The transitioning process from ISO/IEC 27001:2013 to ISO/IEC 2....
CLFE Certified Lead Forensic Examiner
Introduction
Computer forensics is the use of analytical and investigative methods to identify, collect, examine and preserve evidence that is magnetically stored or encoded in PC’s, hard disks, flash drives, PDA’s, mobile phones, etc. Computer forensics can be used as evidence for computer crimes or any other crime, in addition to finding out exactly what happened on a computing device and who is responsible for the occurrence.
The goal is to perform a structured investigation while maintaining a documented chain of evidence that can undergo the legal analysis of a court of law, for either a criminal or civil proceeding.
Gaining skills and knowledge to practice computer forensics will help ensure the overall integrity and survival of a network infrastructure.
The key elements of computer forensics are:
- The use of scientific methods,
- Collection and preservation,
- Validation,
- Identification,
- Analysis and interpretation, and
- Documentation and presentation.
Computer forensics has become its own area of scientific expertise, with accompanying coursework and certification.
Forensic investigators typically follow the following set of procedures:
- After making sure the device cannot be accidentally contaminated, investigators make a digital copy of the device's storage media.
- It is then locked in a safe or another secure facility to maintain its pristine condition. All investigation is done on the digital copy.
An overview of CFLE
In the early 1980s, personal computers became more accessible to consumers, leading to an increase in computer criminal activity.
The discipline of computer forensics emerged during this time as a method to recover and investigate digital evidence for use in court.
The scope of a forensic analysis can vary from simple information retrieval to reconstructing a series of events.
Recently, commercial organizations have vastly benefited from computer forensics in a variety of cases such as:
- Intellectual property theft,
- Industrial espionage,
- Employment disputes,
- Fraud investigations,
- Forgeries,
- Bankruptcy investigations,
- Inappropriate email and internet use in the work place,
- Regulatory compliance etc.
The role of computer forensics will play an even more critical role in society as computer technology emerges. It is an extremely hot topic and is used widely in all industries. Corporations and government agencies hire computer forensics specialists, whenever they need a computer-related crime investigated.
The science of computer forensics has a limitless future as long as technology advances, the field will continue to expand. Any methodology, process or procedural breakdown in the application of forensics can jeopardize the company’s case.
So, what is Computer Forensics?
The U.S. Department of Justice defines computer forensics as “the use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events.”
- Forensic analysis can reveal what web sites have been visited and what files have been downloaded?
- Forensic analysis can reveal what documents have been sent to the printer even if it was a document printed directly from a floppy disk?
- Forensic analysis can reveal when files were last accessed or when files were deleted?
- Forensic analysis can reveal attempts to fabricate or hide evidence?
- Forensic analysis can reveal deleted e-mail even if a web based e-mail server was used like Yahoo, MSN, or Hotmail.
Key domains of a CLFE
- Domain 1: Scientific principles of computer forensics
- Domain 2: Computer forensics operations fundamentals
- Domain 3: Forensics: computer hardware structure
- Domain 4: Forensics: operating systems and file structure
- Domain 5: Forensics of network, cloud and virtual environments
- Domain 6: Forensics of cell phones and tablets
- Domain 7: Computer forensics operation tools and software
- Domain 8: Forensics: examination, acquisition and preservation of electronic evidence
|| Scientific principles of computer forensics
|| Computer forensics operations fundamentals
|| Forensics: computer hardware structure
|| Forensics: operating systems and file structure
|| Forensics of network, cloud and virtual environments
|| Forensics of cell phones and tablets
|| Computer forensics operation tools and software
|| Forensics: examination, acquisition and preservation of electronic evidence
How does a CLFE approach the investigation?
- Identify the purpose of the investigation
- Identify the resources required
- Identify and preserve digital evidence
- Identify tools and techniques to use
- Process data
- Interpret analysis results
- Report and present findings
What are the business benefits of computer forensics?
Today, with the sophistication of powerful software and the technological ability to extract large amounts of data, 100% of the information may be analyzed.
- Capability to reduce or eliminate sampling risk,
- Assessment of relevant types of data from different systems or sources to show a more complete picture,
- Capability to easily trend relevant data over periods of time,
- Fast identification and extraction of certain risk criteria from the entire data population for further analysis,
- Testing for effectiveness of the control environment and policies in place by identifying attributes that violate rules, and
- Finding trends of which company personnel, consultants and forensic accountants were unaware of.
What are the challenges that a CLFE can come across?
- The advancement of encryption,
- The broad system of networking,
- Legal obstacles, and
- The substantial growth of storage media.
- Ensure that no forensics evidence is damaged, destroyed or other- wise compromised by the procedures used during the investigation,
- Never work on the original evidence,
- Establish and maintain a continuing chain of custody, and
- Document everything.
Link of CLFE with other IT security standards
Recent years have seen considerable development in computer forensic and network security.
This has resulted in an ever increasing range of new protocols, new encryption algorithms, new methods of authentication, smarter firewalls and intrusion detection techniques, and new anti-malware products. To a significant degree, the sciences of security and forensics have both seen rapid but separate developments. Considering the similarities between these two important fields, they often connect and work together.
What are the application requirements for the CLFE certification?
To ensure that individuals achieve planned and desired CLFE results, the following steps will serve as guidance on how to become PECB Certified on Certified Lead Forensic Examiner - CLFE.
- Participate in the training course,
- Register for the certification exam,
- Sit for the certification exam,
- Apply for the certification scheme upon successful completion, and
- Obtain the certification.