Cyber Forensics (Evidence Recovery Techniques)
Cyber Forensics (Evidence Recovery Techniques)
Techniques)
The method of collecting and documenting proof from computer or a computing device in a
form which makes it presentable to court by applying the techniques of investigation and
analysis is called Cyber Forensics. The ideology behind cyber forensic is to determine who is
responsible for what actually happened on the computer while documenting the evidence and
performing a proper investigation. The storage media of the device for investigation is turned
into a digital copy by the investigators and investigation is performed on digital copy while
making sure the device under investigation is not contaminated accidentally. Cyber Forensics is
important element for investigation of crime and law enforcement. The computer system
becomes a crime scene when there are cases of hacking and denial of service (DOS) attacks. The
proof can be collected by browsing history, emails, documents, etc. These proofs can be
evidence in the court of law to sort out allegations or to protect innocent people from charges.
Cyber Security has worked to enforce law in both areas cyber forensics and collection reporting
to help provide companies the validated information needed, to present recovered files
material in a court of law.
In few cases, evidence needed for criminal investigation is stored on the hard disks which are
duly distributed, marked with names and extensions on appropriate locations. Though there
are times when cases require forensic experts but they are not lucky in collecting the evidence.
Cyber crime perpetrators may realize that they are to be arrested soon and delete the evidence
which can be brought against them in the court. Sometimes the perpetrator is way ahead and
knows how to smartly hide the information. There are also times when data was never stored
in the hard disc but was from transferable media and this is when the techniques come into
play depending upon each case:
Slack Space
Another way for hiding data is slack space caused by file sizes that do not match the clusters in
which they are stored. Forensic Experts are interested in this space particularly because of
functions through which DOS and Windows operating systems use this slack to fill in the
system’s memory (RAM slack). All kinds of data can be found in this space, and some of them
may be crucial for the investigation.
Steganography
This is hiding files with other files and this type of encryption is made through empty space.
Stenography can be easily explained through data hidden images. An image is recorded through
description f any single pixel represented by particular bite e.g. 10100010. When the last bit is
changed from 0 to 1 a different shade of pixel is obtained and hidden bit is created. Hidden bits
and their orders can be detected by someone who knows the key that is the code meaning it
can only be cracked by someone who knows how to crack such codes, the programs used to
detect the code is anti-steganography which detects the presence of hidden files. It is rightly
observed that detecting is much easier than reconstructing hidden files.
Cyber Forensics was created to address the specified needs of law enforcement to make most
of electronic evidence. Despite, of producing interpretations just like any other forensic
department they provide direct information and data that may have relation with the case. This
type of data collection has wide range insinuation for both the parties the investigator and the
forensic scientist and the work product of the cyber forensic examination. The Computer Fraud
Abuse Act (CFAA) is federal criminal statute which recognizes various computer crimes,
providing a civil remedy to the companies victimized by violation of the statute. In this digital
age, an Act like this need to be recognized worldwide as a tool that can be used by companies
to retrieve stolen data, prevent its distribution in the market and obtain compensation for the
same.
Akshita Bhaskar
References
https://www.datasolutions.rs/eng/digital-forensics-basics/digital-evidence-recovery/
https://www.datatriage.com/the-process-for-recovering-electronic-evidence/
https://www.educba.com/cyber-forensics/