0% found this document useful (0 votes)
15 views30 pages

Unit 5

Uploaded by

mansi.d.matekar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views30 pages

Unit 5

Uploaded by

mansi.d.matekar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

Digital Forensics & Cyber Security

Data Recovery and Evidence Collection

UNIT 5
Recovery deleted files
• Data recovery is the process of recovering and handling
the data through the data from damaged, failed, corrupted,
or inaccessible secondary storage media when it cannot be
accessed normally. Often times, these files are being
stored in hard drives and removable disks, including CDs,
DVDs, tape cartridges, flash memories
Data Recovery Tools
• Different data recovery tools are
1. Puran File Recovery
2. Glary Undelete
3. Pandora Recovery
4. Recuva
5. FreeUndelete
6. Restoration
7. Wise Data Recovery
8. EaseUS Data Recovery Wizard
9. SoftPerfect File Recovery
10. Diskinternal_s
Reasons of Data Loss
1. Hardware or System Malfunctions
2. Human Errors
3. Software Corruption
4. Computer Viruses and Malware
5. Natural Disasters
File System
What is a File System?
• A file system is a process of managing how and where data on a storage disk,
which is also referred to as file management or FS. It is a logical disk
component that compresses files separated into groups, which is known as
directories. It is abstract to a human user and related to a computer; hence, it
manages a disk's internal operations. Files and additional directories can be in
the directories. Although there are various file systems with Windows, NTFS
is the most common in modern times. It would be impossible for a file with
the same name to exist and also impossible to remove installed programs and
recover specific files without file management, as well as files would have no
organization without a file structure.
Different File systems
Partition
Partition
• A partition is a logical division of a hard disk that is treated as a separate
unit by operating systems (OSes) and file systems.
• The OSes and file systems can manage information on each partition as
if it were a distinct hard drive.
• This allows the drive to operate as several smaller sections to improve
efficiency, although it reduces usable space on the hard disk because of
additional overhead from multiple OSes.
Different File systems
A disk (e.g., Hard disk drive) has a
file system, despite type and usage.
Also, it contains information about
file size, file name, file location
fragment information, and where
disk data is stored and also describes
how a user or application may
access the data. The operations like
metadata, file naming, storage
management, and directories/folders
are all managed by the file system.
FAT
(File Allocation Table)
• A FAT stand for File Allocation Table
and FAT32 is an extension which means
that data is stored in chunks of 32 bits.
• These are an older type of file system that
isn’t commonly used these days.
• A file allocation table (FAT) is a table that
an operating system maintains on a hard
disk that provides a map of the clusters
(the basic units of logical storage on a
hard disk) that a file has been stored in.
FAT
(File Allocation Table)
• When you write a new file to a hard disk, the file is stored in one or more
clusters that are not necessarily next to each other; they may be rather widely
scattered over the disk.
• The operating system creates a FAT entry for the new file that records where
each cluster is located and their sequential order.
• When you read a file, the operating system reassembles the file from clusters
and places it as an entire file where you want to read it.
• For example, if this is a long Web page, it may very well be stored on more
than one cluster on your hard disk.
• Today, FAT is not used by later versions of Microsoft Windows like
Windows XP, Vista, 7, and 10 as they use NTFS. The FAT8, FAT12,
FAT32, FAT16 are all the different types of FAT (for file allocation table).
GFS (Global File System)
• GFS: A GFS is a file system, which stands for Global File System. It has the
ability to make enable multiple computers to act as an integrated machine,
now it is maintained by Red Hat. When the physical distance of two or more
computers is high, and they are unable to send files directly with each other, a
GFS file system makes them capable of sharing a group of files directly. A
computer can organize its I/O to preserve file systems with the help of a
global file system.
HFS (Hierarchical file system)
• HFS: HFS (Hierarchical file
system) is the file system that is
used on a Macintosh computer
for creating a directory at the
time a hard disk is formatted.
Generally, its basic function is
to organize or hold the files on a
Macintosh hard disk.
NTFS
(New Technology File System)
• NTFS stands for New Technology File System and this took over
from FAT as the primary file system being used in Windows.
• NTFS is the file system that the Windows NT operating system
uses for storing and retrieving files on a hard disk.
• NTFS is the Windows NT equivalent of the Windows FAT and the
High Performance File System (HPFS).
• NTFS offers a number of improvements over FAT and HPFS in
terms of performance, extendibility, and security
UDF (Universal Disk Format)
• UDF: A UDF is a file system, stands for Universal Disk Format
and used first developed by OSTA (Optical Storage Technology
Association) in 1995 for ensuring consistency among data written
to several optical media. It is used with CD-ROMs and DVD-
ROMs and is supported on all operating systems. Now, it is used in
the process of CD-R's and CD-RW's, called packet writing.
Forensics Evidence, Collection,
Processing and the phases of
forensics investigation

Prof.Reeta Singh ( MCA, Course Cordinator-


IMCOST)
Process of Digital forensics

Prof.Reeta Singh ( MCA, Course Cordinator-


IMCOST)
Phases of forensics investigation

Prof.Reeta Singh ( MCA, Course Cordinator-


IMCOST)
Policy & Procedure Development of Phases of forensics
investigation

• Computer forensics requires specially trained personnel in


sound digital evidence recovery techniques.
• As the primary aim of any digital forensics investigation,
is to allow others to follow the same procedures and steps
and still end with same result and conclusions,
considerable effort must be spent on developing policies
and standard operating procedures (SOP) in how to deal
with each step and phase of the investigation.

Prof.Reeta Singh ( MCA, Course Cordinator-


IMCOST)
Evidence Assessment
• All sources of possible digital evidence should be thoroughly assessed with
respect to the scope of the case. This will help establish the size of the
investigation and determine the next steps.
• Special attention should be given to reviewing the scope of search warrant(s)
and other other legal authorizations to establish the nature of hardware and
software to be seized, other potential evidence sought together with the
circumstances surrounding the acquisition of the evidence to be examined.

Prof.Reeta Singh ( MCA, Course Cordinator-


IMCOST)
Evidence Acquisition (precuations)

• Digital evidence is fragile and can be easily altered, damaged, or destroyed by


improper handling or examination. Even the act of opening files can alter
timestamp information destroying information on when the file was last
accessed. So special precuations are needed to preserve this type of evidence.
Failure to do so may render it unusable or lead to an inaccurate conclusion.

Prof.Reeta Singh ( MCA, Course Cordinator-


IMCOST)
Evidence Examination
• The same general forensic principles apply when examining digital
evidence as they do to any other crime scene. However, different types of
cases and media may require different methods of examination. Only
trained personnel should conduct an examination of digital evidence.
• It is important to make a distinction.:-
• Extraction refers to the recovery of data from whatever media the data is
stored on.
• Analysis refers to the interpretation of the recovered data and placement of
it in a logical and useful format, answering such questions as how did it get
there, where did it come from, and what does it mean?
• Separating the forensic examination this helps the examiner in developing
procedures and structuring the examination and presentation of the digital
evidence.

Prof.Reeta Singh ( MCA, Course Cordinator-


IMCOST)
Documentation & Reporting

• The investigator must document completely and accurately their


each step in their investigation from the start to the end. The aim is
to allow others following the steps outlined in the documentation
to reproduce the investigation and reach the same conclusions.

Prof.Reeta Singh ( MCA, Course Cordinator-


IMCOST)
Types of Computer Forensics

Prof.Reeta Singh ( MCA, Course Cordinator-


IMCOST)
Types of Computer Forensics

Prof.Reeta Singh ( MCA, Course Cordinator-


IMCOST)
Types of Computer Forensics
Disk Forensics:
It deals with extracting data from storage media by searching active,
modified, or deleted files.
Network Forensics:
It is a sub-branch of digital forensics. It is related to monitoring and analysis
of computer network traffic to collect important information and legal
evidence.
Wireless Forensics:
It is a division of network forensics. The main aim of wireless forensics is
to offers the tools need to collect and analyze the data from wireless
network traffic.
Database Forensics:
It is a branch of digital forensics relating to the study and examination of
databases and their related metadata.
Prof.Reeta Singh ( MCA, Course Cordinator-
IMCOST)
Types of Computer Forensics
Malware Forensics:
This branch deals with the identification of malicious code, to study their payload,
viruses, worms, etc.
Email Forensics
Deals with recovery and analysis of emails, including deleted emails, calendars,
and contacts.
Memory Forensics:
It deals with collecting data from system memory (system registers, cache, RAM)
in raw form and then carving the data from Raw dump.
Mobile Phone Forensics:
It mainly deals with the examination and analysis of mobile devices. It helps to
retrieve phone and SIM contacts, call logs, incoming, and outgoing SMS/MMS,
Audio, videos, etc.

Prof.Reeta Singh ( MCA, Course Cordinator-


IMCOST)
University Question
• What is Digital Forensics? Explain Process & Phases of
DF.
• What is Computer Forensics? Explain types of Computer
Forensics in detail?

Prof.Reeta Singh ( MCA, Course Cordinator-


IMCOST)

You might also like