Digital Forensics
Digital Forensics
Syllabus
Understanding of forensic science, digital forensic, The digital forensic process, Locard'
exchange principle, Scientific models.
Contents
1.1 Understanding of Forensic Science
1.2 Digital Forensic Winter-21, Marks 3
1.3 Locard's Exchange Principle .Winter-21,. Marks 7
1.4 Scientific Models
(1-1)
1-2 Introduction
Digital Forensics
of Forensic Science
1.1 Understanding
methods or expertise to investigate crimes
.Forensic science is the use of scientific
that might be presented in a court
of law. Forensic science
or examine evidence
evidence." This process ensures that evidence is pure and has not had an
Investigative process of digital forensics can be divided into several stages. Four
major stages are: Preservation, collection, examination and analysis.
.Computer forensics activities commonly include:
a. The secure collection of computer data.
b. The identification of suspect data.
c. The examination of suspect data to determine details such as origin and
content.
digital forensics
Stages of investigative process of
1. Preservation Preservation freezing the crime scene. It
stage corresponds to
deleted, with the goal of ensuring that the recovered data is valid so that it can be
used as evidence.
Forensic analysis includes reviewing all the data collected. This includes reviewing
log files, systen configuration files, web browser history files,
trust relationships,
email mes-ages and their attachments, installed applications and graphic files.
.You perform soft-ware analysis, review time/date stamps, perform keyword
searches and take any other necessary investigative steps.
.Forensic analysis also includes performing more low-level tasks, such as looking
through information that has been logically deleted from the system to determine
if deleted files, slack space or free space contain data fragments ór entire files that
may be useful to the investigation.
Fig. 1.2.1 shows forensic analysis.
Analys1s of data
Extra Review
email and browser
attachments history files
Preparation of data
Create Perform
statistical data
Review
Review data
collected
file installed
partition table during
ists applications
file systems ive response
Perform Create a
Recover Perform file Search for Review a
forensic working copy
of all
deleted signature relevant the network
duplication data analysis things based evidence
evidence media
Identity and
Recover Identity Perform
unalfocated known software decrypt
space system files analysis encrypted
files
Perform Perform
file-by-fle specialisedd
review analysis
Investigative process of digital forensics can be divided into several stages. Four
major stages are: Preservation, collection, examination and analysis.
Computer forensics activities commonly include
a. The secure collection of
computer data.
b. The identification of
suspect data.
C. The examination of suspect data to determine details such as origin and
content.
TECHNICAL PUBLICATIONS an
up-thrust for knowiedge
1-6
Introduction
Digital Forensics
of law.
information to courts
d. The presentation of computer-based
University Question
GTU Winter-21, Marks 3
1. What is Digitalforensics?
1.3 Locard's Exchange Principle GTU : Winter-21
Edmond Locard was an important forensic scientist of the 19th century. In forensic
science, Locard's exchange principle holds that the perpetrator of a crime will
bring something into the crime scene and leave with something from it, and that
both can be used as forensic evidence.
He formulated the basic principle of forensic science as: "very contact leaves a
trace". It is generally understood as "with contact between two items, there will be
an exchange."
.This basic principle is that "every contact leaves a trace". Thus NO perpetrator can
leave the scene without leaving a trace. Fingerprints, gunshot residue or blood are
the main evidence, which is involuntarily left behind at the crime scene.
Although Locard's thoughts were highly unusual at that time, he realized early the
great significance of using scientific tools in the investigation of crimes. Finally, a
new discipline, forensics, was created for these reasons.
Paul L. Kirk expressed the principle as follows Wherever he steps, whatever he
touches, whatever he leaves, even unconsciously, will serve as a silent witness
against him. Not only his fingerprints or his footprints, but his hair, the fibres
from his clothes, the glass he breaks, the tool mark he leaves, the paint he
scratches, the blood or semen he deposits or collects. All of these and more, bear
mute witness against him. This is evidence that does not forget.
When a crime is committed, fragmentary or trace evidence needs to be collected
from the scene. A team of specialised police technicians goes to the scene of the
crime and seals it off. They record video and take photographs of the crime scene,
victim/s and items of evidence.
If necessary, they undertake ballistics examinations. They check for foot, shoe, and
tire mark impressions, plus hair as well as examine any vehicles and check for
fingerprints, whole or partial.
.Example: website visit: Suppose user visit "technicalpublications.org" and login
there. What evidence of this "visit" do user leave at the technicalpublications.org
webserver? An entry in the webserver log. What evidence do user take with you?
First of all a cookie from the technicalpublications.org server. Second of al, user
browser caches a copy of the webpages visit - ie. it stores a copy on user machine
of each webpage. Third of all, user browser keeps a history of all the pages user
have visited which it uses to offer you a list of completions of the URL you're
currently typing
University Question
1. Explain Locard's Exchange Principle with suitable scenario. .GTU: Winter-21, Marks 7
on Digital
Evidence (SWGDE) brings together
T h e Scientific Working Group
in the field of digital
and multimedia evidence to
organizations actively engaged
ensure quality and consistency
as well as to
foster communication and cooperation
within the forensic community
and efforts of a wide range
of Scientifjic
T h e FBI has supported the formation
Technical Working Groups (TWGs) (Federal Bureau
Working Groups (SWGs) and
of Investigation).
T h e mission of the Working Group on Imaging Technology (SWGIT) was
Scientific
and systems within the
to facilitate the integration of imaging technologies
and guidelines for the
Criminal Justice System (CIS) by providing best practices
of image and archiving.
capture, storage, processing, analysis, transmission, output
2. American Academy of Forensic Sciences
is a multidisciplinary
T h e American Academy of Forensic Sciences (AAFS)
advance science and its
professional organization that provides leadership to
application to the legal system.
AAFS members are 6,600+ represent all 50 United States and 71 other countries.
Membership is comprised of pathologists, attorneys, dentists, toxicologists,
anthropologists, document examiners, digital evidence experts, psychiatrists,
and others.
engineers, physicists, chemists, criminalists, educators, researchers,
AAFS provides
a) Leadership to advance science and its application to the legal system
OO0
Notes
Understanding
2 of the Technical Concepts
Syllabus
Basic computer organization, File system, Memory orgamization concept, Data storage concepts.
Contents
2.1 Basic Computer Organization.............. Winter-21 Marks 3
22 Flynn's Classificationof Computers...... Winter21 Marks 4
2.3 File System
(2-1)
2-2 Concepts
Understanding of the Technical Cono
Digital Forensies
GTU: Winter-21
Organization
2.1 Basic Computer
software that are combinodd to
hardware
device and
system consists
of
Computer
tool to user for solving problems.
provide a
CD ROM
Hard disk Display
Disk controller
Graphics
adapter
Central
processin9
unit
BUS Controller
Main memory
Computer system consists of CPU, memory and I/0 devices with one or more
modules of each type. These all components are interconnected. Common bus is
used for communication between these devices. Each device has its own device
controller.
Main structural elements are as follows
1. Central processing unit: CPU controls the operation of the computer. It
performs processing function.
data
2. Main memory: Used for storing programs and data. The memory is typicaly
volatile. Main memory is also referred as primary memory or real memory,
User program and data are stored in the main memory. Main memory 15
volatile, so it can not stored permanently.
3. VO modules : These modules are used for moving data between computer and
its external environment. The external environment consists of variety of
devices, including secondary memory devices, communication equipmene's and
terminals.
4.System bus : It provides for communication among processors, main memory
and 1/O modules.
CPU and device controller use memory cycle for execution purposes. But memory
cycle is only available to one device at a time.
Bootstrap program loaded when user start the computer. It initializes all the
is
device connected to the computer systern and then loads required device drivers.
After this, operating system loads in the computer systerm. In UNX OS, an 'init' is
the first process which execute by OS.
Processor access the data from main memory before executing any instruction.
Main memory is also called Random Access Memory (RAM).
A t the top of the hierarchy, we have storage on the CPU registers. For accessing
the CPU, it is fastest form of storage.
Every device uses a device controller to connect it to the computer's address and
data bus. Devices can be classified as a block oriented or character oriented,
depending on the number of bytes transferred on an individual operation.
Storage devices are used to store data while the computer is off. Device controller
manage the data transfer between peripheral device and its controller. Device
driver is handled by device controller.
unit of computer
2.1.2 shows block diagram of control
Fig.
Instructor register
Control signals
within CPU
control buS
Clock- Control signals to
control unit
Fig. 2.1.2 block diagram of
instruction registers, signals within the
control
The components of control unit are
and clock signals.
CPU, control signals to/from the bus, control bus, input flags
the functional units
Control unit co-ordinates and controls the activities amongst
instructions stored in the main
The basic function of control unit is to fetch the
involved in it and accordingly
memory, identify the operations and the devices
generate control signals to execute the desired operations.
It controls input and output operations, data transfer between the processor,
University Question
1. Draw and explain Control Unit of basic compruter. GTU: Winter-21, Marks 3
2.2 Flynn's Classification of Computers GTU: Winter-21
S Single
I= Instruction Stream
M Multiple
D Data Stream
the
Data stream Central
Primary memory Processing
its Unit (CPU)
Instruction stream
ain
gly Fig. 2.2.1 Data and instruction stream
T o Flynn's classification, either of the instruction or data streams can be single or
sor,
multiple. Computer architecture can be classified into the following four distinct
computer architecture categories
1. SISD (Single Instruction and Single Data Stream)
2. SIMD (Single Instruction and Muliple Data Streams)
3. MISD (Multiple Instructions and Single Data Stream)
3
4. MIMD (Multiple Instructions and Multiple Data Streams)
nd
res
ion SISD SIMD MISD MIMD
ons Fig. 2.2.2
2.2.1 Single Instruction and Single Data Stream
A sequential computer which exploits no parallelism in either the instruction or
the data streams. This is the common Von Neumann model used in virtually all single
processor computers. These are uniprocessor computer that process one instruction
at a time.
Data Primary
Instruction CPU memory
. input Controllerstreamn Stream
Output
level parallelism.
There is no parallelism and data
instruction level
Amdhal 470/6 which has
which vector processing and
Examples: Cray-1 supports
pipelined instruction processing.
Instruction
Controller
Memory
Digital Forensics
include the most
Interconnection network
Interconnection network
MiMD
(a) Shared memory MiMD organization (b) Message passing organization
memory and do that any other procesor do. Fig. 22.7 shows
can anything can
UMA.
CPU
CPU
c CPU
n
d CPU
c
Fig. 2.2.7 UMA
d For these systems the time to access a work in memory is constant for
d all processors. Such a parallel computer is said to have a Uniform Memory
a Access (UMA).
g these systems, the time taken to access a word in local memory smaller
e than the time taken to access a word stored in memory of other computer
or common shared memory. Thus this systems said to have Non Uniform
Memory Access (NUMA).
ul
Access time to a given memory location varies considerably for different CPUs.
Normally, fast cache is used with NUMA systems to reduce the problem of
e different memory access time for PEs.
.SPMD is by far the most ommonly used pattern for structuring parallel programs.
Main advantage : Tasks and their interactions visible in one piece of source code,
no need to correlated multiple sources.
y 3 *c
then(x+Y)*(x-y)/c
Acyclic dataflow graph is used for representing arithmetic and logical expression.
Following is the acyclic dsataflow graph for given expression.
TECHNICAL PUBLICATIONS -
a D
s5:
one.
the side false side,
Switch routes its data input to the output arc on true or
representations of compilers.
Dataflow models are classified as static and dynamic.
Static Model
The static model allows at most onenode to be enabled for firing. A
instance of a
dataflow actor can be executed only when all of the tokens are available on its
input arcs and no tokens exist on any of its output arcs.
Fig. 2.2.11 shows basic organization of the static dataflow mode.
Update unit
Data
Tokens
Operation
Packets
Fetch unit
Data
Tokens
Enable
instructions
Fetch unit
dataflow model
Fig. 2.2.12 Dynamic
tokens with identical tags. If a
Operation of the matching unit is to bring together
extracted from the matching unit and the
match exists, the corresponding token is
If no match is found, the token is
matched token set is passed on to the fetch unit.
stored in the matching unit to await a partner.
tags.
