Cyber Security
Cyber Security
Network security is the practice of securing a computer network from intruders, whether
targeted attackers or opportunistic malware.
Application security focuses on keeping software and devices free of threats. A
compromised application could provide access to the data its designed to protect.
Successful security begins in the design stage, well before a program or device is
deployed.
Information security protects the integrity and privacy of data, both in storage and in
transit.
Operational security includes the processes and decisions for handling and protecting
data assets. The permissions users have when accessing a network and the procedures
that determine how and where data may be stored or shared all fall under this umbrella.
Disaster recovery and business continuity define how an organization responds to a
cyber-security incident or any other event that causes the loss of operations or data.
Disaster recovery policies dictate how the organization restores its operations and
information to return to the same operating capacity as before the event. Business
continuity is the plan the organization falls back on while trying to operate without
certain resources.
End-user education addresses the most unpredictable cyber-security factor: people.
Anyone can accidentally introduce a virus to an otherwise secure system by failing to
follow good security practices. Teaching users to delete suspicious email attachments, not
plug in unidentified USB drives, and various other important lessons is vital for the
security of any organization.
Cybercrime
Cybercrime is criminal activity that either targets or uses a computer, a computer
network or a networked device. Most cybercrime is committed by cybercriminals or
hackers who want to make money. However, occasionally cybercrime aims to damage
computers or networks for reasons other than profit. These could be political or
personal.
Cybercrime can be carried out by individuals or organizations. Some cybercriminals are
organized, use advanced techniques and are highly technically skilled. Others are
novice hackers.
Types of cybercrime include:
Man-in-the-middle attack
Man-in-the-middle (MitM) attacks, also known as eavesdropping attacks, occur when
attackers insert themselves into a two-party transaction. Once the attackers interrupt the
traffic, they can filter and steal data.
Two common points of entry for MitM attacks:
1. On unsecure public Wi-Fi, attackers can insert themselves between a visitor’s device
and the network. Without knowing, the visitor passes all information through the
attacker.
2. Once malware has breached a device, an attacker can install software to process all
of the victim’s information.
Denial-of-service attack
A denial-of-service attack floods systems, servers, or networks with traffic to exhaust
resources and bandwidth. As a result, the system is unable to fulfill legitimate requests.
Attackers can also use multiple compromised devices to launch this attack. This is
known as a distributed-denial-of-service (DDoS) attack.
SQL injection
A Structured Query Language (SQL) injection occurs when an attacker inserts malicious
code into a server that uses SQL and forces the server to reveal information it normally
would not. An attacker could carry out a SQL injection simply by submitting malicious
code into a vulnerable website search box.
Zero-day exploit
A zero-day exploit hits after a network vulnerability is announced but before a patch or
solution is implemented. Attackers target the disclosed vulnerability during this window
of time. Zero-day vulnerability threat detection requires constant awareness.
DNS Tunneling
DNS tunneling utilizes the DNS protocol to communicate non-DNS traffic over port 53. It
sends HTTP and other protocol traffic over DNS. There are various, legitimate reasons
to utilize DNS tunneling. However, there are also malicious reasons to use DNS
Tunneling VPN services. They can be used to disguise outbound traffic as DNS,
concealing data that is typically shared through an internet connection. For malicious
use, DNS requests are manipulated to exfiltrate data from a compromised system to the
attacker’s infrastructure. It can also be used for command and control callbacks from
the attacker’s infrastructure to a compromised system.
Security technologies
It is known to everyone that everything had two sides: pros and cons, and the same
applies to the Internet as well. With the rapid growth in the Internet, cyber security has
become a major concern to organizations throughout the world. The fact that the
information and tools & technologies needed to penetrate the security of corporate
organization networks are widely available has increased that security concern.
Advantages/Application of VPN
Secure encryption: To read the data, you need an encryption key. Without one, it
would take millions of years for a computer to decipher the code in the event of a brute
force attack . With the help of a VPN, your online activities are hidden even on public
networks.
Disguising your whereabouts: VPN servers essentially act as your proxies on the
internet. Because the demographic location data comes from a server in another
country, your actual location cannot be determined. In addition, most VPN services do
not store logs of your activities. Some providers, on the other hand, record your
behavior, but do not pass this information on to third parties. This means that any
potential record of your user behavior remains permanently hidden.
Access to regional content: Regional web content is not always accessible from
everywhere. Services and websites often contain content that can only be accessed
from certain parts of the world. Standard connections use local servers in the country to
determine your location. This means that you cannot access content at home while
traveling, and you cannot access international content from home. With VPN location
spoofing, you can switch to a server to another country and effectively “change” your
location.
Secure data transfer: If you work remotely, you may need to access important files on
your company’s network. For security reasons, this kind of information requires a secure
connection. To gain access to the network, a VPN connection is often required. VPN
services connect to private servers and use encryption methods to reduce the risk of
data leakage.
Firewall
Firewall is a network security system designed to prevent unauthorized access to or
from a private network. A firewall can be hardware, software, or both. Firewalls prevent
unauthorized internet users from accessing private networks connected to the internet,
especially intranets. Firewall monitors and controls incoming and outgoing network
traffic based on predetermined security rules. A firewall typically establishes a barrier
between a trusted network and an untrusted network, such as the Internet.
The primary purpose of a firewall is to allow non-threatening traffic and prevent
malicious or unwanted data traffic for protecting the computer from viruses and attacks.
A firewall is a cyber security tool that filters network traffic and helps users block
malicious software from accessing the Internet in infected computers.
A firewall system analyzes network traffic based on pre-defined rules. It then filters the
traffic and prevents any such traffic coming from unreliable or suspicious sources. It
only allows incoming traffic that is configured to accept.
Typically, firewalls intercept network traffic at a computer's entry point, known as a port.
Firewalls perform this task by allowing or blocking specific data packets based on pre-
defined security rules. Incoming traffic is allowed only through trusted IP addresses, or
sources.
Encryption
Encryption is a process that encodes a message or file so that it can be only be read by
certain people. Encryption uses an algorithm to scramble, or encrypt, data and then
uses a key for the receiving party to unscramble, or decrypt, the information. Basic
forms of encryption may be as simple as switching letters. As cryptography advanced,
cryptographers added more steps, and decryption became more difficult.
The various components of an encryption are as follows –
Plaintext: It is the data to be protected during transmission.
Encryption Algorithm: It is a mathematical process that produces a cipher text for any
given plaintext and encryption key. It is a cryptographic algorithm that takes plaintext
and an encryption key as input and produces a cipher text.
Cipher text: It is the scrambled version of the plaintext produced by the encryption
algorithm using a specific the encryption key. The cipher text is not guarded. It flows on
public channel. It can be intercepted or compromised by anyone who has access to the
communication channel.
Decryption Algorithm: It is a mathematical process, that produces a unique plaintext
for any given cipher text and decryption key. It is a cryptographic algorithm that takes a
cipher text and a decryption key as input, and outputs a plaintext. The decryption
algorithm essentially reverses the encryption algorithm and is thus closely related to it.
Types of Encryptions
Symmetric Key Encryption
An encryption system in which the sender and receiver of a message share a single,
common key that is used to encrypt and decrypt the message is called Symmetric key
encryption.
Symmetric key encryption algorithm uses same cryptographic keys for both encryption
and decryption of cipher text. Symmetric-key systems are simpler and faster, but their
main drawback is that the two parties must somehow exchange the key in a secure
way. Symmetric encryption is also known as private-key encryption and secure-key
encryption.
Asymmetric Key Encryption (Public Key Encryption)
Asymmetric cryptography uses encryption that splits the key into two smaller keys. One
of the keys is made public and one is kept private. You encrypt a message with the
recipient's public key. The recipient can then decrypt it with their private key. And they
can do the same for you, encrypting a message with your public key so you can decrypt
it with your private key.
Asymmetric cryptography is usually implemented by the use of one-way functions. In
mathematic terms, these are functions that are easy to compute in one direction but
very difficult to compute in reverse. This is what allows you to publish your public key,
which is derived from your private key. It is very difficult to work backwards and
determine the private key.
Intrusion Detection
An intrusion detection system (IDS) is a network security tool that monitors network
traffic and devices for known malicious activity, suspicious activity or security policy
violations.
It is software that checks a network or system for malicious activities or policy violations.
Each illegal activity or violation is often recorded either centrally using a SIEM(Security
information and event management) system or notified to an administration. IDS
monitors a network or system for malicious activity and protects a computer network
from unauthorized access from users, including perhaps insiders. The intrusion detector
learning task is to build a predictive model (i.e. a classifier) capable of distinguishing
between ‘bad connections’ (intrusion/attacks) and ‘good (normal) connections’.
An IDS cannot stop security threats on its own. Today IDS capabilities are typically
integrated with—or incorporated into—intrusion prevention systems (IPSs), which can
detect security threats and automatically take action to prevent them.
Detection Method of IDS
Signature-based Method: Signature-based IDS detects the attacks on the basis of the
specific patterns such as the number of bytes or a number of 1s or the number of 0s in
the network traffic. It also detects on the basis of the already known malicious
instruction sequence that is used by the malware. The detected patterns in the IDS are
known as signatures. Signature-based IDS can easily detect the attacks whose pattern
(signature) already exists in the system but it is quite difficult to detect new malware
attacks as their pattern (signature) is not known.
Anomaly-based Method: Anomaly-based IDS was introduced to detect unknown
malware attacks as new malware is developed rapidly. In anomaly-based IDS there is
the use of machine learning to create a trustful activity model and anything coming is
compared with that model and it is declared suspicious if it is not found in the model.
The machine learning-based method has a better-generalized property in comparison to
signature-based IDS as these models can be trained according to the applications and
hardware configurations.
Anti-Malicious Software
An anti-malicious is a software that protects the computer from malware such as
spyware, adware, and worms. It scans the system for all types of malicious software
that manage to reach the computer. An anti-malicious program is one of the best tools
to keep the computer and personal information protected. An anti-malicious is designed
to eliminate malware from the computer. Although it has similarities with antivirus, an
anti-malware program is different from antivirus. An anti-malware program has more
advanced features and broader coverage. It addresses spyware, spam, and other threat
issues that antivirus doesn’t. Anti-malicious software is designed to find known viruses
and oftentimes other malware such as Ransomware, Trojan Horses, worms, spyware,
adware, etc., that can have a detrimental impact to the user or device.
Software security
Software security is the concept of implementing mechanisms in the construction of
security to help it remain functional (or resistant) to attacks. This means that a piece of
software undergoes software security testing before going to market to check its ability
to withstand malicious attacks.
The idea behind software security is building software that is secure from the get-go
without having to add additional security elements to add additional layers of security
(although in many cases this still happens). The next step is teaching users to use the
software in the right manner to avoid being prone or open to attacks.
Software security is critical because a malware attack can cause extreme damage to
any piece of software while compromising integrity, authentication, and availability. If
programmers take this into account in the programming stage and not afterward,
damage can be stopped before it begins.
SSL
SSL, or Secure Sockets Layer, is an encryption-based Internet security protocol. It was
first developed by Netscape in 1995 for the purpose of ensuring privacy, authentication,
and data integrity in Internet communications. A website that implements SSL/TLS has
"HTTPS" in its URL instead of "HTTP."
How does SSL work
In order to provide a high degree of privacy, SSL encrypts data that is transmitted
across the web. This means that anyone who tries to intercept this data will only see a
garbled mix of characters that is nearly impossible to decrypt. SSL initiates
an authentication process called a handshake between two communicating devices to
ensure that both devices are really who they claim to be. SSL also digitally signs data in
order to provide data integrity, verifying that the data is not tampered with before
reaching its intended recipient.
IPSec
IPSec is a set of communication rules or protocols for setting up secure connections
over a network. Internet Protocol (IP) is the common standard that determines how data
travels over the internet. IPSec adds encryption and authentication to make the protocol
more secure. For example, it scrambles the data at its source and unscrambles it at its
destination. It also authenticates the source of the data.
Computers exchange data with the IPSec protocol through the following steps.
Substitution Method:
A substitution technique is one in which the letters of plaintext are replaced by other
letters or by numbers or symbols.
i. Caesar Cipher:
▪ This is the earliest known example of a substitution cipher.
▪ Each character of a message is replaced by a character three position down in the
alphabet.
▪ plaintext: are you ready
▪ ciphertext: DUH BRX UHDGB
ii. Monoalphabetic and Polyalphabetic Cipher
▪Monoalphabetic cipher is a substitution cipher, where the cipher alphabet for each plain
text alphabet is fixed, for the entire encryption.
▪ In simple words, if the alphabet ‘p’ in the plain text is replaced by the cipher alphabet
‘d’. Then in the entire plain text wherever alphabet ‘p’ is used, it will be replaced by the
alphabet ‘d’ to form the ciphertext.
▪ Polyalphabetic cipher is far more secure than a monoalphabetic cipher. As
monoalphabetic cipher maps a plain text symbol or alphabet to a ciphertext symbol and
uses the same ciphertext symbol wherever that plain text occurs in the message. But
polyalphabetic cipher, each time replaces the plain text with the different ciphertext.
iii. Playfair Cipher
▪ Playfair cipher is a substitution cipher which involves a 5X5 matrix. Let us discuss the
technique of this Playfair cipher with the help of an example:
▪ Plain Text: meet me tomorrow
▪ Key: KEYWORD
▪ Step 1: Create a 5X5 matrix and place the key in that matrix row-wise from left to right.
Then put the remaining alphabets in the blank space.
▪Note: If a key has duplicate alphabets, then fill those alphabets only once in the matrix, and I
& J should be kept together in the matrix even though they occur in the given key.
▪Step 2: Now, you have to break the plain text into a pair of alphabets.
▪Step 3: In this step, we will convert plain text into ciphertext. For that, take the first pair of plain
text and check for cipher alphabets for the corresponding in the matrix. To find cipher alphabets
follow the rules below.
Note
o If both the alphabets of the pair occur in the same row replace them with the alphabet to their
immediate right. If an alphabet of the pair occurs at extreme right then replace it with the first
element of that row, i.e. the last element of the row in the matrix circularly follows the first
element of the same row.
o If the alphabets in the pair occur in the same column, then replace them with the alphabet
immediate below them. Here also, the last element of the column circularly follows the first
element of the same column.
o If the alphabets in the pair are neither in the same column and nor in the same row,
then the alphabet is replaced by the element in its own row and the corresponding
column of the other alphabet of the pair.
▪ Pair: me et me to mo rx ro wz
▪Cipher Text: kn ku kn kz ks ta kc yo
iv. Hill Cipher
• Hill cipher is a polygraphic substitution cipher based on linear algebra. Each letter is
represented by a number modulo 26 with a scheme A = 0, B = 1, …, Z = 25
• To encrypt a message, column vector n x 1 is multiplied key n × n matrix, against
modulus 26.
• To decrypt the message, each block is multiplied by the inverse of the matrix used for
encryption.
Example:
• Plain Text: Hello
• Key: four
Step 3: multiply each column vector with key matrix and find the mod 26 of each
element
Example
91/26=3.5-3=0.5*26=13
208/26=8-8=0*26=0
➔ [5142017]∗[74] = [91208] (mod 26) = [130]
➔ [5142017]∗[1111] = [209407] (mod 26) = [117]
➔ [5142017]∗[1425] = [420705] (mod 26) = [42]
Example:
Plain text: Are you there
Key this is hello
Step 1: Assign the number for both plaintext and the key
Plain text: A R E Y O U T H E R E
0 17 4 24 14 20 19 7 4 17 4
Key: T H I S I S H E L L O
19 7 8 18 8 18 7 4 11 11 14
Step 2 : Add the number of plain text and number of key.
19 17 12 42 22 38 26 11 15 28 18
Step 3: If the number is greater than or equal to 26 then subtract from 26 and rewrite
19 17 12 16 22 12 0 11 15 2 18
Step 4: Write the alphabets for the corresponding character
TRMQWMALPCS
Cipher text= TRMQWMALPCS
2. Transposition Method
• Transposition Ciphers are a bit different to Substitution Ciphers.
• In a Transposition cipher, the letters are just moved around.
• The letters or words of the plaintext are reordered in some way, fixed by a given rule
(the key).
• One of the examples for the transposition is given below
Plain Text: meet me Tomorrow
• The plain text is written in diagonal form as given below
3. Rotor Machines
• Electric rotor machines were mechanical devices that allowed to use encryption
algorithms that were much more complex than ciphers, which were used manually.
