Cyber Security - Unit IV
Cyber Security - Unit IV
Unit IV: Digital Forensic: Introduction: What is Forensic Science? – What is Digital Forensic? – Uses ofDigital
Forensic – Locard’s Exchange Principle – Scientific Method – Role of the Forensic Examiner in the Judicial System.
Labs and Tools: Forensic Laboratories – Policies and Procedures – Quality Assurance – Digital Forensic Tools
TYPES
Disk Forensics: It deals with extracting raw data from the primary or secondary storage ofthe device by
searching active, modified, or deleted files.
Network Forensics: It is a sub-branch of Computer Forensics that involves monitoring andanalyzing the
computer network traffic.
Database Forensics: It deals with the study and examination of databases and their relatedmetadata.
Malware Forensics: It deals with the identification of suspicious code and studying viruses,worms, etc.
Email Forensics: It deals with emails and their recovery and analysis, including deletedemails, calendars,
and contacts.
Memory Forensics: Deals with collecting data from system memory (system registers,cache, RAM) in
raw form and then analyzing it for further investigation.
Mobile Phone Forensics: It mainly deals with the examination and analysis of phones andsmartphones
and helps to retrieve contacts, call logs, incoming, and outgoing SMS, etc., and other data present in it.
CHARACTERISTICS
Identification: Identifying what evidence is present, where it is stored, and how it is stored(in which
format). Electronic devices can be personal computers, Mobile phones, PDAs, etc.
Preservation: Data is isolated, secured, and preserved. It includes prohibiting unauthorized personnel from
using the digital device so that digital evidence, mistakenly or purposely, is not tampered with and making
a copy of the original evidence.
Analysis: Forensic lab personnel reconstruct fragments of data and draw conclusions based on evidence.
Documentation: A record of all the visible data is created. It helps in recreating and reviewing the crime
scene. All the findings from the investigations are documented.
Presentation: All the documented findings are produced in a court of law for further investigations.
PROCEDURE:
The procedure starts with identifying the devices used and collecting the preliminary evidence on the
crime scene. Then the court warrant is obtained for the seizure of the evidence which leads to the seizure
of the evidence. The evidence are then transported to the forensics lab for further investigations and the
procedure of transportation of the evidence from the crime sceneto labs are called chain of custody. The
evidence are then copied for analysis and the original evidence is kept safe because analysis are always
done on the copied evidence and not the original evidence.
The analysis is then done on the copied evidence for suspicious activities and accordingly, the findings
are documented in a nontechnical tone. The documented findings are then presented ina court of law for
further investigations.
APPLICATIONS
Intellectual Property theft
Industrial espionage
Employment disputes
Fraud investigations
Misuse of the Internet and email in the workplace
Forgeries related matters
Bankruptcy investigations
Issues concerned the regulatory compliance
Advantages of Computer Forensics :
To produce evidence in the court, which can lead to the punishment of the culprit.
It helps the companies gather important information on their computer systems or networks
potentially being compromised.
Efficiently tracks down cyber criminals from anywhere in the world.
Helps to protect the organization’s money and valuable time.
Allows to extract, process, and interpret the factual evidence, so it proves the cybercriminalaction’s
in the court.
Disadvantages of Computer Forensics :
Before the digital evidence is accepted into court it must be proved that it is not tamperedwith.
Producing and keeping electronic records safe is expensive.
Legal practitioners must have extensive computer knowledge.
Need to produce authentic and convincing evidence.
If the tool used for digital forensics is not according to specified standards, then in a courtof law, the
evidence can be disapproved by justice.
A lack of technical knowledge by the investigating officer might not offer the desired result
high level:
1. Identification of evidence: It includes of identifying evidences related to the digital crimein storage
media, hardware, operating system, network and/or applications. It is the most important and basic
step.
2. Collection: It includes preserving the digital evidences identified in the first step so that they doesn’t
degrade to vanish with time. Preserving the digital evidences is very importantand crucial.
3. Analysis: It includes analyzing the collected digital evidences of the committed computercrime in
order to trace the criminal and possible path used to breach into the system.
4. Documentation: It includes the proper documentation of the whole digital investigation, digital
evidences, loop holes of the attacked system etc. so that the case can be studied andanalysed in future
also and can be presented in the court in a proper format.
5. Presentation: It includes the presentation of all the digital evidences and documentation inthe court in
order to prove the digital crime committed and identify the criminal.
