Seminar Report
Seminar Report
On
Topic Name
COMPUTER FORENSICS
Bachelor of Technology
in
Computer Science & Engineering
Submitted By
Anjali Singh
Registration No: 1601298039
1
Certificate
2
CONTENTS PAGE NUMBER
CHAPTER 1: INTRODUCTION
2.1 INTRODUCTION
2.2 INVESTIGATION
4.1 TRAINING
CONCLUSION
3
REFERENCE
LIST OF FIGURES
Figure Number page number
Figure-1( Methodology of Computer Forensics) 9
Figure-2(Procedure of investigation) 16
List of Table
Table Number page number
Table-1(1 shows sample of log user) 18
4
ACKNOWLEDGEMENT
We express my deep sense of gratitude and appreciation to Mrs. AMRUTANSHU PANIGRAHI,
Department of COMPUTER SCIENCE Engineering for his constant and valuable guidance and
help in implementing our project topic. He devoted his invaluable time in proving us the guidance
at every step in our seminar.
We would like to express gratitude to Prof. PRATYUSH RANJAN MOHAPATRA, Head of the
Department, COMPUTER SCIENCE Engineering, and GIFT Bhubaneswar for providing us with
this opportunity and for his great help and cooperation.
We are also very thankful to other faculty members of the department of Computer Science
Engineering, for their constant advice, inspiration, and guidance and contributing their valuable
time to giving us encouragement.
Again we are thankful to their valuable suggestion and with whom I shared many ideas through
the problem.
ANJALI SINGH
Department of Computer Science and Engineering
Bhubaneswar, Odisha.
5
ABSTRACT
The Internet is growing explosively, as is the number of crimes committed against or using
computers. As a response to the growth of computer crime, the field of computer forensics has
emerged. Computer forensics involves carefully collecting and examining electronic evidence that
not only assesses the damage to a computer as a result of an electronic attack, but also to recover
lost information from such a system to prosecute a criminal. With the growing importance
of computer security today and the seriousness of cyber crime, it is important for computer
professionals to understand the technology that is used in computer forensics.The need for
computer forensics to be practiced in an effective and legal way. It promotes the idea that
the competent practice of computer forensics and awareness of applicable laws is essential for
today's organizations.
6
CHAPTER 1
INTRODUCTION
1.1 THREATS TO THE SYSTEM
System threats can be broadly classified into human and environment threats. Environment
threats include power outages, fire and floods. Human threats can be malicious or non-
malicious. A threat is considered malicious if the attack or crime
is committed with full knowledge and intension. A non-malicious threat is one where the
individual does not understand its intent or is ignorant of the action that is about to be
committed. For e.g. :-
A disgruntled employee may try to break into the organization’s critical business
information to damage the information and the business. This is an example of
malicious human threat.
An ignorant employee may give out information to a hacker without realizing the
consequences. This is an example of non-malicious human threat.
“Forensic computing is the process of identifying, preserving, analyzing and presenting digital
evidence in a manner that is legally acceptable.”(Rodney Mckemmish 1999).
IDENTIFYING
This is the process of identifying things such as what evidence is present, where and how it is
stored, and which operating system is being used. From this information the investigator can
identify the appropriate recovery methodologies, and the tools to be used.
PRESERVING
This is the process of preserving the integrity of digital evidence, ensuring the chain of custody is
not broken. The data needs to preserved (copied) on stable media such as CD-ROM, using
reproducible methodologies. All steps taken to capture the data must be documented. Any changes
to the evidence should be documented, including what the change was and the reason for the
change. You may need to prove the integrity of the data in the court
7
ANALYSING
This is the process of reviewing and examining the data. The advantage of copying this data onto
CD-ROMs is the fact it can be viewed without the risk of accidental changes, therefore
maintaining the integrity whilst examining the changes.
PRESENTING
This is the process of presenting the evidence in a legally acceptable and understandable manner.
If the matter is presented in court the jury who may have little or no computer experience, must all
be able to understand what is presented and how it relates to the original, otherwise all efforts
could be futile. Far more information is retained on the computer than most people realize. Its also
more difficult to completely remove information than is generally thought. For these reasons(and
many more), computer forensics can often find evidence or even completely recover, lost or
deleted information, even if the information was intentionally deleted. The goal of computer
forensics is to retrieve the data and interpret as much information about it as possible as compared
to data recovery where the goal is to retrieve the lost data
8
Fig 1: Methodology of Computer Forensics
9
4. of Hard Disks and Floppy Disks
The computer should not be operated and computer evidence should not be processed until bit
stream backups have been made of all hard disk drives and floppy disks. All evidence processing
should be done on a restored copy of the bit stream backup rather than on the original computer.
The original evidence should be left untouched unless compelling circumstances exist.
Preservation of computer evidence is vitally important. It is fragile and can easily be altered or
destroyed. Often such alteration or destruction of data is irreversible. Bit stream backups are much
like an insurance policy and they are essential for any serious computer evidence processing.
