Skip to content

Commit b8cfb86

Browse files
committed
update notes
1 parent e7e482d commit b8cfb86

1 file changed

Lines changed: 84 additions & 9 deletions

File tree

course/postgraduate/forensics.md

Lines changed: 84 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -430,8 +430,57 @@ by their own pieces of legislation.
430430
# W5: Legal Framework
431431
## Key pieces of legislation
432432
1. [Computer Misuse Act](https://www.legislation.gov.uk/ukpga/1990/18/crossheading/computer-misuse-offences)
433+
434+
**Amendments**
435+
The amendments to the Computer Misuse Act 1990 by Part 5 of
436+
the Police and Justice Act 2006 are:
437+
- Section 35. Unauthorised access to computer material, punishable by up to 2 years
438+
in prison or a fine or both
439+
- Section 36. Unauthorised acts with intent to impair operation of computer,
440+
etc. punishable by up to 10 years in prison or a fine or both. This covers
441+
Denial of Service (DoS) attacks.
442+
- Section 37. Making, supplying or obtaining articles intended for use in
443+
computer misuse offences, punishable by up to 2 years in prison or a fine or both
444+
433445
2. [Investigatory Powers Act](https://www.legislation.gov.uk/ukpga/2016/25/contents/enacted)
434446

447+
**Provisions of the Act**
448+
- introduced new powers, and restated existing ones, for UK intelligence agencies and law
449+
enforcement to carry out targeted interception of communications, bulk collection
450+
of communications data, and bulk interception of communications;
451+
- created an Investigatory Powers Commission (IPC) to oversee the use of all investigatory
452+
powers, alongside the oversight provided by the Intelligence and Security Committee of
453+
Parliament and the Investigatory Powers Tribunal. The IPC consists of a number of serving
454+
or former senior judges. It combined and replaced the powers of the Interception of
455+
Communications Commissioner, Intelligence Services Commissioner, and Chief
456+
Surveillance Commissioner;
457+
- established a requirement for a judge serving on the IPC to review warrants for accessing
458+
the content of communications and equipment interference authorised by a Secretary of
459+
State before they come into force;
460+
- required communication service providers (CSPs) to retain UK internet users' "Internet
461+
connection records" – which websites were visited but not the particular pages and not the
462+
full browsing history – for one year;
463+
- allowed 48 authorities such as police, intelligence officers and other government
464+
department managers (including HMRC, the Department of Health, the Food Standards
465+
Agency, the Gambling Commission, the Department for Work and Pensions, and
466+
the Department for Transport) to see the Internet connection records, as part of a targeted
467+
and filtered investigation, without a warrant;
468+
- permitted the police and intelligence agencies to carry out targeted equipment interference,
469+
that is, hacking into computers or devices to access their data, and bulk equipment
470+
interference for national security matters related to foreign investigations;
471+
- placed a legal obligation on CSPs to assist with targeted interception of data, and
472+
communications and equipment interference in relation to an investigation; foreign
473+
companies are not required to engage in bulk collection of data or communications;
474+
- maintained an existing requirement on CSPs in the UK to have the ability to remove
475+
encryption applied by the CSP; foreign companies are not required to remove encryption;
476+
- put the Wilson Doctrine* on a statutory footing for the first time as well as safeguards for
477+
other sensitive professions such as journalists, lawyers and doctors;
478+
- provided local government with some investigatory powers, for example to investigate
479+
someone fraudulently claiming benefits, but not access to Internet connection records;
480+
- created a new criminal offence for unlawfully accessing internet data;
481+
- created a new criminal offence for a CSP or someone who works for a CSP to reveal that
482+
data has been requested.
483+
435484
## Regulation of security technologies
436485
The following principles for the handling of digital electronic evidence come from
437486
the Association of Chief Police Officers (ACPO).
@@ -454,8 +503,9 @@ the Association of Chief Police Officers (ACPO).
454503
# W6: The Forensics Process
455504
## The Investigative Methodology
456505
### Differences between Conventional and Digital Forensics
457-
**Conventional forensics** is built on top of Locard's Exchange Principle.
458-
This principle says that every contact leaves a trace. When there is physical contact,
506+
**Conventional forensics** is built on top of **Locard's Exchange Principle**.
507+
This principle says that every contact leaves a trace, because it results in
508+
an exchange of physical material. When there is physical contact,
459509
there is indeed an exchange of physical material.
460510

