The Realm of
Digital Forensics
  ISACA – Malta Chapter
     26th March 2009


                          Donald Tabone
Agenda


 Introducing Computer Forensics
 Computer Forensics in the Real
 World
 The cost vs. benefit perspective
 Modern day challenges
Digital Forensics




Where do we begin?
Introducing Computer
           Forensics..1
Defining Computer Forensics
  Is the systematic accumulation of digital
  evidence
More than
  Investigating computer-related incidents
  Incident Response
But
  Collecting evidence and building a story that
  can be used in court – and if necessary lead to
  a conviction
Introducing Computer
         Forensics..1
Laws for digital evidence were established
in the late 1980’s

Identification, collection, preservation and
analysis of digital information

Information class: stored, transmitted and
produced
Introducing Computer
         Forensics..2
Defining the scope for CF
   Disaster recovery vs. computer forensics
   Fraud, embezzlement, pedophilia, harassment, industrial
   espionage, policy breaches
   Email recovery and analysis
   Preservation of evidence
   Analysis of user activity
   Password recovery
   Tracing web browsing activities
Four Major Stages

Acquisition
   Admissible, Authentic, Complete, Reliable, Believable
Identification
   Cataloguing Digital Evidence, Bag-and-tag
Evaluation
   Searching for keywords, detecting file signatures,
   steganography, sector level analysis
Presentation
   Reporting without making assumptions,
   Producing chain of custody log documentation,
   Presentation in a court of law as an expert / technical
   witness
Computer Forensics
          in the real world
Real world examples
  TJX
     The hackers who ransacked TJX Companies Inc.'s computer
     network and exposed at least 45.7 million credit and debit
     card holders to identity fraud reportedly began their assault
     by exploiting Wi-Fi weaknesses at a Marshalls clothing store
     near St. Paul, Minn.
  Heartland Payment Systems
     Heartland Payment Systems, a credit card processor, on
     January 20th, that up to 100 Million credit cards may have
     been disclosed in what is likely the largest data breach in
     history.
     If accurate, such figures may make the Heartland incident
     one of the largest data breaches ever reported.
  State Bank of India (SBI)
     Mumbai: The State Bank of India, the country’s largest bank,
The Cost vs. Benefit
          perspective
Conducting digital forensics is expensive
and time consuming and not always
conclusive
Companies must stand to gain from CF
   Reputation. Bad publicity? e.g. credit card
   rating
   Justice through the legal system for fraud
   Reducing liability
Political reasons
   Official recording of events
Bottom line – how much do you stand to
The Cost vs. Benefit
            perspective
“When it comes to creating adequate security
incident response procedures, creating a
feedback link that will lead to improving
existing security practices and closing the gap
between security policy creation and its
enforcement, the answer is yes – investing in
an enterprise electronic forensics program is
probably the right thing to do.”
                    Milen Nikolov, IT consultant and trainer, Etisalat Academy
Modern day challenges..1

Time is money!
   And hard drives are becoming huge
Technology evolutions
   MD5 hash algorithm cracked!
   The move to smarter mobile devices
   The cost of keeping abreast with investigation
   hardware & software
Multiple writes to secure delete, a myth?
   Craig Wright, a forensics expert, claims to have put
   this legend finally to rest
Anti-forensics groups and software
   People are becoming a lot smarter as anti-forensic
Modern day challenges..2

Finding the right skills for an investigator
   Intuitive and able to think outside the box
   Technical expertise – a jack of all trades
   Legal term understanding
   Being a technical / expert witness in court
   Discretion
   Ethical
   The ability to convey the concept to various individuals
Full Disk Encryption (FDE)
   Microsoft Bitlocker / PGP WDE
Security concerns
   Plausible Deniability e.g. Truecrypt
The keys to successful
     Computer Forensics
Informative documentation throughout
  Transparent forensic procedures
  Accuracy of process and content
Preservation of evidence and chain of
custody
Continual research
An aptitude towards being dynamic
TIME!
Conclusion..
The word ‘forensics’ literally means
   A science that deals with the relation and application of
   a particular field
Computer forensics is the science and discipline
that is concerned with the relation and application
of computers and legal issues
The computer forensic professional…
   … is a cross between technician, programmer and
   investigator – a curiosity-oriented person who
   determines why and how past events occurred
Computer forensics is used to uncover the
proverbial ‘smoking-gun’
Changes to technology will cause growing pains
Food for thought..

