PowerPoint Presentation

Published on
Embed video
Share video
Ask about this video

Scene 1 (0s)

[Audio] ISMG 6865 – Digital Forensics Analysis Dr. Gregg Graham Unit 1: Digital Forensics Fundamentals Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 2 (15s)

[Audio] Learning Objectives Understanding the Fundamentals of Digital Forensics 1 Understanding Different Types of Cybercrimes 2 Overview of Indicators of Compromise (IoCs) 3 4 Overview of Different Types of Digital Evidence and Rules of Evidence 5 Understanding Forensic Readiness Planning and Business Continuity 6 Understanding the Roles and Responsibilities of a Forensic Investigator Understanding the Legal Compliance in Digital Forensics 7 Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 3 (55s)

[Audio] Unit Flow 3 4 5 Forensic Readiness 2 Digital Forensic Investigator Legal Compliance in Digital Forensics 1 Digital Evidence Fundamentals of Digital Forensics Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 4 (1m 15s)

[Audio] Fundamentals of Digital Forensics. Fundamentals of Digital Forensics.

Scene 5 (1m 21s)

[Audio] Understanding Digital Forensics Digital forensics refer to a set of methodological procedures and techniques that help identify, gather, preserve, extract, interpret, document, and present evidence from digital devices, such that any discovered evidence is acceptable during a legal and/or administrative proceeding Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 6 (1m 53s)

[Audio] Need for Digital Forensics 01 03 To ensure the overall integrity and continued existence of IT systems and network infrastructure within To efficiently track down perpetrators from different parts of the world the organizations 02 04 To protect the organization's financial resources and valuable time To extract, process, and interpret the factual evidence such that it proves the attacker's actions in court Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 7 (2m 28s)

[Audio] Objectives of Digital Forensics Identify, gather, and preserve the evidence of a cybercrime Gather evidence of cyber crimes in a forensically sound manner Estimate the potentialimpact of malicious activity on the victim and assess the intent of the perpetrator Minimize the tangible and intangible losses to the organization Protect the organization from similar incidents in the future Support the prosecution of the perpetrator of an incident Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 8 (3m 5s)

[Audio] When Do Organizations Use Digital Forensics? Prepare for incidents by securing and strengthening the defense mechanism as well as closing the loopholes in security Identify the actions needed for incident response Act against copyright and intellectual property theft/misuse Estimate and minimize the damage to resources in a corporate setup Set a security parameter and formulate security norms for ensuring forensic readiness Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 9 (3m 40s)

[Audio] Types of Cybercrimes Cybercrime is defined as any illegal act involving a computing device, network, its systems, or its applications Cybercrime can be categorized into two types based on the line of attack Insider Attack External Attack  This type of attack occurs when an  It is an attack performed on a corporate network or on a single computer by an entrusted person (insider) who has authorized access to the network attacker from outside the organization tries to gain unauthorized access to its computing systems or informational assets  Such insiders can be former or current employees, business partners, or contractors  These attackers exploit security loopholes or use social engineering techniques to infiltrate the network Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 10 (4m 37s)

[Audio] Examples of Cybercrimes Espionage Phishing/Spoofing 1 7 Intellectual PropertyTheft Privilege Escalation Attacks 2 8 Data Manipulation Denial of Service (DoS)Attack 3 9 Trojan Horse Attack Cyber Defamation 4 10 Structured Query Language (SQL) Attack Cyberterrorism 5 11 Brute-force Attack Cyberwarfare 6 12 Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 11 (5m 8s)

[Audio] Loss of confidentiality, integrity and availability of information stored in organizational systems Impact of Cybercrimes at the Organizational Level 01 Theft of sensitive data 02 Sudden disruption of business activities 03 Loss of customer and stakeholder trust 04 Substantial reputational damage 05 Huge financial losses 06 Penalties arising from the failure to comply with regulations 07 Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 12 (5m 44s)

[Audio] Digital Evidence. Digital Evidence.

