SEM 6 - CS Cyber Forensics
SEM 6 - CS Cyber Forensics
FORENSICS
B.Sc (Computer Science)
Semester 6
Mumbai University
By:
munotes.in
Revision 2023
CYBER FORENSICS
I 1 Computer Forensics 2
I 2 Network Forensic 7
II 4 Internet Forensic 15
II 5 E-mail Forensics 21
II 6 Messenger Forensics 25
II 8 Browser Forensics 27
Unit I
Computer Forensics :
1. Introduction to Computer Forensics and standard procedure.
Ans:
· Computer forensics is the process of collecting, analyzing and preserving digital
evidence in a manner that is legally admissible.
CYBER FORENSICS
3
2. System Identification:
· Identify the specific systems or assets that were affected by the incident.
· Determine the extent of the impact on the affected systems or assets.
· Identify any vulnerabilities or weaknesses in the affected systems that may
have contributed to the incident.
· Determine the cause of the incident, including any human error or external
factors that may have played a role.
· Identify any potential risks or threats that may have led to the incident, and
assess the likelihood of similar incidents happening in the future.
CYBER FORENSICS
4
3. Some common causes of data loss include physical damage to the storage device,
logical corruption, malware or virus attacks, and accidental deletion.
4. Some specialized techniques used in data recovery include file carving, signature
analysis, and sector-by-sector recovery.
5. It's worth noting that the chances of successful data recovery decreases as time
passes and as the device is being used after the data loss.
CYBER FORENSICS
5
5. Some popular software used for disk imaging are Encase, FTK Imager, X-Ways
Forensics, and dd.
6. It's worth noting that disk imaging requires a high level of technical expertise and
should be performed by trained and certified professionals.
CYBER FORENSICS
6
6. Forensics Software
Ans:
1. Forensics software is a specialized type of software used to collect, analyze, and
preserve digital evidence in a legally admissible manner.
2. Some standard features of forensics software include:
· Data acquisition and imaging capabilities to create a forensic copy of the
storage device.
· Data analysis and interpretation tools to identify and extract relevant data
from the image.
· Data search and filtering capabilities to quickly locate specific files or
information.
CYBER FORENSICS
7
Network Forensic :
7. Introduction to Network Forensics and tracking network traffic.
Ans:
1. Network forensics is the process of collecting, analyzing, and preserving evidence
from a network in a legally admissible manner.
2. Standard procedures for network forensics include:
· Identifying and documenting the network infrastructure, including devices,
protocols, and configurations.
· Capturing and analyzing network traffic using specialized software and
techniques.
· Identifying and tracking malicious activity, such as hacking attempts,
malware infections, and unauthorized access.
CYBER FORENSICS
8
CYBER FORENSICS
9
6. It's worth noting that network forensics and traffic tracking requires a high level of
technical expertise and should be performed by trained and certified professionals.
1. Reviewing network logs is the process of analyzing log files generated by network
devices and systems to identify and track network activity.
2. Standard procedures for reviewing network logs include:
· Identifying and documenting the network infrastructure, including devices,
protocols, and configurations.
· Collecting log files from various network devices and systems, such as
routers, switches, firewalls, and servers.
· Analyzing log files using specialized software and techniques to identify
patterns and anomalies.
· Correlating log data from different sources to provide a comprehensive
view of network activity.
· Identifying and tracking malicious activity, such as hacking attempts,
malware infections, and unauthorized access.
· Reconstructing events and activities that occurred on the network to
provide context and understanding of the incident.
· Documenting the entire process and preserving the chain of custody for
evidence.
· Presenting the findings in a clear, concise, and unbiased manner in a report
or court testimony.
· Following legal and ethical guidelines for handling digital evidence.
· Continuously updating the knowledge and skills to keep up with the latest
technology and trends in log analysis.
CYBER FORENSICS
10
CYBER FORENSICS
11
10.Order of Volatility.
Ans:
1. The order of volatility is a guideline used in digital forensics to prioritize the
collection and preservation of evidence based on its likelihood of being lost or
altered.
2. The order of volatility typically includes the following types of evidence:
· Volatile data: Evidence that exists in memory and is lost when the power is
turned off or the system is rebooted. Examples include RAM, cache, and
temporary files.
· Non-volatile data: Evidence that exists on storage devices and is not lost
when power is turned off. Examples include hard drives, flash drives, and
SD cards.
CYBER FORENSICS
12
11.Standard Procedure.
