Cyber Forensics
Cyber Forensics
Forensics
Aahan Rampal
Kartik
Harsh Shah
Meet Soni
Introduction
Cyber forensics is a process of Cyber forensics can do the following:
extracting data as proof for a crime It can recover deleted files, chat logs,
(that involves electronic devices) emails, etc
while following proper investigation It can also get deleted SMS, Phone calls.
rules to nab the culprit by presenting
the evidence to the court.
It can get recorded audio of phone
conversations.
The main aim of cyber forensics is to
It can determine which user used which
maintain the thread of evidence and
system and for how much time.
documentation to find out who did
the crime digitally.
It can identify which user ran which
program.
Cyber forensics is also known as
computer forensics.
Why is it Important?
Cyber forensics helps in collecting important digital evidence to trace the
criminal.
Electronic equipment stores massive amounts of data that a normal person fails
to see. For example: in a smart house, for every word we speak, actions
performed by smart devices, collect huge data which is crucial in cyber
forensics.
It is also helpful for innocent people to prove their innocence via the evidence
collected online.
It is not only used to solve digital crimes but also used to solve real-world crimes
like theft cases, murder, etc.
Businesses are equally benefitted from cyber forensics in tracking system
breaches and finding the attackers.
Process Involved
Obtaining a digital copy of the system that is being or is required to be inspected.
of network traffic to and from the criminal’s network. The tools used
here are network intrusion detection systems and other
Computer automated tools.
Forensics Email forensics: In this type of forensics, the experts check the
email of the criminal and recover deleted email threads to
extract out crucial information related to the case.
Malware forensics: This branch of forensics involves hacking
related crimes. Here, the forensics expert examines the malware,
trojans to identify the hacker involved behind this.
Memory forensics: This branch of forensics deals with collecting
data from the memory (like cache, RAM, etc.) in raw and then
retrieve information from that data.
Mobile Phone forensics: This branch of forensics generally deals
with mobile phones. They examine and analyze data from the
mobile phone.
Database forensics: This branch of forensics examines and
analyzes the data from databases and their related metadata.
Disk forensics: This branch of forensics extracts data from
storage media by searching modified, active, or deleted files.
Techniques Used
Reverse steganography:
Steganography is a technique of hiding the secret information inside or on top of
something, that something can be anything from an image to any type of file. So, cyber
forensic experts do reverse steganography to analyze the data and find a relation with the
case.
Computer forensics investigators can counter this using reverse steganography, by looking
and comparing the hash value of the altered file and original file, the hash value will be
different for both files even though they might appear identical on visual inspection
Stochastic forensics
In Stochastic forensics, the experts analyze and reconstruct digital activity without using
digital artifacts. Here, artifacts mean unintended alterations of data that occur from digital
processes.
Techniques Used
Live analysis
It is used to examine the computers from within the OS using various forensics and
sysadmin tools to get the information from the device.
In forensic analysis, the collection of volatile data is very important like the installed
software packages, hardware information, etc. this approach is useful in the case where the
investigator is dealing with encrypted files.
If the device is still active and running when it’s handed to the investigator, the investigator
should collect all the volatile information from the device such as user login history, which
TCP and UDP ports are open, what services are currently in use, and running, etc.
Techniques Used
Cross-drive analysis
Cross-drive analysis (CDA) is a technique that allows an investigator to quickly identify and
correlate information from multiple data sources or information across multiple drives.
Existing approaches include multi-drive correlation using text searches, e.g., email
addresses, SSNs, message IDs, or credit card numbers.
Civil litigation
Investigators can also use computer forensics in civil litigation cases, like fraud, employment
disputes or divorces. For example, in a divorce case, a spouse's legal team may use
computer forensics on a mobile device to reveal a partner's infidelity and receive a more
favorable ruling.
Use Cases
Corporate security:
Corporations often use computer forensics following a cyberattack, such as a data breach or
ransomware attack, to identify what happened and remediate any security vulnerabilities. A typical
example would be hackers breaking through a vulnerability in a company's firewall to steal sensitive
or essential data. Using computer forensics to fight cyberattacks will continue as cybercrimes
remain on the rise. In 2022, the FBI estimated that computer crimes cost Americans USD 10.3 billion
in annual losses, up from USD 6.9 billion the previous year (link resides outside ibm.com).