Digital Forensics
Digital Forensics
Syllabus
Understanding of forensic science, digital forensic, The digital forensic process, Locard'
exchange principle, Scientific models.
Contents
1.1 Understanding of Forensic Science
1.2 Digital Forensic Winter-21, Marks 3
1.3 Locard's Exchange Principle .Winter-21,. Marks 7
1.4 Scientific Models
(1-1)
1-2 Introduction
1-3 Introduction
Digital Forensics Digital Forensics
identification, and evaluation of physical evidence. It has become an essential part 1. The evidence is acquired without altering it;
of the judicial system. 2. Demonstrably so;
Forensic scientists perform both physical and chemical analyses on physical 3. Analysis is conducted in an accountable and repeatable way
evidence obtained by investigators and law enforcement officials at the
crime scene
Digital forensic processes, hardware and software have been designed to ensure
crime scene. These scientific experts use microscopic examining techniques, compliance with these requirements. The process of digital forensics is typically as
and reference
complex instruments, mathematical principles, scientific principles, follows:
literature to analyze evidence as to identify both class and individual 1. Preservation of the state of the device.
characteristics. 2. Survey and analysis of the data for evidence.
to be
Any information stored on a digital media can be piece of digital evidence 1. When dealing with digital evidence, all of the general forensic and procedural
analyzed during digital forensic process.
principles must be applied.
Computer forensics is the scientific examination and analysis of data held on or
retrieved from, computer staorage media in such a way that the information can be 2. Upon seizing digital evidence, actions taken should not change that evidence.
used as evidence in a court of law. 3. When it is necessary for a person to access original digital evidence, that person
should be trained for the purpose that person should be trained for the purpose.
Investigative process of digital forensics can be divided into several stages. Four
major stages are: Preservation, collection, examination and analysis. 4. All activity relating to the seizure, access, storage or transfer of digital evidence
involves operations such as preventing people from using computers during Extra Review
email and browser
the safest way to
collection, stopping ongoing deletion processes and choosing attachments history files
Preparation of data
collect information.
information
stage consists in finding and collecting digital Perform Review data
2. Collection: Collection Create Review
statistical data collected
information means
that may be relevant to the investigation. Collection of digital
file installed
partition table during
ists applications
collection of the equipment containing the information or recording
the file systems ive response
.Computer forensics is the task of recovering data that users have hidden or Perform Perform
is valid so that it can be
file-by-fle specialisedd
deleted, with the goal of ensuring that the recovered data review analysis
used as evidence.
The computer investigations group manages investigations and conducts forensic Fig. 1.2.1 Forensics analysis
analysis of systems suspected of containing evidence related to an incident or a
crime. Investigative process of digital forensics can be divided into several stages. Four
For complex casework, the computer investigations group draws on resources major stages are: Preservation, collection, examination and analysis.
from those involved in vulnerability assessment, risk management and network Computer forensics activities commonly include
intrusion detection and incident response. This group resolves or terminates all a. The secure collection of
computer data.
case investigations. b. The identification of
suspect data.
Digital forensic investigation: A process that uses science and technology to C. The examination of suspect data to determine details such as origin and
examine
into
digital objects and that developsabout
court of law, to
and tests theories, which can be entered content.
a answer
questions
events that occurred.
TECHNICAL PUBLICATIONS an
up-thrust for knowiedge
TECHNICAL PUBLICATIONS an up-thrust for knowledge
1-6
Introduction
Digital Forensics Digital Forensics 1-7 Introduction
of law.
information to courts
d. The presentation of computer-based .This basic principle is that "every contact leaves a trace". Thus NO perpetrator can
country's laws to computer practice. leave the scene without leaving a trace. Fingerprints, gunshot residue or blood are
e. The application of a
GTU Winter-21, Marks 3 of each webpage. Third of all, user browser keeps a history of all the pages user
1. What is Digitalforensics?
have visited which it uses to offer you a list of completions of the URL you're
1.3 Locard's Exchange Principle GTU : Winter-21
currently typing
Edmond Locard was an important forensic scientist of the 19th century. In forensic
science, Locard's exchange principle holds that the perpetrator of a crime will
University Question
bring something into the crime scene and leave with something from it, and that 1. Explain Locard's Exchange Principle with suitable scenario. .GTU: Winter-21, Marks 7
both can be used as forensic evidence.