2. Associative memory would be ideal.
3. It is not cost-effective.
4. All existing machines use some form of hashing techniques that are typically
not as fast as associative memory.
TECHNICAL PUBLICATIONS an
up-thrust for knowledge
pts
Digital Forensics 2- 15 Understanding of the Technical Concepts
h
The demand-driven approach matches naturally with functional programming8
languages
.Operations are executed only when their results required by another instruction in
demand driven model. So because of this reason it is called lazy evaluation.
SIMD MIMD
SIMD stands for single instruction multiple MIMD stands for multiple instruction multiple
datä. data.
e
s University Question
1. Explain Flynn's classification of computers. GTU: Winter-21, Marks 4
y 2.3 File System
File systems are abstraction that enables users to read, manipulate and organize
data. Typically the data is stored in units known as files in a hierarchical tree
g
where the nodes are known as directories.
The file system enables a uniform view, independent of the underlying storage
devices which can range between anything from floppy drives to hard drives and
flash memory cards. Since file systems evolved from stand-alone computers the
connection between the logical file system and the storage device was typically a
one-to-one mapping.
The DOS and Windows file systems use fixed-size clusters. Even if the actual data
being stored requires less storage than the cluster size, an entire cluster is reserved
for the file. This unused space is called the slack space.
A cluster, also knouwn as an allocation unit, consists of one or more sectors of storage
space and represents the minimum amount of space that an operating system
allocates when saving the contents of a file to a disk.
enion
Start of file
Flg. 2.3.2
r The FAT shows only a list with one entry for each cluster in a volume. Each entry
in the FAT indicates what the associated cluster is being used for the following
l Fig 2.3.2 shows output from norton disk editor on file allocation table.
Free allocation is marked by zero in the cluster. If it contains some value (i.e.
Greater than zero) then that number is given to the next cluster for a given file or
n folder. EOF means end of file. Where file end, FAT marked it as EOF.
e Subdirectories are a special type of file. It contains information such as names,
attributes, dates, times, sizes and the first cluster of each file on the system.
on the
one of two tasks
When a file is deleted, the file system will perform
as "free space"
on the file
allocation table marked
allocation table. The file's entry free.
list is erased and then
the space is marked as
or the file's on the
entry will put the
lf a file needs to be placed on the storage unit, the operating systemn
written to the "empty
the space marked as empty. After the new file is
file in
to be recovered,
When a deleted file is
space", the deleted file is now gone forever.
is used, then
because if the "empty space
the user must not manipulate any files
the file can never be retrieved.
Directory formt
Hoot dir D r f s e t O, hx
Sector 7 in root directory Attr ibutes
Hid Dir ol
Cluster Arc R/0 Sys
Date Time
F i l e n a e Ext Sie
dge
12-05-90 11:19 am
12-0390 2 z pm
1516 12-01-90 1256 pm
SHELL EX 10025
16 11-28-90 2:20 Pn
N L SHL 1391 12:06 a
S53512-es 0 2:34 p
CATHCU 2330 12-0390 2:34 pm
DaTOR
DTTOR
3779
914
12-01-90
12-01-D0
2:11
2:41 P
Pa
A n MFT can volume used to have lots of files that were deleted.
be too big if a
in the MFT. These holes are
The files that were deleted cause internal holes
reclaim this space.
that are unused by files. It is impossible to
significant regions
This is at least true on a live NTFS volume.
A s files are added to an NTFS volume, more entries are added to the MFT and so
the MFT increases in size. When files are deleted from an NTFS volume, their
TECHNICAL PUBLICATIONS an up-thrust for knowledge
pta
Digital Foronsics
19 Understanding of the Tochnicel Concepts
he
e" entries are marked
MFT
Thus, used
as free and may be reused, but the MFT does not shrink
space by these entries is not reclaimed from the disk.
he
ty
MBR VBR SMt Directories and files
d,
en
Measured in Measured in clusters
Directories are treated in NTFS as index entries and store folder entries in a B-Tree
to
accelerate access and facilitate
encoding scheme called unicode.
resorting when entries are deleted. NTFS uses an
The attribute places INDX records in B+ tree, where the is the file A
a
key name.
