Digital Forensics Lab Setup

Digital Forensics Lab Setup

Digital

Moderate Size Floor Plan for DFL Setup. Organization Chart for Basic Setup of Digital Forensic Laboratory.

Cyber LAB Setup

First of all, the Computer Forensics Lab’s security and location is a very important point. Maintaining the safety of the evidence and the tools is the first thing to think about. The following requirements determine the best practice for this issue:

  • It must be in a secure place
  • It must have only one door for entrance
  • It must not have windows or any openings in the walls, ceilings, and floors
  • It must have an intrusion alarm system in the entrance
  • It must have a monitoring Camera, placed at the entrance of the lab
  • The entrance must have a biometric device to handle the access to the lab
  • Every computer must have Uninterrupted Power Supply (UPS)
  • A good lighting in the lab is highly recommended

An Introduction to Cyber LAB Setup

Reportedly, the first computer crime took place in the year 1978 involving alteration / deletion of data. The level of cybercrime has heightened simultaneously with the growth in the years since. In order to meet the needs of such demanding cases, a dedicated investigating environment has become a necessity over the past. The new age lab setups combine a more advanced and wider set of investigative devices and solutions made to forensically examine a variety of digital devices apart from computers only.

Setup

Why Do You Need A Cyber LAB Setup

Getting a lab set up will only be a motivation towards elaborated investigation of digital forensic evidences. One of the key factors for setting up a cyber-lab is exploring more about the new generation digital crime cases a pattern of which has changed over the past years. The sophisticated yet advanced level of cyber-attacks taking place currently comprises of many layers requiring levels of analysis consequently.

One Cyber Lab, Many Purposes!

With your own Cyber Lab setup, precisely investigating an entire range of digital forensic cases is possible under one roof. Starting from Computer forensics, Mobile forensics, Network forensics, to even the latest; Cloud forensics; all cases can be undertaken and investigated with the help of a fully equipped Cyber Lab.

Equipment’s We Offer for LAB SETUP

► Digital evidence preservation tools
► Computer analysis tools
► Mobile device analysis tools
► Forensic data recovery equipment
► Class 100 clean room
► Chip-off workstation
► Data erasure tools
► NSA certified degausser
► Professional storage media shredder

What can we do in the lab?

► Digital Evidence Acquisition & Preservation
► E-discovery
► Forensic Data Recovery
► Password Decryption
► Forensic analysis
► System Emulation
► Data Carving
► Chats & Instant Messenger Analysis
► User Artifacts Analysis
► Timeline Analysis
► etc.

Who Needs Digital Forensics Service?

When corporate customers find a digital crime suspect or a potential criminal behavior based on digital device, but not sure if it is true, outsourcing a law firm straightaway or entering a formal lawsuit may arouse the suspicious, incur internal chaos, cause intelligence leakage, generate unnecessary costs or lead to other unexpected problems.

Under such occasions, many company managements have expressed their wishes to have a beforehand investigation and discovery before going into any formal procedure or handing it to any legal party, after they detect a potential crime.

When you find a digital crime or a potential criminal behavior based on digital device. Escort Cyber Forensics digital forensics laboratory could supply the best solution to support your case.

Other Miscellaneous Requisites

  • Specialized Forensic Workstation» Configured with large capacity hardware devices, Pre-installed with forensic purpose software solutions, Evidence protection and preservation devices integrated.
  • Evidence Collection Accessories» Mobile Data Investigation Kit.
  • Evidence Preservation Devices» RF Shield Bags (Large, Medium, Small).
  • Other Hardware Assemblage Tools» Wiring harness, Wall mounts, Cable ties, Wall plugs, Stainless steel Hose clamps, Fiberglass sleeves and tubes for wires, Round cable clips, Crystal plug connectors, Power cords, Hand-tools, Anti-static pads.

Additional Services

Open the Counting function window in the OMC console and select the Accounting Printout tab. The interface fileOnce the OHL driver is installed, the SMDR data will be outputted to a file, called the TicketCollector.xml, which is located by default in C:UsersPublicDocumentsTicketCollector.xml Installing NetPBXIf your Alcatel OmniPCX Office has been configured to send SMDR data via a IP connection, you first need to install the software to collect the data from the xml file reader and send it to TIM Plus. Click OK to save the settings.The table below presents a summary of the data output from an Alcatel:Installing the Alcatel Office Link DriverIf your Alcatel OmniPCX Office has been configured to send SMDR data via IP, you need to install the Alcatel Office Link Driver to enable the SMDR output.For information on how to install the Alcatel Office Link Driver, please refer to the Alcatel OmniPCX Office manual or speak to your system maintainer. Select the metering type from the drop-down list: Ext. Accounting Activation IP. Alcatel lucent oxo software pcx omc pimphony docs login.

Hardware and software applications that we set up for your Cyber Lab will be run for a validation and testing purposes at the end of Lab Setup.

In addition to that expert and technicians will also provide a demonstration for using the hardware and software components installed in the lab setup. Net framework 2.0 sp 1.

I am not an expert, but I can think of a couple of ways you can go for.
First, it would depend upon your budget, lab size, and the number of (forensic) computers. Also, a system staff.
If you are setting up a medium size lab, I would have about 20 forensic workstations running Windows 7 with virtual machines running XP, Win98, and Linux (Ubuntu). Normally, forensic workstations are off the network connection, or with minimum intranet connection.
Each machine would need some forensic tools. EnCase provides an academic license with a very reasonable price. Some other common tools like FTK and WinHex would be a must. Also, Helix 3 Live CD. If network network forensic is to be taught, tools like Nessus and Wireshark would be needed.
The forensic workstation does not have to be the state of art PCs. They can be 3~5 year old machine (with 40~80GB hard disk, 1GB Ram). FAT12 file systems would be relatively easy to start with for general file systems, so a floppy drive is needed.
You can install one machine with all the OSs and tools, then copy the image to the rest of machines.
To work with images (taking and retrieving), you may need USB/eSATA external hard disks of 100GB+ size. It would be nice if you can have them for each forensic workstation. USB thumb drive with varying size (with FAT16, FAT32, NTFS) would be good to have to play around with disk images. And, of course, a printer attached to the network.
You would need write blockers for each machine.
Then, one decent Linux (Ubuntu) server working as file servers and for time cruching jobs. This server may also contain the forensic workstation image, and then the image can be easily taken through the network.
Just my 2 cents.
Digital Forensics Lab Setup
© 2020