Computer Forensics Based On What I Have Read: Definition of Computer Forensics
Computer Forensics Based On What I Have Read: Definition of Computer Forensics
Computer Forensics Based On What I Have Read: Definition of Computer Forensics
Computer forensics is the discipline that combines elements of law and computer science to collect and
analyze data from computer systems, networks, wireless communications, and storage devices in a way
that is admissible as evidence in a court of law.
Mid Level: they must be handled the same day the event occurs.
These are identified through:
- Violation of special access to a computer or computing facility.
- Unfriendly employee termination
- Unauthorized storing and processing of data
- Destruction of property related to a computer incident(less than 100000$)
- Personal theft of data related to computer incident
- Computer virus or worm of comparatively larger intensity
- Illegal access to buildings
They include:
- Denial of service attacks
- Suspected computer break in
- Computer virus or worms of highest intensity like: Trojan back door
- Destruction of property exceeding 100000$
- Personal theft exceeding 100000$ and illegal fund transfer or download/sale
After collecting the evidence:
Tools
There already exists a solid base of software for conducting computer forensic
investigations. Following is a brief description of the most common tools.
1- EnCase, made by Guidance Software is considered to be the largest digital
investigation software on the market. It is written for Windows but can access a
variety of file systems from a large amount of operating systems.
2- Forensic Toolkit (FTK), made by AccessData is another forensic tool for Windows
systems. FTK is also able to access different file systems but its strength lies in it’s
ability to search. It uses a sorted index to speed up searches and it contains
numerous internal viewers for different file types.
3- ILook Investigator, developed by IRS Criminal Investigation Division Electronic
Crimes Program, is a tool running on Windows. ILook handles raw disk images as
well as some widely used commercial formats. It enables the examiner to browse
files in various categories. Encrypted files, deleted files, password protected files
and files with invalid signature compared to its extension, just to name a few. It has
the advantage of enabling the image creation of complicated systems such as
servers with advanced RAID configurations etc. Unfortunately ILook is only
licensed to law enforcement agencies, which make it impossible to get for
companies making internal investigations etc.
4- ProDiscover, made by Pathways, is also a tool for windows. ProDiscover is also
able to analyze a number of file systems. The license also contains the source code,
so that investigators can identify exactly what the software is doing.
5- SMART, a Linux based alternative. Developed by the same person who originally
wrote EnCase (EnCase was called “Expert Witness” at the time). SMART makes
use of the wide support for file systems on Linux and have advanced features like
recovering deleted files, keyword search, and listing of image files.
6- Sleuth kit/Autopsy is a collection of UNIX tools and commands and a graphical
front end for these. Sleuth kid is also able to analyze numerous file systems and
recover deleted files. It also has a feature where file accesses can listed chronologically
During the interpretation task the actual human work begins. Here the examiner has to
lay the puzzle, connecting pieces together and find out their meaning. Things like the
reliability of the data and which people that can be connected to the data have to be
considered .
Note :Even though the analysis part is divided into different tasks it seem reasonable that
much of the analyze work is done iteratively as each task can give input to another.