Unit II Cyber Security
Unit II Cyber Security
Cyber Forensics
Cyber forensics is a process of extracting data as
proof for a crime (that involves electronic devices)
while following proper investigation rules to nab
the culprit by presenting the evidence to the court.
Email Authentication:
Sender Verification: Email forensics helps verify the authenticity of
an email sender. Techniques like Domain Keys Identified Mail
(DKIM) and Sender Policy Framework (SPF) are used to prevent
email spoofing and phishing.
Recovery of Deleted Emails:
In some cases, deleted emails may be critical evidence.
Email forensics experts can use specialized software to
recover these messages.
Chain of Custody:
A chain of custody is the process of validating how
evidences have been gathered, tracked, and protected on
the way to the court of law. Forensic professionals know
that if you do not have a chain of custody, the evidence is
worthless.
Applications of Email Forensics
Email forensics plays a pivotal role in various domains:
Legal Investigations: Email evidence is frequently used in legal
cases, including criminal, civil, and corporate disputes. It can help
establish motives, timelines, and the authenticity of communications.
Identification
The first step in the digital forensics lifecycle is identification. This
stage involves recognizing and determining potential sources of
digital evidence. During this phase, forensic investigators identify
devices, data, and relevant information that might be pertinent to the
investigation. Common sources include computers, mobile devices,
servers, cloud storage, and network logs.
Preservation
Once potential evidence is identified, the next step is preservation.
This involves securing and preserving the integrity of the digital
evidence to prevent tampering, alteration, or destruction. Chain of
custody protocols are established to maintain a detailed log of who
handled the evidence and when.
Collection
The collection phase involves the systematic gathering of digital
evidence from identified sources. This step requires careful handling
to ensure that data is collected in a forensically sound manner
without altering the original evidence.
Examination
During the examination phase, forensic experts scrutinize the
collected evidence to identify relevant information. This involves
using specialized tools and techniques to recover deleted files,
analyze metadata, and uncover hidden data.
Analysis
The analysis phase is where the extracted and examined data is
interpreted to draw meaningful conclusions. This involves
correlating findings with the context of the investigation, identifying
patterns, and reconstructing events.
Presentation
In the presentation phase, the findings are compiled into a clear,
concise, and understandable format for stakeholders, such as law
enforcement, legal professionals, or corporate management. This
may include written reports, visualizations, and expert testimony.
Data Analytics
Data analytics is the study of comprehensive data sets to
find patterns and irregularities for further investigation,
and research and to provide audit evidence. This tool is
majorly used to analyze data from the entire population.
Data Mining Techniques
Assisted examination techniques, known as data mining,
are used to automatically comb enormous amounts of data
for new, obscure, or unexpected information systems or
patterns.
Reporting
After carrying out all necessary steps during the forensic
audit, the customer will receive a written report on the
fraud with all necessary in-depth information on the audit,
enabling users to move forward with filing a legal
complaint.