• They were developed in the middle of the second decade of the 20th century.
• They became one of the most important cryptographic solutions in the world for the
next tens of years.
• The main idea that lies behind rotor machines is relatively simple.
• One can imagine a simple device, similar to a typewriter, with a number of keys used
to input text produces some random text based on the machine’s algorithm.
4. Steganography
• Steganography is the technique of hiding secret data within an ordinary, non-secret,
file or message in order to avoid detection.
• The secret data is then extracted at its destination.
• The word steganography is derived from the Greek words steganos (meaning hidden
or covered) and the Greek root graph (meaning to write).
• Since steganography is more of an art than a science, there is no limit to the ways
steganography can be used. Below are a few examples:
i. Playing an audio track backwards to reveal a secret message
ii. Playing a video at a faster frame rate (FPS) to reveal a hidden image
iii. Embedding a message in the red, green, or blue channel of an RGB image
Asymmetric Key Cryptography
Asymmetric cryptography is a cryptographic system that uses pairs of keys: public keys
and private keys. You encrypt a message with the recipient's public key. The recipient
can then decrypt it with their private key. And they can do the same for you, encrypting
a message with your public key so you can decrypt it with your private key.
Asymmetric cryptography is usually implemented by the use of one-way functions. In
mathematic terms, these are functions that are easy to compute in one direction but
very difficult to compute in reverse. This is what allows you to publish your public key,
which is derived from your private key. It is very difficult to work backwards and
determine the private key.
With public-key cryptography, robust authentication is also possible. A sender can
combine a message with a private key to create a short digital signature on the
message. Anyone with the sender's corresponding public key can combine that
message with a claimed digital signature; if the signature matches the message, the
origin of the message is verified.
Confidentiality: This component is often associated with secrecy and the use of
encryption. Confidentiality in this context means that the data is only available to
authorized parties. When information has been kept confidential it means that it has not
been compromised by other parties; confidential data are not disclosed to people who
do not require them or who should not have access to them. Ensuring confidentiality
means that information is organized in terms of who needs to have access, as well as
the sensitivity of the data. A breach of confidentiality may take place through different
means, for instance hacking or social engineering.
Integrity: Data integrity refers to the certainty that the data is not tampered with or
degraded during or after submission. It is the certainty that the data has not been
subject to unauthorized modification, either intentional or unintentional. There are two
points during the transmission process during which the integrity could be
compromised: during the upload or transmission of data or during the storage of the
document in the database or collection.
Authentication: In authentication, the user or computer has to prove its identity to the
server or client. Usually, authentication by a server require the use of a user name and
password. Other ways to authenticate can be through cards, retina scans, voice
recognition, and fingerprints.
Non-Repudiation: The certainty that someone cannot dispute the legitimacy of
anything is known as non-repudiation. Non-repudiation is a regulatory notion commonly
used in cybersecurity and refers to the service that confirms the origin and integrity of
data. It assures that no party can deny sending or receiving a communication using
encryption and digital signatures. It cannot also contest the legitimacy of its digital
signature on a document.
Non-repudiation provides evidence of data's origin, authenticity, and integrity. It verifies
the sender that the information is sent and the recipient's identity to the receiver. Neither
side can dispute that communication happened or was processed in this manner.
Digital signatures
A digital signature is a cryptographic output used to verify the authenticity of data. A
digital signature algorithm allows for two distinct operations:
i. A signing operation, which uses a signing key to produce a signature over raw data
ii. A verification operation, where the signature can be validated by a party who has no
knowledge of the signing key
Section 48 of the Act is also used customarily, which stipulates that if any person who
has access to any record, book, register, correspondence, information, documents or
any other material under the authority conferred under this Act or Rules framed
hereunder divulges or causes to divulge confidentiality of such record, books, registers,
correspondence, information, documents or materials to any unauthorized person,
he/she shall be liable to the punishment with a fine not exceeding Ten Thousand
Rupees or with imprisonment not exceeding two years or with both, depending on the
degree of the offense.
