Forensic Computer: CCF2010/KFR20403 Chapter 1 Introduction to Computer Forensic Introduction Electronic evidence and information gathering have become central issues in an increasing number of conflicts and crimes. computer forensics use the computers to analyze complex data (for example, connections between individuals by examination of telephone logs or bank account transactions). employs computers in the court, in the form of computer graphics, to clarify a complex situation such as a fraud or as a replacement for large volumes of paper-based exhibits and statements. So, what actually is computer forensics? Introduction Computer forensics is about evidence from computers that is sufficiently reliable to stand up in court and be convincing. Computer forensics, also referred to as computer forensic analysis is the process of methodically examining computer media (hard disks, diskettes, tapes, etc.) for evidence. A thorough analysis by a skilled examiner can result in the reconstruction of the activities of a computer user. computer forensics is the collection, preservation, analysis, and presentation of computer-related evidence. Computer evidence can be useful in criminal cases, civil disputes, and human resources/employment proceedings. Introduction The continuing technological revolution in communications and information exchange has created an entirely new form of crime witch is Computer crime. Computer crime has forced the computer and law enforcement professions to develop new areas of expertise and avenues of collecting and analyzing evidence. Computer crimes has developed the science of computer forensics. Introduction Roles of a Computer in a Crime The computer can play one of three roles in a computer crime: The computer can have multiple roles. The computer serve as a file cabinet storing critical evidence. It can be the target of the crime. It can be the instrument of the crime. It can serve as an evidence of the crime. For example, a hacker may use the computer as the tool to break into another computer and steal files, then store them on the computer. When investigating a case, it is important to know what roles the computer played in the crime. Introduction The Computer Forensic Objective The objective in computer forensics is to recover, analyze, and present computer-based material in such a way that it is useable as evidence in a court of law. The Computer Forensic Priority Specifically Its primary concern is with forensic procedures, rules of evidence, and legal processes. Its secondary concern is with computers. Generally: Its primary concern is accuracy. Its secondary concern is speed. Introduction The Computer Forensics Specialist the person responsible for doing computer forensics. will take several careful steps to identify and attempt to retrieve possible evidence that may exist on a subject computer system. What are the duties of the Computer Forensics Specialist? 1. 2. 3. Protect the subject computer system during the forensic examination from any possible alteration, damage, data corruption, or virus introduction. Discover all files on the subject system. This includes existing normal files, deleted yet remaining files, hidden files, passwordprotected files, and encrypted files. Recover all (or as much as possible) of discovered deleted files. Introduction 4. 5. 6. 7. 8. Reveal (to the extent possible) the contents of hidden files as well as temporary or swap files used by both the application programs and the operating system. Accesses (if possible and if legally appropriate) the contents of protected or encrypted files. Analyze all possibly relevant data found in special (and typically inaccessible) areas of a disk. Print out an overall analysis of the subject computer system, as well as a listing of all possibly relevant files and discovered file data. Provide expert consultation and/or testimony, as required. Introduction Who Can Use Computer Forensic Evidence? Criminal Prosecutors use computer evidence in a variety of crimes where incriminating documents can be found: financial fraud, and embezzlement record-keeping. Civil litigations can make use of personal and business records found on computer systems that bear on fraud, divorce, discrimination, and harassment cases. Corporations often hire computer forensics specialists to find evidence relating to sexual harassment, embezzlement, theft or misuse of trade secrets. Law enforcement officials frequently require assistance in presearch warrant preparations and post-seizure handling of the computer equipment. Individuals hire computer forensics specialists in support of possible claims of illegal termination, sexual harassment, or discrimination . Introduction Computer Evidence Properties and Problems Computer Evidence Properties : Authentic Accurate Complete Convincing to juries Allowable Computer Evidence Problems Computer data changes moment by moment. Computer data is invisible to the human eye; it can only be viewed indirectly after appropriate procedures. The process of collecting computer data may change it in significant ways. Computer and telecommunications technologies are always changing so that forensic processes can seldom be fixed for very long. Introduction The Nature of Forensics Evidence Digital Evidence: is any data stored or transmitted using a computer that support or disprove a theory of how an offence occurred or address critical elements of the offence. Digital Evidence usually is involve the following areas: Computer intrusions Fraud Identity theft Intellectual property theft Sexual harassment Violent crimes And so on … Introduction Fraud occurs when someone improvements something of value, usually money or property, from a victim by meaningfully making a misrepresentation of a matter of fact. Fraud commonly occurs in the buying or selling of property, particularly real estate and stocks, or in falsifying reports such as taxes and Medicare claims made to obtain benefits from the state or federal government. Introduction Overview of systems security Cybercrime is possible because computers and networks are not properly secured. Often, applying these simple security measures costs nothing. System security is not a thing, it’s a process. The process of building a barrier between the network and those who would do harm. The key is to make your wall more difficult to cross than someone else’s. if an attacker specifically wants to breach your security perimeter, given enough time, he or she will be able to do so. Introduction System security NOT only about keeping out malicious users preventing attacks. It is about maintaining and providing access to resources for authorized users. maintaining the integrity of the data and the infrastructure. Introduction Risk-reducing strategies to improve the security of your computer: 1. 2. 3. 4. 5. 6. 7. 8. Deploying Antivirus Software Defining Strong User Passwords Setting Access Permissions Disabling File and Print Sharing Using Network Address Translation (NAT) Deploying a Firewall Disabling Unneeded Services Configuring System Checking Introduction Deploying Antivirus Software to prevent unauthorized access and to support authorized access. When selecting an antivirus software, look for the following: The product should originate from a well-known, reputable company. The product should automatically update its virus definitions. The product should scan stored files, memory (RAM), removable media, e-mail, and Web-transmitted data. The product should clean or quarantine any infected files it detects. Introduction Defining Strong User Passwords Two elements are needed to gain access to a computer: Username Most usernames are obvious or very easy to guess. Password Passwords must be very strong and kept secured to maintain control over access. 1. Password length and complexity minimum required length (eight characters) 2. Who creates the password? users create their own passwords is usually the best option 3. Forced changing of passwords Administrators can use operating system features to make users change their passwords. Introduction Setting Access Consents Controlling access is an important element in maintaining system security. The most secure environments follow the “least privileged” principle. This principle states that users are decided the least amount of access possible that still enables them to complete their required work tasks. Expansions to that access are carefully considered before being implemented. Introduction Disabling File and Print Sharing On most networks where security is important, this service is disabled on all clients. This action forces all shared resources to be stored on network servers, which typically have better security and access controls than end-user client systems. Introduction Using Network Address Translation (NAT) (NAT) is a feature of many firewalls, proxies, and routing-capable systems. NAT has several benefits: ability to hide the IP address and network design of the internal network. NAT enables internal clients to use non-routable IP addresses, such as the private IP addresses. NAT restricts traffic flow so that only traffic requested or started by an internal client can cross the NAT system from external networks. Introduction Deploying a Firewall a firewall is a device or a software product whose primary purpose is to filter traffic crossing the boundaries of a network. That boundary can be a broadband connection, a dial up link, or some type of LAN or WAN connection. There are several types of firewalls or filtering mechanisms available to handle this job: packet filters. stateful inspection systems. proxy systems. circuit-level filtering. Introduction Disabling Unneeded Services One of the primary tenets for maintaining physical security in a residence or business property is to reduce the number of pathways an impostor can take to gain access to it. Administrators should apply the same perspective in regard to the electronic pathways into the network. Any means by which valid data can reach the network or computer is also a potential path for a malicious intruder or attack. Systems linked to the Internet should have any unneeded protocols, applications, and services either disabled or completely removed or uninstalled. Introduction Configuring System Auditing The only way to know when your system has been breached or when an unsuccessful attempt to enter your security has occurred is to monitor or audit for unusual or abnormal activity. Most OSs include native auditing capabilities. Windows servers and business oriented client operating systems such as NT Workstation and Windows 2000/XP Professional provide for security auditing that is tracked through a security log available to administrators through the Event Viewer administrative tool. THE END