1 / 20

Introduction to Data Forensics

Introduction to Data Forensics. CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland. Background. These lectures are designed to provide a basic awareness of data forensics. Understanding of terminology Awareness of the principles

howard
Download Presentation

Introduction to Data Forensics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland

  2. Background • These lectures are designed to provide a basic awareness of data forensics. • Understanding of terminology • Awareness of the principles • Understanding of the basic procedure Please be aware that I am not a practitioner.

  3. Resources • Notes from the Qinetiq Information Security Foundation Course (2002) • ACPO Good Practice Guide for Computer-based Electronic Evidencehttp://www.acpo.police.uk/asp/policies/Data/gpg_computer_based_evidence_v3.pdf • Interpol Computer Crime Manual • IOCE Guidelineshttp://www.ioce.org/fileadmin/user_upload/2002/ioce_bp_exam_digit_tech.html

  4. Goals • To define computer forensics • To understand its limitations • To understand the principles that apply to computer-based evidence • To understand the process • Top-level • Tools • Risks

  5. Definition of Forensics I (quoted from Wikipedia) • “Forensic science (often shortened to forensics) is the application of a broad spectrum of sciences to answer questions of interest to the legal system. This may be in relation to a crime or to a civil action.”

  6. Definition of Forensics II (quoted from Wikipedia) • “The use of the term ‘forensics’ in place of ‘forensic science’ could be considered incorrect; the term ‘forensic’ is effectively a synonym for ‘legal’ or ‘related to courts’ (from Latin, it means ‘before the forum’). However, it is now so closely associated with the scientific field that many dictionaries include the meaning that equates the word ‘forensics’ with ‘forensic science’.”

  7. Definition of Forensics III (quoted from Wikipedia) • “‘Forensic’ comes from the Latin word ‘forensis’ meaning forum. During the time of the Romans, a criminal charge meant presenting the case before a group of public individuals. Both the person accused of the crime and the accuser would give speeches based on their side of the story. The individual with the best argumentation and delivery would determine the outcome of the case. Basically, the person with the best forensic skills would win.”

  8. The Basic Principle • “Evidence must not be damaged, destroyed or otherwise compromised by procedures used to investigate the computer, otherwise it may be rendered inadmissable.” (Qinetiq)

  9. The Rules • Maintain the integrity of the evidence. • Do not work on the original evidence. • Do not trust the computer system. • Record all actions.

  10. ACPO Principle 1 • “No action should be taken by an analyst that should change data held on a computer or other media which may subsequently be relied upon in Court.”

  11. ACPO Principle 2 • “In exceptional circumstances where a person finds it necessary to access original data held on a target computer that person must be competent to do so and to give evidence explaining the relevance and implications of their actions.”

  12. ACPO Principle 3 • “An audit trail or other record of all processes applied to computer-based evidence should be created and preserved. An independent third party should be able to examine these processes and achieve the same result.”

  13. ACPO Principle 4 • “The person in charge of the case is responsible for ensuring that the law and these principles are adhered to. This applies to the possession of, and access to, information contained in a computer. They must be satisfied that anyone accessing the computer, or any use of a copying device, complies with these laws and principles.

  14. The Process • Search and seizure • Audit and continuity • Imaging • Production of evidence

  15. Search and Seizure • Evidence • IT systems, media, and documentation • A trained officer should be used to do this. • Scene • Secure the scene physically and electronically • Disconnect external data communications • Decide whether to switch off or leave alone • On-site imaging and previewing • Other forensic activities

  16. Audit • Log book • Must be maintained • Must be secured • Must be taken to court • Booking out • All property/exhibits must be booked out prior to analysis.

  17. Audit Details • Record • Details of exhibit numbers/bag seal numbers • Details of system/media • Damage found • Other property found • Photograph of system (optional) • Comparison of system date/time with actual date/time.

  18. Evidence Control • Be able to account for the whereabouts and condition of all exhibits/property • Property books • Receipts • Log books • Note that the evidence may be sensitive.

  19. Imaging • Normally, imaging takes place by hosting the hard disc drives in an imaging system • Must record the media details • Imaging should be performed in a ‘safe’ OS environment, with the devices mounted read-only.

  20. In Court • Formal report • Witness statement • System image files • Extracted evidence • Forensic tool reports

More Related