Presentation (2) (12)
Presentation (2) (12)
HASH AND SIGNATURE ANALYSIS: CALCULATE THE HASH OF THE MALICIOUS FILE AND CHECK IT
AGAINST KNOWN MALWARE DATABASES. INVESTIGATE IF SECURITY VENDORS HAVE SIGNATURES
FOR THIS SPECIFIC THREAT.
VICTIMOLOGY: IDENTIFY POTENTIAL TARGETS AND AFFECTED USERS. UNDERSTAND THE IMPACT
ON THE ORGANIZATION AND PRIORITIZE RESPONSE ACTIONS.
MITIGATION AND REMEDIATION: DEVELOP A PLAN TO MITIGATE THE THREAT. THIS MAY INVOLVE
REMOVING THE MALICIOUS APPLICATION, PATCHING VULNERABILITIES, AND IMPLEMENTING
SECURITY MEASURES TO PREVENT FUTURE INCIDENTS.
• INCIDENT DOCUMENTATION: DOCUMENT YOUR FINDINGS, ACTIONS TAKEN, AND LESSONS
LEARNED. THIS DOCUMENTATION IS CRUCIAL FOR FUTURE REFERENCE AND ANALYSIS.
AGENCIES FOR INVESTIGATION OF CYBER
CRIME IN INDIA
• IN INDIA, THE PRIMARY AGENCY RESPONSIBLE FOR INVESTIGATING CYBER
CRIMES IS THE CYBER CRIME UNIT OF THE CENTRAL BUREAU OF
INVESTIGATION (CBI). ADDITIONALLY, EACH STATE HAS ITS OWN CYBER
CRIME CELL OR UNIT THAT HANDLES SUCH CASES AT THE STATE LEVEL. THE
NATIONAL CYBER CRIME REPORTING PORTAL (WWW.CYBERCRIME.GOV.IN)
ALLOWS INDIVIDUALS TO REPORT CYBER CRIMES ONLINE.
WHILE GOVERNMENT AGENCIES LIKE THE CBI AND STATE CYBER CRIME CELLS PRIMARILY HANDLE CYBER CRIME
INVESTIGATIONS IN INDIA, THERE ARE PRIVATE CYBERSECURITY FIRMS THAT PROVIDE SERVICES SUCH AS DIGITAL
FORENSICS, INCIDENT RESPONSE, AND SECURITY CONSULTING. SOME NOTABLE PRIVATE CYBERSECURITY FIRMS
OPERATING IN INDIA INCLUDE:
LUCIDEUS TECH
• TATA CONSULTANCY SERVICES (TCS) – CYBER SECURITY SERVICES
• IT’S IMPORTANT TO NOTE THAT PRIVATE CYBERSECURITY FIRMS TYPICALLY FOCUS ON PREVENTIVE MEASURES,
CONSULTING, AND SUPPORTING ORGANIZATIONS RATHER THAN ACTING AS LAW ENFORCEMENT AGENCIES FOR
CRIMINAL INVESTIGATIONS. FOR LEGAL ACTION, INVOLVEMENT OF LAW ENFORCEMENT AGENCIES IS ESSENTIAL.
POWER OF CYBER CRIME AGENCY
ARTICLE 21 – RIGHT TO LIFE AND PERSONAL LIBERTY: AGENCIES OPERATE WITHIN THE FRAMEWORK OF
PROTECTING CITIZENS’ FUNDAMENTAL RIGHTS, AND INVESTIGATIONS MUST ADHERE TO DUE PROCESS,
ENSURING THE RIGHT TO PRIVACY AND LIBERTY.
• ARTICLE 19(1)(A) – FREEDOM OF SPEECH AND EXPRESSION: WHILE INVESTIGATING CYBERCRIMES,
AGENCIES BALANCE THE NEED FOR ADDRESSING OFFENSES WITH THE CONSTITUTIONAL RIGHT TO
FREEDOM OF SPEECH AND EXPRESSION.
• ARTICLE 300A – RIGHT TO PROPERTY: IN CASES INVOLVING FINANCIAL CYBERCRIMES OR THEFT,
AGENCIES ACT WITHIN THE CONSTITUTIONAL PROVISIONS RELATED TO PROPERTY RIGHTS.
CONTINUE...
FIR REGISTRATION: A CYBERCRIME INVESTIGATION USUALLY BEGINS WITH THE FILING OF A FIRST INFORMATION
REPORT (FIR) WITH THE LOCAL POLICE. THE COMPLAINANT PROVIDES DETAILS OF THE ALLEGED CYBERCRIME,
AND THE FIR OFFICIALLY INITIATES THE INVESTIGATION.
