Saturday, April 11, 2020

Computer forensic investigations usually follow th Essays

Computer forensic investigations usually follow the standard digital forensic process or phases: acquisition, examination, analysis and reporting. Investigations are performed on static data (i.e. acquired images ) rather than "live" systems. This is a change from early forensic practices where a lack of specialist tools led to investigators commonly working on live data. Techniques [ edit ] A number of techniques are used during computer forensics investigations and much has been written on the many techniques used by law enforcement in particular. See, e.g., "Defending Child Pornography Cases". Cross-drive analysis A forensic technique that correlates information found on multiple hard drives . The process, still being researched, can be used to identify social networks and to perform anomaly detection . [9] [10] Live analysis The examination of computers from within the operating system using custom forensics or existing sysadmin tools to extract evidence. The practice is useful when dealing with Encrypting File Systems , for example, where the encryption keys may be collected and, in some instances, the logical hard drive volume may be imaged (known as a live acquisition) before the computer is shut down. Deleted files A common technique used in computer forensics is the recovery of deleted files. Modern forensic software have their own tools for recovering or carving out deleted data. [11] Most operating systems and file systems do not always erase physical file data, allowing investigators to reconstruct it from the physical disk sectors . File carving involves searching for known file headers within the disk image and reconstructing deleted materials. Stochastic forensics A method which uses stochastic properties of the computer system to investigate activities lacking digital artifacts. Its chief use is to investigate data theft . Steganography One of the techniques used to hide data is via steganography, the process of hiding data inside of a picture or digital image. An example would be to hide pornographic images of children or other information that a given criminal does not want to have discovered. Computer forensics professionals can fight this by looking at the hash of the file and comparing it to the original image (if available.) While the image appears exactly the same, the hash changes as the data changes. [12] Volatile data [ edit ] When seizing evidence, if the machine is still active, any information stored solely in RAM that is not recovered before powering down may be lost. [8] One application of "live analysis" is to recover RAM data (for example, using Microsoft's COFEE tool, windd, WindowsSCOPE ) prior to removing an exhibit. CaptureGUARD Gateway bypasses Windows login for locked computers, allowing for the analysis and acquisition of physical memory on a locked computer. RAM can be analyzed for prior content after power loss, because the electrical charge stored in the memory cells takes time to dissipate, an effect exploited by the cold boot attack . The length of time that data is recoverable is increased by low temperatures and higher cell voltages. Holding unpowered RAM below 60C helps preserve residual data by an order of magnitude, improving the chances of successful recovery. However, it can be impractical to do this during a field examination. [13] Some of the tools needed to extract volatile data, however, require that a computer be in a forensic lab, both to maintain a legitimate chain of evidence, and to facilitate work on the machine. If necessary, law enforcement applies techniques to move a live, running desktop computer. These include a mouse jiggler , which moves the mouse rapidly in small movements and prevents the computer from going to sleep accidentally. Usually, an uninterruptible power supply (UPS) provides power during transit. However, one of the easiest ways to capture data is by actually saving the RAM data to disk. Various file systems that have journaling features such as NTFS and ReiserFS keep a large portion of the RAM data on the main storage media during operation, and these page files can be reassembled to reconstruct what was in RAM at that time. [14] Analysis tools [ edit ] See also: List of digital forensics tools A number of open source and commercial tools exist for computer forensics investigation. Typical forensic analysis includes a manual review of

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.