Cfcs-Notes M1
Cfcs-Notes M1
INTRODUCTION
COMPUTER FORENSICS FUNDAMENTALS:
Searching unallocated space on the hard drive, places where an abundance of data often
resides.
Tracing artifacts, those tidbits of data left behind by the operating system. Our experts
know how to find these artifacts and, more importantly, they know how to evaluate the
value of the information they find.
Processing hidden files files that are not visible or accessible to the user that contain
past usage information. Often, this process requires reconstructing and analyzing the date
codes for each file and determining when each file was created, last modified, last accessed
and when deleted.
Running a string-search for e-mail, when no e-mail client is obvious.
DEPARTMENT OF COMPUTER ENGG.
Employers must safeguard critical business information. An unfortunate concern today is the
possibility that data could be damaged, destroyed, or misappropriated by a discontented
individual. Before an individual is informed of their termination, a computer forensic specialist
should come on-s
this way, should the employee choose to do anything to that data before leaving, the employer
is protected. Damaged or deleted data can be re-placed, and evidence can be recovered to show
removal of proprietary information or to protect the employer from false charges made by the
employee. You should be equipped to find and interpret the clues that have been left behind.
This includes situations where files have been deleted, disks have been reformatted, or other
steps have been taken to conceal or destroy the evidence. For example, did you know?
That the electronic copy of a document can contain text that was removed from the final
printed version?
That some fax machines can contain exact duplicates of the last several hundred pages
received?
DEPARTMENT OF COMPUTER ENGG.
That faxes sent or received via computer may remain on the computer indefinitely?
That email is rapidly becoming the communications medium of choice for businesses?
That people tend to write things in email that they would never consider writing in a
memorandum or letter?
That email has been used successfully in criminal cases as well as in civil litigation?
That email is often backed up on tapes that are generally kept for months or years?
That many people keep their financial records, including investments, on computers?
1. DATA SEIZURE
2. DATA DUPLICATION/PRESERVATION
When one party must seize data from another, two concerns must be addressed:
the data must not be altered in any way
the seizure must not put an undue burden on the responding party
The computer forensics experts should acknowledge both of these concerns by making
an exact duplicate of the needed data.
When experts works on the duplicate data, the integrity of the original is maintained.
3. DATA RECOVERY
Using proprietary tools, your computer forensics experts should be able to safely recover
DEPARTMENT OF COMPUTER ENGG.
4. DOCUMENT SEARCHES
Computer forensics experts should also be able to search over 200,000 electronic
documents in seconds rather than hours.
The speed and efficiency of these searches make the discovery process less complicated
and less intrusive to all parties involved.
5. MEDIA CONVERSION
Computer forensics experts should extract the relevant data from old and un-readable
devices, convert it into readable formats, and place it onto new storage media for
analysis.
Computer forensics experts should offer various levels of service, each designed to suit your
individual investigative needs. For example, they should be able to offer the following
services:
Standard service: Computer forensics experts should be able to work on your case
during nor-mal business hours until your critical electronic evidence is found.
On-site service: Computer forensics experts should be able to travel to your location to
DEPARTMENT OF COMPUTER ENGG.
per-form complete computer evidence services. While on-site, the experts should
quickly be able to produce exact duplicates of the data storage media in question.
Emergency service: Your computer forensics experts should be able to give your case
the highest priority in their laboratories. They should be able to work on it without
interruption until your evidence objectives are met.
Priority service: Dedicated computer forensics experts should be able to work on your
case during normal business hours (8:00 A.M. to 5:00 P.M., Monday through Friday)
until the evidence is found. Priority service typically cuts your turnaround time in half.
Weekend service: Computer forensics experts should be able to work from 8:00 A.M.
to 5:00 P.M., Saturday and Sunday, to locate the needed electronic evidence and will
continue 14 Computer Forensics, Second Edition working on your case until your
evidence objectives are met.
Computer forensics experts should also be able to provide extended services. These services
include:
3. Extracted and possibly relevant evidence is properly handled and protected from later
mechanical or electromagnetic damage.
4. A continuing chain of custody is established and maintained.
1. Protect the subject computer system during the forensic examination from any possible
alteration, damage, data corruption, or virus introduction.
2. Discover all files on the subject system. This includes existing normal files, deleted yet
remaining files, hidden files, password-protected files, and encrypted files.
3. Recover all of discovered deleted files.
4. Reveal the contents of hidden files as well as temporary or swap files used by both the
application programs and the operating system.
