Thursday, April 11 2024

Digital forensics is the process of collecting, storing, and quantifying digital evidence to be used as the result of some action that takes place.

Digital forensics

Most forensics are going to take place from one of two reasons.

For in-house incident, which means somebody has broken an important policy and we need to be able to document that they’ve done this and have to go through a process of forensics.

For outside world incident, which is mostly from a legal hold.

Legal holds are documents that are sent to an organization from another organization. Lets assume organization A and organization B. The intent is to let the other organization B know that the organization A is going to do some exploratory information and that another organization B has to provide that information for them in such a way that they, organization A, can do legal discovery they need to do to.

First concept to be understood from digital forensics is the chain of custody.

The whole idea behind chain of custody is the fact that you or someone underneath your purview is going to be gather evidence against somebody or something. This someone has been looked at as a suspect. And that somebody or something has a chance of losing their job or losing money or losing freedom or even losing honor.

The presenting evidence of the data that has been collected should be of high integrity, means that there should be no claim from the suspect that the name has been changed, the time of the incident gathered has been manipulated, the data collected has been tempered. or the data was gathered days later.

So the whole idea of chain of custody is to show good integrity of the evidence itself.

So the best way to do this is through the chain of custody process.

The cornerstone of chain of custody is a chain of custody form.

Custody forms contain very specific types of information, such as:

1. Defining the evidence, like what are we actually collecting here,

and what does it look like, how does it form? That could be an image of a hard drive. It could be an image from a thumb drive. It could be a video. Whatever it might be, but we define it.

2. Documenting the collection method, one of the big things that we have to worry about is that people will challenge us that we may have changed data.

So there’s a number of collection methods that allow us to grab data from mass storage without affecting it.

3. Date and time collected, It can be very important that we determine exactly when this particular evidence was collected.

4. The people handling the evidence, we need to know the names that includes contact information email that type of information.

Exactly telling who’s handled the evidence and we’re not just talking about the people who collected it, and anybody down the chain as well.

5. The function of the person handling the evidence, that actually means, is this person an in-house I.T. person etc.

In particular we do this to show that these people are qualified to do whatever part of the chain of custody they’re involved in.

6. Locations of the evidence, evidence will move over time from the initial collection to being stored in a storage room to potentially be moved to law enforcement. We need to be able to document all of those steps.

When you approach a computer to begin gathering data, one big concern is the order of volatility. We will cover the volatility and other concepts in the subsequent blogs.

Previous

Deepfake technology! More threat than amusement

Next

Juice Jacking - A new cyber threat!

Check Also

Widget

Don’t Miss

The words Endpoint Detection and Response (EDR) on a green background with lines on the right side of the image

Best Endpoint Detection & Response Platforms

Lara Oporto

Endpoint Detection & Response platforms continuously monitor endpoints for signs of malicious activities, such as unauthorized access or unusual behavior, enabling rapid detection and response to potential cyber threats to safeguard organizational assets. What is Endpoint Detection and Response and how does it work? Endpoint Detection and Response (EDR) is a cornerstone in modern cybersecurity […]

AT&T AlienVault Products Review: OSSIM vs USM

Ellie Buscemi

AlienVault is now the technological basis for AT&T AlienLabs and provides multiple products for different companies’ cybersecurity needs. What AT&T AlienVault Products are Available? In December 2021, CISOstack reported that AT&T intended to acquire AlienVault to expand its cybersecurity offerings to more businesses. Two years later, AlienVault-based offerings make up a large portion of AT&T’s […]

Photo by Simon Kadula on Unsplash.

Navigating Manufacturing IIoT Cybersecurity Challenges

John Powers

Guarding the Gears: Government policy and industry collaboration to mitigate cyberthreats to manufacturers. The smart factory is on the rise. Production lines equipped with advanced sensors can monitor equipment health in real-time and predict potential issues before they disrupt operations. Temperature and humidity sensors can ensure the optimal environment for delicate manufacturing processes. RFID-enabled asset […]

Best Microsegmentation Software

Ellie Buscemi

Microsegmentation allows a company to divide digital assets into smaller, more secure groups, which makes it harder for cybercriminals to take over a company’s data center. What is Microsegmentation? Microsegmentation refers to cyber professionals building layers of cybersecurity protection between groups of digital assets or individual cyber assets. Adding these layers inside instead of only […]

Best Breach and Attack Simulation Platforms

Ellie Buscemi

Breach and attack simulation (BAS) platforms allow companies to see weaknesses in their cyber infrastructures before a malicious hacker can exploit them. What Is BAS – Breach and Attack Simulation? Breach and attack simulation (BAS) is an approach to cybersecurity that uses advanced tools to imitate the attacks used by cybercriminals on companies’ digital infrastructure. […]

Ofer Ben-Noon and Ohad Bobrov

Palo Alto Networks to Acquire Talon

Ellie Buscemi

On Monday, Palo Alto Networks agreed to acquire Israeli startup Talon Cyber Security, an enterprise browser platform. The deal values Talon at between $600 to $700 million, according to The Information. Palo Alto will integrate Talon’s enterprise browser solution into its Prisma SASE product. The acquisition comes among a wave of acquisitions and releases involving […]