He formulated the basic principle of forensic science as: "very contact leaves a 1.4 Scientific Models
trace". It is generally understood as "with contact between two items, there will be
Scientific models are developed as a means of helping people understand scientific
an exchange."
concepts and representing them in a visual medium. Models are used to make
predictions. They may include physical and digital models, which can be refined
over time by the inclusion of new scientific knowledge.
TECHNICAL PUBLICATIONS an up-thrust for knowledge TECHNICAL PUBLICATIONS an up-thrust for knowledge
1-8 Introduction
Digitel Forensics Digital Forensics
1-9 Introduction
AAFS members are 6,600+ represent all 50 United States and 71 other countries.
Membership is comprised of pathologists, attorneys, dentists, toxicologists,
anthropologists, document examiners, digital evidence experts, psychiatrists,
and others.
engineers, physicists, chemists, criminalists, educators, researchers,
AAFS provides
a) Leadership to advance science and its application to the legal system
TECHNICAL PUBLICATIONS an up-thrust for knowledge TECHNICAL PUBLICATIONS an up-thrust for knowledge
1-110 Introduction
Digital Forensics
Notes
Understanding
2 of the Technical Concepts
Syllabus
Basic computer organization, File system, Memory orgamization concept, Data storage concepts.
Contents
2.1 Basic Computer Organization.............. Winter-21 Marks 3
22 Flynn's Classificationof Computers...... Winter21 Marks 4
2.3 File System
2-2 Concepts
Digital Forensies
GTU: Winter-21 Digitel Forensics Understanding of the Technical Concepts
Organization
2.1 Basic Computer that are combinodd to
software
hardware
device and 3. VO modules : These modules are used for moving data between computer and
consists of
Computer system its external environment. The external environment consists of variety of
a tool to user for solving problems.
provide devices, including secondary memory devices, communication equipmene's and
Fig 2.1.! shows modern computer system. terminals.
4.System bus : It provides for communication among processors, main memory
CD ROM and 1/O modules.
Hard disk Display
CPU and device controller use memory cycle for execution purposes. But memory
cycle is only available to one device at a time.
Graphics Bootstrap program is loaded when user start the computer. It initializes all the
Disk controller
adapter device connected to the computer systern and then loads required device drivers.
Central
processin9 After this, operating system loads in the computer systerm. In UNX OS, an 'init' is
unit
the first process which execute by OS.
Computer system consists of CPU, memory and I/0 devices with one or more Storage devices are used to store data while the computer is off. Device controller
modules of each type. These all components are interconnected. Common bus is
manage the data transfer between peripheral device and its controller. Device
used for communication between these devices. Each device has its own device
driver is handled by device controller.
controller.
Main structural elements are as follows 2.1.1 Control Unit
1. Central processing unit: CPU controls the operation of the computer. It
is the main component of a Central Processing Unit (CPU) in
performs processing function.
data The control unit
computers that can direct the operations during the execution of a program by the
2. Main memory: Used for storing programsand data. The memory is typicaly processor / computer.
volatile. Main memory is also referred as primary memory or real memory, Central Processing Unit has three main parts which are the Arithmetic Logic Unit
User program and data are stored in the main memory. Main memory 15 (ALU), the Control Unit (CU), and the Memory Unit. The control unit is an
volatile, so it can not stored permanently.
important component of the CPU. It directly controls the functions of the memory
urit, the ALU and the input and output devices.
TECHNICAL PUBLICATIONS an up-thrust for knowledge
TECHNICAL PUBLICATIONS an up hrust for knowledge
Understanding of
the Technical
2-4
Concepts Digital Forensics
2-5 Understanding of the Technical Concepts
Digital Forensics
unit of computer
2.1.2 shows block diagram of control S Single
Fig.
