Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Part Two: A Forensics Inquiry, Step by Step

    Written by

    David Coursey
    Published September 15, 2004
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      In my first column on this subject, I introduced a set of seven guidelines for IT departments when considering the forensic investigation of a suspect computer system. In part two, Ill offer seven more best practices and recommended steps to be used in conducting the actual examination.

      These columns started as a conversation with John Colbert, president and CEO of Guidance Software, a publisher of forensic software and a provider of professional investigative services. An ex-cop, Colbert ran the professional services business before recently becoming president of the company.

      Following our conversation, John was kind enough to summarize the discussion into the bullet points presented here. My hope is that this information will keep well-meaning IT staff out of trouble and encourage proper investigative technique.

      If an investigation is going to be conducted by an IT professional, the following seven steps should be considered:

      Using Best Practices: Enter into the investigation with the understanding that the courts rely on best practices when making a judgment regarding the admissibility of evidence. Even though the initial thought is that a simple investigation is not going to court, an unexpected discovery could change the entire direction. Thats why it is always important to follow best practices.

      Taking an introductory course to computer forensics would be extremely helpful to learn the basic best practices for data collection. NIST Special Publication 800-61, called the “Incident Handling Guide,” provides a good overview on incident handling, including technical best practices.

      /zimages/5/28571.gifClick here to read about analytics and reporting products that got high marks.

      How Much Data Should Be Collected?: It is important to decide whether the collection will include a few files or the entire hard drive. This decision should be based upon whether other data in the computer, which most likely will be destroyed or altered if not collected now, may be needed after the investigation. If deleted files are to be recovered, it is essential to make a complete copy of the entire hard drive, unless an enterprise remote-forensic software is used.

      Dont forget that the files or data sought may be imbedded in database records, compression files, encrypted files, e-mail files, etc. It may not be simple to locate the files or data in question. Under these conditions, it may be wise to collect the entire drive, so a subsequent examination can take place offline.

      Next Page: How to preserve the data.

      Preserving Data

      How Will the Data Be Preserved?: It is important to preserve the data in a manner that confirms it was not altered during or after collection. One method is to copy the data to a CD-ROM, though there is still an intermediary period where the data could have been altered. Another is to use commercially available computer forensic tools to collect the data. Best practices strongly favor this process.

      The top-of-the-line forensic tools, such as Guidance Softwares EnCase, will automatically preserve data and authenticate that it has not changed during or since collection, while also tracking chain of custody.

      Access to the Computer: Will the computer be accessed physically or through the network? If the computer is going to be accessed physically, the hard drive can be removed and copied. Most computer forensic investigators use forensic write-blocking devices when this process is chosen.

      • Turn the computer off. (Computer forensic experts have significant training on when and how to power off computers depending on the operating system and the state of the machine.)
      • Photograph the exterior and attached devices.
      • Inspect and document the exterior.
      • Inspect and document the interior.
      • Document the details of the hard drive(s).
      • Use a trusted computer and a freshly wiped and formatted hard drive for the collection.
      • Connect the drive(s) to a write-blocking device, if available.
      • Copy the data from the hard drive(s) to the newly formatted hard drive. Or create an evidence file with the forensic software.
      • After the copy is complete, verify the integrity of the copied data. This is done by taking before and after MD5 hash values. Forensic software does this automatically.
      • Replace the hard drive in the computer, and complete any documentation.

      If the computer is going to be accessed remotely–through the network–there is a very good chance that the date and time stamps for the files will be altered in the process. There is only one network-enable computer forensic tool available that can collect the data in a forensic manner, which is Guidance Softwares EnCase Enterprise Edition.

      For more insights from David Coursey, check out his Weblog.

      Examine the Data: After the data has been collected, it should be examined. If the examination takes place prior to the collection, the metadata of the file may be altered and permanently destroyed. This is especially true for live systems.

      Do not examine the original collected data if it is in raw format. The metadata will be permanently altered. Work from a copy, or use a forensic tool that makes an evidence file that prevents any changes whatsoever. Best practices today strongly favor using a forensic tool.

      Report or Present the Findings: Whether the information was found or not, a report should be prepared documenting the findings or lack thereof, unless otherwise directed by management or legal counsel. Some computer forensic tools have a reporting mechanism to aid in this step.

      Archive the Data: Copy the data and any associated electronic findings to CD-Rom, DVD or digital tape. Label the storage media appropriately. Store it in a safe, secure environment until authorized to destroy it.

      There you have the 14 guidelines, best practices and steps an IT staff should follow in conducting an investigation. As I said, its my hope this information will fall into the hands of everyone who might someday be asked to “look into” someones computer and doesnt really understand what that process entails.

      Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Be sure to add our eWEEK.com Security news feed to your RSS newsreader or My Yahoo page

      David Coursey
      David Coursey
      One of technology's most recognized bylines, David Coursey is Special Correspondent for eWeek.com, where he writes a daily Blog (blog.ziffdavis.com/coursey) and twice-weekly column. He is also Editor/Publisher of the Technology Insights newsletter and President of DCC, Inc., a professional services and consulting firm.Former Executive Editor of ZDNet AnchorDesk, Coursey has also been Executive Producer of a number of industry conferences, including DEMO, Showcase, and Digital Living Room. Coursey's columns have been quoted by both Bill Gates and Steve Jobs and he has appeared on ABC News Nightline, CNN, CBS News, and other broadcasts as an expert on computing and the Internet. He has also written for InfoWorld, USA Today, PC World, Computerworld, and a number of other publications. His Web site is www.coursey.com.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×