0% found this document useful (0 votes)
232 views3 pages

DigitalForensics Book

This document discusses digital forensics in cyber security. It begins by defining digital forensics and distinguishing the roles of digital forensics experts and cybersecurity professionals. Next, it outlines the main steps in the digital forensics process: identification, collection, analysis, documentation, and presentation. It then describes some key branches of digital forensics including media, cyber, mobile, and software forensics. The document concludes by discussing challenges in next generation digital forensics areas like cloud, internet of things, and network forensics due to rapidly changing technologies.

Uploaded by

yk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
232 views3 pages

DigitalForensics Book

This document discusses digital forensics in cyber security. It begins by defining digital forensics and distinguishing the roles of digital forensics experts and cybersecurity professionals. Next, it outlines the main steps in the digital forensics process: identification, collection, analysis, documentation, and presentation. It then describes some key branches of digital forensics including media, cyber, mobile, and software forensics. The document concludes by discussing challenges in next generation digital forensics areas like cloud, internet of things, and network forensics due to rapidly changing technologies.

Uploaded by

yk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Special Issue - 2020 International Journal of Engineering Research & Technology (IJERT)

ISSN: 2278-0181
NSDARM - 2020 Conference Proceedings

Digital Forensic in Cyber Security


Sharanya Mohanan.C.V
Assistant Professor On Contract
Carmel College Mala

Abstract:- Digital Forensics could be a branch very finding report, that is leveraged in any later legal
of forensic science which has the identification, collection, proceedings.
analysis and news any valuable digital info within the digital
devices with the pc crimes, as a region of the investigation. It III LEVELS OF DIGITAL FORENSICS
includes the world of study like storage media, hardware, OS,
network and applications. This paper presents the importance
It consist of mainly five steps:
of digital forensics within the field of security in modern
world.

keywords-cybersecurity, mobile forensic cybercrime, software.

I INTRODUCTION
“Digital forensics” could be a broad term bearing
on the look for and detection, recovery and preservation
of proof found on digital systems, usually for criminal or
civil legal functions.
Digital forensics will typically involve the acquisition
of proof regarding events within the physical world.
An example, sick deleted emails that link a suspect to a
murder or alternative crime. The Computers, mobile
devices still play a bigger role in just about each side of
society, the demand for digital forensic consultants is
probably going to rise, very much like it's with cyber
security consultants. Aim of pc forensics techniques is to
go looking, preserve and analyze data on pc systems is to
seek out potential proof as an attempt as an example simply
gap a data file changes the file.

II DIFFERENCE BETWEEN FORENSIC SECURITY


AND CYBERSECURITY
As a sub-domain of the cyber security field,
the distinction between the duties of execs operating in
digital forensics and people operating in
additional ancient cyber security roles may be compared to 1. Identification:
the distinction between a detective and a patrol officer in It is the distinctive evidences associated with the digital
real-world policing. The patrol officer’s task is crime in storage media, hardware, package, network and/or
essentially to forestall offenses from occurring, or notice applications. it's the foremost necessary step.
and take action once they’re happening. The detective job
is to research offenses once the event, is verified. While 2. Collection
there could also be quite an little bit of overlap in duties It includes digital evidences known within the opening
with alternative cyber security occupations, move in order that they doesn’t degrade to fade with
digital forensic specialists specialize in past events instead time. protective the digital evidences is
of the interference of current or future happenings. incredibly necessary and crucial.
Digital forensic investigator can gather proof from a
specific electronic computer in order that it may 3. Analysis:
be conferred in court, conducting a radical digital It includes analyzing the collected digital evidences of the
investigation and building a documented chain of proof. committed pc crime so as to trace the criminal .
Investigators use a range of techniques and
proprietary package forensic applications to look at the 4. Documentation:
copy, looking out hidden folders and unallocated space for It includes the right documentation of the total digital
copies of deleted, encrypted, or broken files.”This proof is investigation, digital evidences, loop holes of the attacked
then verified against the first device and collated in a system etc. in order that the case will be studied and

