Computer Forensics. Incident Response Essentials
by Warren G. Kruse II and Jay G. Heiser
Addison-Wesley, 2002.
Index, Annotated Bibliography, 8 appendices. ISBN 0-201-70719-5. $39.99.
Reviewed by Robert Bruen January 9, 2002
The field of computer forensics is coming into its own these days. It
was always important to discover how someone broke into your machine,
but now there is a greater need to find who broke in and follow up with
legal action. The follow up action requires evidence, which in turn
must meet much higher standards than most sysadmins were familiar with.
In the old days we looked at logs and changed files to figure out what
happened. Now we need to be very careful not to contaminate the disk,
or even cache (good luck) and preserve that state of the disk. Moreover,
once the disk has been designated as compromised, there is something
called the chain of custody that is critical. If the disk is now evidence
in a trial, there had better be a log of everyone who touched the
disk, they ought to have been appropriate people and they should have
done nothing to alter the disk contents. A failure to do this could cause
the case to be thrown out of court.
The chain of evidence is not the only new idea for sysadmins. There are
other procedures that must be followed, as well as small bumps in the
road that can cause major problems along the road. The new demands of
forensics are somewhat foreign to most techies, but this book can help
you step through them. In general, the good techie will want to take a
close look at the disk to what has happened. Fortunately, there are a
set of tools available, with more coming, to help in this. Kruse and
Heiser provide urls to many of them, along with explaining how they
work.
The authors are coming at this from the point of view of cops who
have learned how computers work, as opposed to computer guys who
learned about investigation. This is not a criticism, but rather just
a note to explain their approach. It is good introductory text for
anyone who wants to learn about computer forensics. If you are comfortable
with systems operations, the book is quick read. If you have never looked
at a disk drive in raw mode, you will have to go a little slower.
The main topics addressed are that of using the net to track down an
intruder and disk and file analysis. They explain about Unix systems for
the Windows folks and they cover the criminal justice system. For anyone
who expects to handle a break-in incident, this book is something that
ought to have been read in advance. The book is well organized with a good
number of illustrations. The tools presented are both free and commercial,
which is helpful for getting started. They explain in detail how to use
the tools that protect the disk contents while being copied, pointing the
obvious that one should work on a copy not the evidence. This little
mistake could easily ruin the whole process.
I liked the book, although it is a bit elementary in the technical sense,
but helpful in its organization and the information on the legal aspects.
One more book the security professional ought to read.