Slides - Personal Web Pages

advertisement
Computer Forensics:
Data Collection, Analysis and Preservation
Kikunda Eric Kajangu, Cher Vue, and John Mottola
ITIS-3200-001
Computer Forensics defined:
The use of analytical and investigative
techniques to identify, collect, examine and
preserve evidence/information which is
magnetically stored or encoded.
Industry companies interested
in computer forensics

Guidance Software (http://www.guidancesoftware.com)
◦ They are the creators of the popular GUI-based forensic tool
“EnCase”.

Digital Intelligence, Inc. (http://www.digitalintel.com/)
◦ Digital Intelligence designs and builds computer forensic
software and hardware. They also offer free forensic utility
software for law enforcement.

IVIZE Data Center: (http://www.ivize.net).
◦ They provide several litigation support services including
Electronic Data Discovery
Three main concepts

Data collection

Data analysis

Data preservation
Data Collection

Research challenges
◦ Gathering data
 Ensuring the data is relevant and complete
 Obtaining volitile data
 Obtaining deleted and changed files
◦ Lack of trained professionals
 Computer Forensics is a relatively new field
 Threat of System administrators corrupting data
 No standards
Data Collection

Evolution of data collection
◦ Mid 1980’s
 X-Tree Gold and Norton Disk Edit
 Limited to recovering lost or deleted files
◦ 1990’s
 Specialized tools began to appear
 Tools to perform Network investigations
◦ 1999
 Boot to floppy and write to alternative media
 Very slow transfer rate. (1GB/hr)
◦ Current
 Many tools to choose from
 GUI and Command Line Tools are available
 Fast and efficient
Data Analysis
The main problem when dealing with electronic data analysis
is not only the size that can easily reach a very large volume
to manage, but also the different number of the application
associated with those files.
 Electronic Data Discovery :

- e-mail, Microsoft Office files, accounting databases,…
- other electronically-stored information which could be relevant
evidence in a law suit.

Tools to analyze electronic data in computer forensics :
◦ - Needle Finder:
use a special .NET framework application in conjunction with a SQL
database to process hundreds of file types and emails simultaneously
and pinpoint pertinent, requested information for analysis.
◦ - E-Discovery
Data Preservation
Data should never be analyzed using the same
machine it is collected from
 Forensically sound copies of all data storage devices,
primarily hard drives, must bet made.
 There are two goals when making an image

◦ Completeness
◦ Accuracy

This is done by using standalone hard-drive duplicator
or software imaging tools such as DCFLdd or
Iximager
Research Challenges: What are the
essential problems in this field

Training

Operational Standards

International Standardization
Training
Law enforcement personnel should be
trained to handle it
 Network operators should also be
trained, to improve their abilities in
intrusion detection,
 Lawyers should receive some training to
give a basic understanding of computer
evidence.

Operational Standards

Basic guidelines for the evidence
collection process to be established
◦
◦
◦
◦
◦
◦
Planning
Recording
Performance
Monitoring
Recording
Reporting
International Standardization
Different countries each have their own
methods, standards, and laws
 What is acceptable evidence in one
country may not be in another
 Serious problem when dealing with
international crimes, as computer crime
often is

Conclusions and future work
Even though it is a fascinating field, due to the nature
of computers, far more information is available than
there is time to analyze.
 The main emphasis of future work is on recovery of
data.
 To improve ways to:

◦ Identify the evidence
◦ Determine how to preserve the evidence
◦ Extract, process, and interpret the evidence
◦ Ensure that the evidence is acceptable in a court of law
Works Cited











"5 Common Mistakes in Computer Forensics." Online Security. 25 June 2003. 14
Nov.-Dec. 2007 <http://www.onlinesecurity.com/forum/article279.php>.
"Computer Forensics." Digitalintelligence. 2007. 20 Oct. 2007
<http://www.digitalintel.com/>.
"Computer Forensics." Disklabs. 2004. 15 Oct. 2007
<http://www.disklabs.com/computer-forensics.asp>.
"Computer Forensics." Techtarget. 16 Dec. 2003. 25 Oct. 2007
<http://labmice.techtarget.com/security/forensics.htm>.
"Computer Forensics." Wikipedia. 26 Nov. 2007. 28 Nov. 2007
<http://en.wikipedia.org/wiki/Computer_forensics>.
Dearsley, Tony. "United States: Computer Forensics." Mondaq. 14 June 2007. 22 Oct.
2007 <http://www.mondaq.com/article.asp?articleid=48322>.
Garner, George M. "Forensic Acquisition Utilities." Gmgsystemsinc. 2007. 11 Nov.
2007 <http://www.gmgsystemsinc.com/fau/>.
"International High Technology." Htcia. 2007. 28 Oct. 2007 <http://htcia.org/>.
“Computer Forensics-A Critical Need In Computer Science Programs”
<http://www.scribd.com/doc/131838/COMPUTER-FORENSICS-A-CRITICALNEED-IN-COMPUTER>
“Computer Forensics Laboratory and Tools”
<http://www.scribd.com/doc/136793/COMPUTER-FORENSICS-LABORATORYAND-TOOLs>
Works Cited








Ispirian. "Following Procedure." Hgexperts. 2007. 01 Nov. 2007
<http://www.hgexperts.com/hg/article.asp?id=4804>.
Monica. "A Community of Computer Forensics Professionals."
Computerforensicsworld. 26 Aug. 2007. 09 Nov. 2007
<http://www.computerforensicsworld.com/>.
Morris, Jamie. "Computer Forensics Tools." Ezinearticles. 27 Oct. 2006. 28 Oct. 2007
<http://ezinearticles.com/?Computer-Forensics-Tools&id=340154>.
Reuscher, Dori. "How to Become a Cyber-Investigator." About. 2007. 16 Nov. 2007
<http://certification.about.com/cs/securitycerts/a/compforensics.htm>.
Robinson, Judd. "An Explanation of Computer Forensics." Computerforensics. 2007.
26 Oct. 2007 <http://computerforensics.net/forensics.htm>.
Swartz, Jon. "Cybercrime Spurs College Courses in Digital Forensics." Usatoday. 06
June 2006. 14 Nov. 2007
<http://www.usatoday.com/tech/news/techinnovations/2006-06-05-digitalforensics_x.htm>.
LaBancz, Melissa. “Expert vs. Expertise: Computer Forensics and the Alternative OS”
<http://www.linuxsecurity.com/content/view/117371/171>
“Computer Forensics – Past, Present And Future”
<http://www.scm.uws.edu.au/compsci/computerforensics/Publications/Computer_F
orensics_Past_Present_Future.pdf>
Download