I= Instruction Stream
Instructor register M Multiple
D Data Stream
stages. Fig. 2.2.3 shows SISD. Instructions are broadcast globally by a single control unit. There is single control
Primary thread, single program.
Data
Instruction memory
. input
Output
Controllerstreamn CPU Stream
.Every processor must be allowed to completeits instruction before the next
instruction is taken for execution. So, the execution of instructions is synchronous.
A n array or matrix is also processed in SIMD. Vector computer and array
processors are examples of SIMD.
Fig. 2.2.3 SISD
level parallelism.
There is no instruction level parallelism and data 2.2.3 Multiple Instructions and Single Data Stream
Amdhal 470/6 which has
which supports vector processing and
Examples: Cray-1 .Multiple instruction streams in parallel operating on single instruction stream. Not
pipelined instruction processing.
commonly used. Systolic array is one example of MISD architecture.
Instruction and Multiple Data Streams .Uncommon architecture which is generally used for fault tolerance.
2.2.2 Single
single instruction stream. The I n the MISD category, the same stream of data flows through a linear
There are multiple data streams in parallel with a
TECHNICAL PUBLICATIONS an up-thrust for knowledge TECHNICAL PUBLICATIONS an up-thrust for knowledge
2-8
Understanding of he
Technical Concepts
- -
memory and do that any other procesor can do. Fig. 22.7 shows
Interconnection network
can anything
UMA.
CPU
Interconnection network
CPU
a D
Update unit
Data
Tokens
s5: Operation
Packets
Fetch unit
TECHNICAL PUBLICATIONS an up-thrust for knowledge TECHNICAL PUBLICATIONS an up-thr:st for knowledge
of the Technical
2-14
Understanding oncepts
Digital Forensics Digital Forensics 2- 15 Understanding of the Technical Concepts
of the dynamic«dataflow model The demand-driven approach matches naturally with functional programming8
executable
A n actor is considered
rganization
2.2.12 shows basic
identical tags. Fig. languages
.Operations are executed only when their results required by another instruction in
Matching unit
demand driven model. So because of this reason it is called lazy evaluation.
Data
Tokens 2.2.8 Difference between SIMD and MIMD
www.wwmwaroenmaaewenwwwww.wwweeoeno
*** **
2.2.7 Demand-driven Computation The DOS and Windows file systems use fixed-size clusters. Even if the actual data
I n demand-driven computation, each processor assigns a task to perform and is being stored requires less storage than the cluster size, an entire cluster is reserved
for the file. This unused space is called the slack space.
responsible for all computaions related to those tasks. Demand-driven machines
also known as reduction machines. A cluster, also knouwn as an allocation unit, consists of one or more sectors of storage
It space and represents the minimum amount of space that an operating system
top-down approach for instruction execution. In a reduction machine, the
uses
computation is triggered by the demand for an operation's result. allocates when saving the contents of a file to a disk.
Time
Cluster Arc R/0 Sys Hid Dir ol Directories are treated in NTFS as index entries and store folder entries in a B-Tree
F i l e n a e Ext Sie Date
to access and facilitate
dge
12-05-90
12-0390
11:19
2 z pm
am
accelerate
encoding scheme called unicode.
resorting when entries are deleted. NTFS uses an
plus 4 bit reserved field used to identify the cluster. File content Un-initialized space File slack
Valid data length
2.3.2 Network File System
Master file table is the heart of NTFS. The MFT is an array of file records. Each
is for the MFT itself. The name of
Logical size
record is 1024 bytes. The first record in the MFT
MFT are reserved for metadata files.
the MFT is $MFT. The first 16 records in the Physical size
A n MFT big
can volume used to have lots of files that were deleted.
be too if a
in the MFT. These holes are
The files that were deleted cause internal holes Fig. 2.3.6 File with logical size
reclaim this space.
that are unused by files. It is impossible to
significant regions
live NTFS volume.
