Dr. Bhavani Thuraisingham The University of Texas at Dallas

Slides:



Advertisements
Similar presentations
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Advertisements

Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #26 Emerging Technologies.
COEN 252 Computer Forensics
Evidence Collection & Admissibility Computer Forensics BACS 371.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Guide to Computer Forensics and Investigations, Second Edition
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
BACS 371 Computer Forensics
Forensic and Investigative Accounting
Guide to Computer Forensics and Investigations Fourth Edition
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
Computer Forensics Principles and Practices
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
Recovering and Examining Computer Forensic Evidence Noblett, Pollit, & Presley Forensic Science Communications October 2000 (Cited by 13 according to Google.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
By Drudeisha Madhub Data Protection Commissioner Date:
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland.
Key Management Lifecycle. Cryptographic key management encompasses the entire lifecycle of cryptographic keys and other keying material. Basic key management.
 Known by many names  forensic analysis  electronic discovery  electronic evidence discovery  digital discovery  data recovery  data discovery.
Guide to Computer Forensics and Investigations, Second Edition
Phases of Computer Forensics 1 Computer Forensics BACS Management Information Systems for the Information Age 5e, Haag, Cummings, McCubbrey, 2005,
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
Data and Applications Security Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #21 April 6, 2009.
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
Computer Forensics Principles and Practices
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #9 Preserving Digital Evidence; Image Verifications and Authentication.
STANKIEWICZ. Essential Questions and Learning What is the purpose of criminal Investigation? What are the basic steps in criminal investigations? What.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA Search.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
CIT 180 Security Fundamentals Computer Forensics.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Data and Applications Security Digital Forensics Lecture #28 Dr. Bhavani Thuraisingham The University of Texas at Dallas April 16, 2008.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Intrusion Detection MIS ALTER 0A234 Lecture 12.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
PhD Oral Exam Presentation
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Computer Forensics 1 1.
Guide to Computer Forensics and Investigations Fifth Edition
Digital Forensics Dr. Bhavani Thuraisingham
THE STEPS TO MANAGE THE GRID
Acquisition and Examination of Forensic Evidence
Introduction to Computer Forensics
CompTIA Security+ Study Guide (SY0-501)
Digital Forensics Dr. Bhavani Thuraisingham
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Dr. Bhavani Thuraisingham The University of Texas at Dallas
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Dr. Bhavani Thuraisingham The University of Texas at Dallas
CIS101B Week 4 Class 1 Chapter 12 Security 12.1 through 12.6
Presentation transcript:

Dr. Bhavani Thuraisingham The University of Texas at Dallas Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #3 Computer Forensics Data Recovery and Evidence Collection and Preservation September 3, 2008

Data Recovery What is Data Recovery? Role of Backup in Data Recovery Data Recovery Solution Hiding and Recovering Hidden Data

What is Data Recovery Usually data recovery means that data that is lost is recovered – e.g., when a system crashes some data may be lost, with appropriate recovery procedures the data is recovered In digital forensics, data recovery is about extracting the data from seized computers (hard drives, disks etc.) for analysis

Role of Backup in Data Recovery Databases/files are backed up periodically (daily, weekly, hourly etc.) so that if system crashes the databases/files can be recovered to the previous consistent state Challenge to backup petabyte sized databases/files Obstacles for backing up Backup window, network bandwidth, system throughout Current trends Storage cost decreasing, systems have to be online 24x7 Next generation solutions Multiple backup servers, optimizing storage space

Data Recovery/Backup Solution Develop a plan/policy for backup and recovery Develop/Hire/Outsource the appropriate expertise Develop a system design for backup/recovery Three tier architectures, caches, backup servers Examine state of the art backup/recovery products and tools Implement the backup plan according to the policy and design

Recover Hidden Data Hidden data Files may be deleted, but until they are overwritten, the data may remain Data stored in diskettes and stored insider another disk Need to get all the pieces and complete the puzzle Analysis techniques (including statistical reasoning) techniques are being used to recover hidden data and complete the puzzle Reference: http://www.forensicfocus.com/hidden-data-analysis- ntfs

Evidence Collection and Data Seizure What is Evidence Collection Types of Evidence Rules of Evidence Volatile Evidence Methods of Collection Steps to Collection Controlling Contamination

What is Evidence Collection Collecting information from the data recovered for further analysis Need to collect evidence so that the attacker can be found and future attacks can be prevented and/or limited Collect evidence for analysis or monitor the intruder Obstacles Difficult to extract patterns or useful information from the recovered data Difficult to tie the extracted information to a person

Types of Evidence Testimonial Evidence Evidence supplied by a witness; subject to the perceived reliability of the witness Word processor documents written by a witness as long as the author states that he wrote it Hearsay Evidence presented by a person who is not a direct witness Word processor documents written by someone without direct knowledge of the incident

Rules of Evidence Admissible Evidence must be able to be used in court Authentic Tie the evidence positively to an incident Complete Evidence that can cover all perspectives Reliable There should be no doubt that proper procedures were used Believable Understandable and believable to a jury

Additional considerations Minimize handling and corruption of original data Account for any changes and keep detailed logs Comply with the 5 basic rules Do not exceed your knowledge – need to understand what you are doing Follow the security policy established Work fast / however need to be accurate Proceed from volatile to persistent evidence Do not shut down the machine before collecting evidence Do not run programs on the affected machine

Volatile Evidence Types Cached data Routing tables Process table Kernel statistics Main memory What to do next Collect the volatile data and store in a permanent storage device

