DOC PREVIEW
UTD CS 4398 - Lecture 8 Computer Forensics Data Recovery and Evidence Collection

This preview shows page 1-2-19-20 out of 20 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 20 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 20 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 20 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 20 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 20 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Digital ForensicsOutlineAgenda for Lectures until October 8, 2007Review of Part 1Data RecoveryWhat is Data RecoveryRole of Backup in Data RecoveryData Recovery/Backup SolutionRecover Hidden DataEvidence Collection and Data SeizureWhat is Evidence CollectionTypes of EvidenceRules of EvidenceAdditional considerationsVolatile EvidenceMethods of CollectionSteps to CollectionControlling ContaminationConclusionLinksDigital ForensicsDr. Bhavani ThuraisinghamThe University of Texas at DallasLecture #8Computer Forensics Data Recovery and Evidence CollectionSeptember 12, 2007OutlineAgenda for next several lecturesReview of Part 1 Data RecoveryEvidence Collection and Data SeizureUseful Links and discussionsReference: Part II of Text Book: Chapters 5 and 6Agenda for Lectures until October 8, 2007September 17, 2007-Chapters 7 and 8; Example programming projectsSeptember 19, 2007-Chapters 9, 10, 11September 24, 2007-Guest Lecture: Richardson Police DepartmentSeptember 26, 2007-Chapter 12: Network ForensicsOctober 1, 2007-Guest Lecture: FBI North TexasOctober 3, 2007-Selected Paper DiscussionsOctober 8, 2007-Begin Part IV of bookReview of Part 1Lecture 1: IntroductionLecture 2: FundamentalsLecture 3: Forensics TechnologiesLecture 4: BotnetsLecture 5: Forensics SystemsLecture 6: Forensics ServicesLecture 7: Malicious Code DetectionData RecoveryWhat Data Recovery?Role of Backup in Data RecoveryData Recovery SolutionHiding and Recovering Hidden DataWhat is Data RecoveryUsually data recovery means that data that is lost is recovered – e.g., when a system crashes some data may be lost, with appropriate recovery procedures the data is recoveredIn digital forensics, data recovery is about extracting the data from seized computers (hard drives, disks etc.) for analysisRole of Backup in Data RecoveryDatabases/files are backed up periodically (daily, weekly, hourly etc.) so that if system crashes the databases/files can be recovered to the previous consistent stateChallenge to backup petabyte sized databases/filesObstacles for backing up-Backup window, network bandwidth, system throughoutCurrent trends-Storage cost decreasing, systems have to be online 24x7Next generation solutions-Multiple backup servers, optimizing storage spaceData Recovery/Backup SolutionDevelop a plan/policy for backup and recoveryDevelop/Hire/Outsource the appropriate expertiseDevelop a system design for backup/recovery-Three tier architectures, caches, backup serversExamine state of the art backup/recovery products and tools Implement the backup plan according to the policy and designRecover Hidden DataHidden data -Files may be deleted, but until they are overwritten, the data may remain-Data stored in diskettes and stored insider another diskNeed to get all the pieces and complete the puzzleAnalysis techniques (including statistical reasoning) techniques are being used to recover hidden data and complete the puzzleReference: -http://www.forensicfocus.com/hidden-data-analysis-ntfsEvidence Collection and Data SeizureWhat is Evidence CollectionTypes of EvidenceRules of EvidenceVolatile EvidenceMethods of Collection Steps to CollectionControlling ContaminationWhat is Evidence CollectionCollecting information from the data recovered for further analysisNeed to collect evidence so that the attacker can be found and future attacks can be prevented and/or limitedCollect evidence for analysis or monitor the intruderObstacles-Difficult to extract patterns or useful information from the recovered data-Difficult to tie the extracted information to a personTypes of EvidenceTestimonial Evidence-Evidence supplied by a witness; subject to the perceived reliability of the witness-Word processor documents written by a witness as long as the author states that he wrote itHearsay-Evidence presented by a person who is not a direct witness-Word processor documents written by someone without direct knowledge of the incidentRules of EvidenceAdmissible-Evidence must be able to be used in courtAuthentic-Tie the evidence positively to an incidentComplete-Evidence that can cover all perspectivesReliable-There should be no doubt that proper procedures were usedBelievable-Understandable and believable to a juryAdditional considerationsMinimize handling and corruption of original dataAccount for any changes and keep detailed logsComply with the 5 basic rulesDo not exceed your knowledge – need to understand what you are doingFollow the security policy establishedWork fast / however need to be accurate Proceed from volatile to persistent evidenceDo not shut down the machine before collecting evidenceDo not run programs on the affected machineVolatile EvidenceTypes-Cached data-Routing tables-Process table-Kernel statistics-Main memoryWhat to do next-Collect the volatile data and store in a permanent storage deviceMethods of CollectionFreezing the scene -Taking a snapshot of the system and its compromised state-Recover data, extract information, analyzeHoneypotting-Create a replica system and attract the attacker for further monitoringSteps to CollectionFind the evidence; where is it storedFind relevant data - recoveryCreate order of volatilityRemove eternal avenues of change; no tamperingCollect evidence – use tools Good documentation of all the actionsControlling ContaminationOnce the data is collected it should not be contaminated, must be stored in a secure place, encryption techniquesMaintain a chain of custody, who owns the data, data provenance techniquesAnalyze the evidence-Use analysis tools to determine what happenedAnalyze the log files and determine the timelineAnalyze backups using a dedicated hostReconstruct the attack from all the information collectedConclusionData must be backed up using appropriate policies, procedur4es and technologiesOnce a crime ahs occurred data ahs to be recovered from the various disks and commutersData that is recovered has to be analyzed to extract evidenceEvidence has to analyzed to determine what happenedUse log files and documentations to establish the timelineReconstruct the attackLinksData Recovery-http://www.datatexcorp.com/-http://www.forensicfocus.com/hidden-data-analysis-ntfsDigital


View Full Document

UTD CS 4398 - Lecture 8 Computer Forensics Data Recovery and Evidence Collection

Documents in this Course
Botnets

Botnets

33 pages

Botnets

Botnets

33 pages

Load more
Download Lecture 8 Computer Forensics Data Recovery and Evidence Collection
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture 8 Computer Forensics Data Recovery and Evidence Collection and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture 8 Computer Forensics Data Recovery and Evidence Collection 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?