Cyber Security
Cyber Security
● The first computer crimes were recognized in the 1978 Florida computers act and after this,
the
● field of digital forensics grew pretty fast in the late 1980-90’s.
It includes the area of analysis like storage media, hardware, operating system, network and
applications.
● It can be used for prosecution of various crimes but it is generally associated with E-Crimes.
● Digital evidence is described as information and data kept on, received from, or transferred by an
electronic device that is useful to an investigation.
● When electronic devices are taken into custody and secured for inspection, this evidence can be
obtained.
Digital proof −
1. Similar to fingerprints or DNA evidence, it is latent (hidden).
2. Swift and simple jurisdictional border crossing.
3. Can be easily changed, damaged, or destroyed.
4. Potentially time-sensitive.
● Reporting: In this final step all the documentation, reports are compiled so that they can be
submitted in court.
● Attachments and Content: Extract and analyse email attachments and content for potential
evidence.
● Original Email Preservation: Preserve original email content, headers, and metadata to maintain
authenticity.
● Chain of Custody: Document and maintain a secure chain of custody to track the handling of
email evidence.
● Keyword Search: Conduct keyword searches to identify relevant information within email
content.
● Link Analysis: Analyse relationships between email senders, recipients, and other entities to
uncover patterns or connections.
● Email Source Verification: Verify the authenticity of emails by examining the source, SPF/DKIM
signatures, and sender information.
● Sender Authentication: Validate the identity of the sender through forensic analysis to prevent
email spoofing.
● IP Address Analysis: Analyse IP addresses in email headers to trace the geographic location or
identify potential malicious activities.
● Email Routing Analysis: Examine email routing paths to understand the journey of the email
through different servers.
7. Recovering Deleted Emails: Employ forensic techniques to recover deleted emails, including
examining email server logs and backup systems.
8. Reporting: Generate comprehensive reports documenting the findings of the email forensics
analysis, including key evidence, methodologies used, and conclusions drawn.
● life cycle
The digital
consists
forensics
of a series of
identifying, steps and processes
systematic aimed at
collecting, analysing, and preserving digital evidence in a
forensically sound manner.
● Chain of custody indicates the collection, sequence of control, transfer and analysis.
● It also documents details of each person who handled the evidence, date and time it was
collected or transferred, and the purpose of the transfer.
● It demonstrates trust to the courts and to the client that the evidence has not tampered.
● Reporting: This is the documentation phase of the Examination and Analysis stage. Reporting
includes the following:
● As the internet grew cyber crimes also grew along with it and so did the significance of network
forensics, with the development and acceptance of network-based services such as the World Wide
Web, e-mails, and others.
● With the help of network forensics, the entire data can be retrieved including messages, file
transfers, e-mails, and, web browsing history, and reconstructed to expose the original transaction.
● It is also possible that the payload in the uppermost layer packet might wind up on the disc, but the
envelopes used for delivering it are only captured in network traffic.
● Safeguarding: In this process, the investigators preserve and secure the data so that the tempering
can be prevented.
Accumulation: In this step, a detailed report of the crime scene is documented and all the collected
●
digital shreds of evidence are duplicated.
Observation: In this process, all the visible data is tracked along with the metadata.
●
Investigation: In this process, a final conclusion is drawn from the collected shreds of evidence.
●
Documentation: In this process, all the shreds of evidence, reports, conclusions are documented
● and presented in court.
2. Data Destruction: Criminals may attempt to destroy digital evidence by wiping or destroying
devices. This can require specialised data recovery techniques.
Data Storage: The sheer amount of data that can be stored on modern digital devices can make
3.
it difficult for forensic investigators to locate relevant information. This can require