SCIENTIFIC METHOD
The Nine Phases of Digital Forensics
There are nine steps that digital forensic specialists usually take while investigating digitalevidence.
1. First Response
As soon as a security incident occurs and is reported, a digital forensic team jumps into action.
The team searches devices involved in the crime for evidence and data. Investigators seize thedevices to
make sure the perpetrators can’t continue to act.
3. Evidence Collection
After seizing the devices, professionals collect the data using forensic methods to handle theevidence.
Investigators store evidence in a safe environment. In the secure space, the data can beauthenticated and
proved to be accurate and accessible.
5. Data Acquisition
The forensic team retrieves electronically stored information (ESI) from the devices. Professionals must
use proper procedure and care to avoid altering the data and sacrificing theintegrity of the evidence.
6. Data Analysis
Team members sort and examine the authenticated ESI to identify and convert data that is usefulin court.
7. Evidence Assessment
Once ESI is identified as evidence, investigators assess it in relation to the security incident. Thisphase is
about relating the data gathered directly to the case.
This phase happens once the initial criminal investigation is done. Team members report anddocument
data and evidence in accordance with the court of law.
An expert witness is a professional who works in a field related to the case. The expert witnessaffirms
that the data is useful as evidence and presents it in court.
ROLE OF THE FORENSIC EXAMINER IN THE JUDICIAL SYSTEM
A Digital Forensic Examiner job is to help in the investigation of crimes and cyber-attacks. Digital
forensic examiners are primarily responsible for retrieving, organizing, and protecting digital evidence in
cybercrime investigations. Information can be recovered from computers andother electronic storage
devices by a digital forensic examiner. The Digital Forensic Examiner job description includes keeping
track of evidence so that it can be used in court. They conduct
or participate in suspect or victim interviews. In addition, before criminal trials, the Digital Forensic
Examiner job description includes assisting in the preparation of evidence. They mayprovide
recommendations to other investigators on the importance of digital evidence.
Mentoring
The Digital Forensic Examiner job is to oversee the junior or less experienced scientists and interns.
They mentor them and assign the tasks. A Digital Forensic Examiner job is to mentor and provide
specific comments on specific forensic interviews, participate in group discussions, generate suitable
research linked to the subject of forensic interviewing, and continue to improvepeople skills.
Assessment
Documentation
The Digital Forensic Examiner job description includes recording his or her findings and submitting a
report to the court. The forensic analysis of suspicious documents is part of digitalforensic
documentation analysis.
Types of a Digital Forensic Examiner
Forensic Psychologist: This expertise focuses on detecting criminals through questioning criminals and
relevant evidence to assist in determining motives and mental states. They focuson issues including the
ability to stand trial, provide information, and make significant judgments. They also assess mental
illness in relation to criminal risk.
Forensic Scientist: Forensic scientists investigate crime scenes, conduct scientific analysis, andgive
factual evidence that can be presented in court. To find clues and assist police investigations, they use
cutting-edge technologies and scientific concepts.
Forensic Anthropologist: Forensic Anthropologists evaluate age, gender, nationality, and othertraits
that distinguish a crime victim by examining human bones and structural abnormalities.
DNA/Serology Analysis
The forensic analytical tools of DNA/Serology identification involve collecting and identifyingfluids
from crime or death scenes. Fluids present at the scene need to be identified as human or non-human.
Forensic scientists specializing in serology determine what type of human fluid samples are present and
if any diseases are present. The fluids can be blood, urine, sweat, saliva,semen, or even breast milk.
Once the fluid is identified, serological forensic scientists can isolateand identify the DNA in the
sample. DNA (deoxyribonucleic acid) is the genetic information present in all human tissue. DNA is
unique to every individual, which makes it a valuable tool for identifying victims and suspects.
The technology of DNA analysis first became available in 1986. There were many initial challenges to
DNA evidence, but as the technology has improved, it's become widely accepted asa means of
identifying likely criminal suspects and excluding those unlikely to have involvement. Many cold cases
have been solved, and accused offenders have been cleared through DNA evidence.
Today, law enforcement officials enter DNA profiles of those involved in criminal activity into the
Combined DNA Index System, known as CODIS. The CODIS database helps generate leads in cases
where human biological evidence has been collected. It combines results of DNA screenings from the
Convicted Offender database, including sexual offenses, and the Forensic Index database, which
includes DNA information collected from all crime scenes. Forensic labs enter DNA profiles collected
from crime scenes into the CODIS database and search for matches, enabling law enforcement to match
crime scenes and individuals at the local, state, andfederal levels.
