E. info@canziobarzaghi.it - T. 0362 342214

Guide To Digital Forensics

Guide To Digital Forensics

Computer forensics or digital forensics is a term in computer science to obtain authorized evidence present in digital media or computers storage. With digital forensic investigation, the investigator can find what happened to the digital media corresponding to emails, hard disk, logs, computer system, and the network itself. In many case, forensic investigation can produce how the crime could occurred and the way we will shield ourselves in opposition to it next time.

Some explanation why we have to conduct a forensic investigation: 1. To collect evidences in order that it can be utilized in court docket to unravel legal cases. 2. To investigate our network energy, and to fill the security hole with patches and fixes. 3. To get well deleted files or any recordsdata within the event of hardware or software program failure

In computer forensics, an important issues that have to be remembered when conducting the investigation are:

1. The unique evidence should not be altered in anyhow, and to do conduct the process, forensic investigator should make a bit-stream image. Bit-stream image is a bit by bit copy of the original storage medium and actual copy of the unique media. The difference between a bit-stream image and regular copy of the unique storage is bit-stream image is the slack house in the storage. You'll not find any slack space data on a replica media.

2. All forensic processes must follow the authorized legal guidelines in corresponding nation the place the crimes happened. Every nation has different regulation suit in IT field. Some take IT guidelines very significantly, for example: United Kingdom, Australia.

3. All forensic processes can solely be performed after the investigator has the search warrant.

Forensic investigators would normally looking on the timeline of how the crimes happened in timely manner. With that, we will produce the crime scene about how, when, what and why crimes could happened. In a big firm, it is urged to create a Digital Forensic Staff or First Responder Team, in order that the corporate might nonetheless protect the evidence till the forensic investigator come to the crime scene.

First Response guidelines are: 1. Not at all should anyone, with the exception of Forensic Analyst, to make any makes an attempt to get better data from any computer system or system that holds digital information. 2. Any try to retrieve the data by particular person said in number 1, should be averted because it may compromise the integrity of the proof, through which turned inadmissible in authorized court.

Primarily based on that guidelines, it has already defined the important roles of getting a First Responder Group in a company. The unqualified individual can solely secure the perimeter in order that nobody can contact the crime scene till Forensic Analyst has come (This may be done by taking photograph of the crime scene. They will additionally make notes concerning the scene and who were present at that time.

Steps should be taken when a digital crimes occurred in a professional means: 1. Secure the crime scene until the forensic analyst arrive.

2. Forensic Analyst should request for the search warrant from native authorities or company's management.

3. Forensic Analyst make take an image of the crime scene in case of if there isn't a any photographs has been taken.

4. If the computer remains to be powered on, litigation do not turned off the computer. As an alternative, used a forensic tools similar to Helix to get some info that may only be discovered when the computer continues to be powered on, reminiscent of information on RAM, and registries. Such tools has it's particular operate as to not write something back to the system so the integrity stay intake.

5. Once all live proof is collected, Forensic Analyst cant turned off the computer and take harddisk back to forensic lab.

6. All the evidences have to be documented, wherein chain of custody is used. Chain of Custody maintain data on the proof, such as: who has the proof for the last time.

7. Securing the evidence should be accompanied by authorized officer corresponding to police as a formality.

8. Back in the lab, Forensic Analyst take the proof to create bit-stream image, as unique proof should not be used. Usually, Forensic Analyst will create 2-5 bit-stream image in case 1 image is corrupted. After all Chain of Custody nonetheless used on this state of affairs to maintain data of the evidence.

9. Hash of the unique evidence and bit-stream image is created. This acts as a proof that authentic evidence and the bit-stream image is the precise copy. So any alteration on the bit image will lead to different hash, which makes the evidences discovered turn into inadmissible in court.

10. Forensic Analyst begins to find evidence in the bit-stream image by fastidiously looking on the corresponding location depends upon what sort of crime has happened. For instance: Temporary Internet Recordsdata, Slack House, Deleted File, Steganography files.