Enotes Bca 213 b Unit 4
Enotes Bca 213 b Unit 4
&
School of Law
An ISO 9001:2015 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi, Approved by AICTE &Bar Council of India)
E-NOTES
Class : BCA III Sem.
UNIT – IV
Cyber forensics, also known as digital forensics, is the science of collecting, analysing,
and preserving digital evidence from various electronic devices. It plays a crucial role in
investigations related to cybercrimes, data breaches, and any unauthorized digital activity.
The primary objective of cyber forensics is to establish a timeline of events and provide
clear evidence that can be presented in a court of law.
The rise in cybercrimes has made cyber forensics an essential field. It helps organizations
understand the methods employed by cybercriminals, assess damage, and develop
strategies to prevent future incidents. Moreover, the legal system relies heavily on cyber
forensic experts to provide credible evidence in court cases involving technology.
• Data Analysis: Analyzing the collected data involves examining file systems,
recovering deleted files, and identifying anomalies that indicate malicious activities.
1
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2015 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi, Approved by AICTE &Bar Council of India)
• Testimony: Forensic experts may be called upon to present their findings in court,
explaining technical concepts in a manner that is understandable to judges and
juries.
• File Carving: This technique is used to recover files without the file system's
metadata, often employed to recover deleted files.
Cyber forensics is a critical field that continues to evolve with technology. Its
significance in law enforcement and corporate security cannot be overstated, as it
provides essential insights into cyber incidents and helps in safeguarding digital assets.
DIGITAL EVIDENCE
Digital evidence refers to any information stored or transmitted in digital form that can
be used in a court of law. This includes data from computers, smartphones, tablets,
servers, and any device capable of storing digital information.
• Files and Documents: Includes text files, spreadsheets, presentations, and images.
• Emails and Messaging: Communications can provide insights into intent and
actions.
• Logs: System and application logs record activities that can be crucial in
investigations.
2
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2015 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi, Approved by AICTE &Bar Council of India)
• Network Traffic: Data packets and logs from network devices can reveal
unauthorized access or data breaches.
• Volume and Complexity: The vast amount of digital data can complicate
investigations.
• Technological Advances: Rapid technological advancements require forensic
experts to continuously update their skills and tools.
• Privacy Concerns: Balancing the need for investigation with individuals' privacy
rights can be challenging.
3
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2015 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi, Approved by AICTE &Bar Council of India)
The life cycle of digital forensics refers to the systematic process followed during a
forensic investigation. It ensures that all steps are documented and that evidence is
collected and analyzed in a manner that preserves its integrity.
• Preparation: Involves ensuring that forensic tools and methodologies are in place,
and team members are trained in the latest techniques.
• Collection: Gathering digital evidence while maintaining its integrity. This stage
involves using proper techniques to avoid altering data.
• Preservation: Securing collected evidence to prevent alteration or loss. This often
involves creating forensic images of storage devices.
• Analysis: In-depth examination of the collected evidence to identify relevant
information. This may include recovering deleted files, analyzing logs, and
investigating malware.
• Presentation: Compiling findings into a comprehensive report and presenting it in
court, if necessary. The presentation must be clear and understandable to non-
technical audiences.
• Review: Post-investigation evaluation of the processes followed and lessons
learned for future cases.
4
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2015 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi, Approved by AICTE &Bar Council of India)
The digital forensics process involves several key steps that guide investigators in
collecting, analyzing, and presenting digital evidence. Each step is critical for maintaining
the integrity of the evidence and ensuring a thorough investigation.
• Preservation: Ensuring that the collected evidence is secured and preserved in its
original state, often using write-blockers to prevent changes.
• Analysis: Investigating the collected data to identify patterns, recover deleted files,
and uncover hidden information.
• Maintain Documentation: Keep detailed records of all actions taken during the
investigation, including time stamps and personnel involved.
• Use Multiple Tools: Employ a variety of tools to validate findings and ensure
comprehensive analysis.
5
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2015 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi, Approved by AICTE &Bar Council of India)
• Forensic Imaging Software: Tools such as FTK Imager and EnCase are used to
create forensic copies of storage devices.
• Data Recovery Tools: Software like Recuva and PhotoRec can help recover
deleted files.
• Network Forensics Tools: Tools such as Wireshark can capture and analyze
network traffic.
1. Physical Layer: This layer deals with the physical connection between devices,
including cables, switches, and electrical signals. It defines the hardware elements
involved in communication.
2. Data Link Layer: Responsible for node-to-node data transfer, this layer ensures
error detection and correction and manages access to the physical medium.
Protocols such as Ethernet operate at this layer.
6
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2015 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi, Approved by AICTE &Bar Council of India)
3. Network Layer: The network layer is responsible for routing data packets across
different networks. It determines the best path for data transmission and handles
addressing. Protocols like IP (Internet Protocol) function at this layer.
4. Transport Layer: This layer ensures the reliable transmission of data segments
between end systems. It manages flow control, error detection, and retransmission.
Protocols like TCP (Transmission Control Protocol) and UDP (User Datagram
Protocol) operate here.
5. Session Layer: The session layer establishes, manages, and terminates sessions
between applications. It ensures that data exchanges are synchronized and
organized.
6. Presentation Layer: This layer translates data between the application layer and
the network format. It handles data encryption, compression, and translation to
ensure that the data is presented in a readable format for the application layer.
7. Application Layer: The topmost layer, the application layer, provides network
services to end-user applications. It includes protocols like HTTP, FTP, and SMTP,
enabling users to access and interact with network resources.
The OSI model serves as a guide for network design and troubleshooting. It provides a
standard framework for understanding how different network protocols interact and helps
network engineers identify where issues may arise in the communication process.
The OSI model is often compared with the TCP/IP model, which has fewer layers. The
TCP/IP model combines certain OSI layers into broader categories, reflecting a more
simplified approach to network communication. Understanding both models is essential
for network professionals.
7
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2015 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi, Approved by AICTE &Bar Council of India)
The OSI model is a foundational concept in networking that provides a structured approach
to understanding how different layers of protocols interact. Its significance in network
design and troubleshooting cannot be overstated.
COMPUTER FORENSICS
Computer forensics plays a vital role in investigating cybercrimes, data breaches, and
fraud. It helps organizations protect their assets, recover from incidents, and comply with
legal requirements.
• Evidence Collection: The process begins with the secure collection of data from
computer systems. This includes imaging hard drives and gathering volatile data
such as RAM.
• Data Analysis: Forensic experts analyze the collected data to identify relevant
information, recover deleted files, and investigate the actions of users on the system.
• Forensic Software: Tools like EnCase and FTK are commonly used for data
recovery and analysis.
• Disk Imaging Tools: These tools create exact copies of hard drives, ensuring that
the original evidence remains unaltered.
8
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2015 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi, Approved by AICTE &Bar Council of India)
• Network Forensics Tools: Tools such as Wireshark and Network Miner help
analyze network traffic for evidence of unauthorized access or data exfiltration.
• Volume of Data: The vast amount of data stored on computers can complicate the
analysis process.
Computer forensics is an essential field that aids in investigating cyber incidents and
protecting digital assets. Its methodologies and tools continue to evolve, making it a critical
component of modern cybersecurity efforts.
STEGANOGRAPHY
Steganography is the practice of hiding information within other non-secret data to avoid
detection. Unlike encryption, which alters the appearance of data, steganography conceals
the existence of the information.
Steganography is a fascinating field that intersects with cybersecurity, data protection, and
covert communication. Understanding its techniques, applications, and challenges is
essential for professionals in these domains.
TYPES OF STEGANOGRAPHY
• Image Steganography: Hiding data within image files, often by manipulating the
least significant bits (LSBs) of pixel values.
9
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2015 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi, Approved by AICTE &Bar Council of India)
• Video Steganography: Concealing data within video files, which can include
altering frames or audio tracks.
• Text Steganography: Hiding data within text documents by using specific patterns
or formatting.
• Least Significant Bit (LSB): A common technique where data is embedded into
the least significant bit of pixel values in an image.
CHALLENGES IN STEGANOGRAPHY
• Capacity: The amount of data that can be hidden is often limited by the medium
used.
10
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2015 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi, Approved by AICTE &Bar Council of India)
• Robustness: Ensuring that hidden data remains intact and undetectable even after
modifications or transformations to the host medium.
11