B+ tree is data structure where records
a
arbitrary are
organized by a sortable key
value, such as a number or a string. For a forensic investigator, the effect of the
B+ tree is that INDX records associated with a node are stored as a chunk in
alphanumeric order.
The size of a B+ node is 4096 bytes. When file is added to
a a
directory, a new
record is added to the INDX attribute of the
directory. Within the B+ tree, NTFS
finds the appropriate node and inserts the new record,
shifting records down, if
necessary.
Fig. 2.3.6 shows the file with a
logical size that is larger than its valid data length,
T. leaving un-initialized space.
its
File content Un-initialized space File slack
Valid data length
ch
of Logical size
Physical size
d.
re
Fig. 2.3.6 File with logical size
e.
Fig. 2.3.7 shows the behavior of the Microsoft NTFS driver as an INDX record is
deleted. When the driver INDX record "F", it shifts the records "G" and
removes
"H" to fill the space. As the contents of record "H" shift, a recoverable
so copy
(inactive record "H ") remains in the newly expanded slack space.
eir
Slack space
INDX node Active INDX record
header
Slack
INDX
ADEF|
INDX record "F" deleted
Slack
INDX
from slack
"H" is recoverable
Active INDX records shift to fill space; a copy of record
Slack
INDX
2-22
Understanding of ncepts
Digital Forensics
between programs existing
avoid interference
Memory protection is used to every memory addrese
hardware compares
main memory. The memory
protection a n a limit) to
ensur
registers (base
of two
used by the program with the
contents
area.
that it lies with the allocated memory
address space.
Multiple hardware memories are used to provide a larger
is adding two registers to the CPU
The simplest method of memory protection
for all memory is allocated
contiguously. Non-contiguous
This works good
memory is harder to protect.
decoder adds on the
to address, the memory
When a process reads from or writes
value of the base register. The actual operation
of read or write to address = base
1se
3. Execution time
Compile time
Source program is translated at compile time to produce
:
a
relocatable object module. At compile time, the translator
generates code to
allocate storage for the variable. This storage address is used for code
reference.
Target address is unknown at compile time, it cannot be bound at compile time.
Example of compile time binding is MS DOS.com programs.
Load time : Compiler
generates relocatable code if compile time binding is not
performed. The loader modifies the addresses in the load module at load time to
produce the executable image stored in main memory. Final
until program load time. binding is delayed
.Execution time: Memory address of the
then execution time binding is used.
program is changed at execution time
is Binding delayed until the run time of the
se program. Normally all operating system uses execution time binding Special
hardware is used for execution time
ur binding
Source
Memory
Compiler Inkage
editor -Loader image
program of program
U
Load
s Compile me
Execution
time time
.Logical address is generated by the CPU. This address is also called virtual
address.
e
Main memory address uses physical address. This address also called real
address.
.Logical address space: Set of all logical addresses generated by a program.
.Logical address and physical address is iderntical when load time and compile time
address binding is performed. The execution time address binding generates
different physical and logical address.
Memory Management Unit (MMU) is responsible for run time address mapping
from vitual to physical address.
Dynamic Relocation
Base register is sometimes called as a relocation register. The value of the
relocation register is added to every address generated by a user process at the
time it is sent to main memory.
User can load a process with only absolute addresses for instructions and data,
only when those specific addresses are free in main memory. Program's
instruction, data and any other data structure required by the process can be
accesssed easily if the addresses are relative.
emory
2.4.3 shows dynamic
8
physical address.
Relocation
Main memory
register Kernel
free
Physical
Logical
addresS
Processor TaddresSRelocation x* Y)
free
Data
Memory
management
unit
relocation
Fig. 2.4.3 Dynamic
It is mapping
ot the virtual addresa
extra hardware.
Dynamic relocation requires
time.
address space at run
space to the physical
move a partially
executed process from
Dynamic relocation makes it possible to
another without affecting other process.
one area of main memory into
it is necessary to pertorm an addition and a
Problem with relocation is that,
comparison on every memory reference.
address space is bound
with a separate
For good memory management, logical
physical address space.
University Question
.Caches are introduced into a system to bufer the mismatch between main
memory and processor speeds. A cache is a relatively smal, fast memory placed
between the processor and the main memory. The cache is designed so that its
access time matches the processor cycle time.
