Security Basics mailing list archives

Computer Forensics


From: "steve" <securityfocus () delahunty com>
Date: Tue, 1 Jun 2004 09:13:02 -0400

I recently wrote the list inquiring about firms that folks would recommend
for computer forensics, and thanks for the replies.  I have the list of
recommendations if anyone wants the company names.  An interesting aspect of
the responses was to define what is meant by Computer Forensics.  I think it
would be good to hear from the list as to what we believe makes up the
commonly understood realm of Computer Forensics.  Here is how I have seen
Computer Forensics traditionally defined, into these areas:

    Electronic Discovery
    Forensic Analysis
    Expert Testimony

Below is how the Information Systems Audit and Control Association (ISACA)
www.isaca.org defines Computer Forensics.  The only area where I would not
totally agree with their definition is that the outcome of the work does not
necessarily have to be for use in a court of law.
2.1 Computer Forensics
2.1.1 Computer forensics can be defined as the process of extracting
information and data from computer storage media using the available
technology and establishing its accuracy and reliability for the purpose of
producing the same as evidence in a court of law.

2.1.2 The challenge to computer forensics is actually finding this data,
collecting it, preserving it and presenting it in a manner acceptable in a
court of law.

2.1.3 Computer forensics primarily involves exploration and application of
scientifically proven methods to gather, process, interpret and utilise
digital evidence to:

  a.. Provide a conclusive description of all cyberattack activities for the
purpose of complete post-attack enterprise and critical infrastructure
information restoration
  b.. Correlate, interpret and predict adversarial actions and their effect
on planned operations
  c.. Make digital data suitable and persuasive for introduction into a
criminal investigative process
2.1.4 Computer forensics is a science as well as an art for extracting and
gathering data from a computer to determine how an abuse or intrusion has
occurred, when it occurred and who was the intruder. Organisations that
employ good security practices and maintain appropriate logs are able to
achieve the objectives easily. However, with the right knowledge and tools,
forensic evidence can be extracted even from burned, waterlogged or
physically damaged computer systems.





---------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off 
any course! All of our class sizes are guaranteed to be 10 students or less 
to facilitate one-on-one interaction with one of our expert instructors. 
Attend a course taught by an expert instructor with years of in-the-field 
pen testing experience in our state of the art hacking lab. Master the skills 
of an Ethical Hacker to better assess the security of your organization. 
Visit us at: 
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
----------------------------------------------------------------------------


Current thread: