* Basics of digital forensics A journalist from South Africa recently wrote to me with a series of interesting questions about forensics and I had such fun answering that I got his permission to post his questions and my answers in this column and the next.First, some general resources about computer forensics.Investigating Computer-Related Crime: A Handbook for Corporate Investigators, by Peter Stephenson.https://www.amazon.com/exec/obidos/ASIN/0849322189/fusion0e You may find some good resources in my CJ341 CyberLaw and Cybercrime course lectures at:https://www2.norwich.edu/mkabay/courses/academic/norwich/cj341/lectures.htm In particular, I recommend looking at these:https://www2.norwich.edu/mkabay/courses/academic/norwich/cj341/05_Forensic_Framework.ppthttps://www2.norwich.edu/mkabay/courses/academic/norwich/cj341/09_Remnants.ppthttps://www2.norwich.edu/mkabay/courses/academic/norwich/cj341/15_Using_Forensic_Utilities.pptThe journalist asked, “What do the people who work with computer forensics do and how do they do it?”They collect and secure digital evidence for use in analyzing the occurrence, nature, mechanisms and perpetrators of computer security violations, some of which may be crimes. They understand how information is created and stored in different kinds of digital media and they use specialized procedures and programs to safeguard data again damage and to find relevant data. They also understand the legal requirements for proper chain of custody of evidence as well as restrictions on investigative techniques that are required for effective use in legal proceedings, if any. “What sort of tricks do cyber criminals use to cover their tracks?”Depending on whether criminals have physical access to computer systems they are manipulating, they can:* Use false or temporary identifiers to launch attacks.* Route their attack through several compromised systems to obscure their trail of IP addresses in the packets they generate. * Create IP packets with falsified headers.* Use someone else’s compromised ID on the target computer or network.* Falsify or delete log files (if they can gain root access).* Store information in difficult-to-get-to parts of disks such as slack space.“How do the experts sidestep logic bombs and get to the truth?”Most forensic examiners find out if there is an uninterruptible power supply (UPS) on the computer side of the power cord; if there is not, they pull the plug to stop the computer dead without allowing any shutdown procedures that might result in damage programmed by the criminal. If there is a UPS feeding the computer directly, it may be necessary to do some work with wire cutters inside the computer casing – assuming there are no booby traps.Once the computer has been halted, the forensic examiner typically removes the disk drive(s) and makes bit-for-bit images (copies) onto non-erasable media. These copies are preserved as primary evidence along with the original disk drive if possible. It’s also possible to make a bit-for-bit copy onto a similar hard disk for experimental work. Using forensic utilities, the investigators then searches the entire contents of the disk(s) duplicate(s) looking for interesting information. The hard disk may contain a swap file; that can show part or all of the contents of live memory (RAM) at the time of the last copy to disk before the system was halted. The swap file can therefore have evanescent information that would not normally be seen on disk, such as display or print buffers, passwords in transit through data communications channels, and so on.More in the next article. Related content news Cisco CCNA and AWS cloud networking rank among highest paying IT certifications Cloud expertise and security know-how remain critical in building today’s networks, and these skills pay top dollar, according to Skillsoft’s annual ranking of the most valuable IT certifications. Demand for talent continues to outweigh s By Denise Dubie Nov 30, 2023 7 mins Certifications Certifications Certifications news Mainframe modernization gets a boost from Kyndryl, AWS collaboration Kyndryl and AWS have expanded their partnership to help enterprise customers simplify and accelerate their mainframe modernization initiatives. By Michael Cooney Nov 30, 2023 4 mins Mainframes Cloud Computing Data Center news AWS and Nvidia partner on Project Ceiba, a GPU-powered AI supercomputer The companies are extending their AI partnership, and one key initiative is a supercomputer that will be integrated with AWS services and used by Nvidia’s own R&D teams. By Andy Patrizio Nov 30, 2023 3 mins CPUs and Processors Generative AI Supercomputers news VMware stung by defections and layoffs after Broadcom close Layoffs and executive departures are expected after an acquisition, but there's also concern about VMware customer retention. By Andy Patrizio Nov 30, 2023 3 mins Virtualization Data Center Industry Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe