Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 20

C-DAC/Kolkata

C-DAC All Rights Reserved

www.cdackolkata.in

Cyber Forensic Operating


Procedures

Introduction to Forensic General


Terms

C-DAC/Kolkata

C-DAC All Rights Reserved

www.cdackolkata.in

Information
is
the
quantity
required
for
preservation/collection. Information is an element of an
organizations regular operations
Records are a form of information, regardless of the medium
or format, that have value to an organization. The term is
used to describe both documents and recorded data.
Evidence can be anything (testimony, documents, tangible
objects) that tends to prove or disprove the existence of an
alleged fact .
E-discovery is eDiscovery is a related term that has gained use
to incorporate electronically stored information (ESI) into
the discovery process which is compulsory disclosure, at a
party's request, of information that relates to the litigation.
2

www.cdackolkata.in

Authenticity is the act of proving that something (as a


document) is true or genuine, especially so that it may be
admitted as evidence.
Chain of custody is a process of handling evidence which
creates and maintains a transaction record for each
individual who assumes or releases possession of the
evidence.
The chain of custody record provides both a continuity of
custody from acquisition to presentation and a list of
individuals who have had possession of the evidence.

C-DAC/Kolkata

C-DAC All Rights Reserved

www.cdackolkata.in

Integrity of data is defined as a requirement that information and


programs are changed only in a specified and authorized
manner. The unauthorized alteration of data occur intentionally
or unintentionally, can affect the weight of the evidence in court
Hashing is defined as the process of taking an amount of data
(such as a file or the image of a hard drive) and applying a
complex mathematical algorithm to generate a relatively
compact numerical identifier (the hash value)unique to that
data. Two non-identical pieces of data generating the same
hash value are remote

C-DAC All Rights Reserved


C-DAC/Kolkata

C-DAC All Rights Reserved

Key Elements of Computer


Forensics
Incident
Awareness
Consultation

www.cdackolkata.in

Preliminary Analysis

Deposition/
Affidavit
Image
Acquisition/
Recovery

Detailed
Analysis
C-DAC/Kolkata

Preliminary/
Final Report
C-DAC All Rights Reserved

Presentation
5

Various Data Types

C-DAC All Rights Reserved


C-DAC/Kolkata

C-DAC All Rights Reserved

www.cdackolkata.in

Volatile data, which is in use by a system but not written


to media
data in memory, network status, and connections and
running processes.
Semi-volatile data: Data that are overwritten after a
period
Temporary files, program logs
System and data backups generated as part of an
organizations regular operations

www.cdackolkata.in

Workflow of Cyber Crime


Investigation

C-DAC/Kolkata

C-DAC All Rights Reserved

C-DAC/Kolkata

Search warrant to carry out


search & seize

Investigating officer & legal


advisor

Search, seizure and


transport of digital
evidence

Investigating officer
principal investigator &
legal advisor

Forensic Analysis of
Digital evidence

Digital forensic expert

Preparation of analysis
report

Forensic expert with


assistance legal advisor

Preparation and
presentation of case in
court of law

Investigating officer ,
principal investigator &
legal advisor

C-DAC All Rights Reserved

www.cdackolkata.in

Parties Involve in Different


Stages of Investigation

Cyber Forensic Procedures


Step1

www.cdackolkata.in

Step 1: VerificationVerification is concerned with


confirming that an incident or action has occurred that
warrants the initiation of a forensic investigation
The criteria for verification can come from multiple
sources; an organizations internal policies, local, state, or
federal law, an organizations internal policies

C-DAC All Rights Reserved


C-DAC/Kolkata

C-DAC All Rights Reserved

Cyber Forensic Procedures: Step


Two

C-DAC All Rights Reserved


C-DAC/Kolkata

C-DAC All Rights Reserved

www.cdackolkata.in

Step two: Identification and System Description:


From an eDiscovery perspective this is the point at which
the triggering event has occurred and been verified .
Potential sources of data (such as systems), subject matter
experts (such as forensic analysts) and other required
resources will be identified and allocated at this point.
From a forensic investigation perspective this is the point at
which detailed descriptions of the systems in scope will be
collected by the forensic analyst or security practitioner.

10

Cyber Forensic Procedures: Step


Three

C-DAC/Kolkata

C-DAC All Rights Reserved

www.cdackolkata.in

Step3: Preservation, Collection and Evidence Acquisition: concerned


with acquiring relevant data in scope in a manner that minimizes data loss in
a manner that is legally defensible, auditable, proportionate, reasonable and
efficient.
Forensic investigation is primarily concerned with the following four
principles; the minimization of data loss, the recording of detailed notes,
the analysis of collected data and reporting findings
Systems and data in scope should be handled in such a way to avoid data
destruction and a preservation plan should be developed prior to
execution

11

Step 3 Guidelines
Guide lines of step 3

www.cdackolkata.in

Consistency of Process: Organizations should perform forensic


investigations using a consistent process to preserve/collect data in a
legally defensible manner.