5. Access the contents of protected or encrypted files.
6. Analyze all possibly relevant data found in special areas of a disk. This includes but is
not limited to what is called unallocated space on a disk, as well as slack space in a file
DEPARTMENT OF COMPUTER ENGG.
(the remnant area at the end of a file in the last assigned disk cluster, that is unused by
current file data, but once again, may be a possible site for previously created and
relevant evidence).
7. Print out an overall analysis of the subject computer system, as well as a listing of all
possibly relevant files and discovered file data.
8. Provide an opinion of the system layout; the file structures discovered; any discovered
data and authorship information; any attempts to hide, delete, protect, and encrypt
information; and anything else that has been discovered and appears to be relevant to the
overall computer system examination.
9. Provide expert consultation and/or testimony, as required.
Authorized users can securely reopen the DEBs for examination, while automatic audit
of all actions ensures the continued integrity of their contents.
The teams used other forensic tools and prototypes to collect and analyze specific
features of the digital evidence, perform case management and time lining of digital
events, automate event link analysis, and perform steganography detection.
The results of CFX-2000 verified that the hypothesis was largely correct and that it is
possible to ascertain the intent and identity of cyber criminals.
As electronic technology continues its explosive growth, researchers need to continue
vigorous R&D of cyber forensic technology in preparation for the onslaught of cyber
reconnaissance probes and attacks.
DEPARTMENT OF COMPUTER ENGG.
Computer forensics tools and techniques have become important resources for use in
internal investigations, civil lawsuits, and computer security risk management. Law
enforcement and military agencies have been involved in processing computer evidence for
years.
1. Preservation of Evidence
Computer evidence is fragile and susceptible to alteration or erasure by any number of
occurrences.
Computer evidence can be useful in criminal cases, civil disputes, and human resources/
DEPARTMENT OF COMPUTER ENGG.
employment proceedings.
Black box computer forensics software tools are good for some basic investigation
tasks, but they do not offer a full computer forensics solution.
SafeBack software overcomes some of the evidence weaknesses inherent in black box
computer forensics approaches.
SafeBack technology has become a worldwide standard in making mirror image backups
since 1990.
TROJAN HORSE PROGRAMS
The computer forensic expert should be able to demonstrate his or her ability to avoid
destructive programs and traps that can be planted by computer users bent on
destroying data and evidence.
Such programs can also be used to covertly capture sensitive information, passwords,
and network logons.
DATA-HIDING TECHNIQUES
Trade secret information and other sensitive data can easily be secreted using any
number of techniques. It is possible to hide diskettes within diskettes and to hide entire
computer hard disk drive partitions. Computer forensic experts should understand such
issues and tools that help in the identification of such anomalies.
DEPARTMENT OF COMPUTER ENGG.
Net Threat Analyzer can be used to identify past Internet browsing and email activity
done through specific computers. The software ana
other storage areas that are generally unknown to or beyond the reach of most general
computer users. Net Threat Analyzer avail-able free of charge to computer crime
specialists, school officials, and police.
DUAL-PURPOSE PROGRAMS
Programs can be designed to perform multiple processes and tasks at the same time.
Computer forensics experts must have hands-on experience with these programs.
Computer evidence searches require that the computer specialist know what is being
searched for. Many times not all is known about what may be stored on a given
computer system.
In such cases, fuzzy logic tools can provide valuable leads as to how the subject computer
was used.
2. Disk Structure
Computer forensic experts must understand how computer hard disks and floppy
diskettes are structured and how computer evidence can reside at various levels within
the structure of the disk.
They should also demonstrate their knowledge of how to modify the structure and hide
data in obscure places on floppy diskettes and hard disk drives.
3. Data Encryption
Computer forensic experts should become familiar with the use of software to crack
security associated with the different file structures.
DEPARTMENT OF COMPUTER ENGG.
files).
8. The Boot Process and Memory Resident Programs
Computer forensic experts should become familiar with how the operating system can
be modified to change data and destroy data at the whim of the person who configured
the system.
Such a technique could be used to covertly capture keyboard activity from corporate
executives, for example. For this reason, it is important that the experts understand
these potential risks and how to identify them.
Binary Audit Identification Transfer (BAIT) is a powerful intrusion detection tool that
allows users to create trackable electronic documents.
BAIT identifies (including their location) unauthorized intruders who access, download,
and view these tagged documents.
BAIT also allows security personnel to trace the chain of custody and chain of
command of all who possess the stolen electronic documents.
The cost of recreating data, lost production time or instruction time, reporting
and investigating the theft, filing police reports and insurance claims, increased
insurance, processing and ordering replacements, cutting a check, and the like.
