< All Computer Hacking and Forensics Notes

amosloh | Computer and Hacking Forensics | Module 1 - Modern Forensics

By: amosloh | Related Course: Computer Hacking and Forensics | Published: April 4, 2018 | Modified: April 4, 2018
Join Cybrary

NotepadModern Forensics Notes - Amos

Evolution of forensics:

  • Fingerprints
  • Blood grouping
  • Firearms
  • Documentation
  • Criminal investigation process
  • FBI
  • Computer Analysis/Response Team (became mainstream)
  • 1st international conference
  • IOCE (International Organization on Computer Evidence)
  • Forensic Science Symposium
  • FBI Regional Forensic (deployed)
  • Cybrary.IT

Modern Forensics is to:

”FIND THE TRUTH”

Preservation of evidence is important

AVOID contamination

Process :-

(Chain of Custody has to be maintained)

  1. Identify
  2. Preserve
  3. Extraction (of evidence from crime scene)
  4. Interpret (the evidence by prosecution and defence)
  5. Documentation (eg. chain of custody, evidence preservation)
  6. Presentation (court room)

BASIC STEPS

  1. Crime happens
  2. Identify whether it is a crime scene
  3. Get warrant
  4. First responder (who evaluates the evidence first)
  5. Seize (extract) evidence (by preserving)
  6. Transport
  7. Make bit-by-bit copies
  8. MD5/SHA to verify and proof no unauthorise change
  9. Chain of custody
  10. Store the evidence
  11. Analyse (interpret)
  12. Report (documentation)
  13. Court (presentation)

EVIDENCE NEEDS TO BE

  • WHOLE (COMPLETE)
  • ADMISSIBLE (IS THE EVIDENCE COLLECTED PROPERLY/PROOF relevant to the case)
  • ACCURATE (TRUSTWORTHY)
  • AUTHENTIC (true, best, original)
  • ACCEPTABLE (judge or jury will accept it that will proof or disproof a finding)

TYPES

  • Clickjacking (click something else)
  • Extortion
  • Investment fraud
  • Software piracy
  • Copyright piracy
  • DOS (denial of service)
  • Auction fraud (ebay)
  • Email Bomb/Spam/Hoax
  • Identity theft
  • Virus & worms
  • Malware
  • Cyber stalking
  • Financial Fraud
  • Child porn
  • Embezzlement (theft of funds with trust)
  • Phishing
  • Whaling
  • Spear phishing

Relevant research

CSI-FBI studies

Cybercrime.gov

Google (is your friend)


< All Computer Hacking and Forensics Notes
Join Cybrary

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel