Question

In: Computer Science

A2Z Forensics is a digital forensics investigation firm that conducts forensic investigations for public as well...

A2Z Forensics is a digital forensics investigation firm that conducts forensic investigations for public as well as private sectors. You are working in this firm as a forensics specialist for a number of years now. The firm is establishing a new forensics lab to meet the future requirements. You have been asked to prepare a business case for this new lab. Your job is to focus on three aspects of the new lab which are hardware, software and lab security. Based on the knowledge of topic 2, prepare a brief business case, summarise and justify the equipment (both hardware and software) you recommend for this new lab that will meet future requirements. Also, briefly explain the security measures you recommend for this new lab

Solutions

Expert Solution

Implementing a Forensic lab Infrastructure

The initial step in this process should be to define the scope of the lab. Will this lab be a full-service digital forensics lab that handles all types of devices and case work, or will it be a lab that is focused on one particular niche such as mobile forensics? We will first define the scope of our lab then we will be better able to address exactly what issues we need to consider and to what extent they will be relevant for our lab. Besides, we should also consider scope creep and the adding of services in the future. We may want to prepare and plan now for these things instead of finding out that our initial lab setup will not be sufficient down the road when we will not be able to enhance or expand our lab without major effort or expense.

Selecting Location of the Lab

The location of your lab can also be very important and it is something that needs to be discussed. Will you be storing evidence in the lab? If not, where is your evidence stored and how convenient will it be to shuttle evidence around? Chain-of-custody issues need to be considered as well as the increased likelihood that evidence could be lost, misplaced, or damaged while in transit. You may also want to consider who your main clients are for your lab. Will the lab be convenient for them and does this matter? Location of your lab may also have a large impact on some of the upcoming topics we will be reviewing, such as network connectivity, environmental controls, power requirements, and security controls.

Designing the layout

Once we have a location selected, then the designing the layout of the lab begins. There are several important issues to consider in our design, which should include the location of workstations, work benches, power outlets, network ports, cabinets, and storage bins. Other things to consider may include height-adjustable workstations, wall-mounted monitors, portable clean room, Faraday cage, and fume hood if we are going to be doing JTAG and chip-off processing. Also, don’t forget to install a wireless phone system so you can move freely around your lab while talking with clients, colleagues, and vendors.

Software and Hardware requirements

A variety of hardware tools will also need to be considered for our lab. Some of these items will include forensic bridges (write blockers), forensic duplicators (imaging tools), data wiping/sanitation devices, forensic workstations, and media docking stations. Of course, we will also need a wide variety of cables, adapters, traditional tool kits, and specialized tool kits for working on the variety of evidence items that you will be subjected to. Depending on the services our lab will provide us may also need additional hardware for JTAG and chip-off processing, mobile device repair and data recovery.

Storing (short term) and archiving (long term) our data are extremely important items for us to address. The methods we deploy for storing and archiving can affect the efficiency of our lab, chain-of-custody, security auditing, and data integrity. Two of the most common methods for storing data today are the use of individual hard drives and network storage devices. Both have their advantages and disadvantages. Some advantages of network storage include the ease of access, ability to set up automated backups, and the ability to keep large amounts of data accessible at any given time. Some possible disadvantages of network storage include security concerns and infrastructure costs.We should weigh the pros and cons of each solution we consider.

Designing Lab Security

Security comes in many forms and the two most important ones for our lab will be physical security and data security. Data security deals with making sure the digital information our lab processes and produces is secured. Data security includes securing the data on its storage medium, securing the data while in transport across the network, auditing the access of this data, limiting the access of this data to authorized individuals, and ensuring the integrity of the data.

Physical security is securing our physical environment. One key part of our physical security plan needs to be identifying which areas are considered secure areas. Physical security includes limiting physical access to the lab and evidence items (authorized individuals only), placing security controls on doors, implementing man traps, maintaining logs of all individuals entering secured areas, and implementing video surveillance where necessary. When defining our secured areas, be sure to consider areas where network and storage devices are kept. If these areas are accessed, then our data and entire network infrastructure can be compromised.

Checklist for Physical Security

1 Surveillance system

The surveillance system is used to monitor the premises for unauthorized access and break-ins. Installation professionals should consider the best strategic place as well as the best resolution to ensure maximum security.

2 Access control Access control

It can be in the form of physical locks and keys, electronic keypads, swipe cards, and/or biometrics, depending on the budget.