Use Forensic Toolkits


Live Acquisition is Best: When possible, the acquisition of a
live system (including volatile data) should be achieved. This type
of acquisition will capture a snapshot of the system in question
including the contents of memory, running processes, and network
connections as well as allocated and deleted file

C-DAC/Kolkata

C-DAC All Rights Reserved

12

Step 3 Guidelines

www.cdackolkata.in

Bit Stream Imaging: Bit stream imaging (a.k.a. disk imaging)


generates a bit-for-bit copy of the original media including unallocated
(deleted) data. Bit stream imaging requires access to the entire volume,
a requirement more easily accomplished with low-capacity systems.
Logical backups copy the directories and files from a volume .This
process does not capture additional data from the media, such as
deleted files or residual data stored in slack space.
Make No Changes: During the preservation/collection process do not
alter, delete or add data within reason. The use of forensic toolkits will
help reduce the impact of acquisition and collection on the target
media in read only mood.

C-DAC/Kolkata

C-DAC All Rights Reserved

13

Step 3 Guidelines
Take Hash Value: After All electronic data should be hashed at
the point of acquisition, transfer of custody and modification .

www.cdackolkata.in

MD5, SHA-1 hash algorithm can be used for hashing

Log Everything: Forensic analysts should keep detailed logs of


the actions they perform through the acquisition and collection
process.
Logs can be created and maintained either on paper or in electronic form.

Record and Preserve Chain of Custody:The chain of custody


should be recorded begin with data acquisition, and be
maintained until acceptance as evidence.

C-DAC/Kolkata

C-DAC All Rights Reserved

14

Cyber Forensic Procedures: Step


Four

www.cdackolkata.in

Processing/Review/Analysis and Media Analysis,


String/Byte Search, Timeline Analysis, Data Recovery:
This stage involves analyzing the data that has been
collected during step3.
Processing this data is the most time consuming portion of the
eDiscovery/Forensic Investigation process.
This involves applying the details of the incident, the verification
and system description information and making educated decisions
when examining this snapshot of data for relevant evidence

C-DAC/Kolkata

C-DAC All Rights Reserved

15

Content Analysis
Content (what type of data)
Comparison (against known data)

www.cdackolkata.in

Transaction (sequence)
Extraction (of data)
Deleted Data Files (recovery)
Format Conversion
Keyword Searching
Password (decryption)
Limited Source Code (analysis or compare)
Storage Media (many types)

C-DAC/Kolkata

C-DAC All Rights Reserved

16

Content Analysis Flow Diagram


No

Yes

If item or discovered
information can generate new
Data Search Leads, document
new leads to Data search
Lead List

Who/What

Who/What application created , modified, sent,


received the file
Who is this item linked to and identified with

Where
Where was it found/where did it came from
Does it show where relevant event took place

When

When was it created, accessed, modified, deleted, sent


Time Analysis: what else happened on the system at the
same time

How

How did it originated in the media


How was it created, transmitted, modified, used
Does it show how relevant events occurred

Associated artifacts/ Metadata

Registry entry
Application/System logs analysis

If item or discovered
information can generate
New Source of Data ,
document lead on new
source of data lead list

Mark Relevent Data item


processed on Relevent Data
List

If new Data Search


Leads generated start
Preparation/Extraction

www.cdackolkata.in

Is there more data


for analysis

If new source of data


lead generated start
Obtaining Imaging
Forensic Data

Start Forensic
Reporting to
Document findings

Use timeline or other methods to


document findings on Analysis
Results List

C-DAC/Kolkata

C-DAC All Rights Reserved

17

Cyber Forensic Procedures: Step


Five

C-DAC/Kolkata

C-DAC All Rights Reserved

www.cdackolkata.in

Production: involves the preparation and production of


ESI in a In order to meet the requirement for ESI to be
presented in an agreed upon and usable format
ESI may need to be converted into a standardized,
searchable format that has already been agreed to by
the parties
The usable requirement in the presentation of ESI can
involve factors such as search ability, fielded data,
redaction, metadata and summaries.

18

Cyber Forensic Procedures: Step


Six

C-DAC/Kolkata

C-DAC All Rights Reserved

www.cdackolkata.in

Presentation and Reporting Results: At this final stage


the ESI that has been identified, acquired, analyzed and
prepared will be displayed to an audience.
The goal of this stage is to provide targeted evidence to
prove or disprove statement of facts in the overall
context of eliciting further information, validate
existing facts or positions, or persuade an audience

19

www.cdackolkata.in
C-DAC/Kolkata

C-DAC All Rights Reserved

20

You might also like