• JURISDICTION: DETERMINING THE JURISDICTION IS CRUCIAL IN CYBERCRIME CASES. THE CRIME MAY BE
INVESTIGATED BY THE CYBERCRIME CELL OF THE STATE POLICE OR SPECIALIZED AGENCIES LIKE THE CYBER
CRIME UNIT OR THE CYBER CRIME CELL.
• PRESERVATION OF EVIDENCE: PRESERVING DIGITAL EVIDENCE IS VITAL. INVESTIGATORS MUST TAKE
IMMEDIATE STEPS TO ENSURE THE INTEGRITY OF ELECTRONIC EVIDENCE, INCLUDING SECURING SERVERS,
COMPUTERS, AND OTHER DIGITAL DEVICES INVOLVED IN THE ALLEGED OFFENSE.
CONTINUE.....
PENALTIES: IF THE ACCUSED IS FOUND GUILTY, THE COURT IMPOSES PENALTIES AS PER THE
PROVISIONS OF THE INFORMATION TECHNOLOGY ACT. PENALTIES CAN INCLUDE IMPRISONMENT,
FINES, OR BOTH, DEPENDING ON THE NATURE AND SEVERITY OF THE OFFENSE.
• THROUGHOUT THIS PROCESS, INVESTIGATORS MUST ADHERE TO THE PRINCIPLES OF
NATURAL JUSTICE AND RESPECT THE CONSTITUTIONAL RIGHTS OF THE ACCUSED. THE LEGAL
FRAMEWORK ENSURES A SYSTEMATIC AND LAWFUL APPROACH TO CYBERCRIME
INVESTIGATIONS IN INDIA.
THE PROCEDURE FOR SEARCH AND
SEIZURE OF DIGITAL EVIDENCE IN A
CYBERCRIME INCIDENT TYPICALLY INVOLVES
THE FOLLOWING STEPS:
LEGAL AUTHORIZATION: OBTAIN A SEARCH WARRANT OR OTHER LEGAL
AUTHORIZATION FROM A COMPETENT AUTHORITY, SPECIFYING THE SCOPE AND
LOCATION OF THE SEARCH.
SECURE THE SCENE: SECURE THE PHYSICAL LOCATION WHERE THE DIGITAL EVIDENCE
IS LOCATED TO PREVENT TAMPERING.
• IDENTIFY AND DOCUMENT: IDENTIFY THE DEVICES OR SYSTEMS CONTAINING
POTENTIAL EVIDENCE AND DOCUMENT THEIR STATE BEFORE ANY ACTION IS TAKEN
CON...
PRESERVATION:
IMPORTANCE: PRESERVATION ENSURES THE EVIDENCE REMAINS UNCHANGED FROM THE MOMENT
OF ACQUISITION, MAINTAINING ITS RELIABILITY FOR LEGAL PROCEEDINGS.
• TOGETHER, DUPLICATION AND PRESERVATION FORM THE FOUNDATION FOR A ROBUST AND
DEFENSIBLE FORENSIC INVESTIGATION IN THE REALM OF CYBERCRIME, ALLOWING
INVESTIGATORS TO ANALYZE EVIDENCE WHILE MAINTAINING ITS ORIGINAL STATE.
EXAMINATION AND ANALYSIS OF DIGITAL
EVIDENCE
EXAMINATION:
OBJECTIVE: DELVE DEEPER INTO THE IDENTIFIED DIGITAL EVIDENCE TO EXTRACT MEANINGFUL
INSIGHTS AND DRAW CONCLUSIONS.
• DOCUMENTATION AND REPORTING OF DIGITAL EVIDENCE ARE VITAL FOR ESTABLISHING THE
CREDIBILITY AND ADMISSIBILITY OF INFORMATION IN LEGAL PROCEEDINGS. THIS PROCESS
INVOLVES CREATING COMPREHENSIVE RECORDS DETAILING THE COLLECTION, PRESERVATION,
AND ANALYSIS OF DIGITAL EVIDENCE. DOCUMENTATION SHOULD INCLUDE SPECIFIC DETAILS
SUCH AS DATE, TIME, LOCATION, AND PERSONNEL INVOLVED IN EACH STEP. CLEAR AND CONCISE
REPORTS SHOULD PRESENT FINDINGS, METHODOLOGIES, AND ANY TOOLS USED. MAINTAINING A
METICULOUS CHAIN OF CUSTODY IS CRUCIAL FOR DEMONSTRATING THE EVIDENCE'S INTEGRITY.
ADHERING TO STANDARD OPERATING PROCEDURES AND LEGAL REQUIREMENTS ENSURES THE
RELIABILITY OF THE DOCUMENTATION, STRENGTHENING THE EVIDENTIARY VALUE IN COURT.
MAINTAINING THE CHAIN OF CUSTODY