POLICIES AND PROCEDURES
POLICY
The Forensic Laboratory policy for issuing confidentiality agreements shall be that:
1.
All Forensic Laboratory employees must be issued with, and sign, a confidentiality agreement
(agreements are normally issued at time of recruitment and form a part of thecontract of employment).
2.
No employee shall be allowed access to Forensic Laboratory and Client informationor information
processing systems without signing the agreement.
3.
The Forensic Laboratory confidentiality agreement must define the undertakings to whichan employee
agrees with respect to maintenance of confidentiality and information security.
The confidentiality agreement is subject to periodic reviews by the Human ResourcesDepartment as
follows:
• reviews must be conducted following changes to:
•
job roles;
•
legislation;
•
the Forensic Laboratory policy on Information Security.
•
any changes to the confidentiality agreement must be implemented by the Human Resources
Department with suitable input from the General Counsel or specializedexternal legal sources.
Procedures
Digital forensics entails the following steps:
Identification
Preservation
Analysis
Documentation
Presentation
EXPLORE MORELearn Java Programming with Beginners Tutorial08:32Linux Tutorial for
Beginners: Introduction to Linux Operating...01:35What is Integration Testing Software Testing
Tutorial03:04What is JVM (Java Virtual Machine) with Architecture JAVA...02:24How to writea
TEST CASE Software Testing Tutorial01:08Seven Testing Principles Software Testing05:01Linux
File Permissions Commands with Examples13:29How to use Text tool in Photoshop CC
Tutorial08:32What is NoSQL Database Tutorial02:00Important Linux Commands for Beginners
Linux Tutorial15:03
ForensicsProcess of
Digital
Let’s study each in detail
Identification
It is the first step in the forensic process. The identification process mainly includes things likewhat evidence is present,
where it is stored, and lastly, how it is stored (in which format).
Electronic storage media can be personal computers, Mobile phones, PDAs, etc.
Preservation
In this phase, data is isolated, secured, and preserved. It includes preventing people from usingthe digital device so that
digital evidence is not tampered with.
Analysis
In this step, investigation agents reconstruct fragments of data and draw conclusions based on
evidence found. However, it might take numerous iterations of examination to support a specific
crime theory.
Documentation
In this process, a record of all the visible data must be created. It helps in recreating the crimescene
and reviewing it. It Involves proper documentation of the crime scene along with photographing,
sketching, and crime-scene mapping.
Presentation
In this last step, the process of summarization and explanation of conclusions is done. However, it
should be written in a layperson’s terms using abstracted terminologies. Allabstracted terminologies
should reference the specific details
QUALITY ASSURANCE
Digital forensic examinations require an examiner to apply a wide range of techniques to retrieve
data, and frequently examiners must interpret data to offer an expert opinion on what the data
mean. These opinions can affect the outcomes of investigations, prosecutions, or other remedies. It
is therefore essential that organizations have a management system to engender confidence in the
quality of forensic work performed. The quality management system is the consolidation of
practices and procedures used to ensure the quality of the workand products that the organization
produces.
Administrative Review—All digital forensic examination reports must be administrativelyreviewed
for consistency with agency policy and for editorial correctness.
Technical Review—At least 10 percent of final digital forensic examination reports must be
technically reviewed by another qualified digital forensic examiner (peer reviewed) before the
reports are published.
The reviewing examiner may be from the same or a different organization. The purpose of the
technical review is to ensure the following:
The report is clear and understandable.
The procedures performed were adequately documented and forensically sound.
The exam documentation was sufficiently detailed to enable reproduction of the results.
The interpretations and conclusions of the examiner were reasonable, supported by theexamination
documentation, and scientifically valid.
Validation Testing—Acquiring digital data for forensic examination is a critical phase of the
forensic process. Forensic personnel will often have only one opportunity to obtain the data, and
using untested tools could unintentionally alter the data. To the extent possible, organizations
should ensure the tools they use to acquire digital evidence are validated to operate as intended
and accurately acquire the data. The validation testing may be performed by the organization or
other reputable entity (for example, another digital forensic laboratory).The organization
performing the validation test must document the test, including the requirements that were tested,
the expected results, and the actual results of the testing. To comply with this standard, the
organization must be able to produce the report if requested.
Review of Quality System—An organization should review its quality management system at
least once every 3 years to ensure the system is meeting the quality needs of the organization.