Understanding the Computer Forensic Process - CSU2104 - Shoolini U

Understanding the Computer Forensic Process

View Summary

Executive Summary

1. Introduction

What is Computer Forensics?


2. Computer Crime and How Evidence is Handled

Overview of a Computer Crime:


3. The Forensic Investigation Process

Traditional 4 Phases

  1. Acquisition:
    • Collecting digital evidence (e.g., hard disks, USB drives).
  2. Identification:
    • Finding and recognizing which parts (files, photos) are useful as evidence.
  3. Evaluation:
    • Deciding if the evidence you found is relevant to the crime.
  4. Admission:
    • Presenting the evidence in court.

Evolved Methodologies

There are several models, such as:

  1. Identification: Recognize the incident (like hacking).
  2. Preservation: Secure and protect the evidence (while keeping a record called the Chain of Custody).
  3. Collection: Methodically collect the evidence using standard procedures.
  4. Examination: Deeply search and review the evidence (a technical phase).
  5. Analysis: Decide what the evidence tells you and draw conclusions (a non-technical phase).
  6. Presentation: Document and report the findings (and sometimes testify in court).
  1. Pre-Process: Get approvals, set up your investigation space (lab preparation).
  2. Acquisition & Preservation: Find, collect, and secure the digital evidence carefully.
  3. Analysis: Examine the evidence thoroughly to find who is responsible.
  4. Presentation: Write and present your report of the findings.
  5. Post-Process: Wrap up the investigation by returning or archiving evidence and reflecting on the process.

4. The Importance of Procedure and the Chain of Custody (CoC)

Following Procedure:

Chain of Custody (CoC):


5. A Systematic Approach to Investigations

When handling a case, follow these step-by-step actions:

  1. Initial Assessment:
    • Quickly decide what type of case you’re dealing with.
  2. Plan Your Approach:
    • Develop a preliminary design for the investigation.
    • Create a detailed checklist of tasks.
  3. Resources and Risk Management:
    • Identify all the resources you will need.
    • Determine what risks could affect your investigation and plan to reduce them.
  4. Evidence Handling:
    • Obtain a copy of the evidence drive.
    • Analyze and recover the digital evidence.
  5. Reporting and Review:
    • Investigate the recovered data.
    • Complete a detailed report.
    • Critique what worked and what could be improved in your process.

6. Handling a Case with Objectivity

Keeping it Unbiased:

Planning and Preparation:


7. Planning Your Investigation in Practice

Example Process Steps:

  1. Acquire the hard drive or storage media.
  2. Fill in an evidence form and document the Chain of Custody.
  3. Transport the evidence to your secured forensic lab.
  4. Place the evidence in secure, approved containers (like a locked, fireproof cabinet).
  1. Prepare your forensic workstation.
  2. Retrieve evidence from secure storage.
  3. Make an exact copy (forensic image) of the evidence.
  4. Return the original evidence to secure storage.
  5. Process the copied evidence using forensic analysis tools.

8. Preserving and Securing Digital Evidence

Preservation:

Securing Evidence:


9. High-Tech Investigations and Specific Case Types

Types of High-Tech Cases:

Key Points to Remember:


10. Interviews vs. Interrogations

Interviews:

Interrogations:


11. Other Key Concepts

Bit-Stream Copy (Imaging):


12. Final Thoughts and Exam Tips