Fig. 2.3.7 shows the behavior of the Microsoft NTFS driver as an INDX record is
This is at least true on a
deleted. When the driver removes INDX record "F", it shifts the records "G" and
Fig. 2.3.5 shows NTFS Partition. "H" to fill the space. As the contents of record "H" shift, a recoverable
added to the MFT and so copy
A s files are added to an NTFS volume, more entries are (inactive record "H ") remains in the newly expanded slack space.
the MFT increases in size. When files are deleted from an NTFS volume, their
TECHNICAL PUBLICATIONS an up-thrust for knowledge
TECHNICAL PUBLICATIONS an up-thrust for knowledge
Understanding of the Technical Concepts
2- 20 Digitel Forenslcs 2-21 Understanding of the Technical Concepts
Digital Forensics
interference
existing
between programs
used to avoid program. Normally all operating system uses execution time binding Special
Memory protection is hardware compares
every memory addrese
protection hardware is used for execution time
main memory. The memory
of two registers
(base a n a limit) to ensur binding
used by the program with the
contents
2.4.3 Address Space Mapping .Logical address is generated by the CPU. This address is also called virtual
address.
Secondary storage device stores program in binary executable format. Before
executing, the program is loaded into the main memory.
Main memory address uses physical address. This address also called real
address.
Most of the operating systems allow a user process to store in any section of the
main memory. Source program uses symbolic addresses. .Logical address space: Set of all logical addresses generated by a program.
Binding of instruction and data to main memory address is following ways .Logical address and physical address is iderntical when load time and compile time
1. Compile time address binding is performed. The execution time address binding generates
2. Load time different physical and logical address.
3. Execution time Memory Management Unit (MMU) is responsible for run time address mapping
Compile time
Source program is translated at compile time to produce
: from vitual to physical address.
a
relocatable object module. At compile time, the translator
generates code to Dynamic Relocation
allocate storage for the variable. This storage address is used for code
reference. Base register is sometimes called as a relocation register. The value of the
Target address is unknown at compile time, it cannot be bound at compile time. relocation register is added to every address generated by a user process at the
Example of compile time binding is MS DOS.com programs. time it is sent to main memory.
Load time : Compiler
generates relocatable code if compile time binding is not User can load a process with only absolute addresses for instructions and data,
performed. The loader modifies the addresses in the load module at load time to
only when those specific addresses are free in main memory. Program's
produce the executable image stored in main memory. Final
until program load time. binding is delayed instruction, data and any other data structure required by the process can be
.Execution time: Memory address of the accesssed easily if the addresses are relative.
then execution time binding is used.
program is changed at execution time
is Binding delayed until the run time of the
emory When the processor makes a memory request, the request first passes to the
2.4.3 shows dynamic
8 primary cache. If the data item is found in this cache, we have a cache hit.
physical address.
Main memory I f the data item is not found in the primary cache, we have a cache miss and the
Relocation
register Kernel memory request is forwarded to the L2 cache. If the data item is found in this
cache, we have an L2 cache hit and the data is passed back to the primary cache.
free
.Ifthe data is not found in the L2 cache, the request is finally forwarded to the
Physical main memory. When the main memory responds to the memory request, the data
Logical
addresS
Processor TaddresSRelocation free item is passed back to the L2 cache and then the primary cache.
x* Y)
Data Virtual address cache When cache is indexed with virtual address then it is
Memory
called virtual address.
management
unit
2.5.1 Direct Mapping
relocation
Fig. 2.4.3 Dynamic
.In direct mapping, the cache consists of normal high speed random access
It is mapping
ot the virtual addresa
extra hardware.
Dynamic relocation requires memory and each location in the cache holds the data, at an address in the cache
time.
address space at run
given by the lower significant bits of the main memory address. This enables the
space to the physical
move a partially
executed process from block to be selected directly from the lower significant bits of the memory address.
Dynamic relocation makes it possible to
another without affecting other process. The remaining higher significant bits of the address are stored in the cache with
one area of main memory into
it is necessary to pertorm an addition and a the data to complete the identification of the cached data.
