L13 - Introduction To Cybercrime Investigation
L13 - Introduction To Cybercrime Investigation
Criminal activity that targets computer systems, networks, and electronic devices to
achieve illegal goals.
More than fraud and theft. It is now the domain of vast criminal
networks, foreign government-sponsored hackers and cyber
terrorists.. Cyber Stalking & Bullying
Increased reliance on
technology
As our dependence on technology grows, so do the vulnerabilities cybercriminals can exploit.
Financial gain
The potential for significant financial rewards attracts sophisticated criminals
Globalization of
cybercrime
security responsibility is shared between the provider and the customer, requiring both parties to
be vigilant
4
Cybercrime investigation requires a methodical
approach.
Each stage demands specialized skills and tools to ensure a successful outcome
Investigation
5
Incident Response
❑ Incident response is an organized approach to addressing and managing the aftermath of a security breach
cyberattack, or security incident.
❑ The goal is to handle the situation in a way that limits damage and reduces recovery time and costs.
Preparation
Containmen
Recovery
t
Eradication
8
Digital Forensics
Digital forensics is a branch of forensic science that encompasses the recovery and investigation of material found in
digital devices
It includes the preservation, identification, extraction, documentation, and interpretation of digital media for evidence
and/or root cause analysis using well-defined methodologies and procedures
Data Data
Identification
Acquisition Analysis
9
Digital Forensics
Phases of a Digital Forensics Investigation
Documentati
Evidence Data Securing the
Identification Data Analysis on &
Collection Acquisition Evidence
Reporting
Information needs to be gathered before the digital device is even touched. It won’t often be clear what contextual
information is relevant to an investigation until much later. So, to be safe, document everything about how the
device was found
Documentati
Evidence Data Securing the
Identification Data Analysis on &
Collection Acquisition Evidence
Reporting
A first responder is an individual who is first to find out about the situation and start to address it. This may
be an employee who notices a problem with their company-issued computer, or a network administrator
working to maintain uptime on a company’s network.
Employees should always be trained to contact qualified personnel and report computer incidents as soon as
it occurs so that the forensic process can be kick-started appropriately.
11
Digital Forensics
Phases of a Digital Forensics Investigation
Documentati
Evidence Data Securing the
Identification Data Analysis on &
Collection Acquisition Evidence
Reporting
Documentati
Evidence Data Securing the
Identification Data Analysis on &
Collection Acquisition Evidence
Reporting
➢ Once all that information is recorded, you can move on to collecting the
physical media where digital evidence is stored or accessed.
13
Digital Forensics
Phases of a Digital Forensics Investigation
Documentati
Evidence Data Securing the
Identification Data Analysis on &
Collection Acquisition Evidence
Reporting
1 2 3 4
14
Digital Forensics
Phases of a Digital Forensics Investigation
Documentati
Evidence Data Securing the
Identification Data Analysis on &
Collection Acquisition Evidence
Reporting
What Is the Chain of Custody in Computer Forensics? The chain of custody in digital forensics can also be referred to as the forensic link, the paper trail,
or the chronological documentation of electronic evidence. It indicates the collection, sequence of control, transfer, and analysis
Chain of Custody Form: Tracks where & how evidence was handled. Includes:
Documentati
Evidence Data Securing the
Identification Data Analysis on &
Collection Acquisition Evidence
Reporting
Evidence Acquisition
Triaging/Custom Authentication/Verification
Content Acquisition
Chain of Custody
16
Digital Forensics
Phases of a Digital Forensics Investigation
Documentati
Evidence Data Securing the
Identification Data Analysis on &
Collection Acquisition Evidence
Reporting
Evidence Acquisition
1 Data Type
Volatile Data
Data stored in system memory that will be Persistent Data
lost when the machine loses power or is Data stored in non-volatile storage devices e.g.
shutdown i.e. Data in RAM hard drive.
Such data include active network They are usually not lost after rebooting or
connections, details of running processes shutting down. That is, they persist
and services
Analyzing persistent data can be thought of as a
Analyzing Volatile data can be thought of as post-mortem of events that already happened
a live response to a current threat
17
Digital Forensics
Phases of a Digital Forensics Investigation
Documentati
Evidence Data Securing the
Identification Data Analysis on &
Collection Acquisition Evidence
Reporting
Evidence Acquisition
Documentati
Evidence Data Securing the
Identification Data Analysis on &
Collection Acquisition Evidence
Reporting
Evidence Acquisition
Documentati
Evidence Data Securing the
Identification Data Analysis on &
Collection Acquisition Evidence
Reporting
Evidence Acquisition
4 Authentication/Verification
20
Digital Forensics
Phases of a Digital Forensics Investigation
Documentati
Evidence Data Securing the
Identification Data Analysis on &
Collection Acquisition Evidence
Reporting
Evidence Acquisition
21
Digital Forensics
Phases of a Digital Forensics Investigation
Documentati
Evidence Data Securing the
Identification Data Analysis on &
Collection Acquisition Evidence
Reporting
Forensic experts examine and evaluate data collected from the device to generate evidence for legal or
corporate proceedings. The data collected from the device is used to help reconstruct the incident under
investigation. That analysis and reconstruction are what transform data into evidence.
Write-Blocking Use write-blocking hardware or software to prevent data alteration during acquisition
Documentation Document the state of the evidence before and after collection
Documentati
Evidence Data Securing the
Identification Data Analysis on &
Collection Acquisition Evidence
Reporting
• Payload analysis
Initial examination & Data • Network traffic analysis
review • Log file analysis
• File hashing and whitelist comparison
• Timeline creation
Event analysis • Anomalous behavior detection
• Analysis for indicators of compromise
• Privilege escalation
• Deleted file analysis • Registry & operating system artifact analysis
• User activity
• Internet history • Compromise and damage assessment
Data analysis
• USB storage
• Webmail/cloud storage
• Event reconstruction
Facts • Detailed reporting & automated report generation including visualizations
• Actionable recommendations 23
Digital Forensics
Phases of a Digital Forensics Investigation
Documentati
Evidence Data Securing the
Identification Data Analysis on &
Collection Acquisition Evidence
Reporting
Forensic
Imaging Tools Create bit-by-bit copies of digital media
Documentati
Evidence Data Securing the
Identification Data Analysis on &
Collection Acquisition Evidence
Reporting
• Presenting findings to authorities: Present the case and evidence to law enforcement
agencies for prosecution.
25
Legal Considerations
Understanding digital Working with legal
Chain of custody
evidence laws counsel
Ensure evidence collection and Collaborate with lawyers to Maintain a documented record
handling comply with legal navigate legal aspects of the of evidence handling to ensure
requirements. investigation. admissibility in court
01 When it is necessary for a person to access original digital evidence; that person must be forensically
competent
02 Upon seizing digital evidence, action should not change that evidence
03 All activity relating to the seizure, access, storage or transfer of digital evidence must be fully documented,
preserved and available for review
An individual is responsible for all actions taken with respect to digital evidence while the digital evidence is in
04
their possession
Any agency that is responsible for seizing, accessing, storing or transferring digital evidence is responsible for
05
compliance with these principles
26
2
Challenges of Cybercrime Investigation
Ability to prioritize the myriad of incidents and select Insufficient planning/preparation before
the ones that need investigation the incident
27
Thank you
28