T3 Revision - CSU2104 - Shoolini U

T3 Revision

What Is Forensic Science?

What Is Computer Forensics?

Related Fields

The Investigation Triad

Digital security in a company uses three main areas:

  1. Vulnerability Assessment & Risk Management

    • Test systems for known weaknesses (e.g., unpatched software).
    • People in this team launch controlled attacks to find and fix holes.
  2. Network Intrusion Detection & Incident Response

    • Monitor for attacks or misuse.
    • When an intrusion happens, block it, track the attacker’s methods, and shut down their access.
  3. Computer Investigations

    • Handle incidents that already happened.
    • Steps: Identify what devices and data are involved → Analyze to extract evidence → Report findings.

Challenges in Computer Forensics

Key Terminology

Common Forensic Methodologies

Several formal models exist, for example:

All share similar phases: Preparation → Collection → Examination → Analysis → Reporting.

Types of Investigations

Public-Case Workflow

  1. Complaint: Someone reports an illegal act.
  2. Investigation: Forensic team gathers and analyzes evidence.
  3. Prosecution: Findings (with the investigator’s affidavit) are used to build a court case.

The Forensic Investigator’s Role

Investigator Expertise & Conduct

Certifications & Laws

What Is Digital Forensics?

Overview of a Computer Crime

Core Forensic Process Phases

  1. Acquisition – make a forensically sound copy of the evidence (e.g. hard disk).
  2. Identification – find relevant digital pieces (files, pictures, logs).
  3. Evaluation – decide which items are true evidence.
  4. Admission – present evidence in court.

Common Methodology Examples

  1. Identification of incident
  2. Preservation of integrity & Chain of Custody
  3. Collection of data
  4. Examination (deep technical search)
  5. Analysis (draw conclusions)
  6. Presentation (report and testify)
  1. Pre-Process (permissions, lab setup)
  2. Acquisition & Preservation
  3. Analysis (main evidence work)
  4. Presentation (document findings)
  5. Post-Process (archive or return evidence, review process)

Proper Procedure & Chain of Custody

Systematic Investigation Steps (12-Point Checklist)

  1. Assess case type.
  2. Design preliminary approach.
  3. Create detailed checklist.
  4. Identify needed resources.
  5. Obtain and copy evidence drive.
  6. Identify risks.
  7. Mitigate risks.
  8. Test your design.
  9. Analyze and recover data.
  10. Investigate recovered data.
  11. Complete case report.
  12. Critique the case (lessons learned).

Handling a Case

Assessing Case Requirements

Planning Your Investigation

  1. Acquire suspect hard drive.
  2. Complete evidence form, establish CoC.
  3. Transport to secure lab.
  4. Lock in fireproof cabinet.
  5. Prepare forensic workstation.
  6. Retrieve for copying.
  7. Make forensic (bit-stream) copy.
  8. Return original to secure storage.
  9. Process the forensic copy with tools.

Preserving & Securing Evidence

Real-World Raid Example

“Dead Box” vs. “Live Box”

Forensic Investigator’s Role

High-Tech & Corporate Investigations

What to Look For

Interviews vs. Interrogations

Bit-Stream Copy (Disk Image)

Computer Forensics Lab

Physical Requirements

Lab Security Needs

Evidence Containers

Combination Locks

Keyed Padlocks

Physical Security Policy

Auditing the Lab

Lab Floor Plans

Forensic Workstation Selection

Hardware Peripherals Stock

OS and Software Inventory

Forensics Workstation Components

Disaster Recovery Plan

Course Tools (Software)

Course Tools (Hardware)

HardCopy 3P

Shadow 3

DriveWiper

Forensic Procedures

  1. Seize, tag, and bag all original media
  2. Data Acquisition: make a bit-for-bit copy of the media
  3. Data Analysis: work only on the copy, never on the original

What Is Data Acquisition?

Acquisition & Verification

Disk Image & Fingerprints

Storage Formats

  1. Raw (dd)

    • Bit-for-bit copy with no extras
    • Pros: Fast, widely readable
    • Cons: Same size as original, may skip bad sectors
  2. Proprietary (e.g., .E01, .eve)

    • Can compress and split images, embed metadata
    • Cons: Not always tool-compatible, size limits on segments
  3. Advanced Forensics Format (AFF)

    • Open, extensible, supports compression and metadata, no size limit

Acquisition Methods

  1. Bit-stream disk→image file (most common; tools: EnCase, FTK, ProDiscover)
  2. Bit-stream disk→disk (when file output not possible; tools: SafeBack)
  3. Logical acquisition (copies only files/folders of interest)
  4. Sparse acquisition (captures logical files plus deleted-space fragments)

What to Consider

Contingency Planning

Acquisition Tools

Validating Acquisitions

  1. You cannot predict a hash value before computing it
  2. No two different files/devices have the same hash
  3. Any change in data produces a different hash

RAID Acquisitions

Remote Network Acquisition

Digital Hash & Hash Functions

Computer Forensics

Computer Crime

  1. Computer as a tool: using a computer to commit fraud, send threatening emails, share illegal files, etc.
  2. Computer as a target: hacking into systems, Denial-of-Service attacks, spreading viruses or worms.

Digital Evidence

Forensic Disciplines vs Related Fields

Key Case Study (American Express)

Who Uses Computer Forensics

Cybercrime Overview & History

Types of Cybercrime

Identity Theft & Fraud

Types of Cyber Forensics

Common Forensic Services

Incident Response (IR)

  1. Preparation: create policies, build a response toolkit, train the team.
  2. Detection: use intrusion-detection systems and log monitoring.
  3. Containment: isolate affected systems, change firewall rules, disable bad accounts.
  4. Eradication: remove malware and fix vulnerabilities (with specific steps for UNIX or Windows).
  5. Recovery: rebuild systems, restore data from backups, install patches.
  6. Follow-up: conduct a post-mortem, update procedures, learn from mistakes.

IR Architecture & Policies

IR Risk Analysis

IR Team Organization

Incident Handling Lifecycle

Preparation → Identification → Forensic Analysis → Containment → Eradication → Recovery → Lesson Learned

This cycle repeats and is updated after each incident to improve future response.