6. You want to be able to prove that you did not alter any of the evidence after the computer
came into your possession. Such proof will help you rebut allegations that you changed or
altered the original evidence. Since 1989, law enforcement and military agencies have used a
32 bit mathematical process to do the authentication process. Mathematically, a 32 bit data
validation is accurate to approximately one in 4.3 billion. However, given the speed of today's
computers and the vast amount of storage capacity on today's computer hard Transport the
Computer System to A Secure Location
This may seem basic but all too often seized evidence computers are stored in less than secure
locations. It is imperative that the subject computer is treated as evidence and it should be stored
out of reach of curious computer users. All too often,individuals operate seized computers without
knowing that they are destroying potential computer evidence and the chain of custody.
Furthermore, a seized computer left unintended can easily be compromised. Evidence can be
planted on it and crucial evidence can be intentionally destroyed. A lack of a proper chain of
custody can 'make the day' for a savvy defense attorney . Do not leave the computer unattended
unless it is locked in a secure location
Make Bit Stream Backups disk drives, this level of accuracy is no longer accurate enough. A 32
bit CRC can easily be compromised. Therefore, NTI includes two programs in its forensic suites
10
of tools that mathematically authenticate data with a high level of accuracy. Large hashing
number, provides a mathematical level of accuracy that is beyond question.
File slack is a data storage area of which most computer users are unaware. It is a source of
significant 'security leakage' and consists of raw memory dumps that occur during the work
session as files are closed. The data dumped from memory ends up being stored at the end of
allocated files, beyond the reach or the view of the computer user. Specialized forensic tools
are required to view and evaluate file slack and it can prove to provide a wealth of information
and investigative leads. Like the Windows swap file, this source of ambient data can help provide
relevant key words and leads that may have previously been unknown.
11
significant 'security leakage' and it potentially contains erased files and file slack associated with
the erased files. Often the DOS Undelete program can be used to restore the previously erased
files. Like the Windows swap file and file slack, this source of ambient data can help provide
relevant key words and leads that may have previously been unknown to the computer
investigator.
12
11. Search Files, File Slack and Unallocated Space for Key Words
The list of relevant key words identified in the previous steps should be used to search all relevant
computer hard disk drives and floppy diskettes. There are several forensic text search utilities
available in the marketplace. NTI's forensic search Text Search NT can be used for that purpose
and it has been tested and certified for accuracy by the U. S. Department of Defense. This
powerful search tool is also included as part of NTI's suites of software tools.
13
CHAPTER 2
INVESTIGATION OF COMPUTER FORENSICS
2.1 INTRODUCTION
Cyber crime occurs when information technology is used to commit or conceal an offence.
Computer crime include:-
- Financial frauds
- Sabotage of data and/or networks
- System penetration from outside and denial of service
- Unauthorized access by insiders and employee misuse of internet access
privileges
- Viruses, which are the leading cause of unauthorized users gaining
access to systems and networks through the internet.
2.2 INVESTIGATION
Investigation is the process of collecting, analyzing, and recovering, evidence, and presenting, a
report detailing a crime. Evidence is the key factor that determines a crime and helps prosecute the
guilty in the court of law.
The investigation process consists of procedures and techniques for finding out what happened,
what damage was done, and to what extend, whether the intruder is still a threat, and whether any
fixes still need to be implemented. An investigation, to a great extent depends on the skill of the
investigator or forensic expert.
With the increase in system and cyber crime and the uses of new tools and techniques,
organizations have realized that it is not only important to prevent these crimes and protect
information, but to trace the source of crime.
EVIDENCE:-
Almost all types of investigation of a system crime relies on the evidence obtained from
the target computer. You can collect evidence for a computer crime by analyzing digital
data such as e-mails, files, and other system information. Evidence provides vital
information about the crime in terms of tools and techniques that were used
Every investigation follows a well-defined procedure. The procedure involves the following four
steps:-
15
Fig 2: Procedure of investigation
COLLECTING EVIDENCE:
The first and the most important step in an investigation is collection of evidence. sAs an
investigator, it is important to understand, to know, and to choose what is to be treated as
evidence from the available information. The evidence varies from
situation to situation. E.g., the evidence from investigating a hard disk may be different from
investigating a CD-ROM drive. It is important that the investigator is up-to date with the new
technologies, and of what they can and cannot do.
ANALYZING EVIDENCE:
The second step is analyzing the evidence.
There are different tools and techniques that are used to commit computer crime. It is important to
identify the tools as well as the techniques. These provide the all important footprints of the
crimes. These footprints can be evaluated later to translate them into meaningful sources of
evidence. Many vulnerability software manufacturers recognize the fact that their software is also
effective hacking tools, so they are designed to leave their identity traces along the path they
followed, this serves as strong forensic evidence against the acts of computer crimes and
criminals.
