0% found this document useful (0 votes)
24 views18 pages

Digital Forensics Process

Uploaded by

mahvishshaikh812
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views18 pages

Digital Forensics Process

Uploaded by

mahvishshaikh812
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

DIGITAL FORENSICS PROCESS

• Preparation and identification of digital evidence


• In order to be processed and analysed, evidence must first be
identified. It might be possible that the evidence may be
overlooked and not identified at all. A sequence of events in a
computer might include interactions between:
• Different files
• Files and file systems
• Processes and files
• Log files

• In case of a network, the interactions can be between devices in
the organization or across the globe (Internet). If the evidence is
never identified as relevant, it may never be collected and
processed.
• Collection and recording digital evidence
• Digital evidence can be collected from many
sources. The obvious sources can be
• Mobile phone
• Digital cameras
• Hard drives
• CDs
• USB memory devices

• Non-obvious sources can be:
• Digital thermometer settings
• Black boxes inside automobiles
• RFID tags
• Proper care should be taken while
handling digital evidence as it can be
changed easily. Once changed, the
evidence cannot be analysed further. A
cryptographic hash can be calculated
for the evidence file and later checked if
there were any changes made to the file
or not. Sometimes important evidence
might reside in the volatile memory.
Gathering volatile data requires special
technical skills.
• Storing and transporting digital evidence
• Some guidelines for handling of digital evidence:
• Image computer-media using a write-blocking tool
to ensure that no data is added to the suspect
device
• Establish and maintain the chain of custody
• Document everything that has been done
• Only use tools and methods that have been
tested and evaluated to validate their accuracy
and reliability
• Care should be taken that evidence
does not go anywhere without properly
being traced.
• Sometimes evidence must be
transported from place to place either
physically or through a network. Care
should be taken that the evidence is not
changed while in transit. Analysis is
generally done on the copy of real
evidence. If there is any dispute over
the copy, the real can be produced in
court.
• Examining or investigating digital evidence
• Forensics specialist should ensure that
he/she has proper legal authority to
seize, copy and examine the data. As a
general rule, one should not examine
digital information unless one has the
legal authority to do so. Forensic
investigation performed on data at rest
(hard disk) is called dead analysis.
• Many current attacks leave no trace on
the computer’s hard drive. The attacker
only exploits the information in the
computer’s main memory. Performing
forensic investigation on main memory
is called live analysis. Sometimes the
decryption key might be available only
in RAM. Turning off the system will erase
the decryption key. The process of
creating and exact duplicate of the
original evidence is called imaging
• Analysis, interpretation and attribution
• In digital forensics, only a few sequences of
events might produce evidence. But the
possible number of sequences is very huge.
The digital evidence must be analyzed to
determine the type of information stored on it.
Examples of forensics tools:
• Forensics Tool Kit (FTK)
• EnCase
• Scalpel (file carving tool)
• The Sleuth Kit (TSK)
• Autopsy
• Forensic analysis includes the following
activities:
• Manual review of data on the media
• Windows registry inspection
• Discovering and cracking passwords
• Performing keyword searches related to
crime
• Extracting emails and images
• Types of digital analysis:
• Media analysis
• Media management analysis
• File system analysis
• Application analysis
• Network analysis
• Image analysis
• Video analysis
• Reporting: After the analysis is done, a
report is generated. The report may be
in oral form or in written form or both.
The report contains all the details about
the evidence in analysis, interpretation,
and attribution steps. As a result of the
findings in this phase, it should be
possible to confirm or discard the
allegations. Some of the general
elements in the report are:
• Identity of the report agency
• Case identifier or submission number
• Case investigator
• Identity of the submitter
• Date of receipt
• Date of report
• Descriptive list of items submitted for examination
• Identity and signature of the examiner
• Brief description of steps taken during examination
• Results / conclusions
• Testifying:This phase involves
presentation and cross-examination of
expert witnesses. An expert witness can
testify in the form of:
• Testimony is based on sufficient facts or
data
• Testimony is the product of reliable
principles and methods
• Witness has applied principles and
methods reliably to the facts of the case
PRECAUTIONS TO BE TAKEN WHEN
COLLECTING ELECTRONIC EVIDENCE
• No action taken by law enforcement agencies or
their agents should change the evidence
• When a person to access the original data held on
a computer, the person must be competent to do
so
• An audit trial or other record of all processes
applied to digital evidence should be created and
preserved
• The person in-charge of the investigation has
overall responsibility for ensuring that the law and
these are adhered to
CHALLENGES IN COMPUTER FORENSICS
• Networks span multiple time zones and multiple
jurisdictions
• Network data will be available offline and online (real-
time)
• Real-time data requires ability to capture and analyze data
on the fly
• The data may involve different protocols
• The data may be huge due to increasing bandwidth
• A protocol might also involve multiple layers of signal
(VoIP, HTTP tunneling)
• Current forensic tools will not be able to handle real-time
data and huge amount of data
TECHNICAL CHALLENGES
• The two challenges faced in a digital forensic
investigation are complexity and quantity. The
complexity problem refers to the data collected being at
the lowest level or in raw format. Non-technical people
will find it difficult to understand such data.

• Tools can be used to transform the data from low level
format to readable format. The quantity problem refers
to the amount of data that needs to be analyzed. Data
reduction techniques can be used to group data or
remove known data. Data reduction techniques include:
• Identifying known network packets using IDS signatures
• Identifying unknown entries during log processing
• Identifying known files using hash databases
• Sorting files by their types
LEGAL CHALLENGES
• Digital evidence can be tampered easily, sometimes, even
without any traces. It is common for modern computers to
have multiple gigabyte sized disks. Seizing and freezing of
digital evidence can no longer be accomplished just by
burning a CD-ROM. Failure to freeze the evidence prior to
opening files has invalidated critical evidence.

• There is also the problem of finding relevant evidence within
massive amounts of data which is a daunting task. The real
legal challenges involve the artificial limitations imposed by
constitutional, statutory and procedural issues. There are
many types of personnel involved in digital/computer
forensics like technicians, policy makers, and professionals.

You might also like