Digital Forensics
Total Page:16
File Type:pdf, Size:1020Kb
Dr. Ajay Prasad DIGITAL FORENSICS Dr.Jeetendra Pande Dr. Ajay Prasad Post-Graduate Diploma in Cyber Security Digital Forensics (PGDCS-06) Title Digital Forensics Advisors Mr. R. Thyagarajan, Head, Admn. & Finance and Acting Director, CEMCA Dr. Manas Ranjan Panigrahi, Program Officer(Education), CEMCA Prof. Durgesh Pant, Director-SCS&IT, UOU Editor Er. Gopesh Pande, Network Engineer, Wipro Infotech, Mumbai Authors Block I> Unit I, Unit II, Unit III & Unit IV Dr. Jeetendra Pande, Assistant Professor- School of CS & IT, Uttarakhand Open University, Haldwani Block II> Unit I, Unit II, Unit III & Unit IV Dr. Ajay Prasad, Assistant Professor, CIT, University of Petroleum and Energy Studies, Dehradun Block III> Unit I, Unit II, Unit III & Unit IV Dr. Ajay Prasad, Assistant Professor, CIT, UPES, Dehradun ISBN: 978-93-84813-94-9 Acknowledgement The University acknowledges with thanks the expertise and financial support provided by Commonwealth Educational Media Centre for Asia(CEMCA), New Delhi, for the preparation of this study material. Uttarakhand Open University, 2016 © Uttarakhand Open University, 2016. Digital Forensics is made available under a Creative Commons Attribution Share-Alike 4.0 Licence (international): http://creativecommons.org/licenses/by- sa/4.0/ It is attributed to the sources marked in the References, Article Sources and Contributors section. Published by: Uttarakhand Open University, Haldwani Expert Panel S. No. Name 1 Dr. Jeetendra Pande, School of Computer Science & IT, Uttarakhand Open University, Haldwani 2 Prof. Ashok Panjwani, Professor, MDI, Gurgoan 3 Group Captain Ashok Katariya, Ministry of Defense, New Delhi 4 Mr. Ashutosh Bahuguna, Scientist- CERT-In, Department Of Electronics & Information Technology, Government Of India 5 Mr. Sani Abhilash, Scientist- CERT-In, Department Of Electronics & Information Technology, Government Of India 6 Wing Commander C.S. Chawla, Ministry of Defense, new Delhi 7 Mr. Mukesh Kumar Verma, IT Consultant, Chandigarh 8 Mr. Pritam Dutt Gautam, IT Consultant, New Delhi INDEX 1.1 LEARNING OBJECTIVES ............................................................................................................. 1 1.2 INTRODUCTION ............................................................................................................................ 1 1.2.1 Definition of Computer Forensics ............................................................................................. 1 1.2.2 Cyber crime ................................................................................................................................ 1 1.2.2.1 Computer based crime ....................................................................................................... 2 1.2.2.2 Computer facilitated crime ................................................................................................ 2 1.3 EVOLUTION OF COMPUTER FORENSICS .............................................................................. 2 1.4 STAGES OF COMPUTER FORENSICS PROCESS .................................................................... 4 1.5 BENEFITS OF COMPUTER FORENSICS .................................................................................. 4 1.6 USES OF COMPUTER FORENSICS ............................................................................................ 5 1.7 OBJECTIVES OF COMPUTER FORENSICS ............................................................................. 6 1.8 ROLE OF FORENSICS INVESTIGATOR .................................................................................... 6 1.9 FORENSICS READINESS ............................................................................................................. 7 1.9.1 What is Forensics Readiness?.................................................................................................... 7 1.9.2 Goals of Forensic Readiness ...................................................................................................... 7 1.9.3 Benefits of Forensic Readiness .................................................................................................. 7 1.9.4 Steps for Forensic Readiness Planning ...................................................................................... 8 1.10 SUMMARY ................................................................................................................................... 14 1.11 CHECK YOUR PROGRESS ........................................................................................................ 15 1.12 ANSWERS TO CHECK YOUR PROGRESS.............................................................................. 15 1.13 MODEL QUESTIONS ................................................................................................................. 16 2.1 LEARNING OBJECTIVES ........................................................................................................... 17 2.2 INTRODUCTION TO COMPUTER CRIME INVESTIGATION............................................... 17 2.2.1 Initial Decision-Making Process .............................................................................................. 18 2.3 ASSESS THE SITUATION ........................................................................................................... 18 2.3.1 Notify Decision Makers and Acquire Authorization ............................................................... 18 2.3.2 Review Policies and Laws ........................................................................................................ 19 2.3.3 Identify Investigation Team Members .................................................................................... 20 2.3.4 Conduct a Thorough Assessment ............................................................................................ 21 2.3.5 Prepare for Evidence Acquisition ............................................................................................ 22 2.4 ACQUIRE THE DATA .................................................................................................................. 23 2.4.1 Build Computer Investigation Toolkit ..................................................................................... 23 2.4.1.1 Preparing Your Organization for a Computer Investigation ........................................... 24 2.4.2 Collect the Data ....................................................................................................................... 24 2.4.3 Store and Archive .................................................................................................................... 27 2.5 ANALYZE THE DATA .................................................................................................................. 27 2.5.1 Analyze Network Data ............................................................................................................. 28 2.5.2 Analyze Host Data.................................................................................................................... 28 2.5.3 Analyze Storage Media ............................................................................................................ 28 2.6 REPORT THE INVESTIGATION ................................................................................................ 30 2.6.1 Gather and Organize Information ........................................................................................... 30 2.6.2 Write the Report ...................................................................................................................... 31 2.7 SUMMARY ..................................................................................................................................... 32 2.8 CHECK YOUR PROGRESS .......................................................................................................... 33 2.9 ANSWERS TO CHECK YOUR PROGRESS................................................................................ 33 2.10 MODEL QUESTIONS ................................................................................................................. 34 3.1 LEARNING OBJECTIVES ........................................................................................................... 35 3.2 DIGITAL EVIDENCE ................................................................................................................... 35 3.2.1 Locard’s Principle ..................................................................................................................... 35 3.2.2 Best Evidence Rule .................................................................................................................. 36 3.2.3 Characteristics of Digital Evidence .......................................................................................... 36 3.2.4 Stages in Digital Evidence Investigation Process .................................................................... 37 3.3 FIRST RESPONDER TOOLKIT .................................................................................................. 39 3.3.1 Some Common Mistakes First Responder should avoid ........................................................ 40 3.4 ISSUES FACING COMPUTER FORENSICS ............................................................................ 40 3.4.1 Technical issues ....................................................................................................................... 41 3.4.2 Legal issues .............................................................................................................................