Ia2 Ehf
Ia2 Ehf
• Data Acquisition: The first step in cellular network forensic analysis is to acquire the call
records and network data from the cellular service provider.
• Data Analysis: Once the data has been acquired, the next step is to analyze it for patterns and
anomalies that may indicate criminal activity. analysis, and social network analysis.
• Interpretation and Reporting: The final step in cellular network forensic analysis is to interpret
the findings and prepare a report that can be used as evidence in legal proceedings. The report
should clearly state the methods used, the findings, and any conclusions drawn from the
analysis.
6. Explain the process for analyzing network traffic and collecting network-
based evidence.
Analyzing network traffic and collecting network-based evidence is an important part of digital
forensics investigations. The process typically involves the following steps:
1. Identification of the Network: The first step in analyzing network traffic and collecting
network-based evidence is to identify the network in question. This may involve identifying
the network topology, the devices connected to the network, and the network protocols in
use.
2. Data Collection: Once the network has been identified, the next step is to collect data from
the network. This can be done using a variety of tools, including network sniffers, network
analyzers, and packet capture tools. The data collected may include network logs, network
traffic data, and network packet data.
3. Data Analysis: The next step in the process is to analyze the data that has been collected.
This may involve using specialized forensic tools to extract and interpret the data, such as
network flow analysis tools, intrusion detection systems, or malware analysis tools. The
analysis may also involve identifying patterns or anomalies in the data that may indicate
criminal activity.
4. Evidence Preservation: Once the data has been analyzed, the next step is to preserve the
evidence. This may involve creating backup copies of the data and storing it in a secure
location to prevent tampering or alteration.
5. Reporting: The final step in the process is to prepare a report that summarizes the findings
of the investigation. The report should include details of the network topology, the data that
was collected and analyzed, and any conclusions or recommendations that can be drawn
from the analysis.
Intrusion detection systems (IDS) are tools that automate the process of intrusion detection by
monitoring network traffic or system activity for signs of malicious activity or policy violations.
IDS can be deployed as network-based IDS, host-based IDS, or a combination of both.
Q1. Which are the guidelines we consider for incident report writing.
Following points are to be considered for writing a report:
1. Document investigative steps immediately and clearly:
Through our experience of writing a vast number of forensic reports, we have developed some
report writing guidelines.
2. Know the goals of your analysis:
Before you begin your analysis for examination, know what the goals are. Every crime has
elements of proof, for law enforcement examiners.
3. Organize your report:
Write “macro to micro.” Organize your forensic report to start at the high level and have the
complexity of your report increase as your audience continues to read it.
4. Follow a template:
A standardized report template should be followed. This makes your report writing scalable,
establishes a repeatable standard, and saves time.
5. Use consistent identifier:
There can be confusion created in a report by referring to an item in different ways, such as
referring to the same computer as a system, PC, box, web server, victim system, and so on.
6. Use attachments and appendices:
To maintain the flow of your report, use attachments or appendices. Right in the middle of your
conclusions, you do not want to interrupt your forensic report with 15 pages of source code.
7. Have coworkers read your reports:
To read your forensic reports, employ other coworkers. This helps develop reports that are
comprehensible to nontechnical personnel, who have an impact on your incident response strategy and
resolution.
8. Use MD5 hashes:
Whether it is an entire hard drive or specific files, create and record the MD5 hashes of your proof.
Performing MD5 hashes for all evidence provides support to the claim that you are diligent and attentive
to the special requirements of forensic examination.
9. Include metadata:
Record and include the metadata for every file or file fragment cited in your report. This metadata
includes the time/date stamps, full path of the file, the file size, and the file’s MD5 sum.
Q2. Discuss goal of computer forensic reports writing in short.
Your computer forensic reports should achieve the following goals :
1. Accurately describe the details of an incident.
2. Be understandable to decision makers.
3. Be able to withstand a barrage of legal scrutiny.
4. Be unambiguous and not open to misinterpretation.
5. Be easily referenced (using paragraph numbers for the report and Bates’ numbers for attached
documents).
6. Contain all information required to explain your conclusions.
7. Offer valid conclusions, opinions, or recommendations when needed.
8. Report should be ready in time.
Q3. Describe the Layout of an Investigative Report
1. Executive summary: The contextual information of the state of affairs that brought about
the essential for an investigation is the “executive summary” unit.
2. Objectives: Sometimes, there could be a sudden requirement to perform hard drive forensic
examination. The goals of your forensic examination can be related to virtually any subject,
since any type of case/action can take place.
3. Computer evidence analyzed: The detailed information regarding the assignment of
evidence tag numbers and media serial numbers, as well as descriptions of the evidence, is
provided in this section.
4. Relevant findings: Summary of the findings of probative value is provided in this section.
It answers the question, “What relevant items were found during the investigation?” The
relevant findings should be listed in order of importance, or relevance to the case.
5. Supporting details: An in-depth look and analysis of the relative findings is provided in
this section. It outlines how we found or arrived at the conclusions outlined in the “Relative
Findings” section.
6. Investigative leads: In this section, we outline action items that could be performed to
discover additional information pertinent to the investigation. If more time or additional
resources were provided to the examiner or investigator, these are the outstanding tasks that
could be completed.
7. Additional report subsections: In our computer forensic reports, there are several
additional subsections that we often include. We have found the following subsections to be
useful in specific cases, but not every case. It depends on the needs and wants of the end
consumer.
Q4. Discuss any sample example for writing a forensic report (refer ppt case
study)
Q5. Explain General Structure of a Forensic Report
Case study Example from ppt
Case Study: Behavioral Problem: An administrator calls the corporate director of safety/security over
the worry of a representative. The administrator shows that the employee had inquired as to whether
their neighbors had called. When asked why, the representative had related an anecdote about his
neighbors who have a machine that can read his brain. The worker had told the administrator that this
matter should be accounted for because only the FBI is approved to have such a machine.
Condition of Parcels/Test samples and seals; eg. Received. One sealed/ unsealed ..parcel. The seals
were intact and tallied with the specimen seal as per forwarding authority letter.
Description of Specimens/Parcels/Samples/Exhibits etc. Methodology of Examination