Final Report
Final Report
Submitted in the partial fulfilment of the requirements for the award of the Degree of
Bachelor of Technology
In
By
Assistant Professor
1|Page
Declaration
The Term Paper Report entitled " Synergizing Incident Response and Cyber Forensics:
Fortifying Cyber security Defenses” is a record of bona fide work of K. Rama Charitha, G.
Rupesh Vardhan, M. Shreya, K. Bhavya Sree submitted in partial fulfillment for the award of
B. Tech in Computer Science and Information Technology to the K L University. The results
departments/University/institute.
2|Page
Certificate
This is to certify that the (Term Paper) Report entitled " Synergizing Incident Response and
Cyber Forensics: Fortifying Cyber security Defenses” is being submitted by K. Rama
Charitha, G. Rupesh Vardhan, M. Shreya, K. Bhavya Sree submitted in partial fulfillment for
the award of BTech in in computer science and information technology to the K L University
is a record of bona fide work carried out under our guidance and supervision. The results
embodied in this report have not been copied from any other
departments/University/institute.
I express the sincere gratitude to our HOD Dr. K. Amarendra for his administration towards
our academic growth. I record it as my privilege to deeply thank for providing us the efficient
faculty and facilities to make our ideas into reality.
I express my sincere thanks to our project supervisor Dr. S. Vijaya Krishna for his novel
association of ideas, encouragement, appreciation, and intellectual zeal which motivated us to
venture this report successfully.
Finally, it is pleased to acknowledge the indebtedness to all those who devoted themselves
directly or in directly to make this project report success.
Thank you.
4|Page
V. Abstract
5|Page
Table Of Contents
1. Introduction 7
3. Problem Statement 10
5. Proposed System 13
6. Requirements: 14
7. Design 15-26
8. Result 27-28
11.References 33-34
12.Bibliography 35-36
13.Appendix 37-38
14.List of figures 39
6|Page
1.Introduction
Cyber forensic practices are crucial for examining digital evidence tied
to cybercrime. They gather, keep safe, and study electronic data. This uncovers the
who, what, when, where, and how of a cyber issue. This area helps specialists
piece together events, link harmful actions, and back up legal cases. In the end, it
aids in making the digital world safer and stronger.
7|Page
2. Literature Survey
8|Page
sometimes
upsetting current operations and costing a lot of time and money for things like
asset
mapping, creating secure device identities, and network segmentation[7]. It could
be
expensive to update older systems to comply with cyber forensics policies[8].
The Biden administration, recognizing the growing frequency of
security
breaches, required U.S. Federal Agencies to implement NIST 800-207 for incident
response , underscoring the significance and efficacy of the model[9]. By rigorous
access rules and ongoing verification,Incident response seeks to improve security,
safeguard sensitive information, and lower cyber risk overall[10].
9|Page
3.Problem Statement
10 | P a g e
4. Existing System
11 | P a g e
Furthermore, the existing system emphasizes the importance of
continuous improvement through regular training, exercises, and updates to
response procedures and technologies. This ensures that the organization remains
resilient to evolving cyber threats and can effectively respond to incidents of
varying complexity.
12 | P a g e
5.Proposed System
13 | P a g e
6. Requirements
Software:
1.Operating System: Windows Xp or late
2.FTK imager software
3.EnCase Software
4.wireshark software
Hardware:
1.RAM: 8GB
2.Processor: INTEL i5 8th GEN
14 | P a g e
7. Design
7.1.Tools Overview
15 | P a g e
integrity, enhancing the credibility of the investigative findings.
• Extensible — the user should be able to add new functionality by creating plugins that
can analyze all or part of the underlying data source.
• Centralized — the tool must offer a standard and consistent mechanism for accessing all
features and modules.
16 | P a g e
• Ease of Use — the Autopsy Browser must offer the wizards and historical tools to make
it easier for users to repeat their steps without excessive reconfiguration.
• Multiple Users — the tool should be usable by one investigator or coordinate the work
of a team.
7.1.4 Encase:
Encase, a forensic tool crafted by Guidance Software and launched in
1998,has become a cornerstone in the forensic landscape.
Boasting a suit of functionalities, it excels in disk imaging, data verification, and
comprehensive data analysis.Encase's prowess in navigating these uncharted
territories underscores its significance in uncovering hidden evidence vital for
resolving cases. It serves as a reliable ally for forensic analysts, empowering them
to delve deep into digital landscapes with confidence, knowing that
18 | P a g e
Fig-4 Encase framework[11]
7.2.Need of Forensics
19 | P a g e
7.3.Integrating Forensic techniques into Incident Response
20 | P a g e
7.3.1 Data Collection:
Before diving into the digital treasure hunt, forensic experts first pinpoint
where the data might hide and gather it from those sources, much like detectives
collecting evidence at a crime scene.
➢ Spotting Data Sources:Think of it like exploring a crime scene. Just like detectives
search for clues in various places, analysts identify potential data sources such as
desktop computers, servers, laptops, and network storage devices
➢ Gathering Data:Once potential sources are identified, it's time to gather the data from
them.This process is akin to collecting evidence from different locations in order to
build a complete picture of the incident.
