computer forensics

(redirected from Cyber forensics)

computer forensics

[kəm¦pyüd·ər fə′ren·ziks]
(forensic science)
The study of evidence from attacks on computer systems in order to learn what has occurred, how to prevent it from recurring, and the extent of the damage.

computer forensics

The investigation of a computer system believed to be involved in cybercrime. Forensic software provides a variety of tools for investigating a suspect PC. Such programs may copy the entire hard drive to another system for inspection, allowing the original to remain unaltered.

Another utility compares file extensions to the content within the files to determine if they have been camouflaged with phony extensions. For example, an image file might be renamed as a text document and vice versa. In addition, hard drives can be examined for data that has been deleted (see data remanence).

Network Forensics
In order to identify attacks, "network forensics" deals with the capture and inspection of packets passing through a selected node in the network. Packets can be inspected on the fly or stored on disk for later analysis. See hidden disk areas, forensically clean, slack space, write blocker, file wipe, IDS, Internet forensics and security event management software.

NIST Phases



The National Institute of Standards and Technology "Guide to Integrating Forensic Techniques into Incident Responses" covers four phases, which are briefly summarized below. For the complete 121-page NIST publication, download draft SP 800-86 at http://csrc.nist.gov/publications/nistpubs.

1 - Collection: Identify, label, record and acquire data from possible sources, while preserving the integrity of the data.

2 - Examination: Use manual and automated methods to assess and extract data of particular interest, while preserving the integrity of the data.

3 - Analysis: Use legally justifiable methods and techniques to derive useful information.

4 - Reporting: Describe actions used, explain how tools and procedures were selected, determine what other actions need to be performed, including forensic examination of additional data sources, securing identified vulnerabilities and improving existing security controls. Recommend improvements to policies, guidelines, procedures, tools and other aspects of the forensic process.
References in periodicals archive ?
the leader in Advanced Threat Protection, today announced the availability of the Bit9 Cyber Forensics Service[TM].
The Committee was created as the decision making body for the award which is given in memoriam of Special Agent Tim Fidel, who was a pioneer and tireless advocate of cyber forensics.
There is a clear need for cyber forensics and incident analysis management capabilities for industrial automation," said Bob Radvanovsky, a leading expert on SCADA security and co-founder of Infracritical, a firm that provides research and information security awareness programs to critical infrastructure throughout North America.
The cyber camps offer students and teachers an opportunity to participate in dynamic, challenging, and interactive forums focused on cybersecurity, cyber forensics, and cyber animation and visual effects.
government and the cyber forensics landscape, Butler brings his deep knowledge to ensure Endgame's products and services meet the demand of today's security requirements.
She recently completed requirements for a bachelor's degree in information systems and is planning to obtain a master's degree in cyber forensics and information security.
2]issues the Certified Information Systems Security Professional (CISSP[R]) and related concentrations, as well as the Certified Secure Software Lifecycle Professional (CSSLP[R]), the Certified Cyber Forensics Professional (CCFPSM), Certified Authorization Professional (CAP[R]), HealthCare Information Security and Privacy Practitioner (HCISPPSM), and Systems Security Certified Practitioner (SSCP[R]) credentials to qualifying candidates.
Cyber forensics is going to play a major role in finding the motive in this case as police have come across records of Skype and email exchanges between Indrani and Sanjeev.
to cyber security including cyber forensics, malware analysis, and reverse
Computer Network Defense, or CND, includes vulnerability analysis, indications and warning, attack sensing, countermeasures, cyber forensics, as well as our cyber incident response team.
During a meeting with a five-member Israeli delegation led by Defence Minister Moshe Ya'alon, the home minister's main focus was on cyber security, including cyber forensics and joint development of technology, as the thrust areas to co-operate in the areas of homeland security between the two countries.
Turrem Data has recently been appointed as the exclusive pan-European distributor for US-based AccessData Group, a cyber forensics IT systems provider.