Problem with relocation is that,
Each block maps to one and only one ine of cache always. The mapping is
comparison on every memory reference.
logical address space is bound
with a separate expressed as
F o r good memory management, i=j mod m
physical address space.
where, j is main memory block
no., i is cache line no., m is Memory address
University Question from processor
number of lines in cache.
Tag ndexag and Index
1. Explain main memory with example. GTU Winter-21, Marks 4 The address from the
processor is divided into Main
2.5 Cache Memory GTU: Winter-21 two fields, a tag and an memory
Main
accessedmemory
Cache is small, fast storage used to improve average access time to slow memory index. The tag consists of Cache if tags do
the higher significant bits of Index not matcCn
It applied whenever buffering is employed to reuse commonly occurring items, ie
the address, which are
file caches, name caches, and so on. Tag Data
stored with the data. The
.Caches are introduced into a system to bufer the mismatch between main index is the lower significant Read
memory and processor speeds. A cache is a relatively smal, fast memory placed bits of the address used to Compare
between the processor and the main memory. The cache is designed so that its address the cache.
access time matches the processor cycle time.
Same -Different-f-
Fig. 2.5.1 shows direct
Physical address cache : When the cache is accessed with a physical memory
mapping. Access location
address, it is called physical address cache.
Fig. 2.5.1 Direct mappling
is accesed. It is possible to pass the information to the cache and the processor
i
simultaneously, ie., to read-through the cache, on a miss. The cache location is
altered for a write operation. The main memory may be altered at the same time
or later. Compare Set 1
.If the direct mapped cache with a line consisting than one word then
of more -(hit in cache)
main memory address is composed of a tag, an index, and a word within a line. All
the words within a line in the cache have the same stored tag.
The index part to the address is used to access the cache and the stored tag is
compared with required tag address. For a read operation, if the tags are the same (Miss in cache)
the word within the block is selected for transfer to the processor. If the tags are
not the same, the block containing the required word is first transferred to the Fig. 2.5.2 Set associative cache memory
organization
cache.
Block Address Block Offset (w bits)
Advantage: No need of expensive associative search.
Tag (s u bits) Index (u bits)
Disadvantages: wwwwww.wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
**wwww wwwww
1. Miss rate may increases.
The cache is divided into "sets" of blocks. A
2. Mapping conflicts. four-way set associative cache would
have four blocks in each set. The number of blocks in a set is known as the
2.5.2 Set Associative Mapping associativity or set size. Each block in each set has a stored tag which, together
with the index, completes the identification of the block.
A set-associative scheme is a hybrid between a fully associative cache, and direct If set is represented by u-bits in address field, then set no. can be found by index
mapped cache. It's considered a reasonable compromise between the complex of u bits. The tag filed of each row is then s -
u bits.
hardware needed for fully associative caches and the simple direct-mapped
Algorithm to find cache hit ls:
scheme, which may cause collisions of addresses to the same slot.
1. Pick up the u bits out of total (s u) + u bits out of
It allows a limited number of blocks, with the same index and different tags, in
-
u bits from address field with tag fields of all the 25u
lines in that set.
memory organization.
from that
word is
transferred
and Auxiliary memory also referred to as secondary storage is the non-volatile
block. And, the byte memory lowest-cost, highest-capacity and slowest-access storage in a
the block replaced from RAM. to access the set, computer
iincoming Then,
Usea
is
the processor
1s
system.
address from with the
First, the index of the selected set
used to
all of the tags accessed, other wise, tag 2.6.1 Types of Storage Devices
omparators
f a
are
second.
including EIDE, ATA, SATA, USB, Fibre Channel, SCSI etc.
Drives rotate at 60 to 200 times per .Host controller in computer uses bus to talk to disk controller built into drive or
drive and computer.
