Unit V
Unit V
Introduction
Cyberforensics plays a key role in investigation of cybercrime. “Evidence” in the case of
“cyberoffenses” is extremely important from legal perspective.
There are legal aspects involved in the investigation as well as handling of the digital
forensics evidence.
Only the technically trained and experienced experts should be involved in the forensics
activities.
UNIT-III
Network forensics is the study of network traffi c to search for truth in civil,
criminal and administrative matters to protect users and resources from
exploitation, invasion of privacy and any other crime fostered by the continual
expansion of network connectivity.
UNIT-III Cyber Forensics
Cyber Forensics and Digital Evidence
There are many forms of cybercrimes:
sexual harassment cases – memos, letters, E-Mails; obscene chats or
embezzlement cases – spreadsheets, memos, letters, E -Mails, online
banking
information;
corporate espionage by way of memos, letters, E-Mails and
chats; and frauds through memos, letters, spreadsheets
and E-Mails.
In case of computer crimes/cybercrimes, computer forensics helps.
Computer forensics experts know the techniques to retrieve the data from files
listed in standard directory search, hidden files, deleted files, deleted E-Mail and
passwords, login IDs, encrypted files, hidden partitions, etc.
Typically, the evidences reside on computer systems, user created files, user protected
files,
computer created files and on computer networks.
UNIT-III Cyber Forensics
Cyber Forensics and Digital Evidence
Computer systems have the following:
1. Logical fi le system that consists of
• File system: It includes files, volumes, directories and folders, file allocation
tables (FAT)
as in the older version of Windows Operating System, clusters, partitions,
sectors.
• Random access memory.
• Physical storage media: It has magnetic force microscopy that can be used
to recover
data from overwritten area.
(a) Slack space: It is a space allocated to the fi le but is not actually used due to internal
fragmentation and
(b)unallocated space.
Paper evidence, the process is clear and intuitively obvious. Digital evidence by its very
nature is invisible to the eye. Therefore, the evidence must be developed using tools other
than the human eye.
UNIT-III Cyber Forensics
1. is admissible;
2. is authentic;
3. is complete;
4. is reliable;
5. is understandable and believable.
UNIT-III Cyber Forensics
Digital Forensics Lifecycle
The Digital Forensics Process
UNIT-III Cyber Forensics
Digital Forensics Lifecycle
The Phases in Computer Forensics/Digital Forensics
The Phases in Com puter Forensics/Digital Forensics the forensics life cycle involves the
following phases:
1. Preparation and identification;
2. storing and transporting;
3. collection and recording;
4. examination/investigation;
5. analysis, interpretation and attribution;
6. reporting;
7. testifying.
UNIT-III Cyber Forensics
Digital Forensics Lifecycle
The Phases in Computer Forensics/Digital Forensics
To mention very briefly, the process involves the following activities:
1. Prepare: C ase briefings, engagement terms, interrogatories, spoliation prevention,
disclosure and discovery planning, discovery requests.
2. Record: Drive imaging, indexing, profiling, search plans, cost estimates, risk analysis.
3. Investigate: Triage images, data recovery, keyword searches, hidden data review,
communicate, iterate.
4. Report: Oral vs. written, relevant document production, search statistic reports, chain
of custody reporting, case log reporting.
5. Testify: Testimony preparation, presentation preparation, testimony.
UNIT-III Cyber Forensics
Digital Forensics Lifecycle
The Phases in Computer Forensics/Digital Forensics
Preparing for the Evidence and Identifying the Evidence
Collecting and Recording Digital Evidence
Storing and Transporting Digital Evidence
Examining/Investigating Digital Evidence
Analysis, Interpretation and Attribution
Reporting
Testifying
UNIIII
Digital Forensics Lifecycle
Precautions to be Taken when Collecting Electronic Evidence
UNIT-III
Digital Forensics Lifecycle
Precautions to be Taken when Collecting Electronic Evidence
UNIT-III
Digital Forensics Lifecycle
Precautions to be Taken when Collecting Electronic Evidence
UNIT-III
Chain of Custody refers to the logical sequence that records the sequence of custody, control,
transfer, analysis and disposition of physical or electronic evidence in legal cases. Each step in
the chain is essential as if broke, the evidence may be rendered inadmissible. Thus we can say
that preserving the chain of custody is about following the correct and consistent procedure
and hence ensuring the quality of evidence.