 As the digital evolution becomes ever more
 predominant in today's world, can
 companies afford to not be diligent about
 evaluating risk?
 How much does your company stand to
 lose?
   Understanding how records can be
retrieved is instrumental in reducing the
      risk from unwanted discovery.
   Can you anticipate your companies
                  reaction?
Questions?
   Thank you!
References

(Craig Wright, Dave Kleiman, Shyaam Sundhar R. S.: Overwriting
Hard Drive Data: The Great Wiping Controversy) http://www.
springerlink.com/content/408263ql11460147/
http://www.h-online.com/security/Secure-deletion-a-single-overwrite-
will-do-it--/news/112432
Digital Forensics Handout – Dr. Guillermo Francia III – Jacksonville
State University
Community of Computer Forensic Professionals http://www.
computerforensicsworld.com
Introducing Digital Forensics – Peter Sommer, London School of
Economics
Law, investigations and ethics – Kelly J Kuchta http://www.
lazarusalliance.com/horsewiki/images/d/d4/Computer-Forensics-
Today.pdf
Is it really worth it? - Milen Nikolov, IT consultant and trainer, Etisalat
Academy, 2007 http://www.cpilive.net/v3/print.aspx?NID=1872

More Related Content

PPTX
BYOD - Bringing Technology to work | Sending Data Everywhere
PDF
Digital Crime & Forensics - Report
PDF
Digital Crime & Forensics - Presentation
PPTX
Electronic files are records too
PDF
Who's Afraid of eDiscovery?
PDF
Dean carey - data loss-prevention - atlseccon2011
PDF
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
PDF
The Need for DLP now - A Clearswift White Paper
BYOD - Bringing Technology to work | Sending Data Everywhere
Digital Crime & Forensics - Report
Digital Crime & Forensics - Presentation
Electronic files are records too
Who's Afraid of eDiscovery?
Dean carey - data loss-prevention - atlseccon2011
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
The Need for DLP now - A Clearswift White Paper

What's hot (20)

KEY
Cloud and mobile computing for lawyers
PPTX
Digital forensics intro 20151123
PDF
What is I2 Final-Approved
PDF
Protecting the Information Infrastructure
PDF
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
PDF
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
DOCX
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
DOCX
(Alexa 09) chap.2 lab 1
PDF
Digital forensic principles and procedure
PDF
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
PDF
Data Leakage Prevention - K. K. Mookhey
PDF
Survey & Review of Digital Forensic
PPTX
Dinis Guarda "Hacking the DNA of Humanity with Blockchain and AI"
PPTX
Digital forensics
PDF
Bridging the gap between mobile and computer forensics
PPTX
Protecting Client Data 11.09.11
PPT
The Insider Threat
PDF
Electronic evidence
DOCX
Mjtanasas2
PDF
Information Security for Small Business
Cloud and mobile computing for lawyers
Digital forensics intro 20151123
What is I2 Final-Approved
Protecting the Information Infrastructure
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
(Alexa 09) chap.2 lab 1
Digital forensic principles and procedure
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Data Leakage Prevention - K. K. Mookhey
Survey & Review of Digital Forensic
Dinis Guarda "Hacking the DNA of Humanity with Blockchain and AI"
Digital forensics
Bridging the gap between mobile and computer forensics
Protecting Client Data 11.09.11
The Insider Threat
Electronic evidence
Mjtanasas2
Information Security for Small Business
Ad

Similar to The Realm Of Digital Forensics (20)

DOCX
What is Digital Forensics.docx
PPT
The-Role-of-Digital-Forensics-in-Unraveling-Modern-Cybercrimes-_1_.ppt
PDF
Data Safety And Security
PDF
To get round to the heart of fortress
PPTX
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
PPTX
Cyber Security College Workshop
PDF
Introduction to Forensic Research Digital Forensics
PDF
Digital Forensics Market, Size, Global Forecast 2023-2028
PPTX
Ecommerce security
PDF
A brief Intro to Digital Forensics
PDF
A Guide To Digital Forensics In Cybersecurity - USCSI.pdf
DOCX
Dungogan chap2 lab 1
DOCX
Zamayla chap2 lab 1
PPT
Stream Computing: Defrag Conference
DOCX
Mary hankins fernando br ua
DOCX
Brua computer forensics specialist
DOCX
Cataluña mary hapkins
PPTX
Digital forensics
PDF
Conference on Digital Forensics & Cyber Security 2016
PPTX
Cybersecurity - Sam Maccherola
What is Digital Forensics.docx
The-Role-of-Digital-Forensics-in-Unraveling-Modern-Cybercrimes-_1_.ppt
Data Safety And Security
To get round to the heart of fortress
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
Cyber Security College Workshop
Introduction to Forensic Research Digital Forensics
Digital Forensics Market, Size, Global Forecast 2023-2028
Ecommerce security
A brief Intro to Digital Forensics
A Guide To Digital Forensics In Cybersecurity - USCSI.pdf
Dungogan chap2 lab 1
Zamayla chap2 lab 1
Stream Computing: Defrag Conference
Mary hankins fernando br ua
Brua computer forensics specialist
Cataluña mary hapkins
Digital forensics
Conference on Digital Forensics & Cyber Security 2016
Cybersecurity - Sam Maccherola
Ad

More from Donald Tabone (8)

PPTX
Manning Information Security Strategy
PDF
ICTSA v2
PPTX
ISACA_21st century technologist
PPT
ELPUB_2015
PDF
MARM State of Security v2
PPTX
Selling security to the C-level
PDF
Dealing with Information Security, Risk Management & Cyber Resilience
PDF
Mca Erg Oct 09
Manning Information Security Strategy
ICTSA v2
ISACA_21st century technologist
ELPUB_2015
MARM State of Security v2
Selling security to the C-level
Dealing with Information Security, Risk Management & Cyber Resilience
Mca Erg Oct 09

Recently uploaded (20)

PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
observCloud-Native Containerability and monitoring.pptx
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
STKI Israel Market Study 2025 version august
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Hybrid model detection and classification of lung cancer
PPTX
The various Industrial Revolutions .pptx
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
A review of recent deep learning applications in wood surface defect identifi...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
NewMind AI Weekly Chronicles – August ’25 Week III
observCloud-Native Containerability and monitoring.pptx
Benefits of Physical activity for teenagers.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Getting Started with Data Integration: FME Form 101
Final SEM Unit 1 for mit wpu at pune .pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
1 - Historical Antecedents, Social Consideration.pdf
STKI Israel Market Study 2025 version august
Module 1.ppt Iot fundamentals and Architecture
Hybrid model detection and classification of lung cancer
The various Industrial Revolutions .pptx
sustainability-14-14877-v2.pddhzftheheeeee
WOOl fibre morphology and structure.pdf for textiles
Group 1 Presentation -Planning and Decision Making .pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Web Crawler for Trend Tracking Gen Z Insights.pptx
A review of recent deep learning applications in wood surface defect identifi...

