CS Unit-3
CS Unit-3
Security-Legal perspectives
•Cyber Law – The Legal Perspectives: Introduction, Cybercrime and the
Legal Landscape around the World, Why do we need cyberlaws: the
indian context, the indian IT act.
UNIT-III Cyber Law
🠶 Introduction
🠶 cybercrime is the largest illegal industry.
🠶 Cybercrime involves massive, coordinated attacks against the information infrastructure of a country
.
🠶 3. E-Mails that are defamatory in nature are punishable under Section 500 of the Indian Penal Code (IPC)
that recommends an imprisonment of upto 2 years or a fi ne or both.
🠶 4. Threatening E-Mails are punishable under the provisions of the IPC pertaining to criminal
intimidation, insult and annoyance (CHAPTER XXII) and extortion (CHAPTER XVII).
🠶 5. E-Mail spoofing is covered under provisions of the IPC with regard to fraud, cheating by
🠶 Network forensics is the study of network traffi c to search for truth in civil, criminal and administrative
matters to protect users and resources from exploitation, invasion of privacy and any other crime fostered
by the continual expansion of network connectivity.
UNIT-III Cyber Forensics
🠶 Cyber Forensics and Digital Evidence
🠶 There are many forms of cybercrimes:
🠶 sexual harassment cases – memos, letters, E-Mails; obscene chats or
🠶 embezzlement cases – spreadsheets, memos, letters, E-Mails, online banking
information;
🠶 corporate espionage by way of memos, letters, E-Mails and chats;
🠶 and frauds through memos, letters, spreadsheets and E-Mails.
🠶 In case of computer crimes/cybercrimes, computer forensics helps.
🠶 Computer forensics experts know the techniques to retrieve the data from files listed in standard directory
search, hidden files, deleted files, deleted E-Mail and passwords, login IDs, encrypted files, hidden
partitions, etc.
🠶 Typically, the evidences reside on computer systems, user created files, user protected files, computer
created files and on computer networks.
UNIT-III Cyber Forensics
🠶 Cyber Forensics and Digital Evidence
🠶 Computer systems have the following:
🠶 1. Logical fi le system that consists of
🠶 • File system: It includes files, volumes, directories and folders, file allocation tables (FAT) as in the older
version of Windows Operating System, clusters, partitions, sectors.
🠶 • Random access memory.
🠶 • Physical storage media: It has magnetic force microscopy that can be used to recover data from
overwritten area.
🠶 (a) Slack space: It is a space allocated to the fi le but is not actually used due to internal fragmentation and
🠶 (b) unallocated space.
🠶 2. User created files: It consists of address books, audio/video files, calendars, database fi
les, spreadsheets, E-Mails, Internet bookmarks, documents and text files.
🠶 3. Computer created files: It consists of backups, cookies, configuration files, history files,
log files, swap files, system files, temporary files, etc.
🠶 4. Computer networks: It consists of the Application Layer, the Transportation Layer, the Network Layer,
the Datalink Layer.
UNIT-III Cyber Forensics
🠶 Cyber Forensics and Digital Evidence
🠶 The Rules of Evidence
🠶 “Evidence” means and includes:
1.All statements which the court permits or requires to be made before it by witnesses, in relation to
matters of fact under inquiry, are called oral evidence.
2. All documents that are produced for the inspection of the court are called documentary
evidence
🠶 Paper evidence, the process is clear and intuitively obvious. Digital evidence by its very nature is
invisible to the eye. Therefore, the evidence must be developed using tools other than the human eye.
UNIT-III Cyber Forensics
🠶 Cyber Forensics and Digital Evidence
🠶 T ere are number of contexts involved in
actually identifying a piece of digital evidence:
🠶 1. Physical context: It must be definable in its physical
form, that is, it should reside on a specific piece of
media.
🠶 Logical context: It must be identifiable as to its logical
position, that is, where does it reside relative to the fi
le system.
🠶 Legal context: We must place the evidence in
the correct context to read its meaning. T is
may require looking at the evidence as
machine language, for example, American
Standard Code for Information Interchange
(ASCII).
UNIT-III Cyber Forensics
🠶 Cyber Forensics and Digital Evidence
🠶 Following are some guidelines for the (digital) evidence collection phase:
🠶 1. Adhere to your site’s security policy and engage the appropriate incident handling and
law enforcement personnel.
🠶 2. Capture a picture of the system as accurately as possible.
🠶 3. Keep detailed notes with dates and times. If possible, generate an automatic transcript (e.g., on Unix
systems the “script” program can be used; however, the output fi le it generates should not be given to
media as that is a part of the evidence). Notes and printouts should be signed and dated.
🠶 4. Note the difference between the system clock and Coordinated Universal Time (UTC). For each
timestamp provided, indicate whether UTC or local time is used (since 1972 over 40 countries throughout
the world have adopted UTC as their official time source).
🠶 5. Be prepared to testify (perhaps years later) outlining all actions you took and at what
times. Detailednotes will be vital.
🠶 6. Minimize changes to the data as you are collecting it. T is is not limited to content changes; avoid
updating fi le or directory access times.
1. is admissible;
2. is authentic;
3. is complete;
4. is reliable;
5. is understandable and believable.
UNIT-III Cyber Forensics
🠶 Digital Forensics Lifecycle
🠶 The Digital Forensics
Process
UNIT-III Cyber Forensics
🠶 Digital Forensics Lifecycle
🠶 The Phases in Computer Forensics/Digital Forensics
🠶 The Phases in Computer Forensics/Digital Forensics the forensics life cycle involves the
following phases:
1. Preparation and identification;
2. storing and transporting;
3. collection and recording;
4. examination/investigation;
5. analysis, interpretation and attribution;
6. reporting;
7. testifying.