3 Fire control system

A Lab must have a fire detection system and fire suppression system installed on the premises. The material used for the fire suppression system must not cause damage to the exhibits, equipment or personnel

. 4 Windows, doors & walls protection

When required, windows should be reinforced with bars and locks to prevent break-ins. If the Lab has glass windows and walls, care should be taken that sensitive data are protected from view. Consider using a fireproof door in a location such as a stairwell or corridors to protect the premises from fire.

5 Sufficient power sockets, fuses, breakers and current load Sufficient power sockets, fuses and breakers must be installed in the Lab to ensure smooth operation and prevent power overloads leading to fire hazards and posing risks to the safety of the staff

. 6 Anti-static flooring Anti-static flooring helps to reduce possible electrostatic discharge (ESD) that may cause harm to employees, equipment and evidence.

7 Radio jamming system It is recommended that the Lab install a system to block network signals, for example using a Faraday cage or a jamming device. A Radio jamming system will block any network signals and prevent any intrusion into the exhibit. With current wireless technology, the possibility exists for powered-on smart phones or laptops to automatically attempt to connect to existing wireless networks, hence modifying their data. National legislation must be checked to verify that the use of such systems is allowed and they do not interfere with other systems.

8 Cooling System It is common for a Lab to have computers to conduct work, generating a considerable amount of heat within the lab. Overheating can lead to loss of data and damage to hardware. The Lab should install a cooling system to control its room temperature, including the evidence storage room and server room.


Related Solutions

DIGITAL FORENSIC TOOKS: 1. USB FORENSIC What value could this artifact have for investigation? What kinds...
DIGITAL FORENSIC TOOKS: 1. USB FORENSIC What value could this artifact have for investigation? What kinds of information can you extract? 2. WINDOWS REGISTRY What value could this artifact have for investigation? What kinds of information can you extract? What were they following originally designed for What kind of forensic value could they provide in the in a digital investigation? What are some of the limitations of each type of the artifact? Link Files Prefetch ShimCache Shellbags Jump lists VSS...
Forensics Forensics is the application of investigation and analysis techniques to gather and preserve evidence from...
Forensics Forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. It is usually on of the more interesting topics we can discuss. Take the following scenario and map out the chain of custody (in legal contexts, is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or...
What is a white-hat-hacker? What is digital forensics? What is anti-forensics?
What is a white-hat-hacker? What is digital forensics? What is anti-forensics?
An insurance company has asked your digital forensics firm to review a case for an arson...
An insurance company has asked your digital forensics firm to review a case for an arson investigation. The suspected arsonist has already been arrested, but the insurance company wants to determine whether there’s any contributory negligence on the part of the victims. Two files were extracted to your work folder for this project: a).The first, Letter 1.doc, is a memo about the case from the police department. b).The second, Letter 2.doc, is a letter from the insurance company explaining what...
what is hash in digital forensic?
what is hash in digital forensic?
a. Apart from fraud related investigations, what other investigations are forensic accountants commonly engaged in? b....
a. Apart from fraud related investigations, what other investigations are forensic accountants commonly engaged in? b. What are the three essential characteristics possessed by a forensic accountant?
Privacy laws in other countries are an important concern when performing cloud forensics and investigations. You...
Privacy laws in other countries are an important concern when performing cloud forensics and investigations. You have been assigned a case involving the PII data stored on a cloud in Australia. Before you start any data acquisition from this cloud, you need to research under Australian law. For this project, look for information on Australia’s Privacy Principles(APP), particularly chapter 8: APP 8 – Cross-border disclosure of personal information. Write a one-two page paper summarizing disclosure requirements, steps for storing P...
The Scientific Working Group on Digital Evidence develops best practice and standard documents for digital forensics....
The Scientific Working Group on Digital Evidence develops best practice and standard documents for digital forensics. What are three important digital forensic standard practices that an organization starting a digital forensic unit should implement? Why?
What are some of the technical skills needed to perform computer forensic investigations? What kinds of...
What are some of the technical skills needed to perform computer forensic investigations? What kinds of clues or evidence does the forensic auditor need to collect to try and track the internal or external hacker?
What are the elements of a forensic fraud investigation report, and explain how they could be...
What are the elements of a forensic fraud investigation report, and explain how they could be used to support case preparation in a case like Enron?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT