetc.
nm contained investigators
on the media take a"snap-shot" or
"mirrorinformation
image"
data without affecting the
Jataorfect sector-by-sector copy of the drive, originalall data. This "snap
the
shot"is a perfect:
of
partiallyoverwritten spaces. The including of the unused and
imaging process is safe and does not require
; hence it works without affecting the system.
Examination
lo this phase, all the collected data
are examined. Examination is
rformed copy(Snap-shot) of the system, hard drive, etc. to
on a always
original.data is kept intact. In this phase, data is ensure that the
such as origin and content of the incident. examined determine the
to details
Analysis
In this phase, all the collected data are analyzed and
possible evidences. Analysis is always performed on ainterpreted to determine
copy (snap-shot) of the
system, hard drive, etc. to ensure that the original data is kept intact.
of disks that are normally inaccessible are analyzed in this phase. Special areas
Also,
investigators determine that whether computer evidences were tamperedforensic with,
altered, damaged or removed. Forensic investigators analyze the hidden information
associated with recovered files,content contained in the files, user activity (people
who had access to the drive), Internet activity,e-mail communication etc.
Presentation
In this phase, reporting documents that present the evidences in a legally
acceptable and understandable manner are prepared. Without proper
documentation evidences may not be acceptable. Forensic investigators also provide
proofs (along with documentation) that their investigations preserved all the data
on computer systems from modification and damage. Proper presentation completes
the forensic process because only a properly documented report can be presented
178
Basic Cyber Forensie
inthe court. Presenting admissible evidences in court, proving i of
In court and supporting the client's court case are also the
torensicinvestigator. Documentation should contain stepstaken to
any changes tothe evidence (including whatthe change was and the
rtehsepionsncaptteigburriieltiyty
the
change).
So, on the basis of above discussion, the roles and
for hreason dat ,
responsibilities
forensic investigator are: Identification, preservation, collection.
analysis and presentation of evidences related to Cyber crime thaa
that has be n
committed in an organization. The task of data recovery (if possible)
responsibility of forensic investigator. is
also the
examination,
Rules for Cyber Forensic Process
Original media (or data) should not be used for cyber forensics
"snap-shot" or"mirror-image" or"duplicate-copy" should bebe used
usoda
investigation purpose. Snap-shot should be a sector-by-sector for
procescysbe. A
drive (exact copy of the original data). copy of the
All the deleted information, hidden files, access protected
recovered. filles must be
All the data and evidences should be preserved from
modification orr
Aproper chain of custody for all the data and evidences damage.be
implemented and maintained. should
Integrity of evidences should not be compromised.
Changes (f any) must be properly documented. In some cases, the changes
to data and evidences are unavoidable, for example: b0oting process wll
change the memory and temporary files, also the shutting down of system
can introduce changes. So nature of change, extent of change and reason for
the change should be documented.
For legal proceedings, the incident should be documented in a legally
acceptable and understandable manner.
Relevant evidences should be collected. Evidences related to the incident
(that is under investigation) must be collected.
All the evidences should be collected: exculpatory evidences (focuses on
who else are suspects that is in favor of an attacker) as well as inculpatory
evidences (focuses on who committed the crime that is against an attacker).
The evidences collected must be presented in a way that is easily
understandable in a court of law.
Each and every step of the investigation procedure must be documented.
Allthe laws and rules of Indian IT Act 2000are applicable for Cyber Forersio
Fiensics 179
ofCyber Forensics
olcations
llegal activities that are performed via computers)
(all the illegal
the
yber. forensics process. The applications of cyber forensics
iusing
Inveestigationof cyber-crimes
Investigationof credit-card frauds
Investigationof identityy-frauds
Investigation of identity-thefts
Investigationof Denial-of-Service attacks
Investigation of Cyber terrorism
o Investigationofinternal penetration (or intrusion)
Investigation of. external penetration (or
intrusion)
Investigation of money laundering
Investigationoffcounterfeiting
Investigation of crimes that weren't directly committed via computer, but
forwhich the accused might have stored evidences on computer systems.
Detection of vulnerabilities in an organization's systems (ethical hacking)
Data recOvery
References
to://newyorkcomputerforensics.com/comp
1. http:// /computer-forensics-process/
/www.krollontrack.co.uk/ publications/UK%20EE%20Newsletter %
2011 %20V3 %20AP%20CF.pdf
3. http://www.pcmag.com/encyclopedia/ term/40151/ computer-forensics