Volume 8, Issue 04 Published by, www.ijert.org 1


Special Issue - 2020 International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
NSDARM - 2020 Conference Proceedings

analysed in the future conjointly and might be bestowed determine the supply of a security attack. Network traffic
within the court in a very correct format. objects that need analysis incorporates protocols
used, informatics addresses, port numbers, timestamps,
5. Presentation: malicious packets, transferred files, useragents, application
It includes the presentation of all the digital evidences and server versions, and OS versions, etc. This knowledge are
documentation within the court so as to prove the digital often nonheritable from differing kinds of traffic.
crime committed and determine the criminal.
C. web of Things (IoT) Forensics
IV BRANCHES OF DIGITAL FORENSICS The Internet of Things (IoT) that is supported by the
• Media forensics cloud, huge knowledge and mobile
It is the branch of digital forensics which computing typically connects something and everything
has identification, collection, analysis and presentation of ‘online’. The IoT represents the interconnection Some IoT
audio, video and image . devices square
measure normal things with inherent web property, hereas
• Cyber forensics: some square measure sensing devices developed
It is the branch of digital forensics which specifically with IoT in mind. The IoT covers technologies,
has identification, collection, analysis and presentation of such as: remote-controlled aerial vehicles,good
digital evidences throughout the investigation of a cyber swarms,good grid,good buildings and residential
crime. appliances autonomous cyber-physical and cyberbiological
systems, wearables, embedded digital things, machine to
• Mobile forensics: machine communications, RFID sensors, and context-
It is the branch of digital forensics which aware computing, etc. every of those technologies has
has identification, collection, analysis and become a particular domain on their own advantage.
presentation of digital evidences throughout the With the new styles of devices perpetually rising,the IoT
investigation of against the law committed through a has virtually reached its uttermost evolution.
mobile devices like mobile phones,GPS device,tablet, With associate degree calculable range of fifty billion
laptop. devices that may be networked by
2020 it's calculable that there'll be ten connected IoT
• Sofware forensics: devices for each person worldwide.
It is the branch of digital forensics which
has identification, collection, analysis and presentation of VII CONCLUSION
digital evidences throughout the investigation of against The field of Digital forensics is
the law associated with softwares solely. facing numerous challenges difficult to beat because the
new technologies square measure perpetually being
VI. NEXT GENERATION DIGITAL FORENSICS developed, Digital forensic’s square
A. Cloud Forensics measure given with varied challenges which will have
The cloud computing paradigm substantial socioeconomic impact
presents several edges each to organizations and one on each international enterprises and people
among such blessings relates to the style during which Evidentiary knowledge isn't longer restricted
knowledge is managed by the cloud infrastructure. for to one host however instead unfold between completely
example, knowledge is unfold between numerous knowled different or virtual locations, including: on-line social
ge centres to enhance performance and facilitate load- networks, cloud resources, and private network–attached
balancing, measurability. storage devices. what is more, advances in technology and
As a result, proof left by adversaries is harder to eliminate propagation of innovative services have semiconductor
since it are often derived in numerous locations, rendering diode to a major rise within the quality of DFIs that
the acquisition of proof and its examination easier to DFEs should manage.Hence, to mitigate these challenges,
perform. Despite its several edges, cloud computing worldwide collaboration among
poses important challenges to the LEAs and DFEs from LEAs, tutorial establishments and corporate of dominant
a rhetorical perspective. importance becomes . To facilitate analysis efforts that
These embrace, however aren't restricted to, issues related stretch each other, rhetorical analysis can lag behind,
to the absence of standardization amongst completely tools can become noncurrent, and law
different CSPs, variable levels of information security and enforcements’ product are going to be incapable
their service level agreements. of counting on the results of DF analysis.

B. Network Forensics
A Network forensic Investigation (NFI) pertains to the
acquisition, storage and examination of network traffic
(encapsulated in network packets) generated by a
bunch, associate degree intermediate node, or the
complete portion of a network so as to

Volume 8, Issue 04 Published by, www.ijert.org 2


Special Issue - 2020 International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
NSDARM - 2020 Conference Proceedings

VIII REFERENCES
[1] Montasari, R. (2017, a). An Overview of Cloud Forensics
Strategy: Capabilities, Challenges, and Opportunities. In
Strategic Engineering for Cloud Computing and Big Data
Analytics, pp. 189-205. Springer, Cham.
[2] Caviglione, L., Wendzel, S. and Mazurczyk, W. (2017). The
Future of Digital Forensics: Challenges and the Road Ahead.
IEEE Security & Privacy, (6), pp.12-17.
[3] Taylor, M., Haggerty, J., Gresty, D. and Lamb, D. (2011).
Forensic investigation of cloud computing systems. Network
Security, 2011(3), pp.4-10.
[4] Bojanova, I and Voas, J. (2015). ‘Securing the Internet of
Anything (IoA)’.
[5] Next-Generation Digital Forensics: Challenges and Future
Paradigms, Reza Montasari Department of Computing and
Engineering The University of Huddersfield Huddersfield,
U.K.

Volume 8, Issue 04 Published by, www.ijert.org 3

You might also like