➢ Incident Response and Containment:During an incident response, it's crucial to
decide when and how to contain the situation.Just as emergency responders cordon off
an area to prevent contamination, containment in forensics helps prevent further
damage and preserves evidence.
7.3.2 Examination:
After collecting data, the next step is like sorting through a stack of
puzzle pieces to find the ones that fit together. Analysts carefully examine the data,
searching for clues and relevant information that could shed light on the incident.
Sometimes, they encounter obstacles like locked doors or encrypted files, similar
to how investigators may face barriers in accessing critical information. To
overcome these hurdles, analysts may need to employ techniques to bypass or
mitigate these obstacles, much like a locksmith picking a lock. By doing so, they
can uncover hidden insights and piece together the puzzle of what happened,
helping to solve the case and prevent future incidents.
21 | P a g e
7.3.3 Analysis:
Once the relevant information is sifted out, it's time to dive into the
detective work. Like a sleuth piecing together a complex mystery, analysts study
and analyze the data meticulously. They unravel the connections between people,
places, items, and events, much like connecting the dots in a sprawling
investigation. Every detail matters, from timestamps to user interactions, helping
them paint a comprehensive picture of what transpired. Through this process, they
decipher the story hidden within the data, revealing the who, what, where, and how
behind the incident. This meticulous analysis serves as the backbone for drawing
informed conclusions, guiding further actions to address the issue effectively and
prevent future occurrences.
7.3.4 Reporting:
In the final phase of reporting, it's like putting together the pieces of a
puzzle to create a clear picture of what occurred. However, sometimes there are
22 | P a g e
7.4.A Socio-Technical Framework for Threat Modelling
a Software Supply Chain
23 | P a g e
Fig-6 Socio-technical framework[15]
24 | P a g e
7.5.4. Incident Management Portal:
- Centralized information is stored in the Incident Management Portal.
- Human operators can aggregate individual events into broader incidents for
better management and analysis.
7.5.5. Impact Simulation and Mitigation:
- Impact simulation tools are utilized to understand the potential consequences of
incidents.
- This enables operators to identify affected assets and devise mitigation
strategies.
To enhance this architecture and make it more effective, several measures can be
taken:
7.5.5.1. Automated Correlation:
- Implement machine learning algorithms or AI-based systems to automate
correlation in the Correlation Engine.
- This can improve the speed and accuracy of identifying correlations between
different events.
7.5.5.2. Predictive Analysis:
- Integrate predictive analytics capabilities to forecast potential cyber-physical
threats based on historical data and current trends.
- This proactive approach can help in preemptively addressing vulnerabilities
before they are exploited.
7.5.5.3.Real-time Response:
- Develop mechanisms for real-time response to detected incidents, such as
automated containment measures or dynamic adjustment of security protocols.
- This ensures that responses are swift and effective, minimizing the impact of
incidents.
7.5.5.4. Human-Centric Design:
- Humanize the incident management process by prioritizing user experience and
designing intuitive interfaces.
- Provide training and support for operators to effectively utilize the system and
make informed decisions during incident response.
7.5.5.5. Continuous Improvement:
- Establish feedback loops to continuously evaluate and improve the
effectiveness of the SATIE architecture.
25 | P a g e
- Regularly update threat intelligence sources and adapt the system to evolving
threats and vulnerabilities.
By incorporating these enhancements, the SATIE architecture can become even
more robust and capable of timely detecting, analyzing, and responding to cyber-
physical security incidents in airport systems.
26 | P a g e
8. Results
27 | P a g e
Fig-10 Autopsy (checking files)
28 | P a g e
9.Future Scope
2. Enhanced Automation with AI: Further leveraging AI and machine learning for
automated incident detection, response orchestration, and adaptive threat analysis.
6. Threat Intelligence Sharing Platforms: Building secure platforms for sharing threat
intelligence and incident data among organizations and industry sectors to facilitate
proactive defense measures.
29 | P a g e
8. Privacy-Preserving Forensics: Researching techniques to conduct effective forensic
analysis while respecting user privacy and compliance with data protection
regulations.
13. Insider Threat Detection: Researching techniques for early detection and mitigation
of insider threats through behavioral analytics and user activity monitoring.
15. Cross-Disciplinary Research: Collaborating with experts from diverse fields such as
psychology, law, and sociology to explore interdisciplinary approaches to incident
response and cyber forensics, considering human factors and societal implications.
30 | P a g e
10.Conclusion
31 | P a g e
Beyond incident resolution, the value of Cyber Forensics extends
to informing proactive measures aimed at detecting and preventing future
incidents. By analyzing digital evidence and conducting forensic analysis,
organizations can identify vulnerabilities, discern attack patterns, and implement
preemptive safeguards to mitigate risks before they materialize into full-blown
incidents. Furthermore, Cyber Forensics assumes a central role in post-incident
analysis, enabling organizations to conduct thorough assessments, extract valuable
insights, and derive actionable recommendations for enhancing cybersecurity
posture.