16
RECOVERING EVIDENCE:
There is certain evidence that is removed by computer criminals for various reasons. At times,
there are changes in the evidence simply because the system was rebooted. As an investigator,
you must attempt to recover all the data that might have been tampered with, and locate the
information that may be of some evidence.
PRESERVING EVIDENCE:
After all the evidence as been collected, it is important to preserve it, as it existed during or
soon after the crime. The procedure should follow a “well-deviced” technique to avoid any
changes in the data. Following is a checklist used to ensure that the evidence remains
protected and preserved:-
- The evidence is not damaged or altered due to tools and techniques used
for investigation.
RECORD 1 RECORD 2
18
CHAPTER 3
AnaDisk turns your PC into a sophisticated diskette analysis tool. The software was
originally created to meet the needs of the U.S. Treasury department.
PRIMARY USES
Text Search plus was specifically designed and enhanced for speed and accuracy in
security reviews. It was widely used by classified government agencies and corporations
that support these agencies. The s/w is also used by hundreds of law enforcement agencies
throughout the world in computer crime investigations.
This enhanced forensic filter is used to quickly make sense of nonsense in analysis of
ambient computer data. This tool is so unique that process patents have been applied for
with the U.S. patent office.
PRIMARY USES
20
- The ideal tool to use for corporate, military, and law enforcement
investigators.
- Perfect for covert intelligence gathering when laws permit and you have
physical access to the subject computer.
21
If your pc or laptop is stolen, is it smart enough to tell you where it is? CDs has a solution:
PC Phone Home-another software application that will track and locate a lost or stolen pc
or laptop anywhere in the world. It is easy to install. It is also completely transparent to the
user. If your Phone Home computer is lost or stolen, all you need to do is make a report to
the local police and call CDS – 24 hour command center. CDS’s recovery specialists will
assist local law enforcement in recovery of your property.
Through forensic evidence acquisition services, CDS forensic expert can provide management
with a potent arsenal on digital tools at its disposal. Services include but are not limited to:
22
Investigations are done on different lines under different situations. Although investigation techniques
vary, they can be categorized broadly into two types:-
Physical investigation
Logical investigation
These investigations give information about the system usage patterns, including application and
resource usage. This information might require application monitoring tools such as sniffers.
It includes identifying or locating physical evidence, such as removal of computer hardware. Certain
behavior or incident could trigger a physical investigation. Some examples are:-
LOGICAL INVESTIGATION
It can be referred as digital investigation. Logical investigation takes a look at log files that
can be used as evidence against the criminal. It requires a well designed security policy that
clearly defines the process for logging information. It is important that the logs be
maintained systematically. Some of the logical investigation requirements are:-
- No modifications :-
The system logs should not be modified at all. The system should
remain in the same state as it was when the crime occurred or else it
could lead to loss of evidence.
- System registry:-
System registry keys must be checked to identify the authenticity of the
last logged-in users and the integrity of critical files.
23
- forensic imaging tool:-
forensic imaging tool must be used to make multiple copy of the hard
disk that have been taken for investigation. Bib-by-bit copy of the hard
disk must be made so that no portion of the hard disk whether filled or
empty, is left without being copied. An example of forensic imaging
tool is SETBACK.
24
CHAPTER 4
skills, some of which we have already discussed. The following list provides
an overview of the skill s a manager should look for when deciding which
4.1 TRAINING
There are many training courses to learn the art of computer forensics.
to address the various skill levels of the students. Not all of these
http://www.guidancesoftware.com/html/ence.htm.
25
ADVANTAGES
It helps in determining the cause of death by examining the postmortem changes, blunt
injuries, burns and scalds on the body, and the scene of death. If it's sudden natural death,
the case is investigated by the coroner or a medical examiner.
Forensic analysis is used to investigate accident cases and to determine its cause by
analyzing the vehicle condition, tire and other marks, eye witnesses, calculating the
vehicle's speed etc.
Biometrics technology is combined with forensics, which helps to identify the fingerprint
of the criminal, on the objects present in the crime scene.
Phonetics, which is also a part of forensics, that is used to tap the voice signals and
identify the speaker. Speech enhancement, speech coding and tape authentication are other
techniques used in phonetics.
Other useful aspects of forensic analysis includes fire investigation, forgery and fraud in
payment cards, lie detection, footprint marks, voice analysis, digital imaging and
photography etc.
26
DISADVANTAGES
Scientific analysis consumes lot of time because of which the verdict is delayed.
It requires precise and accurate analysis. Even if a minor error occurs in the analysis, it
may result in the wrong figure.
27
CONCLUSION
Nowadays as computer is the backbone of the country .so the crimes is being increasing
which are known are cyber crimes.To recover, analyze and preserve the computer related
matters in a way that can be presented as a evidence in the court and to identify the
evidence in a short amount of time, estimate the impact of the activity on the victim and
identify the criminal.to reduce the crimes alternatively.
28
REFERENCE
www.Computer forensicstechnology.com
https://en.wikipedia.org/wiki/Computerforensics
29