Unit 4
Unit 4
Unit 8
Imaging of Digital Evidence
• Imaging is the process of creating a bit-for-bit copy of digital
evidence, such as a hard disk or USB drive, for investigation
purposes. This ensures that the original evidence is
preserved and not altered during the examination.
• Imaging captures all data, including deleted files, hidden
files, and unallocated space.To create a forensic image, the
original evidence is connected to a write blocker, which
allows read-only access and prevents any changes to the
data. A destination disk is also connected to the write
blocker, and the imaging software is used to create the
image. Multiple images are typically created for redundancy
Hashing of Digital Evidence
• Hashing is the process of applying a mathematical algorithm to digital
evidence to generate a unique alphanumeric value called a hash value. The
same input will always produce the same hash value, but any change to the
original evidence will result in a different hash value
• Common hashing algorithms used in digital forensics include MD5 (Message
Digest) and SHA-1 (Secure Hashing Algorithm). The generated hash value
serves as a digital fingerprint or electronic signature of the evidence.Hashing
is crucial for verifying the integrity of digital evidence, as it ensures that the
evidence has not been altered during the investigation process. The hash
value is recorded and compared at various stages, such as when the evidence
is seized, imaged, and presented in court.
• imaging creates a forensic copy of digital evidence, while hashing generates a
unique identifier to verify the integrity of the evidence. Both techniques are
essential in digital forensics to preserve and authenticate evidence for legal
proceedings
Duplication and preservation of digital
evidence
• - Proprietary Formats: Most forensic tools have their own formats with
features like the option to compress image files, split images into
smaller segments, and integrate metadata. However, these formats
have limitations, such as the inability to share images between different
tools and file size restrictions for segmented volumes.
cont
• - Advanced Forensics Format (AFF): Developed to address the need for a standard
format for storing and transmitting digital evidence, AFF aims to facilitate
interoperability between different organizations and analysis tools. It provides benefits
like easy import into multiple analysis tools, storage of metadata with evidence, and
increased reliability of evidence.
• - Chronological Record: Log analysis provides a chronological record of events, aiding investigators in
reconstructing what happened, how it happened, and who was involved in security incidents.
•
• - Root Cause Investigation: Log forensics allows security teams to drill down deep into security breaches,
enabling them to identify the root cause of cyberattacks. It provides essential information on the who,
when, where, and how of security incidents, empowering security teams to conduct digital forensic
investigations effectively[2].
• - Detection and Mitigation: Logs act as a vital source for detecting threats, mitigating attacks, and
conducting post-attack analysis. Log management, including log forensics, is essential for collecting, storing,
analyzing, and archiving log data to identify security incidents, attack patterns, and impacted data.
• - Insights and Analysis: Log analysis helps in understanding access logs, identifying attacks, and investigating
suspicious activities. By analyzing logs from various sources like web servers, application servers, and
network devices, investigators can gain insights into potential threats, insider attacks, and vulnerabilities
within the network.
• - Forensic Investigation: Log forensics is a combination of log analytics and computer forensics, aiding digital
forensic experts in untangling incidents and digital crimes. It helps in tracing hackers, detecting
vulnerabilities, and supporting disaster recovery efforts through detailed analysis of log data.