Ans:
1. Standard procedures refer to a set of established protocols and guidelines that are
followed in a specific field or industry to ensure consistency and accuracy in the
processes carried out.
2. Standard procedures in digital forensics include:
· Securing the crime scene to prevent contamination or alteration of
evidence
· Identifying and preserving the relevant data in a forensically sound manner
· Making a forensic copy of the digital data for analysis
· Analyzing the data using specialized software and techniques
· Documenting the entire process and preserving the chain of custody for
evidence
CYBER FORENSICS
13
CYBER FORENSICS
14
· Identifying the type and model of the device and its operating system
· Making a forensic image or copy of the device's storage using specialized
software and hardware
· Extracting relevant data from the device, such as call logs, contacts, text
messages, and media files
· Analyzing the data using specialized software and techniques
· Documenting the entire process and preserving the chain of custody for
evidence
· Presenting the findings in a clear, concise, and unbiased manner in a report
or court testimony
· Following legal and ethical guidelines for handling digital evidence
· Continuously updating the knowledge and skills to keep up with the latest
technology and trends in mobile device forensics
3. Some other considerations when acquiring evidence from cell phones and mobile
devices include:
· Ensuring that the device is powered off and the battery is removed before
acquisition to prevent data alteration
· Extracting data from the device's SIM card and any external storage devices,
such as SD cards
· Making note of any security measures on the device, such as passcodes or
fingerprints, and taking appropriate steps to bypass them
· Following the order of volatility and other standard procedures in digital
forensics
4. It's worth noting that acquiring evidence from cell phones and mobile devices
requires a high level of technical expertise and should be performed by trained and
certified professionals.
CYBER FORENSICS
15
Unit II
Internet Forensic :
13.Introduction to Internet Forensics.
Ans:
1. Internet forensics is the process of collecting, analyzing, and preserving digital
evidence from the internet in a legally admissible manner.
2. Standard procedures for internet forensics include:
· Identifying and documenting the internet infrastructure, including
websites, servers, and protocols.
· Collecting and analyzing digital evidence from the internet, such as web
pages, social media posts, and email messages.
· Identifying and tracking malicious activity, such as hacking attempts,
phishing scams, and online fraud.
· Reconstructing events and activities that occurred on the internet to
provide context and understanding of the incident.
CYBER FORENSICS
16
· Documenting the entire process and preserving the chain of custody for
evidence.
· Presenting the findings in a clear, concise, and unbiased manner in a report
or court testimony.
· Following legal and ethical guidelines for handling digital evidence.
· Continuously updating the knowledge and skills to keep up with the latest
technology and trends in internet forensics.
3. Internet forensics involves the use of various tools and techniques to collect and
analyze digital evidence from the internet, such as web scraping, metadata
analysis, and geolocation analysis.
4. Internet forensics is becoming increasingly important as more and more criminal
activities are taking place on the internet.
5. It's worth noting that internet forensics requires a high level of technical expertise
and should be performed by trained and certified professionals.
6. It's also important to note that Internet Forensics is a complex task and multiple
legal jurisdiction issues may arise when collecting evidence from the internet as
the location of the server or the person committing the crime may be in different
countries.
CYBER FORENSICS
17
· Malware: Malicious software, such as viruses, worms, and Trojans, that can
infect computers and mobile devices to steal data, spread malware, or
disrupt operations.
· Ransomware: Malware that encrypts a user's files and demands a ransom
payment to restore access to the data.
· Social engineering: Attempts to manipulate or deceive users into divulging
sensitive information or performing actions that are not in their best
interests.
· Distributed Denial of Service (DDoS) attacks: Attempts to overload a
website or network with traffic to make it unavailable to legitimate users.
· Advanced Persistent Threats (APT): Sophisticated, long-term cyber attacks
typically launched by state-sponsored actors or well-funded criminal
groups.
3. To protect against these World Wide Web threats, it's important to:
· Keep software and systems updated to fix security vulnerabilities
· Use anti-virus and anti-malware software and firewalls
· Use multi-factor authentication for sensitive accounts
CYBER FORENSICS
18
· Collecting and analyzing log files and other digital evidence to identify
patterns of suspicious activity
· Identifying the methods and techniques used to gain unauthorized access
· Reconstructing events and activities that occurred on the computer system
or network to provide context and understanding of the incident
· Identifying and tracking the individuals or groups responsible for the
hacking or illegal access
· Documenting the entire process and preserving the chain of custody for
evidence
· Presenting the findings in a clear, concise, and unbiased manner in a report
or court testimony
· Following legal and ethical guidelines for handling digital evidence
· Continuously updating the knowledge and skills to keep up with the latest
technology and trends in hacking and illegal access
4. It's worth noting that identifying and investigating hacking and illegal access
requires a high level of technical expertise and should be performed by trained and
certified professionals.