The loss of customer goodwill.
PC PHONEHOME
PC PhoneHome is a software application that will track and locate a lost or stolen
PC or laptop any-where in the world. It is easy to install. It is also completely
transparent to the user.
DEPARTMENT OF COMPUTER ENGG.
Back-up Obstacles
1. The ability of the system being backed up to push data to the backup
server
2. The ability of the backup server to accept data from multiple systems
simultaneously
3. The available throughput of the tape device(s) onto which the data is
moved
DEPARTMENT OF COMPUTER ENGG.
The role of Back-up has changed: The role of backup now includes
the responsibility for recovering user errors and ensuring that good data has
been saved and can quickly be restored.
a. The complex systems that have evolved over the past 30 years must be
DEPARTMENT OF COMPUTER ENGG.
concepts.
We have fewer resources (people, processing power, time, and money) to do more work than
ever before, and we must keep your expenses under control. Systems must remain available to
make money and serve customers. Downtime is much too expensive to be tolerated.
One of the most critical data-management tasks involves recovering data in the event of a
problem. You must evaluate your preparations, make sure that all resources are available in
usable condition, automate processes as much as possible, and make sure you have the right
kind of resources.
If all of the resources (image copies, change accumulations, and logs) are available at recovery
time, these preparations certainly allow for a standard recovery. Finding out at recovery time
that some critical resource is missing can be disastrous!
let your resources fall through the cracks
Identifying different types of conditions is critical to ensuring a successful recovery. Checking
your assets to make sure ready should be part of your plan.
DEPARTMENT OF COMPUTER ENGG.
Automated Recovery
With proper planning and automation, recovery is made possible, reliance on specific
personnel is reduced, and the human-error factor is nearly eliminated.
Data integrity and your business relay on building recovery job control language (JCL). In the
event of a disaster, the Information Management System (IMS) recovery control (RECON) data
sets must be modified in preparation for the recovery.
Cleaning your RECON data sets can take hours if done manually, and an error-prone process.
Multithreading tasks shorten the recovery process. Recovering multiple databases with one
pass through your log data certainly will save time. Taking image copies, rebuilding indexes,
and validating pointers concurrently with the recovery process further reduce downtime.
Take Back-ups
The first step to a successful recovery is the backup of your data. Your goal in backing up data
is to do so quickly, efficiently, and usually with minimal impact to your customers. You might
need only very brief out-ages to take instant copies of your data, or you might have intelligent
storage devices that allow you to take a snapshot of your data. Both methods call for tools to
assist in the management of resources.
BMC software has developed a model called the Back-up and Recovery Solution (BRS) for the
Information Management System (IMS) product.
Image Copy
BRS contains an Image Copy component to help manage your image copy process.
BRS can take batch, on-line (fuzzy), or incremental image copies; Snapshot copies; or
Instant Snapshot copies.
DEPARTMENT OF COMPUTER ENGG.
The Image Copy component of BRS offers a variety of powerful features: dynamic allocation of
all input and output data sets, stacking of output data sets, high performance access methods
(faster I/O), copying by volume, compression of output image copies, and database group
processing--- all while interfacing with DBRC and processing asynchronously.
Change Accumulation
The BRS Change Accumulation component takes advantage of multiple engines, large virtual
storage resources, and high-speed channels and controllers that are available in many
environments.
Use of multiple tack control block (TCB) structures enables overlapping of as much processing
as possible, reducing both elapsed and CPU time.
Recovery
The BRS Recovery component, which functionally replaces the IMS Database
Recovery utility for null- function (DL/I) databases and data-entry databases (DEDBs),
allow recovery of multiple databases with one pass of the log and change accumulation
data sets while dynamically allocating all data sets required for recovery.
BRS recovers multiple databases to any point in time. BRS can determine the best
choice for a Point-in- Time (PIT) recovery. Full DBRS support includes:
RECOVERY MANAGER
notifies you when media errors have jeopardized your recovery resources.
POINTER CHECKING
BRS offers the capability to verify the validity of database pointers through the Concurrent
Pointer Checking function for both full-function databases and Fast Path data-entry databases
(DEDBs).
INDEX REBUILD
If indexes are ever damaged or lost, the Index Rebuild function of BRS allows you rebuild them
rather than recover them.
RECOVERY ADVISOR
The Recovery Advisor component of BRS allows you to monitor the frequency of your image
copies and change accumulations.
It helps you to determine whether all your databases are being backed-up. By using any
number of back-up and recovery tools available, you can better manage your world and be
ready to recover!