Cardinal Rules Od Cyber Forensic
Cardinal Rules Od Cyber Forensic
Module No. and Title MODULE No. 26: Cardinal Rules of Cyber Forensic
1. Learning Outcomes
2. Introduction
2. Introduction
Before the investigator works on the case certain rules and procedure must be followed.
The Cardinal rules have been evolved to facilitate a forensically sound examination of
computer media and enable a forensic professional to testify in the court in respect of
their handling a particular piece of evidence.
If appropriate forensic tools and techniques are applied, same results are obtained
irrespective of the fact who examines the media or which specific tools and techniques
are employed.
There are basically five cardinal rules to be followed systematically by cyber forensic
examiner.
3.1 Never Mishandle the Evidence
3.2 Never work on the Original Evidence
3.3 Never Trust the Subject’s Operating System
3.4 Document Everything
3.5 The results should be repeatable and verifiable by a third party
The first cardinal rule says to preserve the evidence, which means that the evidence
should not to be tampered with or contaminated. Secure collection of evidence is
important to guarantee the evidential integrity and security of information. The best
approach for this matter is to use disk imaging tool. Choosing and using the right imaging
tool is very important in cyber forensics investigation.
To preserve the original evidence, a forensic copy or imaging of the original data is done
using specialized software and write blocker so that integrity of evidence is not altered.
The analysis is done now on forensic copy of evidence. The original evidence is to be
preserved into safe custody.
To document the evidence, like who recovered the evidence and when, and who
possessed it and when a chain-of-evidence form is generated and filled, which helps the
examiner to document what has and has not been done with both the original evidence
and the forensic copies of the evidence.
The second cardinal rule says not to work on the original evidence as the digital evidence
is very fragile in nature. To maintain the integrity of the digital evidence and any
unknowing alteration, preserve the original evidence in its pristine condition.
It is easier to work on the original evidence and the cost related to it is also low.
If analyzed directly, the digital evidence will lose its integrity, authenticity and will not
be admissible in any court.
3.3 Never Trust the Subject’s Operating System
Computer criminal can modify the routine operating system commands to perform
destructive commands. Using the subject’s operating system could easily destroy data
with just a few keystrokes. When the subject computer starts, booting to a hard disks
overwrites and changes evidentiary data.
To make sure that data is not altered, we need to monitor the subject’s computer during
initial bootstrap to identify the correct key to use access the CMOs setup.
The fifth cardinal rule says that the analysis done on the evidence should be completely
audited by the third party. To establish the integrity of information a cryptographic hash
value, such as MD5 or SHA-1 are calculated so that it can be proven to the courts.
Chain of custody forms are created if evidence are used in court or verified by any third
party. The same process can be conducted and verified by any expert or person.
Recognizing the fragile nature of the digital data, major task is to preserve the
evidence against accidental or intentional manipulation.
Stick to the methodology and cardinal rules of computer forensics then perform
analysis and presentation of the evidence so that the prime objective of computer
forensics is met and the evidence should be accepted by the court of law.