Physical address cache : When the cache is accessed with a physical memory
address, it is called physical address cache.
TECHNICAL PUBLICATIONS -
an up-thrust for knowledge
s
Digital Forensics 2- 25 Understanding of the Technicel Concepts
When the processor makes a memory request, the request first passes to the
primary cache. If the data item is found in this cache, we have a cache hit.
I f the data item is not found in the primary cache, we have a cache miss and the
memory request is forwarded the L2 cache. If the data item is found in this
to
cache, we have an L2 cache hit and the data is passed back to the primary cache.
word in the
When the memory is referenced, the index is first used to access a
cache. Then the tag stored in the accessed word is read and compared with the
tag in the address. If the two tags are the same, then the required memory block
is already in the cache and it is h1t. The required word is selected from
the cache
.If the direct mapped cache with a line consisting than one word then
of more
main memory address is composed of a tag, an index, and a word within a line. All
the words within a line in the cache have the same stored tag.
The index part to the address is used to access the cache and the stored tag is
compared with required tag address. For a read operation, if the tags are the same
the word within the block is selected for transfer to the processor. If the tags are
not the same, the block containing the required word is first transferred to the
cache.
.
Fig 2.5.2 shows
memory address filed.
+W
k
-(hit in cache)
(Miss in cache)
If set is represented by u-bits in address field, then set no. can be found by index
of u bits. The tag filed of each row is then s -
u bits.
Algorithm to find cache hit ls:
1. Pick up the bits out of total (s u) + u bits
u out of
-
u bits from address field with tag fields of all the 25u
lines in that set.
Digital Forensics
has the
and line
whose tag is matched,
it is
requir
it is hit to CPU, else mie
any
match occurs,
from that
word is
transferred
and
block. And, the byte
from RAM. access the set,
replaced to
iincoming Then,
the block is 1s Usea
address from
the processor
set with the
First, the index of the the selected
all of tags accessed, other wise, tag
omparators
f a
are
University Question
1. What is cache memory ? Explain direct mapping of cache memory with example.
Digital Forensics
2-29 Understending of the Technical Concepts
Digital Forensics
sectors
and
showing
tracks
2.6.1 shows surface of disk
8
Tracks
Sector
sectors
Fig. 2.6.1 Tracks and
second.
Drives rotate at 60 to 200 times per
drive and computer.
is rate at which data
flow between
Transfer rate
time) is time to move
desired disk arm to
Positioning time (random-access rotate under the disk head.
for desired sector to
cylinder (seek time) and time
surface.
contact with the disk
Head crash results from disk head making
is coated with magnetic material on both surfaces. All
Each platter (disc-shaped)
surfaces has extended from fixed position. Tip of the arm contains
platter arm
surface, track and sector containing that byte, and reads the entire sector into a
Track t Spindle
Cylinder c Read-write
head
Platter
Arm
Rotation
Fig.2.6.2 Moving-head dlsk mechanlsm
TECHNICAL PUBLICATIONS an up-thrust for knowledge
pts
Digital Forensics 2-331 Understanding of the Technical Concepts
Relatively permanent and holds large quantities of data. Magnetic tape access time
is slow.
Mainly used for backup, storage of infrequently-used data, transfer medium
between systems.
I t is kept in spool and wound or rewound past read-write head. Once data under
head, transfer rates comparable to disk.
Typical storage is 20 GB to 200 GB. Common technologies are 4 mm, 8 mm,
19 mm, LTO-2 and SDLT.
CD-ROM
technology is called Compact
in PCs, the commonly used optical storage
most
can store up to
Disk Read-Only Memory (CD-ROM). A
standard CD-ROM disk
written to a standard
650 MB of data, or about 70 minutes of
audio. Once data is
DVD-ROM
.Digital video disk read only memory, is a high-density medium capable of storing
a ful-length movie on a single disk the size of a CD. Achieves such high storage
capacities by using both sides of the disk and special data compression
technologies.