461511
In theory, one might be able to cover digital tracks, and someone could actually
@@ -583,19 +633,19 @@ to repeat the steps until a conclusion is reached.
583633
**Attributing activities** on a computer to a particular person can be challenging.
584634
For example, logs showing that an internet account was used to commit a crime
585635
do not prove that the owner of that account was responsible, since someone else
586-
could have used the individual’s account. However, personal communications and
587-
access to online banking or e-commerce accounts can make it difficult for a person
636+
could have used the individual’s account. However, **personal communications** and
637+
**access to online banking** or **e-commerce accounts** can make it difficult for a person
588638
to deny responsibility for the illegal activities on the computer around
589639
the same time. It is important to use evidence from multiple independent sources.
590640

591641
**Assessing alibis** can also be tricky. Again, the use of evidence from multiple sources
592642
is essential, as it is not difficult to alter the clock on a machine or change
593-
the creation time of a file. However, evidence of clock tampering may enable a
643+
the creation time of a file. However, **evidence of clock tampering** may enable a
594644
forensic practitioner to conclude that the computer owner intentionally backdated
595645
a digital document for example.
596646

597-
**Determining intent** can be done by analysing internet search history,
598-
suspicious behaviour or simply through notes and plans that were not deleted.
647+
**Determining intent** can be done by analysing **internet search history**,
648+
**suspicious behaviour** or simply through **notes** and **plans** that were not deleted.
599649
In several cases, internet searches on suspects’ computers revealed their intent
600650
to commit murder.
601651

@@ -608,8 +658,8 @@ and lead to further breakthroughs.
608658

609659
Finally, there is **document authentication**. Significant attributes such as
610660
the author of a document or its date of creation can be tampered with, as
611-
was already mentioned. In these cases, it is possible to use date-time stamps
612-
on files and in log files, look for nuances on date-time stamps, look for
661+
was already mentioned. In these cases, it is possible to use **date-time stamps
662+
on files and in log files**, look for nuances on date-time stamps, look for
613663
meta-data within files or inspect the files through digital stratigraphy.
614664
Stratigraphy, which is a building block process in archeology, is the study of layers
615665
to determine elements such as the origin, the composition, or the time frame
@@ -790,6 +840,9 @@ human communications** like emails and chat sessions.
790840
can be presented as valid digital evidence in a court of law.
791841

792842
# W8: Anti-forensics
843+
Anti-forensics is the discipline that tries to evade and thwart the forensic process through
844+
the implementation of attacks and adoption of adversarial actions.
845+
793846
## Adversarial Actions
794847
- **Destroy**
795848
Potentially useful digital forensic evidence of their activities (wiping logs)
@@ -864,6 +917,17 @@ to ensure services are up and running**.
864917
<img src="/static/course/postgraduate/forensics/lifecycle.png" alt=""/>
865918
</div>
866919

920+
### Logging Element
921+
- Event: Single occurrence within an environment
922+
- Event Field: Describes one characteristic of the event.
923+
- Event Record: Collection of event fields
924+
- Log: Collection of event records
925+
- Audit: Process of evaluating logs
926+
- Recording: Process of tracking events fields
927+
- Logging: Process of saving events into logs
928+
- Security Incident: Occurrence of a security event (eg,
929+
intrusion attempt, data leakage, DoS, etc).
930+
867931
### Normalisation
868932
Logs come in different formats, syntax and types, eg, ASCII, binary, etc.
869933
There are some standards, but generally there is a lack of consensus.
@@ -876,6 +940,12 @@ and all relevant attributes of the event are identified and processed.
876940
The practice of collecting, monitoring and analysing security-related data from
877941
computer logs.
878942

943+
A security information management system (SIMS) automates that practice.
944+
It is a type of software that automates the collection of event log data from
945+
security devices, such as firewalls, proxy servers, intrusion-detection systems
946+
and antivirus software. It translates the logged data into correlated and
947+
simplified formats and has strong log management capabilities.
948+
879949
SIEM systems gather data from many devices, correlate events and provide information
880950
and knowledge in the form of reports and alerts.
881951

@@ -884,6 +954,11 @@ and knowledge in the form of reports and alerts.
884954
<img src="/static/course/postgraduate/forensics/sim.png" alt=""/>
885955
</div>
886956

957+
A diagram showing a frontend connected to the management server which
958+
contains the server and framework. The server is connected to DB.
959+
It is also connected to the sensor which hosts the agent and plugins
960+
such as snort and spade.
961+
887962
The OSSIM evaluates the risk as follows:
888963
$Risk = (Asset * Priority * Reliability) / 25$
889964

0 commit comments

Comments
 (0)