Course Title: Fundamentals of Computer Forensics
Instructor: Dr. Hanan Hindy
Contact Information: hanan.hindy@cis.asu.edu.eg
Expectation outline provided.
Author: Joakim Kävrestad
Title: Fundamentals of Digital Forensics
Focus: Theory, Methods, and Real-Life Applications
Publisher: Springer
Assignments must be submitted on time; missing deadlines is unacceptable.
Plagiarism is prohibited.
Emphasis on enjoying the learning process and encouraging questions.
Total Grade: 100 points
Breakdown:
Final Exam: 50 points
Year Work: 50 points:
Midterm Exam: 15 points
Case Report: 5 points
Practical Exam: 20 points
Lab work and assignments: 10 points
Day: Tuesday
Time: 1 PM - 2 PM
Location: Office on Second Floor
Email: hanan.hindy@cis.asu.edu.eg
Topics Covered:
Introduction
Ethical Guidelines for Digital Forensics
Digital Evidence
Computer Theory for Digital Forensics
Notable Artifacts
Collecting Evidence
Open-Source Tools for Digital Forensics
Practical Topics:
Data Acquisition (Windows & Linux)
File Analysis
FAT & NTFS File Systems
Windows Analysis
Windows Registries
Recycle Bin Analysis
Traffic Analysis
Analyzing SSL & TLS
Reference Material: YouTube Video
Key Questions:
What is Digital Forensics?
What is Forensic Examination?
Process Overview
Who is involved?
What can digital forensics do?
Ethical Guidelines for Digital Forensics
Discussion on Digital Evidence and Cybercrime
Scientific methods for:
Preservation
Collection
Validation
Identification
Analysis
Documentation
Presentation of digital evidence
Purpose: Assist in reconstructing criminal events and anticipating unauthorized actions.
Origin: Defined at the First Digital Forensics Research Workshop in 2001.
Focus: Examination of digital environments to determine:
If a crime was committed
Events such as remote control or intrusion.
Examination includes what is currently happening, focusing on:
Law enforcement applications
Corporate investigations
Focus on retrieving, storing, and analyzing electronic data relevant to criminal investigations:
Includes data from computers, hard drives, mobile devices, etc.
Issues:
Extracting data from damaged devices
Locating evidence in vast data
Ensuring methods capture data without alteration
Definition: Collection, analysis, and reporting of digital data in a legally admissible manner.
Importance: Supports crime detection and the resolution of disputes involving digital evidence.
Comparison with other forensic disciplines.
Foundation: Practice of collecting, analyzing, and reporting digital data.
Parties involved:
Requester of examination
Individual or device being examined
Figure 1.1: Overview of forensic processes including input, processes, and output.
Differences in targeting between criminal and corporate investigations.
Criminal Investigation: Targeting a person suspected of a crime after obtaining a warrant.
Corporate Investigation: More focus may be on examining devices rather than individuals based on specific reasons.
Exploration of digital actions and events conducted with devices.
Investigation complexities lead to new questions arising.
Forensic Examination Overview revisited with an emphasis on its iterative nature.
Functions:
Uncover actions performed using a digital device
Analyze device storage
Track internet activities and document ownership
Geographic tagging of multimedia
Overall, skilled experts can reveal comprehensive actions within digital devices
Exploration of various criminal investigations involving computer forensic experts.
Involvement across various cases: theft, fraud, murder, etc.
Duties:
Examine digital evidence
Assist in house searches
Provide consultancy for technical queries
Serve as witnesses in court
Participate in interrogations
Investigating computer forensic experts' involvement in criminal and corporate environments.
Important devices of interest to forensic experts.
Stakeholders interested in forensic findings.
Instances when forensic experts investigate regulation breaches, data intrusions, or recovery processes.
Continuing considerations on the role of forensic experts.
Emphasis on the importance of ethics in forensic examinations.
Risks of privacy invasion during forensic examinations linked to solving crimes.
Ethical considerations in maintaining respect for privacy even when necessary.
Forensic examinations should prioritize integrity and ethical guidelines.
Importance of protecting the integrity of all subjects during investigations.
Legal presumption of innocence.
Extend investigations beyond just suspects to cover potentially implicated third parties.
Follow local laws
Be objective, honest, and thorough.
Avoid conflicts of interest and preserve confidentiality.
No harm to humans or undercover research.
Question posed: Do computer forensic experts work on cybercrimes?
Computer forensics involve more than just cyber crimes; it encompasses digital evidence in all crime types.
Digital evidence relevance across various crime categories.
Breakdown of crimes linked to digital evidence.
Identification of crime victims, perpetrators, motives, and means used to commit crimes.
Definition and nature of cybercrime as sophisticated attacks.
Definition of computer-driven crimes such as intrusions and denial of service attacks.
Distinction between cybercrime and cyber-aided crime.
Types of crimes associated with digital evidence and traces.
Acknowledgment and appreciation provided.