Transfer rate is rate at which
data flow between
storage array.
is time to move
disk arm to desired
Positioning time (random-access time) disk head. Disk controllers typically embedded in the disk drive, which acts as an interface
rotate under the
for desired sector to between the CPU and the disk hardware. The controller has an internal cache that
cylinder (seek time) and time
surface.
contact with the disk it to buffer data for
Head crash results from disk head making uses read/write requests.
is coated with magnetic material on both surfaces. All
Each platter (disc-shaped) 2.6.1.2 Magnetic Tape
fixed position. Tip of the
arm
contains
platter surfaces has arm extended from .Magnetic tape is a medium for magnetic recording generally consisting of a thin
for writing data.
read/write head reading or
magnetically coating on a long and narrow strip of plastic. Nearly all recording
to the edge of the disc.
T h e arm moves the heads from the spindle edge tape is of this type, whether used for recording audio or video or for computer
the operating system locates the data storage.
When a program reads a byte from the disk,
byte, and reads the entire sector into a Devices that record and playback audio and video using magnetic tape are
surface, track and sector containing that
special area in main memory called buffer. generally called tape recorders and video tape recorders respectively. A device that
stores computer data on magnetic tape can be called a tape drive, a tape unit, or a
Track t Spindle
streamer.
.The purpose of any magnetic tape unit is to write data on and read data from the
tape used by the device. Tape is moved from a supply reel or hub to a take-up
reel or hub on the magnetic tape transport section of the unit The magnetic oxide
Sector S -Arm assembly coated side of the tape passes in close proximity of a read/write.
Relatively permanent and holds large quantities of data. Magnetic tape access time
is slow.
Cylinder c Read-write Mainly used for backup, storage of infrequently-used data, transfer medium
head between systems.
I t is kept in spool and wound or rewound past read-write head. Once data under
head, transfer rates comparable to disk.
Platter
Arm Typical storage is 20 GB to 200 GB. Common technologies are 4 mm, 8 mm,
Rotation 19 mm, LTO-2 and SDLT.
Fig.2.6.2 Moving-head dlsk mechanlsm
TECHNICAL PUBLICATIONS an up-thrust for knowledge TECHNICAL PUBLIGATIONS- an up-thnustfor knowledge
Understanding of
the Technícel Concept
2-332
Digital Forensics
3
metal surface is
disk's
data. To store data, the
ght to read to be reflected diferently.
dents (pits) and flat spots (lands),
which cause light
be reflected back.
Digital Forensics Process Model
the light cannot
drive shines light into a pit,
wnen an optical bit value of 0 (off). A land reflects light back to its source,
This represents a
a bit value of 1 (on).
representing
CD-ROM
technology is called Compact Syllabus
in PCs, the commonly used optical storage
most
A standard CD-ROM disk can store up to niroduction to cybercrime scene, documenting the scene and evidence, maintaining the chain f
Disk Read-Only Memory (CD-ROM).
written to a standard CuStody, forensic cloning of evidence, Iive and dead system.forensic, hashing concepts to maintai
650 MB of data, or about 70 minutes of
audio. Once data is
the integrity ofevidence, report drafting
CD-ROM disk, the data cannot be altered or overwritten.
and read data at a rate of
Early CD-ROM drives were called single speed,
of up to 7800 kbps.
Contents
150 CD-ROM drives now can transfer data at speeds
kbps. 3.1
Data transfer speeds are getting faster. It is typically
used to store software Introductionto Cybercrime Scene........ Winter-21, . .
Marks 3
3.2
programs. CDs can store audio and video data, as well as text
and program
Documenting the Scene and Evidence.. Winter-21, *** Marks 33
3.3 Maintaining the Chain of Custody
instructions.
continuous spiral that starts at the 3.4 Forensic Cloning
Data is laid outon a CD-ROM disk in a long, of Evidenoe. Winter-21, Marks 7
and winds inwards towards the centre. Data is stored in the form of 3.5 Live and Dead System Forensic. ...
outer edge
which are depressions
Winter-21, Marks 4
lands, which are flat areas on the metals surface, and pits, 3.6 Hashing Concepts to Maintain the Integrity of Evidence
or hollows. A land reflects the laser light into the sensor (a data bit of 1) and a pit
scatters the light (a data bit of 0). Winter-21, ..Marks 7
A standard CD 3.7 Report Drafting
.On a full CD-ROM the spiral of data stretches almost 3 miles long.
can store 650 MB of data or about 70 mins of audio.