32 | P a g e
11.References
[1].A. (2023, July 19). Incident Response And Cyber Forensics In Military
Cybersecurity. MSA. https://militaryspouseafcpe.org/military-organizations-and-
units/cybersecurity-units/incident-response-and-cyber-forensics/
[2].Maia, E., Sousa, N., Oliveira, N., Wannous, S., Sousa, O., & Praça, I. (2022,
August 25). SMS-I: Intelligent Security for Cyber–Physical Systems. Information.
https://doi.org/10.3390/info13090403
[3].O’Neill, A., Ahmad, A., & Maynard, S. B. (2021, August 10). Cybersecurity
Incident Response in Organisations: A Meta-level Framework for Scenario-based
Training. ResearchGate.
https://www.researchgate.net/publication/353838637_Cybersecurity_Incident_Res
ponse_in_Organisations_A_Meta-level_Framework_for_Scenario-based_Training.
33 | P a g e
[9].[Guide to Integrating Forensic Techniques into Incident Response]. (2006,
August). Research Gate.
https://www.researchgate.net/publication/239560731_Guide_to_Integrating_Foren
sic_Techniques_into_Incident_Response
[12].Wireshark Image-
https://upload.wikimedia.org/wikipedia/commons/thumb/c/cf/Wireshark_3.6_scree
nshot.png/1024px-Wireshark_3.6_screenshot.png
[13].FTK Image-
https://www.google.com/imgres?imgurl=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fwww.forensicfocus.co
m%2Fstable%2Fwp-content%2Fuploads%2F2021%2F05%2FScreenshot-2021-
05-03-at-14.48.14-2048x1101-
1.png&tbnid=Zr9C3h9o11_tVM&vet=12ahUKEwiJ9POj2-
aEAxWP7TgGHY1YDoMQMygDegQIARBX..i&imgrefurl=https%3A%2F%2F
www.forensicfocus.com%2Fwebinars%2Fwhat-the-tech-using-ftk-
imager%2F&docid=u3t-s4-
DT04EBM&w=2048&h=1101&q=FTK%20Imager%20tool&ved=2ahUKEwiJ9P
Oj2-aEAxWP7TgGHY1YDoMQMygDegQIARBX
[14].Autopsy Image-https://www.sleuthkit.org/autopsy/images/v3/overview.png
[15].Socio-technical framework-
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7180277&tag=1
34 | P a g e
12.Bibliography
- Explores file system forensics techniques, which are essential for investigating
cyber incidents and gathering digital evidence.
35 | P a g e
7. Jones, Rodney C., et al. "Investigating Computer Crime." CRC Press, 2019.
8. Luttgens, Jason, et al. "The Incident Response Pocket Guide: And, Incident
Response & Computer Forensics." O'Reilly Media, Inc., 2019.
36 | P a g e
13. Appendix
A. Additional Resources
Websites:
SANS Institute: Offers a variety of training courses, webinars, and resources on
incident response and digital forensics.
National Institute of Standards and Technology (NIST) Computer Security
Resource Center: Provides guidelines, standards, and best practices for incident
response and cyber forensics.
Digital Forensics Magazine: Publishes articles, case studies, and industry news
related to digital forensics and incident response.
Online Courses:
Coursera: Offers courses on incident response, digital forensics, and cybersecurity
investigations from universities and industry professionals.
Udemy: Provides a range of online courses covering topics such as incident
handling, malware analysis, and forensic examination.
B. Case Studies
Target Data Breach:
Analyzes the incident response efforts and forensic investigation techniques used
to investigate the massive data breach at Target Corporation in 2013.
WannaCry Ransomware Attack:
Examines the incident response strategies employed by organizations affected by
the WannaCry ransomware attack in 2017 and the forensic analysis of the
malware.
37 | P a g e
C. Tools and Software
Forensic Tools:
Autopsy: An open-source digital forensics platform used for analyzing disk images
and performing forensic examinations.
EnCase Forensic: A commercial forensic investigation platform widely used in law
enforcement and corporate investigations.
Volatility: An open-source memory forensics framework for analyzing volatile
memory dumps.
Incident Response Tools:
Splunk: A platform for real-time security monitoring, incident investigation, and
log analysis.
Wireshark: A network protocol analyzer used for capturing and analyzing network
traffic during incident response investigations.
Snort: An open-source network intrusion detection system (NIDS) used for
detecting and responding to network-based attacks.
D. Methodologies
NIST Computer Security Incident Handling Guide:
Outlines a structured approach to incident handling, including preparation,
detection, analysis, containment, eradication, and recovery.
SANS Incident Handling Steps:
Provides a step-by-step process for handling security incidents, including
preparation, identification, containment, eradication, recovery, and lessons learned.
E. Glossary of Terms
Defines key terms and concepts related to incident response and cyber forensics,
providing clarity and understanding for readers unfamiliar with the terminology.
38 | P a g e
14.List of figures
39 | P a g e