A Strategic Approach

author-image
DQI Bureau
New Update

Though cyber forensics or incident response has become a vital need for the
growing cyber threats against the enterprises, it is generally overlooked until
a major security breach occurs. These result in an unnecessary time and monetary
loss, not to mention the stress associated with crisis management.

Advertisment

As enterprise networking environments continue to expand in diversity, scope,
geography and the size of digital information progresses from a few hundred
megabytes per workstation to terabytes of local storage, the number of cyber
attacks or crime targeted towards enterprises grow manifold.

For an enterprise, the initial response time following an attack or incident
is the most crucial. Therefore, a calculated and planned response is an
organization's best line of defense to prevent the compromise of critical
business systems. An enterprise that lacks an internal team of cyber forensics
investigators may not be able to quickly stabilize its network and data or
preserve forensic evidences.

Tools
of Trade

Few list of tools used
during various stages of investigations are-

Coroners Tool Kit:
Set of UNIX and LINUX data collection and analysis tools.

Encase Forensic: An industry accepted commercial software capable
of conducting large-scale and complex investigations from beginning to
end.

Forensic Boot CD: Helix / Knoppix.

Disk Imaging Tools: Software-based tools such as Linux dd, EnCase,
SafeBack, ILook or hardware-based tools such as SOLO Forensics, Solitaire.

Write-blockers: Software-based tools such as PDBlock, Writeblocker
XP or hardware-based tools such as FastBloc, SCSIBlock.

CRCCMD5: Software for comparing copies of files to find the
identical ones. It also compares the contents of the files and produces a
hash.

Net Threat Analyzer: It identifies past Internet activity, examines
Windows swap files and reveals evidence of browsing activity.

Data Recovery Software: It plays an important role in recovering or
repairing of data incase the potential evidences were deleted by the
suspect.

Few more lists of
tools can be found at   http://www.cybersnitch.net/tucofs/tucofs.asp?
mode=mainmenu

Advertisment

Best Approach

At a broader level cyber forensics can be broadly classified under four
steps

  • Acquisition: This is a practice of digital evidence collection
    process, establishing specific steps for guaranteeing integrity of digital
    evidence and memory information collection.
  • Examination and Querying: In this phase computers should not be
    simply turned on as every time a computer is powered on the access times of
    certain files is altered; this may be crucial information to the
    investigation. Ensure the protected media is write-protected. There are
    several methods that can be used to do this. The preferred practice will
    depend on experience, available tools, and company policy. The next step is
    creation of a bit-for-bit copy of seized data followed by identification and
    separating of potentially useful data from the imaged dataset.
  • Normalization and Analysis: The purpose of this phase is to present
    only the necessary and relevant facts, to the proper people only. This helps
    them understand what occurred and what might need to be done. The extracted
    relevant data is normalized to a format or nomenclature that is easily or
    commonly understood by investigators.
  • Reporting: This is the final stage where the analyzed data is
    presented in a persuasive and evident form, which can be understood by human
    investigators and can be produced in the court of law.

In a big enterprise the ability to rapidly detect and classify malicious
activity contained within network traffic is a challenging problem exacerbated
by large datasets and functionally limited manual analysis tools.

Advertisment

Cyber crime has forced the computer and law enforcement professionals to
develop new areas of expertise and avenues of collecting and analyzing evidence.
As network intrusions, malicious insiders and criminal/terrorist organizations
take aim at corporate networks, the ability to investigate these incidents is
becoming imperative. Corporates should seriously look for implementing internal
Incident Response team who can effectively address any kind of cyber attack.

Debasis Mohanty

mail@dqindia.com

The author works for an MNC as a senior security researcher