Unit 1
Unit 1
UNIT 1
INTRODUCTION
1
SUBJECT OBJECTIVE
Explain the process of investigating Computer Crime.
Perform initial decision making process.
Assess the situation
Notify decision makers and acquire authorisation.
Review policies and laws related to forensics investigation
process.
Acquire and Analyse the data.
Report the investigation.
INTRODUCTION
There is no doubt that those who commit crimes are aware about
the evolution of Information Technology.
It also includes the analysis of images, videos, and audio (in both
analog and digital format).
1. Criminal investigations
3. Intelligence
4. Administrative matters.
1. CRIMINAL INVESTIGATIONS
Digital forensics in the context of a criminal investigation as electronic
evidence can be found in almost any criminal investigation as Homicide,
sexual assault, robbery, child pornography, identity theft and burglary.
In January 2005, Rader left a note for police, hidden in a cereal box in
the back of pickup truck belonging to a Home Depot employee. In the
note, he said:
CONTINUE..
“Can I communicate with Floppy and not be traced to a computer. Be
honest. Under Miscellaneous Section, 494, (Rex, it will be OK), run it
for a few days in case I’m out of town-etc. I will try a floppy for a test
run some time in the near future-February or March.”
2. CIVIL LITIGATION
The use of digital forensics in civil cases (litigation is big
business.
1. Computer Systems.
2. Storage Devices.
3. Handheld Devices.
4. Peripheral Devices.
5. Network Devices.
Irrespective of the size and type, these above mentioned devices might
be contain evidence that is crucial to an investigation like image files,
documents, financial records , e-mail attachments etc.
DIGITAL DEVICES FOR EVIDENCES
(TYPES OF DATA)
1. Computer Systems:-
5. Network Devices:-
In the networking devices, there are lot of evidences which can
be obtained from the internet such as information collected
from website communication, emails, message boards, chat
rooms, file sharing networks and intercepted communications.
1. Memory Forensics
2. Disk Forensics.
3. Network Forensics.
4. Mobile Phone Forensics.
5. Database Forensics.
6. Photo Forensics.
7. Printer Forensics.
8. Multimedia Forensics.
DIFFERENT BRANCHES OF DIGITAL FORENSICS
1. Memory Forensics:- (Memory Analysis)
It is the most important branch which relates to incidence
response is memory forensics which refers to the analysis of
volatile data in a computer’s memory dump.
2. Disk Forensics:-
It is the science of extracting forensics information from digital
storage like in Hard Disk, USB device, CD, DVD, Flash Drives,
Floppy disk etc.
DIFFERENT BRANCHES OF DIGITAL FORENSICS
3. Network Forensics:-
It is a branch of digital forensics that focus on the monitoring
and analysis of network traffic, it involves the process of gathering
and examining the raw data of network and systematically tracking
and monitoring traffic of network to make sure of how an attack
took place.
N/W Forensics will help in identifying unauthorized access to
computer systems and networks and searches for evidence if it will
happen or in other words N/W Forensics attempt to ascertain how
attack was carried out or how an event occurred on a network.
DIFFERENT BRANCHES OF DIGITAL FORENSICS
4.Mobile Phone Forensics:-
It is relating to recovery of digital evidence or data from a
mobile devices under forensically sound conditions.
5. Database Forensics:-
It is a branch of digital forensics science relating to the forensics
study of databases and their related metadata. The discipline is
similar to computer forensics, following the normal forensics
process and applying investigative techniques to database contents
and metadata.
DIFFERENT BRANCHES OF DIGITAL FORENSICS
6. Printer Forensics:-
The chain of custody accounts for each evidence item from the
time it’s collected to the time it’s presented in court (should that
become necessary).
Reports can (and do) take many forms. Some are quite long and
detailed (reaching over 100 pages or more). Others are less so
(even as few as one or two pages).
One major issue with reports generated by the tools is that they
are quite often very technical.
The same holds true in digital forensics. Registry keys and log files
can serve as the digital equivalent to hair and fiber.
As with DNA, our ability to detect and analyze these artifacts relies
heavily on the technology available at the time.
LOCARD’S EXCHANGE PRINCIPLE
Look at the numerous cold cases that are being solved now as a
result of the significant advances in DNA science.