SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Collecting and Preserving Digital
            Evidence
Data Recovery
•   What is Data Recovery?
•   Role of Backup in Data Recovery
•   Data Recovery Solution
•   Hiding and Recovering Hidden Data
What is Data Recovery
• Usually data recovery means that data that is lost is
  recovered – e.g., when a system crashes some data
  may be lost, with appropriate recovery procedures
  the data is recovered
• In digital forensics, data recovery is about extracting
  the data from seized computers (hard drives, disks
  etc.) for analysis
Role of Backup in Data Recovery
• Databases/files are backed up periodically (daily, weekly,
  hourly etc.) so that if system crashes the databases/files can
  be recovered to the previous consistent state
• Challenge to backup petabyte sized databases/files
• Obstacles for backing up
   – Backup window, network bandwidth, system throughout
• Current trends
   – Storage cost decreasing, systems have to be online 24x7
• Next generation solutions
   – Multiple backup servers, optimizing storage space
Data Recovery/Backup Solution
• Develop a plan/policy for backup and recovery
• Develop/Hire/Outsource the appropriate expertise
• Develop a system design for backup/recovery
   – Three tier architectures, caches, backup servers
• Examine state of the art backup/recovery products
  and tools
• Implement the backup plan according to the policy
  and design
Recover Hidden Data
• Hidden data
   – Files may be deleted, but until they are overwritten, the
     data may remain
   – Data stored in diskettes and stored insider another disk
• Need to get all the pieces and complete the puzzle
• Analysis techniques (including statistical reasoning)
  techniques are being used to recover hidden data
  and complete the puzzle
Evidence Collection and Data Seizure
•   What is Evidence Collection
•   Types of Evidence
•   Rules of Evidence
•   Volatile Evidence
•   Methods of Collection
•   Steps to Collection
•   Controlling Contamination
What is Evidence Collection
• Collecting information from the data recovered for further
  analysis
• Need to collect evidence so that the attacker can be found
  and future attacks can be prevented and/or limited
• Collect evidence for analysis or monitor the intruder
• Obstacles
   – Difficult to extract patterns or useful information from the recovered
     data
   – Difficult to tie the extracted information to a person
Types of Evidence
• Testimonial Evidence
  – Evidence supplied by a witness; subject to the perceived
    reliability of the witness
  – Word processor documents written by a witness as long as
    the author states that he wrote it
• Hearsay
  – Evidence presented by a person who is not a direct
    witness
  – Word processor documents written by someone without
    direct knowledge of the incident
Rules of Evidence
• Admissible
   – Evidence must be able to be used in court
• Authentic
   – Tie the evidence positively to an incident
• Complete
   – Evidence that can cover all perspectives
• Reliable
   – There should be no doubt that proper procedures were used
• Believable
   – Understandable and believable to a jury
Additional considerations
•   Minimize handling and corruption of original data
•   Account for any changes and keep detailed logs
•   Comply with the 5 basic rules
•   Do not exceed your knowledge – need to understand what
    you are doing
•   Follow the security policy established
•   Work fast / however need to be accurate
•   Proceed from volatile to persistent evidence
•   Do not shut down the machine before collecting evidence
•   Do not run programs on the affected machine
Volatile Evidence
• Types
  –   Cached data
  –   Routing tables
  –   Process table
  –   Kernel statistics
  –   Main memory
• What to do next
  – Collect the volatile data and store in a permanent storage
    device
Methods of Collection
• Freezing the scene
  – Taking a snapshot of the system and its
    compromised state
  – Recover data, extract information, analyze
• Honeypotting
  – Create a replica system and attract the attacker
    for further monitoring
Steps to Collection
• Find the evidence; where is it stored
• Find relevant data - recovery
• Create order of volatility
• Remove external avenues of change; no
  tampering
• Collect evidence – use tools
• Good documentation of all the actions
Controlling Contamination
• Once the data is collected it should not be contaminated,
  must be stored in a secure place, encryption techniques
• Maintain a chain of custody, who owns the data, data
  provenance techniques
• Analyze the evidence
   – Use analysis tools to determine what happened
• Analyze the log files and determine the timeline
• Analyze backups using a dedicated host
• Reconstruct the attack from all the information collected
Duplication and Preservation of
               Evidence
•   Preserving the Digital Crime Scene
     – First task is to make a compete bit stream backup of all computer data
         before review or process
     – Bit stream backups (also referred to as mirror image backups) involve
         the backup of all areas of a computer hard disk drive or another type
         of storage media, e.g., Zip disks, floppy disks, Jazz disks, etc. Such
         backups exactly replicate all sectors on a given storage device. Thus,
         all files and ambient data storage areas are copied. Bit stream backups
         are sometimes also referred to as 'evidence grade' backups and they
         differ substantially from traditional computer file backups and
         network server backups.
     – http://www.forensics-intl.com/def2.html
•   Make sure that the legal requirements are met and proper procedures are
    followed
Digital Evidence Process Model
•   The U.S. Department of Justice published a process model in the
    Electronic Crime Scene Investigation: A guide to first responders that
    consists of four phases: -
•   1. Collection; which involves the evidence search, evidence recognition,
    evidence collection and documentation.
•   2. Examination; this is designed to facilitate the visibility of evidence,
    while explaining its origin and significance. It involves revealing hidden
    and obscured information and the relevant documentation.
•   3. Analysis; this looks at the product of the examination for its significance
    and probative value to the case.
•   4. Reporting; this entails writing a report outlining the examination
    process and pertinent data recovered from the overall investigation.
Standards for Digital Evidence
•   The Scientific Working Group on Digital Evidence (SWGDE) was established in
    February 1998 through a collaborative effort of the Federal Crime Laboratory
    Directors. SWGDE, as the U.S.-based component of standardization efforts
    conducted by the International Organization on Computer Evidence (IOCE), was
    charged with the development of cross-disciplinary guidelines and standards for
    the recovery, preservation, and examination of digital evidence, including audio,
    imaging, and electronic devices.
•   The following document was drafted by SWGDE and presented at the
    International Hi-Tech Crime and Forensics Conference (IHCFC) held in London,
    United Kingdom, October 4-7, 1999. It proposes the establishment of standards
    for the exchange of digital evidence between sovereign nations and is intended to
    elicit constructive discussion regarding digital evidence. This document has been
    adopted as the draft standard for U.S. law enforcement agencies.
•   http://www.fbi.gov/hq/lab/fsc/backissu/april2000/swgde.htm
Verifying Digital Evidence
• Encryption techniques
   – Public/Private key encryption
   – Certification Authorities
   – Digital ID/Credentials
• Owner signs document with his private key, the Receiver
  decrypts the document with the owner’s public key
• Owner signs document with the receiver’s public key,
  Receiver decrypts the document with his private key
• Standards for Encryption
   – Export/Import laws
Conclusion
• Data must be backed up using appropriate policies,
  procedures and technologies
• Once a crime ahs occurred data ahs to be recovered from the
  various disks and commuters
• Data that is recovered has to be analyzed to extract evidence
• Evidence has to analyzed to determine what happened
• Use log files and documentations to establish the timeline
• Reconstruct the attack
Conclusion
• Standards and processes have to be set in place for
  representing, preserving, duplicating, verifying,
  validating certifying and accrediting digital evidence
• Numerous techniques are out there; need to
  determine which ones are useful for the particular
  evidence at hand
• Need to make it a scientific discipline

