Unit 1
Unit 1
FORENSICS
Unit 1
Define computer crime
Computer crime is any criminal offense,
activity or issue that involves computers.
Cybercrime Investigations
Incident Response
Corporate Investigations
Law Enforcement Support
Litigation Support
Data Recovery
Malware Analysis
Digital Asset Tracing
Mobile Device Forensics
Network Forensics
Types of computer forensics
Investigators
Responsibilities:
Lead the overall investigation process,
coordinating with other team members.
Analyze digital evidence to reconstruct events,
determine the timeline of activities, and identify
relevant information.
Use specialized forensic tools to extract,
recover, and preserve electronic evidence.
Collaborate with other team members to build a
comprehensive understanding of the case.
Cont…
Photographer:
Responsibilities:
Document the physical crime scene, ensuring
accurate and thorough visual records.
Capture images of computer systems,
networks, and related physical evidence.
Follow established procedures for
photographing and cataloging evidence.
Provide visual documentation for reports and
legal proceedings.
Cont..
Incident Handlers (First Responder):
Responsibilities:
Respond quickly to cybersecurity incidents,
ensuring the preservation of volatile evidence.
Contain and mitigate security breaches and
vulnerabilities.
Collaborate with other team members to gather
initial information and assess the scope of the
incident.
Preserve and document critical information
related to the incident.
Cont…
IT Engineers & Technicians (Other Support
Staff):
Responsibilities:
Provide technical support for the forensic
investigation, including hardware and software
assistance.
Assist in the acquisition and preservation of digital
evidence.
Maintain and update forensic tools, ensuring they
are current and effective.
Collaborate with forensic analysts to address
technical challenges during the investigation.
Cont..
Attorney
Responsibilities:
Ensure that all forensic activities comply with legal
standards and procedures.
Provide legal guidance to the team throughout the
investigation process.
Collaborate with investigators to understand case
requirements and legal implications.
Prepare and present evidence in legal proceedings
and hearings.
Assist in obtaining necessary legal permissions for
evidence collection.
Stages of a Computer Forensics Investigation
Stage 1: Identification
The very first step in a digital forensics investigation is
to identify the devices and resources containing the
data that will be a part of the investigation. The data
involved in an investigation could be on organizational
devices such as computers or laptops, or on users’
personal devices like mobile phones and tablets.
These devices are then seized and isolated, to
eliminate any possibility of tampering. If the data is on
a server or network, or housed on the cloud, the
investigator or organization needs to ensure that no
one other than the investigating team has access to it.
Stage 2: Extraction and Preservation
Case Study: One time during a mobile phone examination, the phone
was seized from a suspect but transported to other place without having
first stored it in a forensically sound storage device.
By the time the police officer arrived with the evidence into the forensic
lab, it had been contaminated several times that the police officer could
not prove that the suspect was the last user of the said phone.
If the police officer was well trained with the right tools, they would have
stored the phone in the state, which automatically disables network
signal and keeps the phone in the same state as at the point of seizure.
3. Analyze
Analyze – the data and evidence
without any alterations.
The forensic investigator’s work is to
examine what is on the seized devices
and to map relationships with other facts
collected to aid the solving of the case.
You cannot alter any data as such would
be a biased action.
Self-Study
How is computer forensics used as evidence?