What Is Computer Forensics
What Is Computer Forensics
Identify
Gather
Preserve
Extract
Interpret
Documentation and presentation evidence
Internal
External
Espionage
Manipulation of data records
Leak of theft of proprietary information
External Attacks
Phishing attempts
Brute force
Injection attacks like sql or xss
Challenges
Investigating cyber crime come with its own set of unique challenges for a forensic investigator
Volatile evidence
Speed
Cyber crimes are fast by nature, moving data around the world in seconds
Anonymity
Other challenges
Laws
Size of evidence
Think like anti-virus but this is used by the bad guys to defeat forensics
Policy violation
Harassment
Misusing of company resources
Suspension
Change job role, demotion
Termination
Civil vs Criminal
Civil cases involve two or more parties wher one claims some wrongful doing by the other part
Breach of contract
Chain of custodian issues
Investigation process
Base on the type of case, the investigation process may be a little different
The FBI defines a criminal organization as a group of individuals with an identified hierarchy engaged in
significant criminal activities
Collecting Evidence
Digital evidence
We can use in a court of law, but its stored or transmitted in a digital form
On storage media
During routine or investigating network traffic
Fragile by nature
Volatile data
Data that will be lost once the device is power off
Involatile data