DVD-ROM
.Digital video disk read only memory, is a high-density medium capable of storing
a ful-length movie on a single disk the size of a CD. Achieves such high storage
capacities by using both sides of the disk and special data compression
technologies.
The latest generation of DVD-ROM use layers of data tracks; the laser beam reads
data from the first layer and then looks through it to read data from the second
layer. Each side of a standard DVD-ROM can hold up to 4.7 GB. Dual layer
DVD-ROM can hold 17 GB of data.
University Question
TECHNICAL PUBLICATIONS -
an up-thrust for knowledge (3-1)
Process Model
Digital Forensics
Digital Forensics
3-2 Digital Forensics 3-3 Digital Forensics Process Model
GTU: Winter-21
Scene Until
3.1 Introduction to Cybercrime recently, malware, spam emails, hacking
computers and
networks. The cyber artacks of this nature
into corporate sites ana ouier
TECHNICAL PUBLICATIONS an up-thrust for knowledge TECHNICAL PUBLICATIONS an up-thrust for knowledge
Proc9ss Model
Digitel Forensics Digital Forensics
3-4 3-5 Digital Forensics Process Model
Digital Forensics
of computer-related Example :
some examples
attacks are just Launching the denial-of-service attacks on commercial web sites.
Unline fraud and hacking
crimes that are committed on a large scale every day.
3.1.5 Traditlonal Problems Associated with Cyber Crime
a. Online banking fraud
Individuals seeking a crime have
b. Fake antivirus always displayed a remarkable ability to adapt
to cnanging technologies, environments and lifestyles. Computer crime poses a
c. Standed traveler scams daunting task for law enforcement agencies because they are highly techrical
d. Fake escrow' scams crimes.
e. Advanced fraud Law enforcement agencies must have individuals trained in computer forensics in
order to
f. Infringing pharmaceuticals prToperly investigate computer crimes. Additionally, countries must update
and create
& Copyright-infringing software legislation, which prohibits computer crimes and outlines appropriate
punishments for those crimes.
h. Copyright-infringing music and video
Computer crimes will likely become more frequent with the advent of further
i. Online payment card fraud technologies. It is important that civilians, law enforcement officials and other
j. In-person payment card fraud members of the criminal justice system are
knowledgeable about computer crimes
in order to reduce the threat
k. Industrial cyber-espionage and extortion they pose.
1. Welfare fraud. The eariest computer crimes were characterized as non-technological speific.
material
The and dissemination of obscene het of computer components and software piracy were particular favorites.
trafficking, distribution, posting constitutes one
and child pornography, Hacking and technologically complicated computer crime came later.
ncluding pornography, indecent exposure
of the most important Cybercrimes known today. Stealing the significant
transmit the data from one 3.1.6 Issues and Challenges in Cyber Crime
information, data, account number, credit card number
place to another. and
Hacking are amongst the gravestybercrimes
cracking Investigation is a process that develops and tests hypotheses to answer questions
known till date. about events that occurred. In general, computer forensics investigates data that
can be retrieved from a computer's hard disk or other storage media.
3.1.4 Three Categories of Cyber Crime is the task of recovering data that users have hidden or
a. Cyberpiracy: Using cyber-technology in unauthorized ways to reproduce copies
Computer forensics
deleted, with the goal of ensuring that the recovered data is valid so that it can be
of proprietary software and proprietary information or distribute proprietary used as evidence.
information (in digital form) across a computer network.
