20
Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland

Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland

Embed Size (px)

Citation preview

Page 1: Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland

Introduction to Data Forensics

CIS302

Harry R. Erwin, PhD

School of Computing and Technology

University of Sunderland

Page 2: Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland

Background

• These lectures are designed to provide a basic awareness of data forensics.

• Understanding of terminology• Awareness of the principles• Understanding of the basic procedure

Please be aware that I am not a practitioner.

Page 4: Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland

Goals

• To define computer forensics• To understand its limitations• To understand the principles that apply to

computer-based evidence• To understand the process

– Top-level– Tools– Risks

Page 5: Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland

Definition of Forensics I (quoted from Wikipedia)

• “Forensic science (often shortened to forensics) is the application of a broad spectrum of sciences to answer questions of interest to the legal system. This may be in relation to a crime or to a civil action.”

Page 6: Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland

Definition of Forensics II (quoted from Wikipedia)

• “The use of the term ‘forensics’ in place of ‘forensic science’ could be considered incorrect; the term ‘forensic’ is effectively a synonym for ‘legal’ or ‘related to courts’ (from Latin, it means ‘before the forum’). However, it is now so closely associated with the scientific field that many dictionaries include the meaning that equates the word ‘forensics’ with ‘forensic science’.”

Page 7: Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland

Definition of Forensics III (quoted from Wikipedia)

• “‘Forensic’ comes from the Latin word ‘forensis’ meaning forum. During the time of the Romans, a criminal charge meant presenting the case before a group of public individuals. Both the person accused of the crime and the accuser would give speeches based on their side of the story. The individual with the best argumentation and delivery would determine the outcome of the case. Basically, the person with the best forensic skills would win.”

Page 8: Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland

The Basic Principle

• “Evidence must not be damaged, destroyed or otherwise compromised by procedures used to investigate the computer, otherwise it may be rendered inadmissable.” (Qinetiq)

Page 9: Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland

The Rules

• Maintain the integrity of the evidence.• Do not work on the original evidence.• Do not trust the computer system.• Record all actions.

Page 10: Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland

ACPO Principle 1

• “No action should be taken by an analyst that should change data held on a computer or other media which may subsequently be relied upon in Court.”

Page 11: Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland

ACPO Principle 2

• “In exceptional circumstances where a person finds it necessary to access original data held on a target computer that person must be competent to do so and to give evidence explaining the relevance and implications of their actions.”

Page 12: Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland

ACPO Principle 3

• “An audit trail or other record of all processes applied to computer-based evidence should be created and preserved. An independent third party should be able to examine these processes and achieve the same result.”

Page 13: Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland

ACPO Principle 4

• “The person in charge of the case is responsible for ensuring that the law and these principles are adhered to. This applies to the possession of, and access to, information contained in a computer. They must be satisfied that anyone accessing the computer, or any use of a copying device, complies with these laws and principles.

Page 14: Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland

The Process

• Search and seizure• Audit and continuity• Imaging• Production of evidence

Page 15: Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland

Search and Seizure

• Evidence– IT systems, media, and documentation– A trained officer should be used to do this.

• Scene– Secure the scene physically and electronically– Disconnect external data communications– Decide whether to switch off or leave alone– On-site imaging and previewing– Other forensic activities

Page 16: Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland

Audit

• Log book– Must be maintained– Must be secured– Must be taken to court

• Booking out– All property/exhibits must be booked out prior to

analysis.

Page 17: Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland

Audit Details

• Record– Details of exhibit numbers/bag seal numbers– Details of system/media– Damage found– Other property found– Photograph of system (optional)– Comparison of system date/time with actual

date/time.

Page 18: Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland

Evidence Control

• Be able to account for the whereabouts and condition of all exhibits/property– Property books– Receipts– Log books

• Note that the evidence may be sensitive.

Page 19: Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland

Imaging

• Normally, imaging takes place by hosting the hard disc drives in an imaging system

• Must record the media details• Imaging should be performed in a ‘safe’ OS

environment, with the devices mounted read-only.

Page 20: Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland

In Court

• Formal report• Witness statement• System image files• Extracted evidence• Forensic tool reports