CYBER FORENSICS
19
CYBER FORENSICS
20
CYBER FORENSICS
21
2. Standard procedures for reconstructing past internet activities and events include:
· Identifying and documenting the internet infrastructure, including
websites, servers, and protocols
· Collecting and analyzing digital evidence, such as web pages, social media
posts, and email messages
· Identifying and tracking the individuals or groups responsible for the
activities or events
· Correlating data from different sources to provide a comprehensive view of
the activities or events
· Reconstructing the timeline of events and activities that occurred on the
internet
· Documenting the entire process and preserving the chain of custody for
evidence
· Presenting the findings in a clear, concise, and unbiased manner in a report
or court testimony
· Following legal and ethical guidelines for handling digital evidence
· Continuously updating the knowledge and skills to keep up with the latest
technology and trends in internet forensics
3. Reconstructing past internet activities and events can be used in various types of
investigations, such as cybercrime, fraud, intellectual property theft, and threat
intelligence.
4. It's worth noting that reconstructing past internet activities and events requires a
high level of technical expertise and should be performed by trained and certified
professionals.
5. It's also important to follow laws and regulations related to data privacy and digital
evidence, as the collection, analysis, and presentation of digital evidence must
comply with legal standards.
E-mail Forensics :
19.e-mail analysis.
CYBER FORENSICS
22
Ans:
1. E-mail analysis refers to the process of collecting, analyzing, and preserving e-mail
messages in a legally admissible manner as part of an investigation or litigation.
2. Standard procedures for e-mail analysis include:
· Identifying and documenting the e-mail infrastructure, including servers,
protocols, and accounts
· Collecting and analyzing e-mail messages, including headers, body content,
attachments, and metadata
· Identifying and tracking the individuals or groups responsible for the e-mails
· Reconstructing the timeline of e-mails and their relationship to other events
or activities
· Documenting the entire process and preserving the chain of custody for
evidence
· Presenting the findings in a clear, concise, and unbiased manner in a report
or court testimony
· Following legal and ethical guidelines for handling digital evidence
· Continuously updating the knowledge and skills to keep up with the latest
technology and trends in e-mail analysis
3. E-mail analysis can be used in various types of investigations, such as cybercrime,
fraud, intellectual property theft, and e-discovery in civil litigation.
4. E-mail analysis requires a high level of technical expertise and should be performed
by trained and certified professionals.
5. It's also important to follow laws and regulations related to data privacy and digital
evidence, as the collection, analysis, and presentation of digital evidence must
comply with legal standards.
6. It's also important to keep in mind that e-mails can be tampered with or fabricated,
so it's important to validate the authenticity of the e-mails being analyzed.
CYBER FORENSICS
23
CYBER FORENSICS
24
6. It's worth noting that identifying and investigating e-mail headers and spoofing
requires a high level of technical expertise and should be performed by trained and
certified professionals.
7. It's also important to follow laws and regulations related to data privacy and digital
evidence, as the collection, analysis, and presentation of digital evidence must
comply with legal standards.
CYBER FORENSICS
25
CYBER FORENSICS
26
CYBER FORENSICS
27
Browser Forensics:
24.Cookie Storage and Analysis.
Ans:
1. Cookies are small text files that are stored on a user's computer or mobile device
by a website to remember certain information, such as login credentials or
browsing preferences.
2. Cookie storage and analysis refers to the process of collecting, analyzing, and
preserving cookies as part of an investigation or litigation.
3. Standard procedures for cookie storage and analysis include:
CYBER FORENSICS
28
· Identifying and documenting the websites and web pages that have set the
cookies
· Collecting and analyzing cookies, including their content, expiration date,
and source
· Identifying and tracking the individuals or groups responsible for setting the
cookies
· Reconstructing the timeline of events and activities that occurred on the
website
· Documenting the entire process and preserving the chain of custody for
evidence
· Presenting the findings in a clear, concise, and unbiased manner in a report
or court testimony
· Following legal and ethical guidelines for handling digital evidence
· Continuously updating the knowledge and skills to keep up with the latest
technology and trends in cookie storage and analysis
4. Cookie storage and analysis can be used in various types of investigations, such as
cybercrime, fraud, intellectual property theft, and e-discovery in civil litigation.
