0% found this document useful (0 votes)
6 views7 pages

Cyber Security L-17

Uploaded by

Abhishek Parmar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views7 pages

Cyber Security L-17

Uploaded by

Abhishek Parmar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

The Need for Computer Forensics

• To collect, examine, and safeguard evidence.


• To help solve cyber crimes and to recover important
compromised data.
• How computer forensics works
• Device identification
• Data preservation
• Forensic analysis
• Reporting
Chain of Custody
• In a legal context, the chain of custody process refers to
acquiring, storing, safeguarding and transferring of an asset,
whether digital or physical
• It’s a documentation of the ownership of a digital asset, such
as data, as it transfers from one person or organization to
another, the exact date and time of the transfer, and the
purpose of the transfer.
• More specifically, tracking and documenting each transfer of
the asset as it moves from one place to another. While being a
long and tedious process, chain of custody is vital as it ensures
the authenticity of the acquired asset, increases transparency,
and allows the personnel involved to be held accountable for
the actions taken on the asset
Forensics Analysis of E-Mail
• The two most important components of an E-Mail system are
the E-Mail server and the E-Mail gateway.
• Forensics Analysis of E-Mail helps to establish the authenticity
of an email when suspected.
• Email consists of two parts the header and the body. Message
headers are the important part for investigating E-Mail
messages.
• The "header" of an E-Mail is very important from forensics
point of view - a full header view of an E-Mail provides the
entire path of E-Mail's journey from its origin to its destination.
• SPF (Sender Policy Framework) is an email authentication
standard that helps protect senders and recipients from spam,
spoofing, and phishing.
• DKIM is a standard email authentication method that adds a
digital signature to outgoing messages.
• DMARC is a standard email authentication method. DMARC
helps mail administrators prevent hackers and other attackers
from spoofing their organization and domain.
Digital Forensics Life Cycle
Digital Forensics Process
The Phases in Computer Forensics/ Digital
Forensics
• Preparation and Identification
• Collection and Recording
• Storing and transporting
• examination and investigation
• analysis, interpretation and attribution
• reporting
• testifying

You might also like