Digital Forensics
Digital Forensics
Name- Ansh
Course- B.Sc. Forensic science (hons)
Batch- 2023-2026
Enrollment no.- A5905923032
CONTENTS LIST :
I. Acknowledgement
II. Abstract of the report
III. Introduction To digital forensics
IV. Investigation procedure in digital evidences
V. History of digital forensics
VI. Different types of tools used
VII. Techniques used in digital forensics
VIII. Rules of digital forensic
IX. Characteristics of digital evidences
X. Chain of custody
XI. Evidence handling procedure
XII. Ethical hacking, methodology and tools
XIII. Different tools for ethical hacking
XIV. Intro to computer crimes
P a g e 1 | 40
XV. Types of cyber crimes
XVI. Explain the goal of report writing
XVII. Layout of an investigative report
XVIII.Case study- Financial frauds in district jamtara of
Jharkhand
XIX. Discussions and study findings
ACKNOWLEDGEMENT
process .
P a g e 2 | 40
ABSTRACT
Digital forensics, you know, it's like the Sherlock Holmes of the
digital world. From sniffing out deleted files to cracking encrypted
codes, digital forensics does it all. Well, that's where forensics steps
in like a hero to save the day. It's like a high-tech treasure hunt for
data that longer wants to be found. Think of them as modern-day
wizards waving their digital wands to reveal truths buried deep
within our devices. So next time you think your data is safe and
sound, remember: there's a whole army of digital sleuths out there
ready to dive into the depths of your files.
P a g e 3 | 40
trojans, password attacks, information gathering etc. is blocked
by the use of digital forensics.
P a g e 4 | 40
Documentation: Documentation procedure helps us to safe
guard the volatile data that is being analyzed and to
continuously record the crime scene, locations, different
devices that are being examined and making a track record that
can be admissible in courts.
United states were the first country to create the 1978 Florida
Computer Crimes Act in 1970. Further Canada passed a legislation
in the branch of cybercrimes and computer forensics, in 1983.When
the emergence of the digital forensics was seen, soon in 1985, the
British government formed the new computer crime department.
The recognition of digital forensics got popular worldwide due to
P a g e 5 | 40
the issue of the 1990 Britain Computer Misuse Act. Consultants of
cyber security like, Collier and Spaul gave the term computer
Forensics In their Academic paper. in Britain, it also created the
National Hi-tech Crime Unit in 2001. With due time, 43 countries
came along together to sign The Convention of Cybercrime in the
year, 2004.Branches of Digital Forensics
P a g e 7 | 40
3.Bulk Extractor: This extractor runs on certain patterns that without
the help of system file structure recovers data from sophisticated
spaces, hidden areas and overwritten areas.
TECHNIQUES
P a g e 8 | 40
coherent story. Imagine looking at similarities between drives
to catch trouble brewing before it hits the fan.
Original Evidence
P a g e 9 | 40
If criminal or civil proceed in the client/victim to allow us to
handover all the original evidences, since we have evidence
handling procedures in place.
P a g e 10 | 40
Types of Evidence
There are many types of evidence, each with their own special
or unique characteristics. Some of the major types of evidence
are:
1. Illustrative evidence
2. Electronic evidence
3. Documented evidence
4. Explainable evidence
5. Substantial evidence
6. Testimonial
Illustrative Evidence
It is usually represented by Obi and is a type of certificate. For
example, photographs, films, sound recordings, x-rays,
graphics, drawings, simulations, sculptures and models.
Electronic Evidence
P a g e 11 | 40
Documented Evidence
Substantial Evidence
Testimonial
P a g e 12 | 40
that is, affidavit. This is done of the common forms of evidence
in the system
P a g e 13 | 40
be read. Cases where digital evidence is discovered also help
investigators examine the evidence.. Metadata is used to identify
specific data and facilitate digital authentication.
CHAIN OF CUSTODY
Evidence Validation
Volatile Evidence
The preliminary information gathering is the initial response
for determining whether an activity that occur is not unlawful,
unauthorized, or unacceptable. The volatile data collected
P a g e 14 | 40
because it can help determine the criminal activity that can get
lost if the system is powered of the order of volatility evidences
are main or physical memory, virtual memory, peripheral
(RAM), memory,
Digital Photos
Evidence Labels
Evidence Storage
Evidence Log
P a g e 16 | 40
The evidence custodian logs the receipt of the evidence in the
evidence log when they receive the evidence log. A complete
inventory of all the evidences within the safe should be kept in
an evidence log.
Working Copies
Evidence Backups
Evidence Disposition
P a g e 17 | 40
to record the evidence tag and the evidence log in the date of
final disposition.
Evidence Safe
There are lots of security breaches out there. The art of finding
these breaches is called hacking. Computer hackers have been
around for many years, hacking becoming more common as the
internet spreads everywhere. Not a lot of hackers are famous
like Kevin Mitnick, In the digital world, there are many types
P a g e 18 | 40
of threats. It's tough to describe them all perfectly because
hackers are just like everyone - unique individuals. Each one
has different reasons, ways of doing things, and skills. Hackers
aren't always social or teenagers either, They are usually smart
cookies who like learning new things and taking risks.
Selecting Tools
P a g e 19 | 40
physical security testing, you may be vulnerable. Since some
tools focus on specific tests, a single tool can test everything.
Evaluating Results
P a g e 20 | 40
1. Nmap
2.. Nessus
4. Nikto
5. kismet
P a g e 21 | 40
Nessus: Nessus is the most famous vulnerability scanner.
Nessus was designed with robust cybersecurity in mind.
Donate in a non-commercial environment.
and 270+.
P a g e 22 | 40
INTRODUCTION TO COMPUTER CRIMES
TYPES OF CYBERCRIME
P a g e 23 | 40
Internet crimes against individuals include Internet
pornography, publishing child pornography, email harassment,
and illegal contract fraud.This includes sexual, racial, religious,
or other forms of harassment. Anyone who commits this type
of crime is committing a cybercrime.
The spread of the virus online shows that this medium is being
used by individuals and groups to threaten governments around
the world and voters at home. Crime manifests itself as a crime
when a private individual "hacks" a website controlled by the
government or military.
P a g e 24 | 40
1. Cybercrime involving harassment or violence:
Cybercrime involving harassment or violence is a crime
that creates a physical risk for some person or persons.
(b) Depression
P a g e 25 | 40
In this section we will talk about hacking, ,, credit card fraud,
Internet pornography, online gambling, software hacking,
email spoofing, fraud, phishing, cyber terrorism,
Internet Porn
P a g e 26 | 40
Online casino
Software piracy
Email Fraud
Phishing
Cyber Terrorism
P a g e 29 | 40
8. Reports should be prepared immediately.
Executive summary:
2.Objective:
P a g e 30 | 40
Objectives are used to describe all the activities that the
assessment aims to accomplish. In some cases, when reviewing
media content, scanning may not allow for a comprehensive
search.
Computer evidence:
Related findings:
P a g e 31 | 40
Supporting information:
P a g e 32 | 40
Some examples of search engines are:
7. Additional Information:
P a g e 33 | 40
(a) Attacker Methodology: its important addition to help
understand the attack or attack being made. it is useful if you
are investigating a computer access problem. In the transaction
log, you can observe whether the attack was carried out and the
rest of the attack.
(d) Recommendations:
P a g e 34 | 40
In this section, we make some recommendations to help our
customers or customers be better prepared and better educated
for computer security issues. Specifically, we discuss host-
based, network-based, and programmatic countermeasures that
customers can use to eliminate or reduce the risk of the security
incidents we investigate.
