QUESTION NUMBER 132-136
132. How is the collection of files done in forensic science?
Data Collection
The first step in the forensic process is to identify potential sources
of data and acquire data from them.
Identifying Possible Sources of Data
The
increasingly widespread use of digital technology for both professional and
personal purposes has led to an abundance of data sources. The most obvious and
common sources of data are desktop computers, servers, network storage devices,
and laptops. These systems typically have internal drives that accept media,
such as CDs and DVDs, and also have several types of ports (e.g., Universal
Serial Bus [USB], Firewire, Personal Computer Memory Card International
Association [PCMCIA]) to which external data storage media and devices can be
attached. Examples of external storage forms that might be sources of data are
thumb drives, memory and flash cards, optical discs, and magnetic disks.
Standard computer systems also contain volatile data that is available
temporarily (i.e., until the system is shut down or rebooted). In addition to
computer-related devices, many types of portable digital devices (e.g., PDAs,
cell phones, digital cameras, digital recorders, audio players) may also
contain data. Analysts should be able to survey a physical area, such as an
office, and recognize the possible sources of data.
Analysts
should also think of possible data sources located in other places. For
example, there are usually many sources of information within an organization
regarding network activity and application usage. Information may also be
recorded by other organizations, such as logs of network activity for an
Internet service provider (ISP). Analysts should be mindful of the owner of
each data source and the effect that this might have on collecting data. For
example, getting copies of ISP records typically requires a court order.
Analysts should also be aware of the organization’s policies, as well as legal
considerations, regarding externally owned property at the organization’s
facilities (for example, an employee’s personal laptop or a contractor’s
laptop). The situation can become even more complicated if locations outside
the organization’s control are involved, such as an incident involving a
computer at a telecommuter’s home office. Sometimes it is simply not feasible
to collect data from a primary data source; therefore, analysts should be aware
of alternate data sources that might contain some or all of the same data, and
should use those sources instead of the unattainable source.
Organizations
can take on going proactive measures to collect data that may be useful for
forensic purposes. For example, most OSs can be configured to audit and record
certain types of events, such as authentication attempts and security policy
changes, as part of normal operations. Audit records can provide valuable
information, including the time that an event occurred and the origin of the
event. Another helpful action is to implement centralized logging, which means
that certain systems and applications forward copies of their logs to secure
central log servers. Centralized logging prevents unauthorized users from
tampering with logs and employing anti-forensic techniques to impede analysis. Performing
regular backups of systems allows analysts to view the contents of the system as
they were at a particular time. In addition, as described in Sections 6 and 7,
security monitoring controls such as intrusion detection software, antivirus
software, and spyware detection and removal utilities can generate logs that
show when and how an attack or intrusion took place.
Another proactive data collecting measure is the monitoring of user behaviour,
such as keystroke monitoring, which records the keyboard usage of a particular
system. Although this measure can provide a valuable record of activity, it can
also be a violation of privacy unless users are advised through organizational
policy and login banners that such monitoring may be performed. Most
organizations do not employ techniques such as keystroke monitoring except when
gathering additional information on a suspected incident. Authority for
performing such monitoring should be discussed with legal advisors and
documented clearly in the organization’s policy. Acquiring the Data
After
identifying potential data sources, the analyst needs to acquire the data from
the sources. Data acquisition should be performed using a three-step process:
developing a plan to acquire the data, acquiring the data, and verifying the
integrity of the acquired data. Although the following items provide an
overview of these three steps, the specific details behind steps 2 and 3 vary
based on the type of data being acquired.
1. Develop a plan
to acquire the data.
Developing a plan is an important first step in most cases because there are multiple potential data sources. The analyst should create a plan that prioritizes the sources, establishing the order in which the data should be acquired. Important factors for prioritization include the following:
Developing a plan is an important first step in most cases because there are multiple potential data sources. The analyst should create a plan that prioritizes the sources, establishing the order in which the data should be acquired. Important factors for prioritization include the following:
Likely Value. Based on the analyst.s understanding of the situation and previous
experience in similar situations, the analyst should be able to estimate the
relative likely value of each potential data source.
Volatility. Volatile data refers to data on a live system that is lost after a computer is
powered down or due to the passage of time. Volatile data may also be lost as a
result of other actions performed on the system. In many cases, acquiring
volatile data should be given priority over non-volatile data. However,
non-volatile data may also be somewhat dynamic in nature (e.g., log files that
are overwritten as new events occur).