UNIT-III Cyber Forensics
🠶 Digital Forensics Lifecycle
🠶 The Phases in Computer Forensics/Digital Forensics
🠶 To mention very briefly, the process involves the following activities:
1. Prepare: Case briefings, engagement terms, interrogatories, spoliation prevention,
disclosure and discovery planning, discovery requests.
2. Record: Drive imaging, indexing, profiling, search plans, cost estimates, risk analysis.
3. Investigate: Triage images, data recovery, keyword searches, hidden data review,
communicate, iterate.
4. Report: Oral vs. written, relevant document production, search statistic reports, chain
of custody reporting, case log reporting.
5. Testify: Testimony preparation, presentation preparation, testimony.
UNIT-III Cyber Forensics
🠶 Digital Forensics Lifecycle
🠶 The Phases in Computer Forensics/Digital Forensics
🠶 Preparing for the Evidence and Identifying the Evidence
🠶 Collecting and Recording Digital Evidence
🠶 Storing and Transporting Digital Evidence
🠶 Examining/Investigating Digital Evidence
🠶 Analysis, Interpretation and Attribution
🠶 Reporting
🠶 Testifying
UNIT-III Cyber Forensics
🠶 Digital Forensics Lifecycle
🠶 Precautions to be Taken when Collecting Electronic Evidence
UNIT-III Cyber Forensics
🠶 Digital Forensics Lifecycle
🠶 Precautions to be Taken when Collecting Electronic Evidence
UNIT-III Cyber Forensics
🠶 Digital Forensics Lifecycle
🠶 Precautions to be Taken when Collecting Electronic Evidence
UNIT-III Cyber Forensics
🠶 Challenges in Computer Forensics.
🠶 Technical Challenges: Understanding the Raw Data and its Structure
🠶 The Legal Challenges in Computer Forensics and Data Privacy Issues
UNIT-III Cyber Forensics
🠶 Challenges in Computer Forensics.
🠶 Technical Challenges: Understanding the Raw Data and its Structure
🠶 There are two aspects of the technical challenges faced in digital forensics investigation – one is the “
complexity” problem and the other is the “quantity” problem involved in a digital forensics investigation.
🠶 A digital forensics investigator often faces the “complexity problem” because acquired data is
typically at the lowest and most raw format.
🠶 Non-technical people may find it too difficult to understand such format. For resolving the complexity
problem, tools are useful; they translate data through one or more “layers of abstraction” until it can be
understood.
🠶 For example, to view the contents of a directory from a fi le system image, tools process the
fi le system structures so that the appropriate values are displayed.
🠶 The data that represents the fi les in a directory exist in formats that are too low level to identify without
the assistance of tools
UNIT-III Cyber Forensics
🠶 Challenges in Computer Forensics.
🠶 Technical Challenges: Understanding the Raw Data and its Structure
🠶 The directory is a layer of abstraction in the fi le system. Examples of non-fi le system layers
of abstraction include:
🠶 1. ASCII;
🠶 2. HTML Files;
🠶 3. Windows Registry;
🠶 4. Network Packets;
🠶 5. Source Code.
🠶 Examples of abstraction layers are data reduction techniques; for example
1. Identifying known network packets using IDS signatures;
2. identifying unknown entries during log processing;
3. identifying known fi les using hash databases;
4. sorting fi les by their type.
UNIT-III Cyber Forensics
🠶 Challenges in Computer Forensics.
🠶 Technical Challenges: Understanding the Raw Data and its Structure
🠶 For Example if we are examine the FAT File system Disk
🠶 The FAT fi le system has seven layers of abstraction. The first layer uses just the partition image as input,
🠶 assuming that the acquisition was done of the raw partition using a tool such as the UNIX
“dd” tool.
🠶 This layer uses the defined Boot Sector structure and extracts the size and location values.
Examples of extracted values include:
🠶 1. Starting location of FAT;
🠶 2. size of each FAT;
🠶 3. number of FATs;
🠶 4. number of sectors per cluster;
🠶 5. location of Root Directory
UNIT-III Cyber Forensics
🠶 Challenges in Computer Forensics.
🠶 Technical Challenges: Understanding the Raw Data and its Structure
🠶 The abstraction layers of the FAT file system are as follows:
🠶1. Layer 0: Raw file system image;
🠶2. Layer 1: File system image and values from Boot Sector and FAT Entry Size;
🠶3. Layer 2: FAT Area and Data Area;
🠶4. Layer 3: Starting Cluster, FAT Entries;
🠶5. Layer 4: Clusters, Raw Cluster Content and Content Type;
🠶6. Layer 5: Formatted Cluster Content;
🠶7. Layer 6: List of Clusters.
UNIT-III Cyber Forensics
🠶 Challenges in Computer Forensics.
🠶 The Legal Challenges in Computer Forensics and Data Privacy Issues
🠶 Evidence, to be admissible in court, must be relevant, materialand competent, and its
probative value must outweigh any prejudicial effect.
🠶 There are many types of personnel involved in digital forensics/computer forensics:
🠶(a) Technicians: who carry out the technical aspects of gathering evidence
🠶(b) Policy makers: establish forensics policies that refl ect broad considerations
🠶(c) Professionals: the link between policy and execution – who must have extensive technical
skills as well as good understanding of the legal procedure
UNIT-III Cyber Forensics
🠶 Challenges in Computer Forensics.
🠶 The Legal Challenges in Computer Forensics and Data Privacy Issues
🠶 Skills for digital forensics professionals are the following:
1. Identify relevant electronic evidence associated with violations of specific laws;
2. identify and articulate probable cause necessary to obtain a search warrant and
recognize the limits of warrants;
3. locate and recover relevant electronic evidence from computer systems using tools;
4. recognize and maintain a chain of custody;
5. follow a documented forensics investigation process.