0% found this document useful (0 votes)
5 views

Unit 4.4

Uploaded by

dailybhaktifeed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Unit 4.4

Uploaded by

dailybhaktifeed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Challenges faced by Digital Forensics

Digital forensics has been defined as the


use of scientifically derived and proven
methods towards-
Identification
Collection
Preservation
Validation
Analysis
Interpretation
presentation
of digital evidence derivative from digital
sources to facilitate the reconstruction of
events found to be criminal.
Challenges faced by Digital Forensics
But these digital forensics investigation
methods face some major challenges at the
time of practical implementation.

Digital forensic challenges are categorized into


three major heads these are:-

1. Technical challenges
2. Legal challenges
3. Resource Challenges
1. Technical challenges

 Digital forensic experts use forensic tools for


collecting evidence against criminals and
criminals use.
 such tools for hiding, altering or removing
the traces of their crime.
 in digital forensic this process is called Anti-
forensics technique
 which is considered as a major challenge in
digital forensics world.
 Anti-forensics techniques are categorized
into the following types:-
1. Technical challenges (Continue….)

S.No Type Description


1 Encryption It is legitimately used for ensuring the privacy of
information by keeping it hidden from an
unauthorized user/person. Unfortunately, it can
also be used by criminals to hide their crimes.

2 Data hiding in Criminals usually hide chunks of data inside the


storage space storage medium in invisible form by using system
commands, and programs.

3 Covert Channel A covert channel is a communication protocol


which allows an attacker to bypass intrusion
detection technique and hide data over the
network. The attacker used it for hiding the
connection between him and the compromised
system.
2. Legal challenges

 Hon’ble High Court of Delhi held that


 while dealing with the admissibility of an
intercepted telephone call in a CD and CDR
which was without a certificate under Sec.
65B of the Indian Evidence Act, 1872
 The court observed that the secondary
electronic evidence without certificate u/s.
65B of Indian Evidence Act, 1872 is not
admissible and cannot be looked into by the
court for any purpose whatsoever.
2. Legal challenges (Continue…..)

S.No Type Description


1 Absence of There are no proper guidelines for the collection
guidelines and and acquisition of digital evidence. The
standards investigating agencies and forensic laboratories
are working on the guidelines of their own. Due
to this, the potential of digital evidence has been
destroyed.

2 Limitation of the The Indian Evidence Act, 1872 have limited


Indian Evidence Act, approach, it is not able to evolve with the time
1872 and address the E-evidence are more
susceptible to tampering, alteration,
transposition, etc. the Act is silent on the method
of collection of e-evidence it only focuses on the
presentation of electronic evidence in the court
by accompanying a certificate
3. Resource Challenges

 As the rate of crime increases the number of


data increases and the burden to analyze
such huge data is also increases on a digital
forensic expert
 because digital evidence is more sensitive
as compared to physical evidence it can
easily disappear.
 For making the investigation process fast
and useful forensic experts use various tools
to check the authenticity of the data but
dealing with these tools is also a challenge
in itself.
3. Resource Challenges (Continue….)
 Change in technology
Due to rapid change in technology like operating
systems, application software and hardware, reading of
digital evidence becoming more difficult because new
version software’s are not supported to an older version
and the software developing companies did provide any
backward compatible’s which also affects legally.
 Volume and replication
The confidentiality, availability, and integrity of electronic
documents are easily get manipulated. The combination
of wide-area networks and the internet form a big
network that allows flowing data beyond the physical
boundaries. Such easiness of communication and
availability of electronic document increases the volume
of data which also create difficulty in the identification of
original and relevant data.
3. Resource Challenges (Continue….)
 Change in technology
Due to rapid change in technology like operating
systems, application software and hardware, reading of
digital evidence becoming more difficult because new
version software’s are not supported to an older version
and the software developing companies did provide any
backward compatible’s which also affects legally.
 Volume and replication
The confidentiality, availability, and integrity of electronic
documents are easily get manipulated. The combination
of wide-area networks and the internet form a big
network that allows flowing data beyond the physical
boundaries. Such easiness of communication and
availability of electronic document increases the volume
of data which also create difficulty in the identification of
original and relevant data.

You might also like