Module 04 Digital Evidence and First Responder Procedure
Module 04 Digital Evidence and First Responder Procedure
MODULE
Page 1 of 12
Contents
Page 2 of 12
Types of Investigation
1 https://en.wikibooks.org/wiki/Introduction_to_Digital_Forensics/Types
Page 3 of 12
The final form of investigation is different from the previous three. Intrusion investigation is
instigated as a response to a network intrusion, for example a hacker trying to steal corporate
secrets. The investigation focuses on identifying the entry point for such attacks, the scope of
access and mitigating the hackers activities. Intrusion investigation often occurs "live" (i.e. in
real time) and leans heavily on the discipline of network forensics.
VIDEO LECTURE
Page 4 of 12
VIDEO LECTURE
As discussed earlier, there are many volatile memory units present in system like CPU register,
Cache memory, RAM, etc. with different order of volatility. Order of volatility specifies the
how sensitive the memory is towards the loss of data. Higher is the order of volatility, higher
are the chances of data being lost/change/modified. Therefore, the forensics investigator must
follow the order of volatility to capture data from different memory devices. The order of
volatility of various digital storage devices or digital evidences is shown in the figure below.
The higher is the level of memory in the pyramid, higher is the order of volatility.
Page 5 of 12
CPU, cache and register content
Memory
4.3.5 Steganography
One of the techniques used to hide data is via steganography, the process of hiding data inside
of a picture or digital image. An example would be to hide pornographic images of children or
other information that a given criminal does not want to have discovered. Computer forensics
professionals can fight this by looking at the hash of the file and comparing it to the original
image (if available.) While the image appears exactly the same, the hash changes as the data
changes. In Forensic examination, Steganalysis is used to get the details of Steganographic
contents.
4.4 SUMMARY
1. It is advisable to take the photograph of the computer, cabling and the devices that are
attached to the victim’s computer, which are as important as victim’s computer.
Page 6 of 12
2. Only forensically clean storage devices should be used to store the logs and other
important digital information from the victim’s system.
4. The Investigator look for document properties, file signatures, browser history, chat
history, emails, printer spools, cache files, registry files, timeframe, ownership
information, etc. to find clues.
5. Do not shut-off or reboot the machine. This will erase all the valuable data present in
the volatile devices.
i. Cross-drive analysis
ii. Live
iii. Volatile
iv. Steganography
2. True or False
i. False
ii. True
iii. True
iv. True
Page 7 of 12
4.7 FURTHER READING
Bunting, S., & Wei, W. (2006). The Official EnCE: EnCase Certified ExaminorStudy Guide. Wiley
Publishing Inc.
ENISA, & Anderson, P. (2014). Electronic evidence - a basic guide for First Responders. European Union
Agency for Network and Information Security.
Godbole, N., & Belapure, S. (2011). Cyber Security (with CD): Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives. Wiley.
Kent, K., Chevalie, S., Grance, T., & Dang, H. (2006). Guide to Integrating Forensic Techniques into
Incident Response. Special Publication 800-86, National Institute of Standard and Technology, U.S.
Department of Commerce.
Mukasey, M. B., Sedgwick, J. L., & Hagy, D. W. (2008). Electronic Crime Scene Investigation:A Guide
for First Responders Second Edition. Special report, National Institute of Justice .
Nelson, B., Phillips, A., & Steuart, C. (2009). Guide to Computer Forensics and Investigations. Cengage
Learning.
Nolan, R., O’Sullivan, C., Branson, J., & Waits, C. (2005). First Responders guide to Computer Forensic.
CERT Training and Education.
Nolan, R., O’Sullivan, C., Branson, J., & Waits, C. (2005). First Responders Guide to Computer
Forensics.
Wolfe, H. B. (2007). Electronic Forensics: A Case for First Responders. 19th Annual FIRST
Conference on Computer Security Incident Handling. Spain.
2. What are the main types of investigation performed by digital forensics specialists?
Page 8 of 12
4. What is volatile data? What is order of volatility of digital evidences? Explain.
Introduction to computer forensics. (n.d.). Retrieved Oct. 11, 2015, from forensic control:
https://forensiccontrol.com/resources/beginners-guide-computer-forensics/
Krause, M., & Tipton, H. F. (Eds.). (1993). Handbook of Information Security Management.
AUERBACH.
Lawton, D., Stacey, R., & Dodd, G. (2014). eDiscovery in digital forensic investigation. CAST
publication number 32/14 available under the Open Government Licence v3.0
https://www.nationalarchives.gov.uk/doc/open-government-licence/version/3/.
Locard's Exchange Principle. (2005, April 10). Retrieved Oct. 11, 2015, from Project Gutenberg Self-
Publishing Press: http://self.gutenberg.org/article/whebn0001722373/locard
Morton, T. (2013, Sep. 13). Types of investigations. Retrieved Oct. 11, 2015, from Wikibooks:
https://en.wikibooks.org/wiki/Introduction_to_Digital_Forensics/Types
Page 9 of 12
EXPERT PANEL
Dr. Ajay Prasad, Sr. Associate Professor, University of Petroleum and Energy
Studies, Dehradun
Page 10 of 12
Mr. Rishikesh Ojha, Digital Forensics and eDiscovery Expert
Page 11 of 12
This MOOC has been prepared with the support of
Page 12 of 12