Scene 13 (5m 49s)

[Audio] Introduction to Digital Evidence Digital evidence is defined as "any information of probative value that is either stored or transmitted in a digital form" Digital evidence is circumstantial and fragile in nature, which makes it difficult for a forensic investigator to trace criminal activities According to Locard's Exchange Principle, "anyone or anything, entering a crime scene takes something of the scene with them, and leaves something of themselves behind when they leave" Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 14 (6m 29s)

[Audio] Types of Digital Evidence Volatile Data Non-volatile Data  Data that are lost as soon as the device is powered off; examples include system time, logged-on user(s), open files, network information, process information, process-to-port mapping, process memory, clipboard contents, service/driver information, command history, etc.  Permanent data stored on secondary storage devices such as hard disks and memory cards; examples include hidden files, slack space, swap file, index.dat files, unallocated clusters, unused partitions, hidden partitions, registry settings, event logs, etc. Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 15 (7m 25s)

[Audio] Roles of Digital Evidence  Examples of cases where digital evidence may assist the forensic investigator in the prosecution or defense of a suspect: 01 03 04 05 02 Identity theft Information leakage Theft of commercial secrets Malicious attacks on the computersystems themselves Unauthorized transmission of information 07 08 09 10 06 Use/abuse of the Internet Abuse of information systems Email communication between suspects/ conspirators Production of false documents and accounts Unauthorized encryption/password protection of documents Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 16 (8m 15s)

[Audio] Sources of Potential Evidence User-Created Files User-Protected Files Computer-Created Files  Compressed files  Address books  Backup files  Database files  Log files  Misnamed files  Configuration files  Encrypted files  Media (images,graphics, audio, video, etc.) files  Printer spool files  Password-protected files  Cookies  Swap files  Documents (text, spreadsheet, presentation, etc.) files  Hidden files  System files  Steganography  Internetbookmarks, favorites, etc.  History files  Temporary files Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 17 (9m 13s)

[Audio] Sources of Potential Evidence (Cont'd) Device Location of Potential Evidence Hard Drive Text, picture, video, multimedia, database, and computer program files Thumb Drive Text, graphics, image, and picture files Memory Card Event logs, chat logs, text files, image files, picture files, and internet browsing history Smart Card Evidence is found by recognizing or authenticating the information of the card and the user, through the level of access, configurations, permissions, and in the device itself Dongle Biometric Scanner Answering Machine Voice recordings such as deleted messages, last called number, memo, phone numbers, and tapes Digital Camera/Surveillance cameras Images, removable cartridges, video, sound, time and date stamp, etc. Random Access Memory (RAM) and Volatilestorage Evidence is located and can be acquired from the main memory of the computer Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 18 (10m 29s)

[Audio] Sources of Potential Evidence (Cont'd) Device Location of Potential Evidence Handheld Devices Address book, appointment calendars or information, documents, email, handwriting, password, phone book, text messages, and voice messages MAC (Media Access Control) address Local Area Network (LAN) Card/ Network Interface Card (NIC) For routers, evidence is found in the configuration files Routers, Modem, Hubs, and Switches For hubs, switches, and modems evidence is found on the devices themselves Network Cables and Connectors On the devices themselves Server Computer system Printer Evidence is found through usage logs, time and date information, and network identity information, ink cartridges, and time and date stamp Internet of Things and wearables Evidence can be acquired in the form of GPS, audio and video recordings, cloud storage sensors, etc. Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 19 (11m 41s)

[Audio] Sources of Potential Evidence (Cont'd) Device Location of Potential Evidence Storage device and media such as tape, CD, DVD, and Blu-ray contain the evidence in the devices themselves Removable Storage Device and Media Scanner Evidence is found by looking at the marks on the glass of the scanner Telephones Evidence is found through names, phone numbers, caller identification information, appointment information, electronic mail and pages, etc. Copiers Documents, user usage logs, time and date stamps, etc. Credit Card Skimmers Evidence is found through card expiration date, user's address, credit card numbers, user's name, etc. Digital Watches Evidence is found through address book, notes, appointment calendars, phone numbers, email, etc. Facsimile(Fax) Machines Evidence is found through documents, phone numbers, film cartridge, send or receive logs GlobalPositioning Systems (GPS) Evidence is found through previous destinations, way points, routes, travel logs, etc. Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 20 (13m 3s)

[Audio] Rules of Evidence  Digital evidence collection must be governed by five basic rules that make it admissible in a court of law: Understandable 1 Evidence must be clear and understandable to the judges Admissible 2 Evidence must be related to the fact being proved Authentic 3 Evidence must be real and appropriately related to the incident Reliable 4 There must be no doubt about the authenticity or veracity of the evidence Complete 5 The evidence must prove the attacker's actions or his/her innocence Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 21 (13m 41s)

[Audio] Best Evidence Rule It states that the court only allows the original evidence of a document, photograph, or recording at the trial rather than a copy. However, the duplicate can be accepted as evidence, provided the court finds the party's reasons for submitting the duplicate to be genuine. The principle underlying the best evidence rule is that the original evidence is considered as the best evidence Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 22 (14m 13s)

[Audio] Federal Rules of Evidence (United States) These rules shall be construed to secure fairness in administration, elimination of unjustifiable expense and delay, and promotion of growth and development of the law of evidence to the end that the truth may be ascertained, and proceedings justly determined Source:https://www.rulesofevidence.org Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 23 (14m 41s)

[Audio] Scientific Working Group on Digital Evidence (SWGDE) Principle 1 Standards and Criteria 1.1  In order to ensure that the digital evidence is collected, preserved, examined, or transferred in a manner safeguarding the accuracy and reliability of the evidence, law enforcement and forensic organizations must establish and maintain an effective quality system  All agencies that seize and/or examine digital evidence must maintain an appropriate SOP document. All elements of an agency's policies and procedures concerning digital evidence must be clearly set forth in this SOP document, which must be issued under the agency's management authority. Standards and Criteria 1.2 Standards and Criteria 1.3  Agency management must review the SOPs on an annual basis to ensure their continued suitability and effectiveness  Procedures used must be generally accepted in the field or supported by data gathered and recorded in a scientific manner https://www.swgde.org Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 24 (15m 57s)

[Audio] Scientific Working Group on DigitalEvidence (SWGDE) (Cont'd) 1 Standards and Criteria 1.4 The agency must maintain written copies of appropriate technical procedures Standards and Criteria 1.5 2 The agency must use hardware and software that are appropriate and effective for the seizure or examination procedure Standards and Criteria 1.6 3 All activity relating to the seizure, storage, examination, or transfer of the digital evidence must be recorded in writing and be available for review and testimony Standards and Criteria 1.7 4 Any action that has the potential to alter, damage, or destroy any aspect of the original evidence must be performed by qualified persons in a forensically sound manner https://www.swgde.org Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 25 (16m 59s)

[Audio] The Association of Chief Police Officers (ACPO) Principles of Digital Evidence Principle 1: No action taken by law enforcement agencies or their agents should change data held on a computer or storage media which may subsequently be relied upon in court Principle 2: In exceptional circumstances, where a person finds itnecessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to explain his/her actions and the impact of those actions on the evidence, in the court Principle 3: An audit trail or other record of all processes applied to computerbased electronic evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result. Principle 4: The person in charge of the investigation (the case officer) has overall responsibility for ensuring that the law and these principles are adheredto https://www.college.police.uk Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 26 (18m 5s)

[Audio] Forensic Readiness. Forensic Readiness.

Scene 27 (18m 10s)

[Audio]  Forensic readiness refers to an organization's ability to optimally use digital evidence in a limited period of time and with minimal investigation costs ` Benefits:  Fast and efficient investigation with minimal disruption to the business Forensic  Provides security from cybercrimes such as intellectual property theft, fraud, or extortion  Offers structured storage of evidence that reduces the cost and time of an investigation  Improves law enforcement interface  Helps the organization use the digital evidence in its own defense Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 28 (18m 51s)

[Audio] Forensic Readiness and Business Continuity  Forensic readiness helps maintain business continuity by allowing quick and easy identification of the impacted components and replacing them to continue the services and business Lack of forensic readiness may result in: Forensic readiness allows businesses to:  Loss of clients due to damage to the  Quickly determine the incidents organization's reputation  Collect legally sound evidence and analyze it to identify attackers  System downtime  Minimize the required resources  Data manipulation, deletion, and theft  Quickly recover from damage with less downtime  Inability to collect legally sound evidence  Gather evidence to claim insurance  Legally prosecute the perpetrators and claim damages Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 29 (19m 50s)

[Audio] Forensics Readiness Planning  Forensic readiness planning refers to a set of processes to be followed to achieve and maintain forensics readiness 1 5 Identify the potential evidence required for an incident Identify if the incident requiresfull or formal investigation 2 6 Determine the sources of evidence Create a process for documenting the procedure 3 7 Establish a legal advisory boardto guide the investigation process Define a policy that determines the pathway to legally extract electronic evidence with minimal disruption Keep an incident response team ready 4 8 to review the incident and preserve the evidence Establish a policy to handle andstore the acquired evidence in a secure manner Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 30 (20m 44s)

[Audio] Digital Forensic Investigator. Digital Forensic Investigator.

Scene 31 (20m 50s)

[Audio]  Trained professionals who extract, analyze, investigate, and report crimes that either target technology or use it as a tool to commit a crime.  They play a key role in tracking, investigating, and prosecuting cybercriminals. Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 32 (21m 11s)

[Audio] Need for a Digital Forensic Investigator Sound Evidence Handling Cybercrime Investigation Incident Handling and Response If a technically inexperienced person examines the evidence, it might become inadmissible in a court of law Forensic investigators help organizations maintain forensics readiness and implement effective incident handling and response Forensic investigators, by virtue of their skills and experience, help organizations and law enforcement agencies investigate and prosecute the perpetrators of cybercrimes Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 33 (21m 50s)

[Audio] Roles and Responsibilities of a Forensics Investigator A forensic investigator performs the following tasks: Determines the extent of any damage done during the crime Analyzes the evidence data found Prepares the analysis report Recovers data of investigative value from computing devices involved in crimes Creates an image of the original evidence without tampering with it to maintain its integrity Updates the organization about various attack methods and data recovery techniques, and maintains a record of them Guides the officials carrying out the investigation Addresses the issue in a court of law and attempts to win the case by testifying in court Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 34 (22m 36s)

[Audio] What Makes a Good Digital Forensics Investigator? Interviewing skills to gather extensive information about the case from the client or victim, witnesses, and suspects Excellent writing skills to detail findings in the report Strong analytical skills to find the evidence and link it to the suspect Excellent communication skills to explain their findings to the audience Remains updated about new methodologies and forensic technology Well-versed in more than one computer platform (including Windows, Macintosh, and Linux) Knowledge of various technologies, hardware, and software Develops and maintains contact with computing, networking, and investigating professionals Has knowledge of the laws relevant to the case Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 35 (23m 27s)

[Audio] Legal Compliance in Digital Forensics. Legal Compliance in Digital Forensics.

Scene 36 (23m 33s)

[Audio] Digital Forensics and Legal Compliance Gramm-Leach-Bliley Act (GLBA) Electronic Communications Privacy Act 01 05  Legal compliance in digital forensics ensures that any evidence that is collected and analyzed is admissible in a court of law General Data Protection Regulation (GDPR) 02 06 Federal Information Security Modernization Act of 2014 (FISMA) Data Protection Act 2018 03 07 Health Insurance Portability and Accountability Act of 1996 (HIPAA)  Compliance with certain regulations and standards plays an important part in computer forensic investigation and analysis, some of which are as follows: Sarbanes-Oxley Act (SOX) of 2002 04 08 Payment Card Industry Data Security Standard (PCI DSS) Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 37 (24m 36s)

[Audio] Other Laws Relevant to Digital Forensics United States Foreign Intelligence Surveillance Act https://www.fas.org Protect America Act of 2007 https://www.congress.gov Privacy Act of 1974 https://www.justice.gov National Information Infrastructure Protection Act of 1996 https://www.congress.gov Computer Security Act of 1987 https://www.congress.gov Freedom of Information Act (FOIA) https://www.foia.gov United Kingdom Regulation of Investigatory Powers Act 2000 https://www.legislation.gov.au Cybercrime Act 2001 https://www.legislation.gov.au Australia Information Privacy Act 2014 https://www.findandconnect.gov.au India Information Technology Act http://www.dot.gov.in Germany Section 202a. Data Espionage, Section 303a. Alteration of Data, Section 303b. Computer Sabotage http://www.cybercrimelaw.net Italy Penal Code Article 615 ter http://www.cybercrimelaw.net Canada Canadian Criminal Code Section 342.1 https://laws-lois.justice.gc.ca Singapore Computer Misuse Act https://sso.agc.gov.sg Belgium Computer Hacking http://www.cybercrimelaw.net Brazil Unauthorized modification or alteration of the information system https://www.domstol.no Philippines Data Privacy Act of 2012 https://www.privacy.gov.ph Hong Kong Cap. 486 Personal Data (Privacy) Ordinance https://www.pcpd.org.hk Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited..

Scene 38 (26m 19s)

[Audio] Module Summary This module has discussed the fundamentals of digital forensics 1 It has covered various types of digital evidence and rules of evidence 2 It also discussed in detail on various laws and rules to be considered during digital evidence collection 3 This module also discussed the forensic readiness planning and business continuity 4 It has also discussed the roles and responsibilities of a forensic investigator 5 Finally, this module ended with a detailed discussion on legal compliance in digital forensics 6 In the next module, we will discuss in detail on digital forensics investigation process 7 Copyright ©. All Rights Reserved. Reproduction is Strictly Prohibited..