Dr. Phil Nyoni: Digital Forensics Lecture 1: Introduction To Forensics
Dr. Phil Nyoni: Digital Forensics Lecture 1: Introduction To Forensics
Digital Forensics
Lecture 1: Introduction to
Forensics
07 July 2021
Exams:
There will be an exam.
• Pre-incident preparation
• Detection of incidents
• Initial response
• Formulate response strategy
• Investigate the incident
• Reporting
• Resolution (and Improvement)
Digital Forensics and Incident Response
Pre-Incident Preparation
• Legal
– File a civil complaint and/or notify
law enforcement.
• Administrative
– Usually has to deal with internal
employees who have violated
workplace policies.
• Three steps:
– Contain the problem.
– Solve the problem.
– Take steps to prevent the
problem from occurring again.
• Disaster recovery
– Uses computer forensics techniques to retrieve
information their clients have lost
• Investigators often work as a team to make
computers and networks secure in an organization
1980s
PCs gained popularity and different OSs emerged.
Disk Operating System (DOS) was available.
Forensics tools were simple, and most were generated by
government agencies.
2000s
FBI, CIA and NSA each with their own full cyber crime
divisions, full digital forensics labs, dedicated onsite and field
agents
Digital Forensics and Incident Response
Digital Investigation
A digital investigation is a process where we develop and test
hypotheses that answer questions about digital events. This is
done using the scientific method where we develop a
hypothesis using evidence that we find and then test the
hypothesis by looking for additional evidence that shows the
hypothesis is impossible.
B. Carrier, 2006
File System Forensic Analysis
Identification
This step involves identifying what data could be recovered and
electronically retrieving it by running various Computer Forensic
tools and software suites
Example: An investigator has pinpointed a suspicious IP
address belonging to the laptop in Ohio. The digital forensics
investigator may have a co-worker send them the suspected
laptop for analysis.
Digital Forensics and Incident Response
Investigation Process
Analysis/Evaluation
This is the investigative portion of the process where a
forensics practitioner begins looking into the acquired asset or
medias data to find evidence of the suspected crime. Example:
The investigator may look through documents, email and chat
conversations, browser website history, hard drives, and other
user activities.
Reporting/Presentation
This step involves the presentation of evidence discovered in a
manner which is understood by lawyers, staff/management,
and suitable as evidence. Example: A digital forensics
investigator may debrief a company's technical leaders in detail
and then give a high-level summary to the general manager
Question:
Describe a role of Acquisition process in Computer
Forensic Investigation.
Question:
List and describe minimum two challenges facing
Digital Forensics in the next 10 years.
https://blog.veriato.com/the-evolution-of-digital-forensics
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800
-61r2.pdf