computer forensics
computer forensics
1. Identification
o Determine the t.ype of incident and identify the digital devices and data
sources involved (e.g., hard drives, emails, network logs).
o Example: Identifying an employee’s computer suspected of containing
evidence of fraud.
2. Preservation
o Secure the digital evidence to prevent data modification or loss.
o Use write blockers, create disk images, and document the chain of custody.
o Example: Imaging a hard drive to ensure original data is untouched.
3. Collection
o Acquire data from identified sources using forensic tools like FTK or EnCase.
o Includes physical (e.g., hard drives) and logical (e.g., email archives) evidence
collection.
4. Examination
o Analyze the data for relevant artifacts using forensic techniques.
o Example: Searching for deleted files or encrypted data.
5. Analysis
o Interpret the findings, correlate data points, and determine their relevance to
the investigation.
o Example: Identifying timestamps of unauthorized file access.
6. Documentation
o Document every step of the investigation, including tools used and findings.
This ensures transparency and admissibility in court.
7. Presentation
o Prepare the findings in a clear, concise format for legal teams or court
presentations.
The chain of custody refers to the documented process that tracks the handling of evidence
from the time it is collected to its presentation in court. Its importance includes:
c) Identify the Two Types of Data Acquisition and Describe Them (5 Marks)
1. Physical Acquisition
o Copies all data from a device, including deleted and unallocated spaces.
o Example: Creating a complete bit-by-bit image of a hard drive.
2. Logical Acquisition
o Copies active files and directories but does not include deleted or hidden data.
o Example: Extracting user documents and emails from a system.
1. Secure Location:
o The lab must be in a secure location to prevent unauthorized access.
2. Specialized Equipment:
o Ensure the availability of forensic tools (e.g., write blockers, imaging tools).
3. Data Storage:
o Large, secure storage solutions for evidence preservation.
4. Compliance:
o Adherence to legal standards and regulations governing digital evidence.
5. Trained Personnel:
o Employ certified forensic analysts with relevant expertise.
1. Preparation:
o Define objectives and gather tools and resources.
2. Identification:
o Locate potential evidence and determine its relevance.
3. Collection:
o Acquire evidence using sound forensic methods.
4. Analysis:
o Examine and interpret data to identify patterns or anomalies.
5. Presentation:
o Document findings and present them in court-admissible formats.
• Consequences:
o Evidence could be declared inadmissible, weakening the case.
o Legal challenges and claims of tampering could arise.
• Document:
o The Chain of Custody is the key document that tracks how evidence is
handled.
• Definition:
o Write blockers are tools that prevent any modification to a storage device
during analysis.
• Role:
o Ensure evidence remains intact by allowing read-only access.
o Example: A write blocker is used to safely image a suspect’s hard drive
without altering the data.
Paper 2022
A search and seizure plan outlines the procedures for identifying, collecting, and preserving
evidence during an investigation. Key contents include:
1. Anonymity of Attackers:
o Cybercriminals often use techniques like VPNs, Tor, or proxy servers to mask
their identity.
o Example: An attacker defrauds an e-commerce platform using stolen credit
card details, routing their activities through multiple IP addresses.
2. Encryption:
o Encrypted data and communication channels (e.g., WhatsApp, Signal) make
accessing evidence difficult.
o Example: An insider encrypts company emails and files before unauthorized
exfiltration.
3. Anti-Forensics Techniques:
o Attackers use data obfuscation, steganography, or file wiping to hinder
investigations.
o Example: A hacker deletes logs and overwrites unallocated disk space to
erase their tracks.
4. Cross-Border Investigations:
o Cybercrimes often involve jurisdictions with varying legal frameworks,
complicating evidence collection and prosecution.
o Example: A ransomware gang based in Eastern Europe targets businesses in
Kenya.
5. Volume of Data:
o Analyzing large volumes of logs, emails, and file systems can overwhelm
investigators.
oExample: Reviewing 100 TB of corporate data to locate malicious activity.
6. Rapidly Evolving Technology:
o Investigators must continually adapt to new malware, tools, and tactics.
o Example: Investigating an AI-generated phishing campaign.
When selecting a data acquisition tool, investigators must ensure it meets the following
requirements:
1. Forensic Soundness:
o The tool must preserve the integrity of data and ensure no modifications occur
during acquisition.
o Example: FTK Imager creates a bit-by-bit copy while maintaining data
integrity.
2. Compatibility:
o It should support various file systems (e.g., NTFS, FAT32) and storage
devices.
o Example: EnCase can analyze data from HDDs, SSDs, and mobile devices.
3. Efficiency:
o The tool should handle large datasets and complete acquisition promptly.
o Example: Imaging a 1 TB hard drive without delays.
4. Reporting Capability:
o It must generate detailed logs to document the acquisition process.
o Example: Autopsy includes acquisition details for chain-of-custody purposes.
5. Legal Compliance:
o The tool should comply with local and international forensic standards.
o Example: Using tools approved under ISO 27037 ensures admissibility in
court.
1. Data Wiping:
o Overwrites data to make recovery impossible.
o Example: Using software like DBAN to erase a hard drive.
2. Encryption:
o Encrypts files or devices, making data inaccessible without the correct
decryption key.
o Example: A criminal encrypts their entire drive with BitLocker.
3. Steganography:
o Hides data within non-suspicious files like images or videos.
o Example: Embedding malicious code in an innocent-looking PNG file.
4. Log Tampering:
o Alters or deletes system logs to erase traces of activity.
o Example: A hacker removes login entries from the server's log files.
QUESTION TWO [15 MARKS]
1. Data Privacy:
o Logs must comply with data protection regulations (e.g., GDPR).
2. Retention Periods:
o Determine how long logs can be retained legally.
3. Chain of Custody:
o Maintain proper documentation to ensure logs are admissible.
4. Anonymization:
o Logs containing sensitive data should be anonymized.
5. Access Control:
o Restrict access to logs to authorized personnel only.
1. Executive Summary:
o High-level overview of findings.
2. Objective:
o Purpose of the investigation.
3. Scope:
o What was examined (e.g., devices, systems).
4. Evidence Collected:
o Details of the data sources and acquisition process.
5. Analysis:
o Findings, such as malicious activity or tampered files.
6. Conclusion:
o Summary of key points.
7. Recommendations:
o Steps for remediation and prevention.
1. Identify Scope.
2. Preserve Evidence.
3. Analyze Data.
4. Document and Report.
Paper 2024
1. Identification
o Recognize potential evidence sources and define the investigation's scope.
o Example: Identifying a compromised laptop in a data breach.
2. Preservation
o Protect evidence from alteration using tools like write blockers.
o Example: Creating a bit-by-bit image of a suspect's hard drive.
3. Collection
o Acquire evidence from devices or networks while maintaining its integrity.
o Example: Extracting email logs from a mail server.
4. Analysis
o Examine the evidence to uncover relevant information.
o Example: Detecting malware behavior through log analysis.
5. Documentation
o Record all actions taken during the investigation.
6. Presentation
o Summarize findings for legal or organizational purposes.
1. Accuracy:
o Modern tools improve accuracy in data recovery and analysis.
o Example: Advanced disk imaging tools ensure every byte is captured.
2. Efficiency:
o Up-to-date tools speed up investigation processes.
o Example: Faster decryption algorithms reduce analysis time.
3. Adaptation to Evolving Technologies:
o New tools handle emerging threats like encrypted ransomware.
4. Legal Compliance:
o Current tools align with forensic standards for evidence admissibility.
1. Secure Location:
o A controlled environment with restricted access.
2. Forensic Workstations:
o High-performance computers with dedicated forensic software.
3. Specialized Tools:
o Hardware like write blockers and software for disk imaging and memory
analysis.
4. Storage:
o Secure storage for evidence with redundancy systems.
• Concept:
Network forensics involves capturing, recording, and analyzing network traffic to
uncover cybercrimes.
• Importance:
o Incident Response: Detect and mitigate attacks in real time.
o Evidence Collection: Provide proof of unauthorized access or data breaches.
o Example: Investigating DDoS attacks by analyzing traffic patterns.
1. Qualifications:
o Certifications like Certified Computer Forensics Examiner (CCFE).
o Extensive experience in forensic investigations.
2. Responsibilities:
o Analyze evidence and prepare detailed reports.
o Testify in court and explain findings in simple terms.
1. Tools:
oCellebrite: Extracts data from phones, including deleted files.
oOxygen Forensic Suite: Analyzes app data and communication logs.
2. Techniques:
o Physical Extraction: Creates a bit-by-bit copy of device storage.
o Logical Extraction: Retrieves active data like contacts and messages.
o Data Carving: Recovers deleted files from unallocated space.
1. Encryption:
o Emails secured with encryption are difficult to access.
2. Anonymity:
o Spoofed sender addresses complicate tracing.
3. Volume of Data:
o Large mailboxes require extensive analysis.
4. Cross-Jurisdictional Issues:
o Emails stored on servers in different countries face legal challenges.
5. Deleted Emails:
o Recovery of deleted emails is not always guaranteed.
1. Chain of Custody:
o Maintain documentation of evidence handling.
2. Integrity:
o Use write blockers to avoid altering data.
3. Legal Compliance:
o Adhere to local and international laws governing digital evidence.
4. Storage Security:
o Store evidence in secure, tamper-proof environments.
5. Documentation:
o Record every step taken to ensure transparency.
1. Disk Forensics:
o Analyze storage media for tampered or deleted files.
2. Network Forensics:
o Monitor traffic for unauthorized activities.
3. Email Forensics:
o Investigate email trails for phishing or fraud.
4. Memory Forensics:
o Examine volatile memory for active malware.
5. Mobile Forensics:
o Retrieve and analyze data from mobile devices.