? - Unit 4 PDF
? - Unit 4 PDF
Forensics
1. What is Cyber Forensic / Digital Forensic / Computer Forensic?
All three mean the same thing – the process of collecting, analyzing, and saving digital
evidence from electronic devices (like computers, phones, etc.) in a way that can be used
in court.
1
Collect Evidence
Gather digital data from
devices
4 2
Present in Court Analyze Evidence
Use evidence in legal Examine data for
proceedings relevant information
3
Save Evidence
Securely store analyzed
data
Used for:
• Solving cyber crimes
• Recovering lost data
• Investigating hacking or fraud
Cyber Security Services
Example:
If someone hacks a company, computer forensic experts check logs, emails, and files to
find out who did it, how, and when.
Determine
Incident Occurs Check Logs Review Files Method
1
Record Handling
Document who handled
the evidence
4 2
Maintain Integrity Document Time
Ensure evidence Note when the evidence
remains unaltered was handled
3
Note Location
Specify where the
evidence was handled
1
2
3
Authenticity
Trust Ensures evidence is
genuine and unaltered.
Upholds confidence in Admissibility
the investigative
process. Guarantees evidence is
accepted in court.
Example:
If a hard disk is collected as evidence, every time it changes hands, it is logged with date,
time, and person’s name.
Chain of Custody for Hard Disk Evidence
Repeat
Hard Disk Transfer to Transfer
Collection Next Custodian Process
The hard disk is The hard disk is The process repeats
initially collected as transferred to the for each subsequent
evidence. next custodian. transfer.
Physical Evidence: Things you can touch.Examples: fingerprints, a weapon, broken glass.
Solid and
Electronic and tangible
intangible
Harder to
Easily destroyed destroy
1
Collect Evidence
Gathering relevant data
4 2
Preserve
Evaluate Evidence
Evidence
Assessing data for
validity Maintaining integrity of
data
3
Present Evidence
Submitting data in court
Identify Sender
Determine the email's origin
Determine Time and
Location
Establish when and where
the email was sent
Verify Authenticity
Confirm if the email is
genuine
Approaches:
1. Header Analysis – Read email header to trace IP address and source.
2. Server Logs – Check email servers for logs of sent/received messages.
3. Keyword Search – Look for suspicious words in inbox or trash.
4. Deleted Email Recovery – Use tools to recover deleted messages.
5. Attachment Analysis – Check if any harmful files were attached.
Header Keyword
Analysis Search Attachment
Read email header Look for suspicious
Analysis
to trace IP address words in inbox or Check if any harmful
and source trash files were attached
Random device
control
Switching the device
on/off randomly can
alter data.
Normal system
File editing usage
Editing files or software Using the suspect’s
can lead to data system normally might
corruption. change data.
Use Forensic
Create Data Tools
Image Employ specialized
Capture a copy of tools for data
the data for analysis analysis