What is Cyber Forensics?
Cyber Forensics is also known as Digital Forensics or Computer Forensics. Cyber forensics is the process of investigating and analyzing digital data which is gathered as evidence in criminal cases.
Need for Cyber Forensics
- Used in fighting against cyber crimes like hacking and DoS attack.
- Motive behind the crime and the culprit can be identified easily.
- Cyber forensics report can be produced to the court of law as an evidence.
- Maintains the integrity of evidence.
- To recover lost data.
- Cyber crime investigation.
- Incident handling and response.
Cyber Forensics Process
A methodological approach to investigate, seize, and analyze digital evidence and then manage the case from the time of search and seizure to reporting the investigation result.
Phases involved in the Forensics Investigation Process
1. Pre-investigation Process
- Deals with tasks to be performed prior to the commencement of the actual investigation.
- Involves setting up a computer forensics lab, building a forensics workstation, developing an investigation toolkit, setting up an investigation team, getting approval from the relevant authority etc.
2. Investigation Process
- Main phase of the Computer Forensics Investigation process.
- Involves acquisition, preservation, and analysis of evidentiary data to identify the source of the crime and the culprit behind it.
3. Post-investigation Process
- Includes documentation of all actions undertaken and all findings uncovered during the investigation.
- Ensures that the report is easily explicable to the target audience and that it provides adequate and acceptable evidence.
Steps in Cyber Forensics Investigation
- Identification.
- Preservation.
- Analysis.
- Documentation.
- Presentation.
Types of Cyber Forensics
- Disk Forensics.
- Database Forensics.
- Network Forensics.
- Malware Forensics.
- Email Forensics.
- Memory Forensics.
- Mobile Forensics.
Computer Forensics Lab (CFL)
A Computer Forensics Lab (CFL) is a location that houses instruments, software & hardware tools, and forensic workstations required for conducting a computer-based investigation with regard to the collected evidence.
Setting up a Computer Forensics Lab (CFL)
1. Planning & Budgeting Considerations
- Number of expected cases.
- Type of investigation.
- Manpower.
- Equipment and software requirement.
2. Physical & Structural Design Considerations
- Lab size.
- Access to essential services.
- Space estimation for work area and evidence storage.
- Heating, ventilation, and air-conditioning.
3. Work Area Considerations
- Workstation requirements.
- Ambience.
- Internet, network, and communication line.
- Lighting systems and emergency power.
4. Physical Security Considerations
- Electronic sign-in.
- Intrusion alarm systems.
- Fire suppression systems.
5. Human Resources Considerations
- Number of required personnel.
- Training and certification.
6. Forensic Lab Licensing
- ASCLD/Lab accreditation.
- ISO/IEC 17025 accreditation.
Cyber Forensics Investigator
Cyber Forensics Investigator is a professional who works with law enforcement agencies and other private firms to retrieve information from storage devices.
Roles and Responsibilities of a Forensics Investigator
- Determines the extent of any damage done during the crime.
- Recovers data of investigative value from computing devices involved in crimes.
- Creates an image of the original evidence without tampering to maintain its integrity.
- Guides the officials carrying out the investigation.
- Analyzes the evidence data found.
- Prepares the analysis report.
- Updates the organization about various attack methods and data recovery techniques, and maintains a record of them.
- Addresses the issue.
Cyber Forensics Tools
- The Sleuth Kit.
- FTK Imager.
- Xplico.
- OSForensics.
- Bulk Extractor.
Challenges for Cyber Forensics
- Excessive use of internet and storage space.
- Evidence should be free from tampering.
- Evidence should be authentic.
- Investigators should have good technical knowledge.
- Tools used for investigation should be of specific standards.
Types of Digital Evidence
1. Volatile Data
Data that are lost as soon as the device is powered off. For example system time, logged-on user, open files, network information, process information, command history, clipboard contents etc.
2. Non-volatile Data
Data that are permanently stored on a secondary storage devices such as hard disks, memory cards, thumb drives etc. For example hidden files, swap file, index.dat file, hidden or unused partitions, registry settings, event logs etc.
Roles of Digital Evidence
- Identity theft
- Malicious attacks
- Information leakage
- Abuse of internet or systems
- Digital document forgery
Sources of Potential Evidence
1. User-Created Files
- Address books
- Database files
- Media files
- Document files
- Internet bookmarks
2. User-Protected Files
- Compressed files
- Misnamed files
- Encrypted files
- Password-protected files
- Hidden files
- Steganography
3. Computer-Created Files
- Backup files
- Log files
- Configuration files
- Cookies
- Swap files
- System files
- Temporary files
Rules of Digital Evidence
Digital evidence collection must be governed by five basic rules.
1. Understandable
Evidence must be clear and understandable to the judges.
2. Admissible
Evidence must be related to the fact being proved.
3. Authentic
Evidence must be real and appropriately related to the incident.
4. Reliable
There must be no doubt the authenticity or veracity of the evidence.
5. Complete
The evidence must prove the attacker’s action.
Forensic Readiness
Forensic readiness refers to an organization’s ability to optimally use digital evidence in a limited period of time and with minimal investigation costs.
Benefits of Forensic Readiness
- Fast and efficient investigation with minimal disruption to the business.
- Provides security from cyber crimes such as intellectual property theft, fraud, or extortion.
- Offers structured storage of evidence that reduces the cost and time of an investigation.
- Improves law enforcement interface.
- Helps the organization use the digital evidence in its own defense.
Forensic Readiness Planning
Forensic readiness planning refers to a set of processes to be followed to achieve and maintain forensic readiness.
- Identify the potential evidence required for an incident.
- Determined the sources of evidence.
- Define a policy that determines the pathway to legally extract electronic evidence with minimal disruption.
- Establish a policy to handle and store the acquired evidence in a secure manner.
- Identify if the incident requires a full or formal investigation.
- Create a process of documenting the procedure.
- Establish a legal advisory board to guide the investigation process.
- Keep an incident response team ready to review the incident and preserve the evidence.