Amount of Effort Required. The amount of effort
required to acquire different data sources may vary widely. The effort involves
not only the time spent by analysts and others within the organization
(including legal advisors) but also the cost of equipment and services (e.g.,
outside experts). For example, acquiring data from a network router would
probably require much less effort than acquiring data from an ISP.2. Acquire the data.
If the data has not already been acquired by security tools, analysis tools, or other means, the general process for acquiring data involves using forensic tools to collect volatile data, duplicating non-volatile data sources to collect their data, and securing the original non-volatile data sources. Data acquisition can be performed either locally or over a network. Although it is generally preferable to acquire data locally because there is greater control over the system and data, local data collection is not always feasible (e.g., system in locked room, system in another location). When acquiring data over a network, decisions should be made regarding the type of data to be collected and the amount of effort to use. For instance, it might be necessary to acquire data from several systems through different network connections, or it might be sufficient to copy a logical volume from just one system.
3. Verify the integrity of the data.
After the data has been acquired, its integrity should be verified. It is particularly important for an analyst to prove that the data has not been tampered with if it might be needed for legal reasons. Data integrity verification typically consists of using tools to compute the message digest of the original and copied data, then comparing the digests to make sure that they are the same.
Incident Response Considerations
When performing forensics during incident response, an important consideration is how and when the incident should be contained. Isolating the pertinent systems from external influences may be necessary to prevent further damage to the system and its data or to preserve evidence. In many cases, the analyst should work with the incident response team to make a containment decision (e.g., disconnecting network cables, unplugging power, increasing physical security measures, gracefully shutting down a host). This decision should be based on existing policies and procedures regarding incident containment, as well as the teams assessment of the risk posed by the incident, so that the chosen containment strategy or combination of strategies sufficiently mitigates risk while maintaining the integrity of potential evidence whenever possible.
The organization should also consider in advance the impact that various containment strategies may have on the ability of the organization to operate effectively. For example, taking a critical system offline for several hours to acquire disk images and other data might adversely affect the ability of the organization to perform its necessary operations. Significant downtime could result in substantial monetary losses to the organization. Therefore, care should be taken to minimize disruptions to an organizations operations.
133. What is the need for forensics?
The Need for Forensics
Over the last decade, the number of crimes that involve computers has grown, spurring an increase in companies and products that aim to assist law enforcement in using computer-based evidence to determine the who, what, where, when, and how for crimes. As a result, computer and network forensics has evolved to assure proper presentation of computer crime evidentiary data into court. Forensic tools and techniques are most often thought of in the context of criminal investigations and computer security incident handling used to respond to an event by investigating suspect systems, gathering and preserving evidence, reconstructing events, and assessing the current state of an event.
However, forensic tools and techniques are also useful for many other types of tasks, such as the following: .
Operational Troubleshooting:
Many forensic tools and techniques can be applied to troubleshooting operational issues, such as finding the virtual and physical location of a host with an incorrect network configuration, resolving a functional problem with an application, and recording and reviewing the current OS and application configuration settings for a host. .
Log Monitoring.
Various tools and techniques can assist in log monitoring, such as analyzing log entries and correlating log entries across multiple systems. This can assist in incident handling, identifying policy violations, auditing, and other efforts. .
Data Recovery.
There are dozens of tools that can recover lost data from systems, including data that has been accidentally or purposely deleted or otherwise modified. The amount of data that can be recovered varies on a case-by-case basis. .
Data Acquisition.
Some organizations use forensics tools to acquire data from hosts that are being redeployed or retired. For example, when a user leaves an organization, the data from the user’s workstation can be acquired and stored in case it is needed in the future. The workstation’s media can then be sanitized to remove all of the original user’s data. .
Due Diligence/Regulatory Compliance.
Existing and emerging regulations require many organizations to protect sensitive information and maintain certain records for audit purposes. Also, when protected information is exposed to other parties, organizations may be required to notify other agencies or impacted individuals. Forensics can help organizations exercise due diligence and comply with such requirements. .
Regardless of the situation, the forensic process comprises the following basic phases: .
Collection.