The Realm Of Digital Forensics

  • 1. The Realm of Digital Forensics ISACA – Malta Chapter 26th March 2009 Donald Tabone
  • 2. Agenda Introducing Computer Forensics Computer Forensics in the Real World The cost vs. benefit perspective Modern day challenges
  • 4. Introducing Computer Forensics..1 Defining Computer Forensics Is the systematic accumulation of digital evidence More than Investigating computer-related incidents Incident Response But Collecting evidence and building a story that can be used in court – and if necessary lead to a conviction
  • 5. Introducing Computer Forensics..1 Laws for digital evidence were established in the late 1980’s Identification, collection, preservation and analysis of digital information Information class: stored, transmitted and produced
  • 6. Introducing Computer Forensics..2 Defining the scope for CF Disaster recovery vs. computer forensics Fraud, embezzlement, pedophilia, harassment, industrial espionage, policy breaches Email recovery and analysis Preservation of evidence Analysis of user activity Password recovery Tracing web browsing activities
  • 7. Four Major Stages Acquisition Admissible, Authentic, Complete, Reliable, Believable Identification Cataloguing Digital Evidence, Bag-and-tag Evaluation Searching for keywords, detecting file signatures, steganography, sector level analysis Presentation Reporting without making assumptions, Producing chain of custody log documentation, Presentation in a court of law as an expert / technical witness
  • 8. Computer Forensics in the real world Real world examples TJX The hackers who ransacked TJX Companies Inc.'s computer network and exposed at least 45.7 million credit and debit card holders to identity fraud reportedly began their assault by exploiting Wi-Fi weaknesses at a Marshalls clothing store near St. Paul, Minn. Heartland Payment Systems Heartland Payment Systems, a credit card processor, on January 20th, that up to 100 Million credit cards may have been disclosed in what is likely the largest data breach in history. If accurate, such figures may make the Heartland incident one of the largest data breaches ever reported. State Bank of India (SBI) Mumbai: The State Bank of India, the country’s largest bank,
  • 9. The Cost vs. Benefit perspective Conducting digital forensics is expensive and time consuming and not always conclusive Companies must stand to gain from CF Reputation. Bad publicity? e.g. credit card rating Justice through the legal system for fraud Reducing liability Political reasons Official recording of events Bottom line – how much do you stand to
  • 10. The Cost vs. Benefit perspective “When it comes to creating adequate security incident response procedures, creating a feedback link that will lead to improving existing security practices and closing the gap between security policy creation and its enforcement, the answer is yes – investing in an enterprise electronic forensics program is probably the right thing to do.” Milen Nikolov, IT consultant and trainer, Etisalat Academy
  • 11. Modern day challenges..1 Time is money! And hard drives are becoming huge Technology evolutions MD5 hash algorithm cracked! The move to smarter mobile devices The cost of keeping abreast with investigation hardware & software Multiple writes to secure delete, a myth? Craig Wright, a forensics expert, claims to have put this legend finally to rest Anti-forensics groups and software People are becoming a lot smarter as anti-forensic
  • 12. Modern day challenges..2 Finding the right skills for an investigator Intuitive and able to think outside the box Technical expertise – a jack of all trades Legal term understanding Being a technical / expert witness in court Discretion Ethical The ability to convey the concept to various individuals Full Disk Encryption (FDE) Microsoft Bitlocker / PGP WDE Security concerns Plausible Deniability e.g. Truecrypt
  • 13. The keys to successful Computer Forensics Informative documentation throughout Transparent forensic procedures Accuracy of process and content Preservation of evidence and chain of custody Continual research An aptitude towards being dynamic TIME!
  • 14. Conclusion.. The word ‘forensics’ literally means A science that deals with the relation and application of a particular field Computer forensics is the science and discipline that is concerned with the relation and application of computers and legal issues The computer forensic professional… … is a cross between technician, programmer and investigator – a curiosity-oriented person who determines why and how past events occurred Computer forensics is used to uncover the proverbial ‘smoking-gun’ Changes to technology will cause growing pains
  • 15. Food for thought.. As the digital evolution becomes ever more predominant in today's world, can companies afford to not be diligent about evaluating risk? How much does your company stand to lose? Understanding how records can be retrieved is instrumental in reducing the risk from unwanted discovery. Can you anticipate your companies reaction?
  • 16. Questions? Thank you!
  • 17. References (Craig Wright, Dave Kleiman, Shyaam Sundhar R. S.: Overwriting Hard Drive Data: The Great Wiping Controversy) http://www. springerlink.com/content/408263ql11460147/ http://www.h-online.com/security/Secure-deletion-a-single-overwrite- will-do-it--/news/112432 Digital Forensics Handout – Dr. Guillermo Francia III – Jacksonville State University Community of Computer Forensic Professionals http://www. computerforensicsworld.com Introducing Digital Forensics – Peter Sommer, London School of Economics Law, investigations and ethics – Kelly J Kuchta http://www. lazarusalliance.com/horsewiki/images/d/d4/Computer-Forensics- Today.pdf Is it really worth it? - Milen Nikolov, IT consultant and trainer, Etisalat Academy, 2007 http://www.cpilive.net/v3/print.aspx?NID=1872