Bca Ctis Sem-5 Digital Forensic Investigation
Bca Ctis Sem-5 Digital Forensic Investigation
Bca Ctis Sem-5 Digital Forensic Investigation
Course Dossier
Semester: V
Subject Name: Digital Forensic Investigation
Subject Code: 14110501
SWARRNIM STARTUP & INNOVATION UNIVERSITY
Swarrnim School of Computing & IT
(BCA -CTIS)
Digital Forensic Investigation
Semester: V
Code: ________
Th Pr Th Pr
3 - 2 5 4 30 50 70 - 150
Objectives: -
● To make it possible for students to learn the process, various steps, tools and
techniques involved in computer forensics
Prerequisites: -
● Basic concepts of information security
● Knowledge of computer networking, operating systems and servers
Course outline:-
Sr. Course Contents Number of
No. Hours
1 Computer Forensics 9
Introduction to Computer Forensics, Forms of Cyber Crime, First
Responder Procedure- Non-technical staff, Technical Staff, Forensics
Expert and Computer Investigation procedure, Case Studies
2 Storage Devices & Data Recover Methods 9
Storage Devices- Magnetic Medium, Non-magnetic medium and
Optical Medium, Working of Storage devices-Platter, Head assembly,
spindle motor, Data Acquisition, Data deletion and data recovery
method and techniques, volatile data analysis, Case Studies
3 Forensics Techniques 9
Windows forensic, Linux Forensics, Network forensics – sources of
network-based evidence, other basic technical fundamentals, Mobile
Forensics – data extraction & analysis, Steganography, Password
cracking- Brute force, Cross-drive analysis, Live analysis, deleted files,
stochastic forensics, Dictionary attack, Rainbow attack, Email Tacking
– Header option of SMTP, POP3, IMAP, examining browsers, Case
Studies
4 Cyber Law 9
Corporate espionage, digital evidences handling procedure, Chain of
custody, Main features of Indian IT Act 2008 (Amendment), Case
Studies, Incident specific procedures – virus and worm incidents,
Hacker incidents, Social incidents, physical incident, Guidelines for
writing forensic report
5 Forensic Analysis of Web Application 9
Forensic analysis of web server, network analysis of web server
compromise, web server log analysis, web application forensic,
forensic analysis of web application security, intruder profiling,
forensic for code injection attack, Case Studies
Learning Outcomes:-
Students will gain the knowledge, they should be able to
● explain the importance of computer forensic in achieving the goals of information
security
● comprehend steps involved in recovering data stored in various devices and various
techniques used in windows, linux, network and web application forensics
● justify the need for meticulous documentation in computer forensics
● articulate the rationale for having an adequate legal framework when dealing with
computer forensics
Books Recommended:-
Text Books:
1. Computer Forensics: Computer Crime Scene Investigation by John Vacca, Laxmi
Publications, 1st; 2015
2. Digital Forensic: The Fascinating World of Digital Evidences by Nilakshi Jain, et.al,
Wiley, 1sted; 2016
3. The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics by
John Sammons, Syngress, 2nded; 2014
Reference Books:
1. Cyber Forensics in India: A Legal Perspective by Nishesh Sharma, Universal Law
Publishing - an imprint of LexisNexis; First 2017 edition
2. Network Forensics:Tracking Hackers Throu by Davidoff, Pearson India, 1 sted; 2013
E-Resources:-
● http://index-of.es/Varios-2/Computer%20Forensics%20Computer%20Crime%20Scene
%20Investigation.pdf
Practical List:-
Sr. No. Practical
System Forensics – System is switched on and off and imaging – To
1
take an exact copy of evidence disk
2 Web browser and Internet forensics
3 Image steganography &Steganalysis and recovering deleted files
4 E- Mail investigation & analysis
5 Data carving
6 Linux server forensic
7 Windows server forensics
8 Log collection from network devices
9 Mobile forensic investigation
10 Case study based analysis
UNIT-1
I. Introduction to Computer Forensics
A. Definition of Computer Forensics: Computer Forensics refers to the branch of digital
investigation that involves the identification, preservation, analysis, and presentation of
electronic evidence in a manner that is admissible in a court of law. It encompasses the use
of scientific methodologies, tools, and techniques to collect, examine, and interpret data
from digital devices and networks with the aim of uncovering evidence related to
cybercrimes, unauthorized activities, or incidents involving digital systems.
Computer forensics involves the systematic examination of digital artifacts, such as files,
emails, metadata, system logs, and network traffic, to reconstruct events, determine the
who, what, when, where, and how of a digital incident, and establish a clear chain of
custody for the evidence collected. It requires specialized knowledge and expertise in
computer systems, operating systems, networks, file systems, and data recovery
techniques.
The ultimate goal of computer forensics is to provide accurate and reliable evidence that
can be used in legal proceedings, such as criminal investigations, civil litigation, and internal
organizational investigations. It plays a crucial role in uncovering digital evidence, identifying
culprits, establishing motives, and supporting the prosecution or defense of individuals
involved in cybercrimes or other illicit activities.
3. Legal Admissibility: Computer forensics follows strict procedures and protocols to ensure
the admissibility of digital evidence in a court of law. It employs recognized forensic
techniques to maintain the integrity, authenticity, and reliability of the evidence, making it
acceptable and persuasive in legal proceedings.
5. Incident Response and Disaster Recovery: In the event of a security breach or cyber
incident, computer forensics assists in analyzing the extent of the incident, identifying the
vulnerabilities, and implementing measures to prevent future attacks. It helps organizations
develop effective incident response plans and enhances their disaster recovery strategies.
The scope of computer forensics is continually expanding as technology evolves and cyber
threats become more sophisticated. Its importance in investigations, legal proceedings, and
security measures makes it an indispensable discipline in the digital age.
1. Digital Evidence Collection: Computer forensics experts employ proven methods and tools
to collect digital evidence from various sources, such as computers, mobile devices, storage
media, network logs, and cloud services. They ensure that the evidence is collected in a
forensically sound manner, maintaining its integrity and preserving its admissibility in legal
proceedings.
2. Data Recovery and Reconstruction: Cyber criminals often attempt to hide or delete
evidence to evade detection. Computer forensics experts use advanced data recovery
techniques to retrieve deleted or hidden files, reconstruct fragmented data, and recover
information from damaged or encrypted devices. This enables them to uncover crucial
evidence that would otherwise be inaccessible.
4. Digital Forensic Analysis: Computer forensics involves the systematic analysis of digital
evidence to reconstruct events, identify the methods used by cyber criminals, and establish
a timeline of activities. Forensic tools and techniques are employed to examine file
metadata, internet browsing history, communication records, system logs, and other
relevant artifacts. This analysis helps in understanding the modus operandi, identifying
patterns, and establishing a clear chain of events.
6. Expert Testimony and Legal Support: Computer forensics experts often provide expert
testimony in court proceedings, explaining the technical aspects of cyber crimes, the
methods used in the investigation, and the interpretation of digital evidence. They assist
prosecutors and defense attorneys in understanding the technical details and presenting
the evidence in a clear and convincing manner.
Overall, computer forensics plays a crucial role in investigating cyber crimes by employing
specialized techniques, tools, and expertise to collect, analyze, and interpret digital
evidence. It helps in identifying the perpetrators, understanding their methods, and
providing solid evidence for the prosecution of cyber criminals.
3. Identity Theft: The fraudulent acquisition and misuse of someone's personal identifying
information, such as name, social security number, or financial details. Cyber criminals may
use stolen identities for financial gain, opening fraudulent accounts, or conducting illegal
activities in the victim's name.
8. Online Fraud: Various forms of fraud conducted online, such as online auction fraud,
credit card fraud, investment scams, or online dating scams. Cyber criminals use deception
to trick individuals or organizations into providing money, goods, or sensitive information.
B. Examples and Case Studies of Cyber Crimes: Here are a few notable examples:
In May 2017, the WannaCry ransomware attack spread globally, infecting hundreds of
thousands of computers across over 150 countries. The malware exploited a vulnerability in
outdated versions of the Windows operating system. Once infected, the ransomware
encrypted users' files and demanded a ransom payment in Bitcoin for their release. The
attack targeted various organizations, including hospitals, government institutions, and
businesses, causing significant disruptions and financial losses.
In 2017, Equifax, one of the largest credit reporting agencies, suffered a massive data breach
that exposed sensitive personal information of approximately 147 million consumers. The
breach occurred due to a vulnerability in the company's website software. Cyber criminals
exploited the vulnerability and gained unauthorized access to names, Social Security
numbers, birth dates, addresses, and other personal data. The incident highlighted the risks
associated with inadequate security measures and the severe consequences of data
breaches on individuals and organizations.
Business Email Compromise (BEC) scams involve cyber criminals impersonating executives
or employees of an organization to deceive individuals into making unauthorized financial
transfers. In one case, a Nigerian cyber criminal group called "The Yahoo Boys" targeted a
Japanese company and successfully tricked them into transferring over $5 million by
impersonating the company's CEO and forging emails. BEC scams exploit social engineering
techniques and compromised email accounts to manipulate victims into believing they are
conducting legitimate financial transactions.
In 2015, the Ashley Madison website, a platform for individuals seeking extramarital affairs,
suffered a significant data breach. The breach resulted in the exposure of personal
information, including names, email addresses, and payment transaction details, of millions
of users. The incident not only led to reputational damage for the website but also had
severe consequences for the individuals involved, with reports of extortion attempts, public
shaming, and even suicides.
These case studies demonstrate the diverse nature of cyber crimes, their impact on
individuals and organizations, and the need for robust cybersecurity measures, awareness,
and effective legal frameworks to combat such offenses.
1. Anonymity and Pseudonymity: Perpetrators of cyber crimes often hide their identities or
operate under pseudonyms, making it challenging to attribute the criminal activity to
specific individuals. Cyber criminals may use sophisticated techniques such as encryption,
anonymizing tools, or hacking through intermediaries, complicating the identification and
apprehension process.
2. Global and Cross-Jurisdictional Nature: Cyber crimes can originate from anywhere in the
world, making investigations complex due to jurisdictional issues and the need for
international cooperation. Gathering evidence across borders, navigating different legal
systems, and coordinating investigations with multiple agencies pose significant challenges
in investigating and prosecuting cyber criminals effectively.
4. Encryption and Data Protection: Encryption technologies are commonly used to secure
communications and protect data. While encryption enhances security and privacy, it also
presents challenges for investigators as they encounter encrypted data that may require
substantial resources, time, or specialized expertise to decrypt. Striking a balance between
privacy rights and law enforcement needs is an ongoing challenge.
8. Transnational Organized Cyber Crime: Some cyber crimes are orchestrated by organized
criminal groups spanning multiple countries, making investigations more challenging. These
groups employ sophisticated techniques, professional expertise, and vast resources, posing
significant hurdles for law enforcement agencies in detecting, disrupting, and dismantling
such criminal networks.
Non-technical staff members often play a crucial role as first responders in the initial stages
of a digital forensic investigation. Their primary responsibilities include identifying and
preserving digital evidence, establishing a chain of custody, and documenting relevant
information. Here are the key aspects of their role:
Technical staff members play a critical role as first responders in digital forensic
investigations. They possess specialized knowledge and skills in handling and analyzing
digital evidence. Their responsibilities as first responders include the following:
By carrying out these responsibilities, technical staff members as first responders contribute
to the preservation and collection of digital evidence in a forensically sound manner. Their
expertise and prompt actions during the initial stages of an investigation significantly impact
the success and efficiency of the overall digital forensic process.
Forensics experts are highly trained professionals who specialize in conducting computer
investigations and analyzing digital evidence. Their role is crucial in uncovering and
interpreting the digital evidence necessary for legal proceedings. Here are their key
responsibilities:
1. Evidence Collection and Preservation: Forensics experts ensure the proper identification,
collection, and preservation of digital evidence. They follow established protocols and use
forensic tools to create forensic images, hash values, and maintain the chain of custody to
preserve the integrity of the evidence.
2. Data Recovery and Forensic Analysis: Experts employ advanced techniques and tools to
recover and analyze digital data from various sources, including computers, mobile devices,
cloud storage, and network logs. They use forensic software and methodologies to examine
file metadata, deleted files, internet browsing history, communication records, and other
relevant artifacts.
4. Malware and Network Analysis: Experts specialize in analyzing malware, malicious code,
and network traffic to determine the source, purpose, and impact of cyber attacks. They
examine malware behavior, trace its origins, and identify indicators of compromise.
Network analysis helps identify compromised systems, unauthorized access, or
unauthorized data transfers.
5. Expert Testimony and Reporting: Forensics experts provide expert testimony in legal
proceedings, explaining their analysis, findings, and interpretations of digital evidence. They
prepare detailed reports that summarize the investigation process, methodologies used,
results obtained, and their expert opinions. These reports are critical in presenting evidence
and supporting the prosecution or defense.
The computer investigation process followed by forensics experts typically involves the
following steps:
These examples and case studies illustrate the role of forensics experts in conducting
computer investigations and highlight the significance of their expertise in uncovering
digital evidence and presenting it in a legally admissible manner.
V. Case Studies
A. Case Study 1: Identity Theft and Digital Fraud
c. Privacy Concerns and Data Protection: Balancing the need for collecting evidence with
privacy rights posed challenges. Investigators had to ensure that the investigation followed
legal and ethical guidelines, respecting the privacy of individuals not directly involved in the
fraudulent activities.
d. Digital Footprint and Evidentiary Challenges: Cyber criminals often employ techniques to
conceal their activities or mask their digital footprints. Investigators faced challenges in
tracing the suspect's actions through anonymization tools, IP spoofing, or encryption
methods. Gathering legally admissible evidence required overcoming technical obstacles.
e. Awareness and Prevention: The case highlighted the importance of raising awareness
about identity theft and digital fraud prevention measures. Lessons learned emphasized the
need for individuals to safeguard their personal information, use strong passwords, and
exercise caution while sharing sensitive data online.
This case study exemplifies the complexities of investigating identity theft and digital fraud.
The successful resolution of the case required a combination of technical expertise,
collaboration with law enforcement agencies, adherence to legal procedures, and effective
analysis of digital evidence. It underscores the importance of digital forensics in identifying
perpetrators and gathering evidence to combat cyber crimes effectively.
c. Malware Analysis:
Forensics experts analyzed malware samples discovered during the investigation. They
used sandboxing techniques, virtual environments, and advanced anti-malware tools to
dissect the malicious code, identify its functionality, and determine its purpose. This helped
in understanding the attack methodology and uncovering any backdoors or remote access
tools used by the attackers.
d. Endpoint Forensics:
Investigators conducted a thorough examination of compromised endpoints, such as
servers and employee workstations. They analyzed system logs, event logs, and registry
entries to identify any signs of unauthorized access, lateral movement, or data exfiltration.
This involved recovering deleted files, examining user accounts, and assessing system
configurations for potential vulnerabilities.
This case study highlights the complexities of investigating data breaches and cyber
espionage incidents. The forensic investigation employed a range of techniques, including
network traffic analysis, malware analysis, endpoint forensics, and collaboration with threat
intelligence agencies. The legal implications involved regulatory compliance, reporting
requirements, and potential legal consequences. The consequences of the breach included
intellectual property loss, reputational damage, and the need for remediation measures to
prevent future incidents.
Class Test
- Multiple-choice questions and short answer questions related to the lecture content.
Multiple-choice Questions:
1. Which of the following best describes computer forensics?
a) The study of computer systems and networks
b) The process of analyzing digital evidence in a court of law
c) The investigation of cybercrimes using scientific methodologies
d) The prevention of unauthorized access to computer systems
2. Who plays a crucial role in identifying and preserving digital evidence as first responders?
a) Non-technical staff
b) Technical staff
c) Forensics experts
d) Law enforcement agencies
Answers:
Multiple-choice Questions:
1. c) The investigation of cybercrimes using scientific methodologies
2. a) Non-technical staff
3. b) Investigate and prosecute cybercrimes
Assignments
1. Case Study Analysis:
Choose a real-life cybercrime case and analyze the computer forensic investigation
techniques used. Discuss the challenges faced, the evidence collected, and the outcome of
the case.
Exercises
1. Chain of Custody Exercise:
Given a scenario involving the collection of digital evidence, create a chain of custody
document, including relevant information such as date, time, location, description of
evidence, and signatures of personnel involved.
Note: Throughout the lecture, include relevant examples and case studies to illustrate
concepts and provide practical insights into the field of computer forensics and digital
forensic investigation. Title: Introduction to Computer Forensics and Digital Forensic
Investigation