The first phase in the process is to identify, label, record, and acquire data from the possible sources of relevant data, while following guidelines and procedures that preserve the integrity of the data. Collection is typically performed in a timely manner because of the likelihood of losing dynamic data such as current network connections, as well as losing data from battery-powered devices (e.g., cell phones, PDAs). .
Examination.
Examinations involve forensically processing large amounts of collected data using a combination of automated and manual methods to assess and extract data of particular interest, while preserving the integrity of the data. .
Analysis.
The next phase of the process is to analyze the results of the examination, using legally justifiable methods and techniques, to derive useful information that addresses the questions that were the impetus for performing the collection and examination. .
Reporting.
The final phase is reporting the results of the analysis, which may include describing the actions used, explaining how tools and procedures were selected, determining what other actions need to be performed (e.g., forensic examination of additional data sources, securing identified vulnerabilities, improving existing security controls), and providing recommendations for improvement to policies, guidelines, procedures, tools, and other aspects of the forensic process. The formality of the reporting step varies greatly depending on the situation.
134. What are the key recommendations on establishing and organizing a forensic capability?
The key recommendations on establishing and organizing a forensic capability are as follows:
Organizations should have a capability to perform computer and network forensics.
Forensics is needed for various tasks within an organization, including investigating crimes and inappropriate behavior, reconstructing computer security incidents, troubleshooting operational problems, supporting due diligence for audit record maintenance, and recovering from accidental system damage. Without such a capability, an organization will have difficulty determining what events have occurred within its systems and networks, such as exposures of protected, sensitive data. Also, handling evidence in a forensically sound manner puts decision makers in a position where they can confidently take the necessary actions. :
Organizations should determine which parties should handle each aspect of forensics.
Most organizations rely on a combination of their own staff and external parties to perform forensic tasks. Organizations should decide which parties should take care of which tasks based on skills and abilities, cost, response time, and data sensitivity. :
Incident handling teams should have robust forensic capabilities.
More than one team member should be able to perform each typical forensic activity. Hands-on exercises and IT and forensic training courses can be helpful in building and maintaining skills, as can demonstrations of new tools and technologies. :
Many teams within an organization should participate in forensics.
Individuals performing forensic actions should be able to reach out to other teams and individuals within an organization, as needed, for additional assistance. Examples of teams that may provide assistance in these efforts include IT professionals, management, legal advisors, human resources personnel, auditors, and physical security staff. Members of these teams should understand their roles and responsibilities in forensics, receive training and education on forensic.related policies, guidelines, and procedures, and be prepared to cooperate with and assist others on forensic actions. :
Forensic considerations should be clearly addressed in policies.
At a high level, policies should allow authorized personnel to monitor systems and networks and perform investigations for legitimate reasons under appropriate circumstances. Organizations may also have a separate forensic policy for incident handlers and others with forensic roles that provides more detailed rules for appropriate behavior. Everyone who may be called upon to assist with any forensic efforts should be familiar with and understand the forensic policy. Additional policy considerations are as follows: :
• . Forensic policy should clearly define the roles and responsibilities of all people performing or assisting with the organization’s forensic activities. The policy should include all internal and external parties that may be involved and should clearly indicate who should contact which parties under different circumstances.
• . The organization’s policies, guidelines, and procedures should clearly explain what forensic actions should and should not be performed under normal and special circumstances and should address the use of anti-forensic tools and techniques. Policies, guidelines, and procedures should also address the handling of inadvertent exposures of sensitive information.
• . Incorporating forensic considerations into the information system life cycle can lead to more efficient and effective handling of many incidents. Examples include performing auditing on hosts and establishing data retention policies that support performing historical reviews of system and network activity.
Organizations should create and maintain guidelines and procedures for performing forensic tasks.
The guidelines should include general methodologies for investigating an incident using forensic techniques, and step-by-step procedures should explain how to perform routine tasks. The guidelines and procedures should support the admissibility of evidence into legal proceedings. Because electronic logs and other records can be altered or otherwise manipulated, organizations should be prepared, through their policies, guidelines, and procedures, to demonstrate the reliability and integrity of such records. The guidelines and procedures should also be reviewed regularly and maintained so that they are accurate.
135. List various phases in forensics process. Explain in short.
Refer question number 130 and 121
136. Explain the two techniques used to copy files from media.
Refer question number 124
No comments:
Post a Comment