Thursday, September 23 2021

Digital forensics is the process of collecting, storing, and quantifying digital evidence to be used as the result of some action that takes place.

Digital forensics

Most forensics are going to take place from one of two reasons.

For in-house incident, which means somebody has broken an important policy and we need to be able to document that they’ve done this and have to go through a process of forensics.

For outside world incident, which is mostly from a legal hold.

Legal holds are documents that are sent to an organization from another organization. Lets assume organization A and organization B. The intent is to let the other organization B know that the organization A is going to do some exploratory information and that another organization B has to provide that information for them in such a way that they, organization A, can do legal discovery they need to do to.

First concept to be understood from digital forensics is the chain of custody.

The whole idea behind chain of custody is the fact that you or someone underneath your purview is going to be gather evidence against somebody or something. This someone has been looked at as a suspect. And that somebody or something has a chance of losing their job or losing money or losing freedom or even losing honor.

The presenting evidence of the data that has been collected should be of high integrity, means that there should be no claim from the suspect that the name has been changed, the time of the incident gathered has been manipulated, the data collected has been tempered. or the data was gathered days later.

So the whole idea of chain of custody is to show good integrity of the evidence itself.

So the best way to do this is through the chain of custody process.

The cornerstone of chain of custody is a chain of custody form.

Custody forms contain very specific types of information, such as:

1. Defining the evidence, like what are we actually collecting here,

and what does it look like, how does it form? That could be an image of a hard drive. It could be an image from a thumb drive. It could be a video. Whatever it might be, but we define it.

2. Documenting the collection method, one of the big things that we have to worry about is that people will challenge us that we may have changed data.

So there’s a number of collection methods that allow us to grab data from mass storage without affecting it.

3. Date and time collected, It can be very important that we determine exactly when this particular evidence was collected.

4. The people handling the evidence, we need to know the names that includes contact information email that type of information.

Exactly telling who’s handled the evidence and we’re not just talking about the people who collected it, and anybody down the chain as well.

5. The function of the person handling the evidence, that actually means, is this person an in-house I.T. person etc.

In particular we do this to show that these people are qualified to do whatever part of the chain of custody they’re involved in.

6. Locations of the evidence, evidence will move over time from the initial collection to being stored in a storage room to potentially be moved to law enforcement. We need to be able to document all of those steps.

When you approach a computer to begin gathering data, one big concern is the order of volatility. We will cover the volatility and other concepts in the subsequent blogs.

Previous

Deepfake technology! More threat than amusement

Next

Juice Jacking - A new cyber threat!

Check Also

Widget

Don’t Miss

Cyber Deal Update: Upstream Security, Hunters, build.security

Khushi Arora

Upstream Security and Hunters complete Series C and Series A funding rounds, respectively. Elastic NV acquires build.security. Funding Upstream Security, an Israeli provider of automotive cybersecurity and a data analytics platform for connected vehicles, has closed a $62 million Series C funding round led by Mitsui Sumitomo Insurance, along with new investors I.D.I. Insurance, NextGen […]

Cyber Deal Update: Loop Secure, Intelligent Automation, Blumira

Khushi Arora

Tesserent acquires Loop Secure to complement its own services, and BlueHalo merges with Intelligent Automation. Blumira completes a Series A funding round. Mergers and Acquisitions Tesserent, an Australian network security company, has announced its intent to acquire Loop Secure, a provider of managed security services, governance risk and compliance, and offensive security services also based […]

Cyber Deal Update: FHIRBlocks, InfoSum

Khushi Arora

Healthcare cybersecurity company ConsenSys Health acquires FHIRBlocks. InfoSum and Monte Carlo close a Series B and Series C funding round, respectively. Mergers and Acquisitions Otava, a Michigan-headquartered cloud solutions provider, has announced its acquisition of NewCloud Networks, a Colorado-based cloud computing services provider. The acquisition provides Otava a product portfolio that includes security services, cloud […]

Cyber Deal Update: Carve Systems, Baffle, Certik

Khushi Arora

iVision acquires Carve Systems, Baffle closes a Series B funding round, and CertiK closes adds to its Series B funding round announced last month. Mergers and Acquisitions iVision, a Georgia-based provider of IT infrastructure and application solutions, has acquired Carve Systems, a New York-based cybersecurity company that provides security testing, security engineering, and security strategy […]

Cyber Executive Moves: Aegon Asset Management, Tego Cyber

Khushi Arora

Aegon Asset Management hires former COO of MN and Tego Cyber gains a new CISO. Aegon Asset Management, based in The Netherlands, has appointed Nicole Grootveld-Sandig as its chief technology officer. Grootveld-Sandig joins Aegon from the Dutch specialist pensions management company MN NV. Tego Cyber, a Nevada-based developer of cyber threat intelligence solutions, has hired […]

Cyber Deal Update: Appriss Insights, Espagon

Khushi Arora

Equifast acquires data analytics company Appriss Insights, while Cisco acquires observability provider Espagon. Mergers and Acquisitions Equifax, an Atlanta-based global data, analytics and technology company, has announced its acquisition of Appriss Insights, a Kentucky-based information technology company providing customized solutions to enhance security and financial processes for businesses, for $1.825 billion. “We are extending the […]