P a g e 35 | 40
individuals and businesses to access payments, savings, and
credit facilities online without visiting a bank branch or dealing
directly with the financial service provider are considered to be
part of digital finance, according to some consensus. By
providing individuals and small, medium and large businesses
with easy access to a range of financial products and services
(including credit facilities),digital finance promises to boost the
GDP of digitalized economies.
ONLINE TRANSACTION
P a g e 37 | 40
Although technically trained personnel are required to combat
digital financial fraud, the situation in Jharkhand was dire.
Since digital frauds are known to be transnational, their
jurisdiction is also vast and unclear. The police likewise send a
solicitation to monetary foundations and e-wallet organizations
to give significant data with respect to computerized monetary
misrepresentation however there is additionally a resistance
between monetary establishment and police which lead to
flawed examination and a low conviction rate in advanced
monetary misrepresentation. At last, because of the above
things the examination isn't done as expected and in a decent
way which prompts the low conviction rate.
P a g e 38 | 40
REFERENCES
I. https://mlgansari.wordpress.com/wpcontent/uploads/2020/04/chapter-4-
digital-evidences-mcq-q_a.pdf 2)
II. https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8387.pdf
III. https://mlgansari.wordpress.com/wpcontent/uploads/2020/04/chapter-4-
digital-evidences-mcq-q_a.pdf
IV. https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8387.pdf
V. https://mlgansari.wordpress.com/wpcontent/uploads/2020/04/chapter-4-
digitalevidences-mcq-q_a.pdf
VI. https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8387.pdf
VII. NAVEENKUMAR G VENKATA SWAMY, MASUDA H IMTIAZ,
"SUPPORT VECTOR MACHINE FOR PERSON CLASSIFICATION
USING THE EEG SIGNALS", 2023 INTERNATIONAL CONFERENCE
ON ELECTRICAL, COMPUTER AND ENERGY TECHNOLOGIES
(ICECET), PP.1-4, 2023.
VIII. ANEEBA ASHRAF, AYIMA ZAHRA, MUHAMMAD ASIF, MAAZ BIN
AHMAD, SADIA ZAFAR, "ETHICAL HACKING METHODOLOGIES:
A COMPARATIVE ANALYSIS", 2021 MOHAMMAD ALI JINNAH
UNIVERSITY INTERNATIONAL CONFERENCE ON COMPUTING
(MAJICC), PP.1-5, 2021.
IX. B. SMITH, W. YURCIK, D. DOSS, "ETHICAL HACKING: THE
SECURITY JUSTIFICATION REDUX", IEEE 2002 INTERNATIONAL
SYMPOSIUM ON TECHNOLOGY AND SOCIETY (ISTAS'02). SOCIAL
IMPLICATIONS OF INFORMATION AND COMMUNICATION
TECHNOLOGY. PROCEEDINGS (CAT. NO.02CH37293), PP.374-379,
2002.
X. MARAS, MARIE-HELEN. (2014). COMPUTER FORENSICS:
CYBERCRIMINALS, LAWS AND EVIDENCE, SECOND EDITION.
JONES AND BARTLETT.
P a g e 39 | 40
XI. MARAS, MARIE-HELEN. (2016). CYBER CRIMINOLOGY. OXFORD
UNIVERSITY PRESS.
XII. INTERNATIONAL CENTRE FOR MISSING & EXPLOITED
CHILDREN (ICMEC) AND THE UNITED NATIONS CHILDREN'S
FUND (UNICEF). (2016). ONLINE CHILD SEXUAL ABUSE AND
EXPLOITATION.
XIII. • BARCLAY, CORLANE. (2017). CYBERCRIME AND LEGISLATION:
A CRITICAL REFLECTION ON THE CYBERCRIMES ACT, 2015 OF
JAMAICA. COMMONWEALTH LAW BULLETIN, VOL. 43(1), 77-107.
XIV. https://www.geeksforgeeks.org/computerforensic-report-format/
P a g e 40 | 40