Security Policies
Security policies are a formal set of rules which is issued by an organization to ensure
that the user who are authorized to access company technology and information assets
comply with rules and guidelines related to the security of information. It is a written
document in the organization which is responsible for how to protect the organizations
from threats and how to handles them when they will occur. A security policy also
considered to be a "living document" which means that the document is never finished,
but it is continuously updated as requirements of the technology and employee
changes.
Need of Security policies-
1) It increases efficiency
The best thing about having a policy is being able to increase the level of consistency
which saves time, money and resources. The policy should inform the employees about
their individual duties, and telling them what they can do and what they cannot do with
the organization sensitive information.
2) It upholds discipline and accountability
When any human mistake will occur, and system security is compromised, then the
security policy of the organization will back up any disciplinary action and also
supporting a case in a court of law. The organization policies act as a contract which
proves that an organization has taken steps to protect its intellectual property, as well as
its customers and clients.
3) It can make or break a business deal
It is not necessary for companies to provide a copy of their information security policy to
other vendors during a business deal that involves the transference of their sensitive
information. It is true in a case of bigger businesses which ensures their own security
interests are protected when dealing with smaller businesses which have less high-end
security systems in place.
4) It helps to educate employees on security literacy
A well-written security policy can also be seen as an educational document which
informs the readers about their importance of responsibility in protecting the
organization sensitive data. It involves on choosing the right passwords, to providing
guidelines for file transfers and data storage which increases employee's overall
awareness of security and how it can be strengthened.
We use security policies to manage our network security. Most types of security policies
are automatically created during the installation. We can also customize policies to suit
our specific environment. There are some important cyber security policies
recommendations describe below-
1. Virus and Spyware Protection policy
This policy provides the following protection:
It helps to detect, removes, and repairs the side effects of viruses and security risks.
It helps to detect the threats in the files which the users try to download.
It helps to detect the applications that exhibit suspicious behaviour by using SONAR
heuristics and reputation data.
2. Firewall Policy
This policy provides the following protection:
It blocks the unauthorized users from accessing the systems and networks that connect to the
Internet.
It detects the attacks by cybercriminals.
It removes the unwanted sources of network traffic.
Managing Risk
Cyber risk management, also called cybersecurity risk management, is the process of
identifying, prioritizing, managing, and monitoring risks to information
systems. Companies across industries use cyber risk management to protect
information systems from cyberattacks and other digital and physical threats.
These risks cannot be eliminated, but cyber risk management programs can help
reduce the impact and likelihood of threats. Companies use the cybersecurity risk
management process to pinpoint their most critical threats and select the right IT
security measures based on their business priorities, IT infrastructures, and resource
levels.
Risk Management Process
1. Risk framing
Risk framing is the act of defining the context in which risk decisions are made. By
framing risk at the outset, companies can align their risk management strategies with
their overall business strategies. This alignment helps avoid ineffective and expensive
mistakes, like deploying controls that interfere with key business functions.
2. Risk assessment
Companies use cybersecurity risk assessments to identify threats and vulnerabilities,
estimate their potential impacts, and prioritize the most critical risks. How a company
conducts a risk assessment will depend on the priorities, scope, and risk tolerance
defined in the framing step.
3. Responding to risk
The company uses the risk assessment results to determine how it will respond to
potential risks. Risks deemed highly unlikely or low-impact may simply be accepted, as
investing in security measures may be more expensive than the risk itself. Likely risks
and risks with higher impacts will usually be addressed.
4. Monitoring
The organization monitors its new security controls to verify that they work as intended
and satisfy relevant regulatory requirements.
The organization also monitors the broader threat landscape and its own IT ecosystem.
Changes in either one—the emergence of new threats, the addition of new IT assets—
can open up new vulnerabilities or make previously effective controls obsolete. By
maintaining constant surveillance, the company can tweak its cybersecurity program
and risk management strategy in nearly real time.
Confidentiality – Information should only be seen by those persons authorized to see it.
Information could be confidential because it is proprietary information that is created and
owned by the organization or it may be customers’ personal information that must be kept
confidential due to legal responsibilities.
Integrity – Information must not be corrupted, degraded, or modified. Measures must be
taken to insulate information from accidental and deliberate change.
Availability – Information must be kept available to authorized persons when they need it.
Unit 5
Forensics and Incident Analysis
Cyber Forensics
Cyber forensics is the science of collecting, inspecting, interpreting, reporting, and
presenting computer-related electronic evidence. Evidence can be found on the hard
drive or in deleted files.
It is the process of examining, acquiring, and analyzing data from a system or device so
that it can be transcribed into physical documentation and presented in court.
During the inspection, it is critical to create a digital or soft copy of the system’s special
storage cell. The purpose of carrying out a detailed cyber forensics investigation is to
determine who is to blame for a security breach. The entire inquiry is carried out on the
software copy while ensuring that the system is not affected. In the technological age,
cyber forensics is an inevitable factor that is incredibly important.
Deleted file recovery. This technique involves recovering and restoring files or fragments
deleted by a person—either accidentally or deliberately—or by a virus or malware.
Reverse steganography. The process of attempting to hide data inside a digital message or
file is called steganography. Reverse steganography happens when computer forensic
specialists look at the hashing of a message or the file contents. A hashing is a string of data,
which changes when the message or file is interfered with.
Cross-drive analysis. This technique involves analyzing data across multiple computer
drives. Strategies like correlation and cross-referencing are used to compare events from
computer to computer and detect anomalies.
Live analysis. This technique involves analyzing a running computer's volatile data, which is
data stored in RAM (random access memory) or cache memory. This helps pinpoint the
cause of abnormal computer traffic.
Digital Evidence Collection
Process involved in Digital Evidence Collection:
The main processes involved in digital evidence collection are given below:
Data collection: In this process data is identified and collected for investigation.
Examination: In the second step the collected data is examined carefully.
Analysis: In this process, different tools and techniques are used and the collected evidence
is analyzed to reach some conclusion.
Reporting: In this final step all the documentation, reports are compiled so that they can be
submitted in court.
There are two types of data,that can be collected in a computer forensics investigation:
Persistent data: It is the data that is stored on a non-volatile memory type storage device
such as a local hard drive, external storage devices like SSDs, HDDs, pen drives, CDs, etc.
the data on these devices is preserved even when the computer is turned off.
Volatile data: It is the data that is stored on a volatile memory type storage such as memory,
registers, cache, RAM, or it exists in transit, that will be lost once the computer is turned off
or it loses power. Since volatile data is ephemeral, it is crucial that an investigator knows
how to reliably capture it.
Evidentiary Reporting
All incidents should be reported to management as soon as possible. Prompt internal
reporting is crucial to collect and preserve potential evidence. It is important that
information about the investigation be limited to as few people as possible. Information
should be given on a need-to-know basis, which limits the possibility of the investigation
being leaked. In addition, all communications related to the incident should be made
through an out-of-band method to ensure that the intruder does not intercept any
incident-related information. In other words, Email should not be used to discuss the
investigation on a compromised system. Based on the type of crime and type of
organization it may be necessary to notify –
Executive management.
The information security department.
The physical security department.
The internal audit department.
The legal department.
Incident Preparation
Once a threat has been identified, the IR (incident response) team should work to
contain the threat to prevent further damage to other systems and the organization
at large.
The responder quickly isolates any infected machine and works on backing up any
critical data on an infected system, if possible.
Next, a temporary fix should be implemented on an infected machine to prevent the
threat from escalating. The goal is to minimize the threat.
Damaged systems removed from production; devices are isolated, compromised
accounts are locked down — the bleeding stops here.
Eradication
Recovery
Recovery is the testing of the fixes in the eradication phase and the transition back
to normal operations.
Vulnerabilities are remediated, compromised accounts have passwords changed or
are removed altogether and replaced with other more secure methods of access.
At the recovery stage, any production systems affected by a threat will be brought
back on line.
This includes any data recovery or restoration efforts that need to take place as well.
To ensure that they are back to normal operation, test, check, and track the affected
systems.
This step provides the opportunity to learn from our experience so we can better
respond to future security events.
Take a look at the incident with a humble but critical eye to identify areas for
improvement.
Then add those improvements to documentation.
A central part of the incident response methodology is learning from previous
incidents to improve the process.
This helps analyze and document everything about the breach. Determine what
worked well in response plan, and where there were some holes.
Lessons learned from both mock and real events will help strengthen systems
against the future attacks.