The latest generation of DVD-ROM use layers of data tracks; the laser beam reads
data from the first layer and then looks through it to read data from the second
layer. Each side of a standard DVD-ROM can hold up to 4.7 GB. Dual layer
DVD-ROM can hold 17 GB of data.
University Question
TECHNICAL PUBLICATIONS -
an up-thrust for knowledge
ncept
ected
3
tiny
back.
Digital Forensics Process Model
urce,
mpact Syllabus
p to niroduction to cybercrime scene, documenting the scene and evidence, maintaining the chain f
dard CuStody, forensic cloning of evidence, Iive and dead system.forensic, hashing concepts to maintai
the integrity ofevidence, report drafting
e of
bps.
Contents
3.1
ware Introductionto Cybercrime Scene........ Winter-21, . .
Marks 3
3.2
ram Documenting the Scene and Evidence.. Winter-21, *** Marks 33
3.3 Maintaining the Chain of Custody
the 3.4 Forensic Cloning
m of
of Evidenoe. Winter-21, Marks 7
3.5 Live and Dead System Forensic. ... Winter-21, Marks 4
ons
3.6 Hashing Concepts to Maintain the Integrity of Evidence
pit
Winter-21, ..Marks 7
CD 3.7 Report Drafting
ing
age
ion
ads
ond
yer
(3-1)
Process Model
Digital Forensics
3-2
Digital Forensics
GTU: Winter-21
Scene
3.1 Introduction to Cybercrime
networks. cyber The
involving computers and
crime is any
criminal activity
networks and
Internet. LAN and
yber computer
space inchudes computer systems,
WAN is also part of cyber space.
music files to stealing
from downloading illegal
Cyber crime incorporate anything
accounts.
millions of rupees from online bank
object of the crime
which a computer is the
is defined as a crime in
Cyber crime or is used as a tool
to commit an
offense (child
(hacking phishing, spamming) vulnerable to crime.
are as
Internet connected activities
pornography, hate crimes).
that is perpetrated through
the use
of a
Computer crime is any illegal activity
computer. ot a
other person in charge
of owner or any
a person without the permission or secures
accessto
computer network,
accesses
computer, computer system
or
torts and
the said acts are
such computer, computer system or computer network,
crimes under the Indian cyber law.
used to describe the
"CYBER". This word is
There is no standard definition for
refers to a block of data
world of an object in cyberspace
virtual computers e.g.
network.
floating around a computer system or
cyber crimes. In
Therefore, crimes committed in cyberspace are
to be treated as
f. Infringing pharmaceuticals
& Copyright-infringing software
d Example :
Launching the denial-of-service attacks on commercial web sites.
3.1.5 Traditlonal Problems Associated with Cyber Crime
Individuals seeking a crime have
always displayed a remarkable ability to adapt
to cnanging technologies, environments and lifestyles. Computer crime poses a
daunting task for law enforcement agencies because they are highly techrical
crimes.
Law enforcement agencies have individuals trained in computer forensics in
must
order to
prToperly investigate computer crimes. Additionally, countries must update
and create
legislation, which prohibits computer crimes and outlines appropriate
punishments for those crimes.
Computer crimes will likely become more frequent with the advent of further
technologies. It is important that civilians, law enforcement officials and other
members of the criminal justice
system are knowledgeable about computer crimes
in order to reduce the threat
they pose.
The eariest computer crimes were characterized as non-technological speific.
het of computer components and software piracy were particular favorites.
Hacking and technologically complicated computer crime came later.
t
3.1.6 Issues and Challenges in Cyber Crime
Investigation is a process that develops and tests hypotheses to answer questions
about events that occurred. In general, computer forensics investigates data that
can be retrieved from a computer's hard disk or other storage media.
Computer forensics is the task of recovering data that users have hidden or
deleted, with the goal of ensuring that the recovered data is valid so that it can be
used as evidence.
The computer investigations group manages investigations and conducts forensic
analysis of systems suspected of containing evidence related to an incident or a
crime.
cyber-crimes.
and law enforcement personnel; are not equipped to address
.Security forces
high-tech crimes.
the investigative
8. Fresent protocols are not self-sufficient, which identifies
other crimes.
University Question
?
1. What are the main challenges of investigating computer-related crime
GTU: Winter-21, Marks 3