5. It's worth noting that cookie storage and analysis requires a high level of technical
expertise and should be performed by trained and certified professionals.
6. It's also important to follow laws and regulations related to data privacy and digital
evidence, as the collection, analysis, and presentation of digital evidence must
comply with legal standards.
CYBER FORENSICS
29
Ans:
1. Cache and temporary internet files are types of data that are stored on a computer
or mobile device by web browsers to speed up the loading of frequently visited
websites.
2. Analyzing cache and temporary internet files refers to the process of collecting,
analyzing, and preserving this type of data as part of an investigation or litigation.
3. Standard procedures for analyzing cache and temporary internet files include:
· Identifying and documenting the web browsers and devices that have
stored the data
· Collecting and analyzing cache and temporary internet files, including their
content, expiration date, and source
· Identifying and tracking the individuals or groups responsible for creating or
accessing the data
· Reconstructing the timeline of events and activities that occurred on the
device or computer
· Documenting the entire process and preserving the chain of custody for
evidence
· Presenting the findings in a clear, concise, and unbiased manner in a report
or court testimony
· Following legal and ethical guidelines for handling digital evidence
· Continuously updating the knowledge and skills to keep up with the latest
technology and trends in cache and temporary internet files analysis
4. Analyzing cache and temporary internet files can be used in various types of
investigations, such as cybercrime, fraud, intellectual property theft, and e-
discovery in civil litigation.
5. It's worth noting that analyzing cache and temporary internet files requires a high
level of technical expertise and should be performed by trained and certified
professionals.
CYBER FORENSICS
30
6. It's also important to follow laws and regulations related to data privacy and digital
evidence, as the collection, analysis, and presentation of digital evidence must
comply with legal standards.
7. It's also important to keep in mind that cache and temporary internet files can be
deleted or overwritten by the user or the system, so it's important to act quickly
and gather evidence as soon as possible.
CYBER FORENSICS
31
· Continuously updating the knowledge and skills to keep up with the latest
technology and trends in web browsing activity reconstruction
3. Web browsing activity reconstruction can be used in various types of
investigations, such as cybercrime, fraud, intellectual property theft, and threat
intelligence.
4. It's worth noting that web browsing activity reconstruction requires a high level of
technical expertise and should be performed by trained and certified professionals.
5. It's also important to follow laws and regulations related to data privacy and digital
evidence, as the collection, analysis, and presentation of digital evidence must
comply with legal standards.
6. It's also important to keep in mind that web browsers can have different settings,
features and ways of storing data and that it's important to have knowledge of
those particularities when conducting the analysis.
CYBER FORENSICS
32
Unit III
Investigation, Evidence presentation and Legal aspects of Digital
Forensics:
CYBER FORENSICS
33
· Continuously updating the knowledge and skills to keep up with the latest
technology and trends in evidence collection
3. It's worth noting that obtaining authorization to collect evidence requires a high
level of technical expertise and should be performed by trained and certified
professionals.
4. It's also important to follow laws and regulations related to data privacy and digital
evidence, as the collection, analysis, and presentation of digital evidence must
comply with legal standards.
5. It's also important to keep in mind that different types of evidence may have
different legal requirements for collection, such as the requirement of a warrant,
and that it's important to be aware of those requirements to avoid any legal issues.
6. Also, it's important to keep in mind that the method of obtaining authorization to
collect evidence may vary depending on the jurisdiction.
CYBER FORENSICS
34
· Continuously updating the knowledge and skills to keep up with the latest
technology and trends in evidence collection
3. Authentication of evidence refers to the process of verifying the integrity,
authenticity and reliability of digital evidence.
4. Standard procedures for authenticating evidence include:
· Identifying and documenting the evidence to be authenticated
· Determining the legal basis for the authentication
· Preparing a detailed plan for the authentication
· Examining the evidence for signs of tampering, alteration or forgery
· Comparing the evidence with known standards
· Verifying the origin and integrity of the evidence
· Documenting the entire process and preserving the chain of custody for
evidence
· Following legal and ethical guidelines for handling digital evidence
· Continuously updating the knowledge and skills to keep up with the latest
technology and trends in evidence authentication
5. It's worth noting that both, acquiring evidence and authenticating it, require a high
level of technical expertise and should be performed by trained and certified
professionals.
CYBER FORENSICS
35
· Preparing a detailed plan for the analysis, including the scope, methods, and
resources required
· Applying appropriate analytical techniques and tools, such as forensic
software, to extract and interpret data
· Examining the evidence for signs of tampering, alteration or forgery
· Comparing the evidence with known standards
· Verifying the origin and integrity of the evidence
· Identifying and tracking individuals or groups involved in the activities or
events under investigation
· Reconstructing the timeline of events and activities
· Documenting the entire process and preserving the chain of custody for
evidence
· Presenting the findings in a clear, concise, and unbiased manner in a report
or court testimony
· Following legal and ethical guidelines for handling digital evidence
· Continuously updating the knowledge and skills to keep up with the latest
technology and trends in evidence analysis
3. It's worth noting that analysis of evidence requires a high level of technical
expertise and should be performed by trained and certified professionals.
4. It's also important to follow laws and regulations related to data privacy and digital
evidence, as the collection, analysis, and presentation of digital evidence must
comply with legal standards.
5. It's also important to keep in mind that different types of evidence may have
different legal requirements for analysis and that it's important to be aware of
those requirements to avoid any legal issues.
6. It's also important to keep in mind that the method of analysis may vary depending
on the type of evidence and the aim of the investigation.
CYBER FORENSICS
36
CYBER FORENSICS
37
6. It's also important to keep in mind that the method of reporting may vary
depending on the aim of the investigation, such as a court case, internal
investigation or threat intelligence.
31.Testimony.
Ans:
1. Testimony refers to the process of giving oral or written evidence in a court of law
or other legal proceeding.
2. Standard procedures for testimony include:
· Preparing a detailed statement or report of the evidence and findings
· Reviewing and practicing the testimony with a lawyer or other
representative
· Being familiar with the facts, evidence, and applicable laws and regulations
· Being able to explain technical concepts and procedures in a clear and
understandable manner
· Being able to answer questions clearly and honestly
· Being able to remain impartial and unbiased
· Being able to respond to challenges or objections to the evidence or
testimony
· Being able to maintain the chain of custody and integrity of the evidence
· Following legal and ethical guidelines for handling digital evidence
· Continuously updating the knowledge and skills to keep up with the latest
technology and trends in forensic testimony
CYBER FORENSICS
38
3. It's worth noting that giving testimony requires a high level of technical expertise
and should be performed by trained and certified professionals.
4. It's also important to follow laws and regulations related to data privacy and digital
evidence, as the collection, analysis, and presentation of digital evidence must
comply with legal standards.
5. It's also important to keep in mind that different types of legal proceedings may
have different requirements for testimony and that it's important to be aware of
those requirements to avoid any legal issues.
6. It's also important to keep in mind that the method of giving testimony may vary
depending on the jurisdiction and the type of legal proceeding.
CYBER FORENSICS
39
CYBER FORENSICS
40
6. The act also provides for the establishment of a Computer Emergency Response
Team (CERT-In) to respond to and handle cyber security incidents.
7. The IT Act also provides for the regulation of intermediaries, such as internet
service providers (ISPs) and social media platforms, to ensure compliance with the
Act and to protect the rights of users.
8. The act also regulates the collection, storage and handling of sensitive personal
data or information.
9. The IT Act is regularly amended to keep up with the latest trends and
developments in digital technology and the internet.
10. It's important to note that the IT Act is a dynamic and constantly evolving
legislation, and it's important to stay updated with the latest amendments and
regulations to ensure compliance.
CYBER FORENSICS
41
CYBER FORENSICS
42
5. Evaluate the effectiveness of the response and investigation, including the actions
taken by law enforcement and the measures implemented to prevent similar
crimes from happening in the future.
6. Identify the key lessons learned from the case and the best practices that can be
applied to prevent or respond to similar cybercrime cases.
7. Understand the factors that made the organization vulnerable to the attack and
what could have been done to prevent the attack.
8. Understand the legal requirements for handling digital evidence in cybercrime
cases and the process of collecting, analyzing and reporting the evidence.
9. Understand the legal and ethical guidelines for handling digital evidence, and the
legal requirements for expert testimony.
10. Continuously update your knowledge and skills to keep up with the latest
technology and trends in cybercrime and digital forensics.
11. Understand the importance of collaboration between different organizations and
agencies in dealing with cybercrime cases.
12. Understand the importance of public awareness and education in preventing
cybercrime.
CYBER FORENSICS