Module 1 - Introduction To Digital Investigation and Forensics
Module 1 - Introduction To Digital Investigation and Forensics
Forensics
Lecture 1
1
Objectives
2
An Overview of Digital Forensics
• Digital forensics
• The application of computer science and investigative procedures for a legal purpose
involving the analysis of digital evidence after proper search authority, chain of
custody, validation with mathematics, use of validated tools, repeatability, reporting,
and possible expert presentation.
• In October 2012, an ISO standard for digital forensics was ratified - ISO 27037
Information technology - Security techniques
3
Digital Forensics and Other Related
Disciplines (1 of 2)
• Investigating digital devices includes:
• Collecting data securely
• Examining suspect data to determine details such as origin and content
• Presenting digital information to courts
• Applying laws to digital device practices
• Digital forensics is different from data recovery
• Which involves retrieving information that was deleted by mistake or lost during a
power surge or server crash
• Forensics investigators often work as part of a team, known as the
investigations triad
4
Digital Forensics and Other Related
Disciplines (2 of 2)
5
Objectives
6
Preparing for Digital Investigations
7
Understanding Public-Sector Investigations
8
Understanding Private-Sector Investigations
9
Objectives
10
Maintaining Professional Conduct
11
Objectives
12
Preparing a Digital Forensics Investigation
13
Taking a Systematic Approach (1 of 2)
14
Taking a Systematic Approach (2 of 2)
15
Assessing the Case
16
Planning Your Investigation
17
Securing Your Evidence
18
Objectives
19
Example Procedures for Private-Sector
High-Tech Investigations
• As an investigator, you need to develop formal procedures and informal
checklists
• To cover all issues important to high-tech investigations
• Ensures that correct techniques are used in an investigation
20
Internet Abuse Investigations
21
E-mail Abuse Investigations
22
Objectives
23
Understanding Data Recovery Workstations
and Software
• Investigations are conducted on a computer forensics lab (or data-recovery lab)
• In data recovery, the customer or your company just wants the data back
• Computer forensics workstation
• A specially configured PC
• Loaded with additional bays and forensics software
• To avoid altering the evidence use:
• Write-blockers devices
- Enable you to boot to Windows without writing data to the evidence drive
24
Setting Up Your Workstation for Digital
Forensics
• Basic requirements
• A workstation running Windows 7 or later
• A write-blocker device
• Digital forensics acquisition tool
• Digital forensics analysis tool
• Target drive to receive the source or suspect disk data
• Spare PATA or SATA ports
• USB ports
25
Objectives
26
Summary of conducting an Investigation
27
Acquiring an Image of Evidence Media
28
Analyzing Your Digital Evidence
29
Completing the Case (1 of 2)
30
Completing the Case (2 of 2)
31
Critiquing the Case
32
Summary
33
References
• Nelson, B., Phillips, A., & Steuart, C. (2019). Guide to computer forensics and
investigations. Cengage Learning.
• Hayes, D. R. (2015). A practical guide to computer forensics investigations.
Pearson Education.
• Nelson, B., Phillips, A., & Steuart, C. (2015). Guide to computer forensics and
investigations: Processing digital evidence. Cengage Learning.
• Sachowski, J. (2018). Digital Forensics and Investigations: People, Process, and
Technologies to Defend the Enterprise. CRC Press.
34