One of the concepts that is most essential in Digital Forensics is the Chain of Custody. The chain
of custody in digital cyber forensics is also known as the paper trail or forensic link, or
chronological documentation of the evidence.Chain of custody indicates the collection,
sequence of control, transfer and analysis.
It also documents details of each person who handled the evidence, date and time it was
collected or transferred, and the purpose of the transfer.
It demonstrates trust to the courts and to the client that the evidence has not tampered.
Digital evidence is acquired from the myriad of devices like a vast number of IoT devices, audio
evidence, video recordings, images, and other data stored on hard drives, flash drives, and
other physical media.
Importance of maintaining Chain of Custody?
In order to prove a chain of custody, you’ll need a form that lists out the details of how the evidence was handled
every step of the way. The form should answer the following questions:What is the evidence?: For example-
digital information includes the filename, md5 hash, and Hardware information includes serial number, asset ID,
hostname, photos, description.
How did you get it?: For example- Bagged, tagged or pulled from the desktop.
When it was collected?: Date, Time
Who has handle it?
Why did that person handled it?
Where was it stored?: This includes the information about the physical location in which proof is stored or
information of the storage used to store the forensic image.
How you transported it?: For example- in a sealed static-free bag, or in a secure storage container.
How it was tracked?
How it was stored?: For example- in a secure storage container.
Who has access to the evidence?: This involves developing a check-in/ check-out process.
The CoC form must be kept up-to-date. This means every time the best evidence is handled off, the chain of
custody form needs to be updated.
Procedure to establish the Chain of Custody
In order to assure the authenticity of the chain of custody, a series of steps must be followed. It is
important to note that the more information Forensic expert obtains concerning the evidence, the
more authentic is the created chain of custody.
The following procedure is followed according to the chain of custody for electronic devices:Save the
original material
• Take photos of the physical evidence
• Take screenshots of the digital evidence.
• Document date, time, and any other information on the receipt of the evidence.
• Inject a bit-for-bit clone of digital evidence content into forensic computers.
• Perform a hash test analysis to authenticate the working clone.
How can the Chain of Custody be assured?
A couple of considerations are involved when dealing with digital evidence and Chain of Custody. We shall discuss the most
common and globally accepted and practiced best practices.Never ever work with the Original Evidence: The biggest
consideration that needs to be taken care of while dealing with digital evidence is that the forensic expert has to make a full
copy of the evidence for forensic analysis. This cannot be overlooked as when errors are made to working copies or
comparisons need to be done, then, in that case, we need an original copy.
Ensuring storage media is sterilized: It is important to ensure that the examiner’s storage device is forensically clean when
acquiring the evidence. Suppose if the examiner’s storage media is infected with malware, in that case, malware can escape
into the machine being examined and all of the evidence will eventually get compromised.
Document any extra scope: During the process of examination, it is important to document all such information that is
beyond the scope of current legal authority and later brought to the attention of the case agent. A comprehensive report must
contain following sections:
Identity of the reporting agency.
Case identifier.
Case investigator.
Identity of the submitter.
Date of receipt.
Date of report.
Descriptive list of items submitted for examination: This includes the serial number, make, and model.
Identity and signature of the examiner
Brief description of steps taken during the examination: For example- string searches, graphics image searches, and recovering
erased files.
Results.
Document any extra scope: During the process of examination, it is important to document all such information that is
beyond the scope of current legal authority and later brought to the attention of the case agent. A comprehensive report must
contain following sections:
Identity of the reporting agency.
Case identifier.
Case investigator.
Identity of the submitter.
Date of receipt.
Date of report.
Descriptive list of items submitted for examination: This includes the serial number, make, and model.
Identity and signature of the examiner
Brief description of steps taken during the examination: For example- string searches, graphics image searches, and recovering
erased files.
Results.
Consider the safety of the personnel at the scene: It is very important to ensure that the crime scene is fully secure before
and during the search. In some cases, the examiner may only be able to do the following while onsite:
Identify the number and type of computers.
Interview the system administrator and users.
Identify and document the types and volume of media: This includes removable media also.
Determine if a network is present.