Methods of Collection Freezing the scene Taking a snapshot of the system and its compromised state Recover data, extract information, analyze Honeypotting Create a replica system and attract the attacker for further monitoring

Steps to Collection Find the evidence; where is it stored Find relevant data - recovery Create order of volatility Remove external avenues of change; no tampering Collect evidence – use tools Good documentation of all the actions

Controlling Contamination Once the data is collected it should not be contaminated, must be stored in a secure place, encryption techniques Maintain a chain of custody, who owns the data, data provenance techniques Analyze the evidence Use analysis tools to determine what happened Analyze the log files and determine the timeline Analyze backups using a dedicated host Reconstruct the attack from all the information collected

Duplication and Preservation of Evidence Preserving the Digital Crime Scene First task is to make a compete bit stream backup of all computer data before review or process Bit stream backups (also referred to as mirror image backups) involve the backup of all areas of a computer hard disk drive or another type of storage media, e.g., Zip disks, floppy disks, Jazz disks, etc. Such backups exactly replicate all sectors on a given storage device. Thus, all files and ambient data storage areas are copied. Bit stream backups are sometimes also referred to as 'evidence grade' backups and they differ substantially from traditional computer file backups and network server backups. http://www.forensics-intl.com/def2.html Make sure that the legal requirements are met and proper procedures are followed

Digital Evidence Process Model The U.S. Department of Justice published a process model in the Electronic Crime Scene Investigation: A guide to first responders that consists of four phases: - 1. Collection; which involves the evidence search, evidence recognition, evidence collection and documentation. 2. Examination; this is designed to facilitate the visibility of evidence, while explaining its origin and significance. It involves revealing hidden and obscured information and the relevant documentation. 3. Analysis; this looks at the product of the examination for its significance and probative value to the case. 4. Reporting; this entails writing a report outlining the examination process and pertinent data recovered from the overall investigation. https://www.dfrws.org/2004/day1/Tushabe_EIDIP.pdf

Standards for Digital Evidence The Scientific Working Group on Digital Evidence (SWGDE) was established in February 1998 through a collaborative effort of the Federal Crime Laboratory Directors. SWGDE, as the U.S.-based component of standardization efforts conducted by the International Organization on Computer Evidence (IOCE), was charged with the development of cross- disciplinary guidelines and standards for the recovery, preservation, and examination of digital evidence, including audio, imaging, and electronic devices. The following document was drafted by SWGDE and presented at the International Hi-Tech Crime and Forensics Conference (IHCFC) held in London, United Kingdom, October 4-7, 1999. It proposes the establishment of standards for the exchange of digital evidence between sovereign nations and is intended to elicit constructive discussion regarding digital evidence. This document has been adopted as the draft standard for U.S. law enforcement agencies. http://www.fbi.gov/hq/lab/fsc/backissu/april2000/swgde.htm

Verifying Digital Evidence Encryption techniques Public/Private key encryption Certification Authorities Digital ID/Credentials Owner signs document with his private key, the Receiver decrypts the document with the owner’s public key Owner signs document with the receiver’s public key, Receiver decrypts the document with his private key Standards for Encryption Export/Import laws http://esm.cis.unisa.edu.au/new_esml/resources/publications/digital%20forensics%20- %20exploring%20validation,%20verification%20and%20certification.pdf

Conclusion - I Data must be backed up using appropriate policies, procedures and technologies Once a crime ahs occurred data ahs to be recovered from the various disks and commuters Data that is recovered has to be analyzed to extract evidence Evidence has to analyzed to determine what happened Use log files and documentations to establish the timeline Reconstruct the attack

Conclusion - II Standards and processes have to be set in place for representing, preserving, duplicating, verifying, validating certifying and accrediting digital evidence Numerous techniques are out there; need to determine which ones are useful for the particular evidence at hand Need to make it a scientific discipline

Links Data Recovery http://www.datatexcorp.com/ http://www.forensicfocus.com/hidden-data-analysis-ntfs Digital Evidence http://faculty.ncwc.edu/toconnor/426/426lect06.htm http://www.itoc.usma.edu/Workshop/2006/Program/Pres entations/IAW2006-07-1.pdf http://www.e-evidence.info/index.html http://www.digital-evidence.org/ http://findarticles.com/p/articles/mi_m2194/is_3_73/ai_n 6006624/pg_1 http://infohost.nmt.edu/~sfs/Students/HarleyKozushko/ Presentations/DigitalEvidence.pdf

Links: Preserving Digital Evidence http://www.fbi.gov/hq/lab/fsc/backissu/april2000/swgde.htm (standards) https://www.dfrws.org/2004/day1/Tushabe_EIDIP.pdf (process) http://www.logicube.com/logicube/articles/cybersleuth_collect ing_digital_evidence.asp (hard drive duplication) http://www.crime-scene- investigator.net/admissibilityofdigital.html (digital photographs) http://faculty.ncwc.edu/toconnor/426/426lect06.htm http://www.freepatentsonline.com/7181560.html (US Patent) http://www.mediasec.com/downloads/veroeffentlichungen/tho rwirth2004.pdf (survey) http://www.forensics-intl.com/def2.html (bit stream backup)

Links: Verifying Digital Evidence http://esm.cis.unisa.edu.au/new_esml/resources/publica tions/digital%20forensics%20- %20exploring%20validation,%20verification%20and%20 certification.pdf (verification and validation) http://www.forensicmag.com/articles.asp?pid=21 http://www.forensicmag.com/articles.asp?pid=28 (accreditation, parts 1 and 2)