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic pptPriya Manik
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crimeatuljaybhaye
 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics KakshaPatel3
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologiesurjarathi
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
computer forensics
computer forensicscomputer forensics
computer forensicsAkhil Kumar
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidenceOnline
 
Automated Fingerprint Identification Systems
Automated Fingerprint Identification SystemsAutomated Fingerprint Identification Systems
Automated Fingerprint Identification SystemsRmcauley
 

Was ist angesagt? (20)

Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Lect 5 computer forensics
Lect 5 computer forensicsLect 5 computer forensics
Lect 5 computer forensics
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics
 
Crime Scene DOCUMENTATION
Crime Scene DOCUMENTATION Crime Scene DOCUMENTATION
Crime Scene DOCUMENTATION
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologies
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Incident response process
Incident response processIncident response process
Incident response process
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
Automated Fingerprint Identification Systems
Automated Fingerprint Identification SystemsAutomated Fingerprint Identification Systems
Automated Fingerprint Identification Systems
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 

Andere mochten auch

Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in indiaAdv Prashant Mali
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records tooBob Larrivee
 
Informatics in Clinical Practice: Designing and Implementing an Electronic Re...
Informatics in Clinical Practice: Designing and Implementing an Electronic Re...Informatics in Clinical Practice: Designing and Implementing an Electronic Re...
Informatics in Clinical Practice: Designing and Implementing an Electronic Re...Health Informatics New Zealand
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsFilip Maertens
 

Andere mochten auch (6)

Crime statistics
Crime statisticsCrime statistics
Crime statistics
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records too
 
Informatics in Clinical Practice: Designing and Implementing an Electronic Re...
Informatics in Clinical Practice: Designing and Implementing an Electronic Re...Informatics in Clinical Practice: Designing and Implementing an Electronic Re...
Informatics in Clinical Practice: Designing and Implementing an Electronic Re...
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 

Ähnlich wie Collecting Digital Evidence & Preserving Data

644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdfGnanavi2
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenesprimeteacher32
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its roleSudeshna Basak
 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaResilient Systems
 
Cyber forensics and investigations
Cyber forensics and investigationsCyber forensics and investigations
Cyber forensics and investigationsJay Mehta
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraIGN MANTRA
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas IndonesiaIGN MANTRA
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer ForensicsAlchemist095
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx9905234521
 
DigitalForensics.ppt
DigitalForensics.pptDigitalForensics.ppt
DigitalForensics.pptssuserba01a3
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsHiren Selani
 

Ähnlich wie Collecting Digital Evidence & Preserving Data (20)

CF.ppt
CF.pptCF.ppt
CF.ppt
 
cyber Forensics
cyber Forensicscyber Forensics
cyber Forensics
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
 
Daniel_CISSP_Dom7__1_.pdf
Daniel_CISSP_Dom7__1_.pdfDaniel_CISSP_Dom7__1_.pdf
Daniel_CISSP_Dom7__1_.pdf
 
Forensics Analysis and Validation
Forensics Analysis and Validation  Forensics Analysis and Validation
Forensics Analysis and Validation
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its role
 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a Panacea
 
Cyber forensics and investigations
Cyber forensics and investigationsCyber forensics and investigations
Cyber forensics and investigations
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
 
DigitalForensics.ppt
DigitalForensics.pptDigitalForensics.ppt
DigitalForensics.ppt
 
DigitalForensics.ppt
DigitalForensics.pptDigitalForensics.ppt
DigitalForensics.ppt
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
File000117
File000117File000117
File000117
 

Mehr von Online

Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3Online
 
Philosophy of early childhood education 2
Philosophy of early childhood education 2Philosophy of early childhood education 2
Philosophy of early childhood education 2Online
 
Philosophy of early childhood education 1
Philosophy of early childhood education 1Philosophy of early childhood education 1
Philosophy of early childhood education 1Online
 
Philosophy of early childhood education 4
Philosophy of early childhood education 4Philosophy of early childhood education 4
Philosophy of early childhood education 4Online
 
Operation and expression in c++
Operation and expression in c++Operation and expression in c++
Operation and expression in c++Online
 
Functions
FunctionsFunctions
FunctionsOnline
 
Formatted input and output
Formatted input and outputFormatted input and output
Formatted input and outputOnline
 
Control structures selection
Control structures   selectionControl structures   selection
Control structures selectionOnline
 
Control structures repetition
Control structures   repetitionControl structures   repetition
Control structures repetitionOnline
 
Introduction to problem solving in c++
Introduction to problem solving in c++Introduction to problem solving in c++
Introduction to problem solving in c++Online
 
Optical transmission technique
Optical transmission techniqueOptical transmission technique
Optical transmission techniqueOnline
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Online
 
Lan technologies
Lan technologiesLan technologies
Lan technologiesOnline
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technologyOnline
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocolsOnline
 
Internet protocol
Internet protocolInternet protocol
Internet protocolOnline
 
Application protocols
Application protocolsApplication protocols
Application protocolsOnline
 
Addressing
AddressingAddressing
AddressingOnline
 
Transport protocols
Transport protocolsTransport protocols
Transport protocolsOnline
 