Document the information about the location from which the media was removed.
Identify offsite storage areas and/or remote computing locations.
Identify proprietary software.
Determine the operating system in question.
The Digital evidence and Digital Chain of Custody are the backbones of any action taken by digital forensic specialists.
Network Forensics
• The word “forensics” means the use of science and technology to investigate and establish facts in
criminal or civil courts of law. Forensics is the procedure of applying scientific knowledge for the
purpose of analyzing the evidence and presenting them in court.
• Network forensics is a subcategory of digital forensics that essentially deals with the examination
of the network and its traffic going across a network that is suspected to be involved in malicious
activities, and its investigation for example a network that is spreading malware for stealing
credentials or for the purpose analyzing the cyber-attacks. As the internet grew cybercrimes also
grew along with it and so did the significance of network forensics, with the development and
acceptance of network-based services such as the World Wide Web, e-mails, and others.
• With the help of network forensics, the entire data can be retrieved including messages, file
transfers, e-mails, and, web browsing history, and reconstructed to expose the original
transaction. It is also possible that the payload in the uppermost layer packet might wind up on
the disc, but the envelopes used for delivering it are only captured in network traffic. Hence, the
network protocol data that enclose each dialog is often very valuable.
• For identifying the attacks investigators must understand the network protocols and applications
such as web protocols, Email protocols, Network protocols, file transfer protocols, etc.
Investigators use network forensics to examine network traffic data gathered from the networks that
are involved or suspected of being involved in cyber-crime or any type of cyber-attack.
Introduction:
In today's digital age, organizations face a constant threat from cyber attacks that can have severe consequences
on their operations, reputation, and financial stability. This newsletter explores the challenges organizations
encounter in dealing with cyber attacks and highlights the implications for their security posture.
I. Evolving Threat Landscape:
The rapid advancement of technology has led to a parallel rise in sophisticated cyber threats. Hackers and
cybercriminals employ various techniques such as malware, phishing, ransomware, and social engineering to
exploit vulnerabilities in organizational systems. The ever-evolving nature of these threats poses a significant
challenge for organizations to keep up with the latest security measures.
II. Insider Threats:
One of the most challenging aspects of cyber attacks for organizations is the presence of insider threats.
Employees or former employees with malicious intent can compromise sensitive data, sabotage systems, or
provide unauthorized access to cybercriminals. Mitigating insider threats requires a delicate balance between
trust and security, as organizations must implement robust access controls, monitoring systems, and employee
awareness programs.
III. Data Breaches and Privacy Concerns:
Data breaches have become alarmingly common, leading to the exposure of sensitive information
and violating user privacy. Organizations must adhere to strict data protection regulations, such as
the General Data Protection Regulation (GDPR) in the European Union, to safeguard customer data.
The financial and reputational damage resulting from data breaches can be significant, necessitating
proactive measures to prevent and respond to such incidents.
IV. Resource Constraints:
Many organizations, particularly small and medium-sized enterprises, face resource constraints
when it comes to cybersecurity. Limited budgets and lack of skilled personnel make it challenging to
implement robust security measures and maintain an effective security posture. Cybersecurity
awareness training, regular system updates, and investing in reliable security solutions are crucial
but often overlooked due to resource limitations.
V. Rapid Technological Advancements:
The rapid adoption of emerging technologies such as cloud computing, the Internet of Things (IoT),
and artificial intelligence (AI) brings new security challenges for organizations. Integrating these
technologies into existing infrastructures without compromising security requires specialized
knowledge and expertise. Failure to address these challenges effectively can expose organizations to
vulnerabilities and potential cyber attacks.
VII. Third-Party Risks:
Many organizations rely on third-party vendors and partners for various services and support.
However, these relationships can introduce additional risks. Cyber attacks on third-party vendors
can compromise organizational systems and data. Organizations must conduct due diligence and
establish strong security protocols when engaging with third parties to mitigate these risks.
VIII. Regulatory Compliance:
Organizations are subject to an increasing number of cybersecurity regulations and compliance
standards. Failure to comply with these requirements can result in legal repercussions and
reputational damage. Navigating the complex landscape of regulatory compliance can be challenging,
particularly for multinational organizations operating in different jurisdictions with varying data
protection laws.