The computer investigations group manages investigations and conducts forensic
Example: Distributing proprietary MP3 files on the Internet via peer-to-peer analysis of systems suspected of containing evidence related to an incident or a
(P2P) technology. crime.
b. Cybertrespass: Using cyber-technology to gain or to exceed unauthorized access Challenges of cyber-crime are as follows:
to an individual's or an organization's computer system or a password-protected 1. Lack of awareness and the culture of cyber security, at individual as well as
website organizational level.
oExample : Unleashing the ILOVEYOU computer virus. 2. Lack of trained and qualified
manpower to implement the counter measures
c. Cybervandalism: Using cyber-technology to unleash one or more programs that 3. No email account policy especially for the defense forces, police and the
disrupt the transmission of electronic information across one or more computer
security agency personnel.
networks, including the Internet or destroy data resident in a computer or damage
a computer system's resources or both. 4. Cyber-attacks have come not only from terrorists but also from neighboring
contries contrary to our National interests.
TECHNICAL PUBLICATIONS an
TECHNICAL PUBLICATIONS an up-thrust for knowledge up-thrust for knowledge
Process Modef
Digltal Forensics Digitel Forensics
Digital Forensics 3-6 3-7 Digital Forensics Process Model
doesn't include any Storin8 media or digital evidence
join the police
he minimum necessary eligibility to
almost illiterate to
fire, water, jet fuel and can deteriorate over time or when exposea
that they are toxic
knowledge of the computers
sector so
chemicals.
Evidence dynamics
cyber-crime. of the create investigative and legal challenges and are more difficult
beats the progress to prove that the evidence
.1he speed of cyber technology changes always ot these
is authentic and reliable.
identify the origin
government sector so that they are not able to m n a l s use mobile phones, laptop computers and network servers in the course
of committing their crimes
cyber-crimes.
personnel; are not equipped to address Two
.Security forces and law enforcement
in
terms cybercrime and digital forensics are defined to address developments
high-tech crimes. criminal activities
investigative
involving computers and in
legislation and investigative
8. Fresent protocols are not self-sufficient, which identifies
the technologies to address them.
responsibility for crimes that stretch internationally. Digital evidence as a form of physical evidence creates several challenges for
for the training of digital forensic analysis
Budgets for security purpose by the government especially to
are less as compare 1. Messy or
law entorcement, security personnel's and investigators slippery form of evidence that is very difficult to handle.
other crimes. 2. Digital evidence is
generally an abstraction of some digital object or event
3. Digital evidence is
University Question usually circumstantial, making it difficult to attribute
computer activity to an individual.
?
1. What are the main challenges of investigating computer-related crime 4. Digital evidence can be manipulated or destroyed so easily arises new
GTU: Winter-21, Marks 3 challenges for digital investigators.
homicides, sex offenses, missing persons, child abuse, fraud and theft.
The order of volatility is the sequence order which the digital evidence is
or in
collected. The order is maintained from highly volatile to less volatile data.
Digital evidence helps in tracking how a crime was committed, provide
investigativeleads, ordisprove witness statements and identify likely
support Highly volatile data resides in the memory, cache, or CPU registers and it will be
suspects. lost as soon as the power to the computer is turmed off. Less volatile data cannot
is defined as information stored transmitted in binary form be lost easily and is relatively permanent because it may be stored on disk drives
Digital evidence or
that may be relied upon in court. or other permanent storage media, such as floppy disks and CD-ROM discs.
.For considering multiple sources of digital evidence, computer systems can be The crime scene technicians should collect evidence beginning with the most
categorised into three groups volatile and then movingg towards a least volatile. The order of volatility for data
1. Open computer systems from most volatile to least volatile is
2. Communication systems a) Cache memory, b) Regular RAM,
3. Embedded computer systems c)Swap or paging file, d) Hard drive data,
A digital crime scene in its original state can never exists as some evidence e) Logs stored on remote systems, Archived media.
dynamics is expected.
Any influence that changes, relocates, obscures or obliterates evidence, regardless University Question
of intent between the time evidence is transferred and the time the case is
1. Explain onder of volatility in brief GTU Winter-21, Marks 3
resolved. Ofenders,
anyone else who had
victims, first responders,
digital evidence examinaters and
access to digital evidence prior to its preservation can cause
evidence dynamics.
TECHNICAL PUBLICATIONS an up-thrust for knowledge TECHNICAL PUBLICATIONsan up-thrust for knowledge