Leadership
LeadershipLeadership
LeadershipOnline
 

Mehr von Online (20)

Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3
 
Philosophy of early childhood education 2
Philosophy of early childhood education 2Philosophy of early childhood education 2
Philosophy of early childhood education 2
 
Philosophy of early childhood education 1
Philosophy of early childhood education 1Philosophy of early childhood education 1
Philosophy of early childhood education 1
 
Philosophy of early childhood education 4
Philosophy of early childhood education 4Philosophy of early childhood education 4
Philosophy of early childhood education 4
 
Operation and expression in c++
Operation and expression in c++Operation and expression in c++
Operation and expression in c++
 
Functions
FunctionsFunctions
Functions
 
Formatted input and output
Formatted input and outputFormatted input and output
Formatted input and output
 
Control structures selection
Control structures   selectionControl structures   selection
Control structures selection
 
Control structures repetition
Control structures   repetitionControl structures   repetition
Control structures repetition
 
Introduction to problem solving in c++
Introduction to problem solving in c++Introduction to problem solving in c++
Introduction to problem solving in c++
 
Optical transmission technique
Optical transmission techniqueOptical transmission technique
Optical transmission technique
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technology
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocols
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Application protocols
Application protocolsApplication protocols
Application protocols
 
Addressing
AddressingAddressing
Addressing
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Leadership
LeadershipLeadership
Leadership
 

