UNIT-4 Cybersecurity Complete Notes
UNIT-4 Cybersecurity Complete Notes
Kaushal Kishor
Unit-4
UNDERSTANDING COMPUTER FORENSICS
OR
or secondary storage of the device by searching active, modified, or
deleted files.
SH
2. Network Forensics: It is a sub-branch of Computer Forensics that
KI
involves monitoring and analysing the computer network traffic.
3. Database Forensics: It deals with the study and examination of
L
Characteristics:
1. Identification: Identifying what evidence is present, where it is
stored, and how it is stored (in which format). Electronic devices
can be personal computers, Mobile phones, PDAs, etc.
Dr. Kaushal Kishor
Application:
OR
● Intellectual Property theft
● Industrial espionage SH
KI
● Employment disputes
● Fraud investigations
L
● Bankruptcy investigations
● Issues concerned the regulatory compliance
KA
OR
Digital Forensic Science:
SH
● Digital Forensics is a branch of forensic science which includes the
identification, collection, analysis and reporting of any valuable
KI
digital information in the digital devices related to computer
crimes, as a part of the investigation.
L
OR
Branches of Digital Forensics:
SH
● Media forensics: It is the branch of digital forensics which
includes identification, collection, analysis and presentation of
KI
audio, video and image evidence during the investigation process.
● Cyber forensics: It is the branch of digital forensics which
L
laptop.
● Software forensics: It is the branch of digital forensics which
includes identification, collection, analysis and presentation of
digital evidence during the investigation of a crime related to
softwares only.
OR
threats, and intellectual property theft, helping organisations
maintain a secure digital environment.
SH
KI
5. Incident Response and Mitigation: Computer forensics aids in
incident response by providing methodologies and tools to quickly
L
HA
OR
to combat digital threats.
SH
12.Criminal Investigations: In criminal investigations, computer
KI
forensics is indispensable for examining electronic evidence,
reconstructing digital timelines, and identifying individuals
L
involved in cybercrimes.
HA
US
documentation to find out who did the crime digitally. Cyber forensics
can do the following:
● It can recover deleted files, chat logs, emails, etc
● It can also get deleted SMS, Phone calls.
● It can get recorded audio of phone conversations.
● It can determine which user used which system and for how
much time.
● It can identify which user ran which program.
OR
disks, mobile phones etc.
● It can be used for prosecution of various crimes but it is generally
associated with E-Crimes. SH
KI
● Digital evidence is described as information and data kept on,
received from, or transferred by an electronic device that is useful
L
to an investigation.
HA
● When electronic devices are taken into custody and secured for
inspection, this evidence can be obtained.
US
Digital proof −
KA
OR
Forensic Analysis of E-Mail:
SH
● Email forensics involves the systematic examination and analysis
KI
of email data to gather evidence for investigative or legal purposes.
● It plays a crucial role in cybercrime investigations, corporate
L
OR
examining the source, SPF/DKIM signatures, and sender
information.
SH
● Sender Authentication: Validate the identity of the sender
KI
through forensic analysis to prevent email spoofing.
L
OR
Here are the key stages of the digital forensics life cycle:
SH
KI
1. Identification of evidence: It includes identifying evidence
related to the digital crime in storage media, hardware, operating
L
basic step.
US
OR
In order to preserve digital evidence, the chain of custody should span
from the first step of data collection to examination, analysis, reporting,
SH
and the time of presentation to the Courts. This is very important to
KI
avoid the possibility of any suggestion that the evidence has been
compromised in any way.
L
HA
US
KA
DR
OR
be taken.
SH
KI
Network Forensics:
● Network forensics is a subcategory of digital forensics that
L
essentially deals with the examination of the network and its traffic
HA
OR
● Documentation: In this process, all the shreds of evidence,
reports, conclusions are documented and presented in court.
SH
KI
Challenges in Network Forensics:
● The biggest challenge is to manage the data generated during
L
the process.
HA
● Address Spoofing.
KA
DR
Advantages:
● Network forensics helps in identifying security threats and
vulnerabilities.
● It analyses and monitors network performance demands.
Dr. Kaushal Kishor
Disadvantage:
● The only disadvantage of network forensics is that It is difficult
to implement.
OR
computer forensics investigation are:
● Secure the subject system
● Take a copy of hard drive/disk
SH
KI
● Identify and recover all files
● Access/view/copy hidden, protected, and temp files
L
HA
OR
media
● Collect the data from the target media SH
KI
● Use a write blocking tool while performing imaging of the disk
● Check emails records too while collecting evidence
L
OR
4. Social Engineering: Manipulating individuals to divulge confidential
information or perform actions.
SH
● Threat Impact: Unauthorised access, data breaches, identity theft.
KI
● Examples: Impersonation, pretexting, baiting.
L
HA
exposure.
● Examples: Insecure smart devices, lack of encryption in IoT
communication.
DR
OR
10. Eavesdropping: Unauthorised interception of communications.
SH
● Threat Impact: Privacy invasion, data leakage, industrial espionage.
● Examples: Wiretapping, packet sniffing.
KI
OR
specialised data recovery techniques.
information.
HA
US
KA
DR