Digital Forensics - A Intro
Digital Forensics - A Intro
• https://www.guru99.com/digital-forensics.html
• https://www.upguard.com/blog/digital-forensics
DEPARTMENT OF COMPUTER ENGINEERING, Sanjivani COE, Kopargaon 17
Computer Forensics
• It is a branch of digital forensics concerned with evidence found in
computers and digital storage media.
• The goal of computer forensics is to examine digital data with the aim
of identifying, preserving, recovering, analyzing and presenting facts
and opinions about the digital information.
• It is used in both computer crime and civil proceedings.
• The discipline has similar techniques and principles to data recovery,
with additional guidelines and practices designed to create a legal
audit trail with a clear chain of custody.
• Evidence from computer forensics investigations is subjected to the
same guidelines and practices as other digital evidence.
DEPARTMENT OF COMPUTER ENGINEERING, Sanjivani COE, Kopargaon 18
Mobile Device Forensics
• Mobile device forensics is a branch of digital forensics focused on the
recovery of digital evidence from mobile devices using forensically sound
methods.
• It can relate to any device that has internal memory and communication
ability including PDA devices, GPS devices, and tablets.
• The growing need for mobile device forensics is driven by: Use of mobile
phones to store and transmit personal and corporate information and use of
mobiles in online financial transactions.
• Mobile device forensics is particularly challenging due to: Storage capacity
growth; Rapid Changes/updates in mobile phone:- operating systems, data
storage, services, peripherals, and even pin connectors and cables.
3.Do not alter the original data collected- Obtaining copies of the original
data ensures that you are preserving any valuable metadata. Metadata includes
information such as author, file size, the date data was created, and keywords.
Other valuable metadata may include how files were accessed, shutdowns or
commands, and if copies were created.
4. Select an extraction method- Choice of extraction method may vary on the
amount of time that you have to retrieve the data or what data you are trying to
retrieve. Logical extraction involves the communication between the extraction
tool with the device using its own program. Live data can be acquired such as
messages, call logs, contacts, passwords to social media, photos and videos,
and data from apps. Physical extraction involves making a bit-by-bit copy of
the data contained on a device including any files that were hidden or deleted.
• https://www.unodc.org/e4j/zh/cybercrime/module-6/key-issues/handling-of-
digital-evidence.html
• https://www.youtube.com/watch?app=desktop&v=XpFsMB6FoOs
DEPARTMENT OF COMPUTER ENGINEERING, Sanjivani COE, Kopargaon 37
Linux-file systems
• Linux uses a hierarchical file system that is organized in a tree-like structure. The
topmost directory in any Linux file system is the root directory. There are different
types of file systems available in Linux,
• Regular file, Directory file, Link file, Character special file, Block special file,
Socket file, and Named pipe file.
• Linux offers many file systems such as Ext, Ext2, Ext3, Ext4, JFS, ReiserFS,
XFS, btrfs, and swap.