Kürzlich hochgeladen

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 

Kürzlich hochgeladen (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 

Collecting Digital Evidence & Preserving Data

  • 1. Collecting and Preserving Digital Evidence
  • 2. Data Recovery • What is Data Recovery? • Role of Backup in Data Recovery • Data Recovery Solution • Hiding and Recovering Hidden Data
  • 3. What is Data Recovery • Usually data recovery means that data that is lost is recovered – e.g., when a system crashes some data may be lost, with appropriate recovery procedures the data is recovered • In digital forensics, data recovery is about extracting the data from seized computers (hard drives, disks etc.) for analysis
  • 4. Role of Backup in Data Recovery • Databases/files are backed up periodically (daily, weekly, hourly etc.) so that if system crashes the databases/files can be recovered to the previous consistent state • Challenge to backup petabyte sized databases/files • Obstacles for backing up – Backup window, network bandwidth, system throughout • Current trends – Storage cost decreasing, systems have to be online 24x7 • Next generation solutions – Multiple backup servers, optimizing storage space
  • 5. Data Recovery/Backup Solution • Develop a plan/policy for backup and recovery • Develop/Hire/Outsource the appropriate expertise • Develop a system design for backup/recovery – Three tier architectures, caches, backup servers • Examine state of the art backup/recovery products and tools • Implement the backup plan according to the policy and design
  • 6. Recover Hidden Data • Hidden data – Files may be deleted, but until they are overwritten, the data may remain – Data stored in diskettes and stored insider another disk • Need to get all the pieces and complete the puzzle • Analysis techniques (including statistical reasoning) techniques are being used to recover hidden data and complete the puzzle
  • 7. Evidence Collection and Data Seizure • What is Evidence Collection • Types of Evidence • Rules of Evidence • Volatile Evidence • Methods of Collection • Steps to Collection • Controlling Contamination
  • 8. What is Evidence Collection • Collecting information from the data recovered for further analysis • Need to collect evidence so that the attacker can be found and future attacks can be prevented and/or limited • Collect evidence for analysis or monitor the intruder • Obstacles – Difficult to extract patterns or useful information from the recovered data – Difficult to tie the extracted information to a person
  • 9. Types of Evidence • Testimonial Evidence – Evidence supplied by a witness; subject to the perceived reliability of the witness – Word processor documents written by a witness as long as the author states that he wrote it • Hearsay – Evidence presented by a person who is not a direct witness – Word processor documents written by someone without direct knowledge of the incident
  • 10. Rules of Evidence • Admissible – Evidence must be able to be used in court • Authentic – Tie the evidence positively to an incident • Complete – Evidence that can cover all perspectives • Reliable – There should be no doubt that proper procedures were used • Believable – Understandable and believable to a jury
  • 11. Additional considerations • Minimize handling and corruption of original data • Account for any changes and keep detailed logs • Comply with the 5 basic rules • Do not exceed your knowledge – need to understand what you are doing • Follow the security policy established • Work fast / however need to be accurate • Proceed from volatile to persistent evidence • Do not shut down the machine before collecting evidence • Do not run programs on the affected machine
  • 12. Volatile Evidence • Types – Cached data – Routing tables – Process table – Kernel statistics – Main memory • What to do next – Collect the volatile data and store in a permanent storage device
  • 13. Methods of Collection • Freezing the scene – Taking a snapshot of the system and its compromised state – Recover data, extract information, analyze • Honeypotting – Create a replica system and attract the attacker for further monitoring
  • 14. Steps to Collection • Find the evidence; where is it stored • Find relevant data - recovery • Create order of volatility • Remove external avenues of change; no tampering • Collect evidence – use tools • Good documentation of all the actions
  • 15. Controlling Contamination • Once the data is collected it should not be contaminated, must be stored in a secure place, encryption techniques • Maintain a chain of custody, who owns the data, data provenance techniques • Analyze the evidence – Use analysis tools to determine what happened • Analyze the log files and determine the timeline • Analyze backups using a dedicated host • Reconstruct the attack from all the information collected
  • 16. Duplication and Preservation of Evidence • Preserving the Digital Crime Scene – First task is to make a compete bit stream backup of all computer data before review or process – Bit stream backups (also referred to as mirror image backups) involve the backup of all areas of a computer hard disk drive or another type of storage media, e.g., Zip disks, floppy disks, Jazz disks, etc. Such backups exactly replicate all sectors on a given storage device. Thus, all files and ambient data storage areas are copied. Bit stream backups are sometimes also referred to as 'evidence grade' backups and they differ substantially from traditional computer file backups and network server backups. – http://www.forensics-intl.com/def2.html • Make sure that the legal requirements are met and proper procedures are followed
  • 17. Digital Evidence Process Model • The U.S. Department of Justice published a process model in the Electronic Crime Scene Investigation: A guide to first responders that consists of four phases: - • 1. Collection; which involves the evidence search, evidence recognition, evidence collection and documentation. • 2. Examination; this is designed to facilitate the visibility of evidence, while explaining its origin and significance. It involves revealing hidden and obscured information and the relevant documentation. • 3. Analysis; this looks at the product of the examination for its significance and probative value to the case. • 4. Reporting; this entails writing a report outlining the examination process and pertinent data recovered from the overall investigation.
  • 18. Standards for Digital Evidence • The Scientific Working Group on Digital Evidence (SWGDE) was established in February 1998 through a collaborative effort of the Federal Crime Laboratory Directors. SWGDE, as the U.S.-based component of standardization efforts conducted by the International Organization on Computer Evidence (IOCE), was charged with the development of cross-disciplinary guidelines and standards for the recovery, preservation, and examination of digital evidence, including audio, imaging, and electronic devices. • The following document was drafted by SWGDE and presented at the International Hi-Tech Crime and Forensics Conference (IHCFC) held in London, United Kingdom, October 4-7, 1999. It proposes the establishment of standards for the exchange of digital evidence between sovereign nations and is intended to elicit constructive discussion regarding digital evidence. This document has been adopted as the draft standard for U.S. law enforcement agencies. • http://www.fbi.gov/hq/lab/fsc/backissu/april2000/swgde.htm
  • 19. Verifying Digital Evidence • Encryption techniques – Public/Private key encryption – Certification Authorities – Digital ID/Credentials • Owner signs document with his private key, the Receiver decrypts the document with the owner’s public key • Owner signs document with the receiver’s public key, Receiver decrypts the document with his private key • Standards for Encryption – Export/Import laws
  • 20. Conclusion • Data must be backed up using appropriate policies, procedures and technologies • Once a crime ahs occurred data ahs to be recovered from the various disks and commuters • Data that is recovered has to be analyzed to extract evidence • Evidence has to analyzed to determine what happened • Use log files and documentations to establish the timeline • Reconstruct the attack
  • 21. Conclusion • Standards and processes have to be set in place for representing, preserving, duplicating, verifying, validating certifying and accrediting digital evidence • Numerous techniques are out there; need to determine which ones are useful for the particular evidence at hand • Need to make it a scientific discipline