Unit-4 CS
Unit-4 CS
Now that you understand what is digital forensics, let’s look at its steps:
Identification
This is the initial stage in which the individuals or devices to be analyzed are
identified as likely sources of significant evidence.
Preservation
Analysis
Documentation
These are tried-and-true procedures for documenting the analysis's conclusions, and
they must allow other competent examiners to read through and duplicate the results.
Knowing the primary objectives of using digital forensics is essential for a complete
understanding of what is digital forensics:
It aids in determining the motive for the crime and the identity of the primary
perpetrator
Creating procedures at a suspected crime scene to help ensure that the digital
evidence obtained is not tainted
Data acquisition and duplication: The process of recovering deleted files and
partitions from digital media in order to extract and validate evidence
Assists you in quickly identifying evidence and estimating the potential impact
of malicious activity on the victim
As digital data forensics evolves, several sub-disciplines emerge, some of which are
listed below:
Computer Forensics
It analyzes digital evidence obtained from laptops, computers, and storage media to
support ongoing investigations and legal proceedings.
Network Forensics
Network or cyber forensics depends on the data obtained from monitoring and
analyzing cyber network activities such as attacks, breaches, or system collapse
caused by malicious software and abnormal network traffic.
This sub-specialty focuses on the extraction and analysis of digital images to verify
authenticity and metadata and determine the history and information surrounding
them.
Memory Forensics
It refers to the recovery of information from a running computer's RAM and is also
known as live acquisition.
Email Forensics
The reason email forensics come into part of the digital forensics investigation is due
to the massive and common use of emails among people nowadays.
People’s using email to communicate with their friends, schoolmates, colleagues and a
variety of people. Hence, numerous data and information is transmitted across its use
and meanwhile some of those are illegal not surprisingly just like what other common
communication approach, e.g. mobile phone, has happened as well when it was
popularized to certain extend.
In fact, it’s already a severe public concern that a majority of criminals are using email
for their crime committed in recent years, especially when it comes to cyber security
and digital crime. Not only that, increasingly noncomputer crimes and even civil
litigation, has been related to emails.
That’s being said, we do want to unveil the operation theory of email and thus
extract email related crimes via email forensics to bring the criminals to justice.
Email messages
Email addresses(sender and recipient)
IP addresses
Date and time
User information
Attachments
Passwords
logs (Cloud, server, and local computer)
To deeply and overall investigate the above crucial elements of email, potential clues
are going to be obtained to help push the progress of a criminal investigation.
Hence, knowing how to conduct scientific and effective email forensics has come into
account.
But before diving deep into practical email forensics, without a full understanding of
the operation and theory of emails themselves, the forensic work is likely to be stuck.
Engagement contract
Non-Disclosure Agreement (NDA)
Authorization
Confidentiality
Payment
Consent and acknowledgement
Limitation of liability
Social networking site is defined as web-based services that allow individuals to:
Create a public or semi-public profile
Search or navigate through a list of users with whom they share a common
connection
View connections of other users
Although social networking sites have their uses, there are several associated
security threats. The concerns regarding social networking sites are:
Does the social networking site violate people’s intellectual property rights
Whether these sites infringe the privacy of their own users
Whether these sites promote fraudulent and illegal activities
Content preservation can be challenging given the dynamic, short-lived and often
multi-format nature of social media. There is generally no control over the content
posted on social media networking sites. High level of forensic skill is required to
analyze and quantify the preserved data to answer questions such as: