Forensics Exam
Forensics Exam
The Principal Computer Forensic Investigator is responsible for the scientific collection, preservation,
analysis, and presentation of digital evidence in a criminal investigation. They ensure the evidence is
handled legally and maintains its chain of custody.
Analyze: Examine and interpret the collected evidence to extract relevant information.
Report: Document the findings and generate a comprehensive report for legal proceedings.
Present: Testify in court as an expert witness to explain the findings and their significance.
c) Steps involved in creating a bit-stream image of a hard drive using FTK Imager (5 Marks):
MD5 hashes are a checksum used to verify the integrity of the digital evidence. They ensure the image is
an exact copy of the original hard drive and hasn't been tampered with during acquisition or storage.
This is crucial for maintaining the admissibility of evidence in court.
FTK Search Results (PST file): Identified email client software and potential location of relevant
emails.
Email Header Analysis: Extracted sender's email address, IP address, and potential location for
further investigation.
Email Domain Analysis: Determined if the sender's email originated from a free public service or
a registered domain.
Domain Registrant Details: Gathered information about the domain owner to identify potential
leads.
Hosting Company Details: Identified the email service provider to obtain server logs and
potentially user information.
Mail Server Logs: Analyzed login activity to determine if the sender's email originated from the
reported location.
Video Footage: Verified the suspect's physical presence at her desk during the time of the
email's sending (establishing alibi).
Email Attachment: Checked for hidden messages using steganography techniques (Stegdetect).
Forensic Lab Storage: Maintained the evidence in a secure and controlled environment.
g) Chain-of-Custody (5 Marks):
A chain-of-custody document is a record that tracks the possession, movement, and handling of
evidence throughout the investigation. It ensures the evidence is authentic and hasn't been tampered
with. It's crucial for establishing the admissibility of evidence in court.
Encryption: Encrypted data may require specialized tools or decryption keys for access.
Data Volume: Analyzing large amounts of data can be time-consuming and resource-intensive.
Emerging Technologies: Keeping pace with new devices, software, and digital storage methods.
Legal Issues: Understanding and complying with electronic evidence laws and regulations.
o Solution: Use filtering techniques based on user access logs, file types, and date ranges
to focus on relevant data.
Employee Access: System and network admins can provide information on user activity and data
access patterns.
o Solution: Collaborate with them to identify suspicious access attempts or data transfers.
Logical Acquisition: Preferred method as it creates a copy without altering the original data.
o Use specialized forensic software to acquire a bit-by-bit copy of the suspect's hard drive
and relevant network shares.
Keyword Searching: Can help identify specific files or documents related to the stolen data.
Timeline Analysis: Reconstruct the timeline of data access and transfers to pinpoint suspicious
activity.
Chain of Custody: Maintaining a documented record of evidence handling is critical to ensure its
admissibility in court.
Privacy Concerns: Only acquire data relevant to the investigation and avoid accessing personal
information not related to the case.
Authorization: Obtain a warrant for data acquisition unless there's exigent circumstances
(immediate threat to life or evidence).
1. Collection: Capture network traffic data using packet sniffers or network taps.
2. Analysis: Identify suspicious network activity, intrusions, and data exfiltration attempts.
3. Reconstruction: Piece together the sequence of events and identify the source of the attack.
4. Reporting: Document the findings and generate a report for legal proceedings.
Network Traffic Logs: Records of data packets flowing through the network, including source,
destination, and content (if unencrypted).
IDS/IPS Logs: Data from Intrusion Detection/Prevention Systems identifying suspicious network
activity.
DNS Logs: Records of Domain Name System queries, revealing websites accessed.
Question 4: Importance of Report Writing in Computer Forensics
a) Importance:
A well-written report clearly documents the investigation process, findings, and conclusions.
Eye Witness: Reports observations of an event (e.g., seeing someone using a computer).
Expert Witness: Analyzes digital evidence and interprets its technical significance in the context
of the case (e.g., explaining deleted files recovered from a computer).
Presents technical findings from the computer forensic investigation to the court in
understandable terms.
Explains the methodology used and the implications of the evidence for the case.
Clarity and Conciseness: Use clear language and avoid technical jargon where possible.
Computer forensics is the scientific method of collecting, analyzing, and preserving digital evidence from
electronic devices. Law enforcement uses it to investigate cybercrime, financial fraud, identity theft, and
other crimes where digital evidence is present.
o Direct: Digital evidence directly related to the crime (e.g., incriminating documents).
o Indirect: Supports the existence or nature of direct evidence (e.g., access logs).