Mahan Tesh

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

BLDEA’S

Commerce, BHS Arts and


TGP Science College, Jamakhandi

DEPARTMENT OF BCA

ASSIGNMENT

Name : Mahantesh madiwal


Class :bca 5th sem
Uucms :U15IG21S0395
Sub: BUSINESS INTELLIGENCE
Introduction to Cyber
Forensics
Cyber forensics, also known as digital forensics, is the application of investigation
and analysis techniques to gather and preserve evidence from digital devices. It
plays a crucial role in identifying, preserving, and recovering digital evidence in a
forensically sound manner to support legal proceedings. This involves the
collection and analysis of data, including emails, documents, multimedia files, and
other digital information.

by Mahantesh Madiwal
Importance of Collecting and
Preserving Digital Evidence
Legal Admissibility Chain of Custody
Collecting and preserving digital evidence is Maintaining a clear chain of custody for
vital for ensuring its admissibility in legal digital evidence is crucial to validate its
proceedings. Proper preservation methods reliability and maintain its integrity. This
are essential to demonstrate the integrity involves documenting the handling,
and authenticity of the evidence. transfer, and storage of evidence.

Investigation Integrity
Preserving digital evidence is essential to maintain the integrity of the investigation. It ensures that
critical information remains unaltered and usable for analysis.
Types of Digital Evidence
1 Emails 2 Chat Logs 3 Multimedia Files
Email communications, Conversations Images, videos, and
including the content, conducted through audio recordings can
timestamps, and messaging platforms provide significant
sender/recipient often contain valuable evidence relevant to
information, can serve as evidence related to illicit various digital
important evidence in activities or investigations, including
digital investigations. communication of cybercrimes and data
incriminating breaches.
Methods and Techniques for Collecting
Digital Evidence
Live Data Acquisition Forensic Imaging Data Carving

Collecting volatile data from Creating a forensic image of Recovering and extracting
live systems to capture real- digital media to preserve its fragmented or partially
time digital evidence without content and structure for corrupted data from storage
altering the original state of the thorough analysis and media using specialized data
system. investigation. recovery techniques.
Tools Used in Cyber Forensics

Digital Analysis Software Hardware Write Blockers Evidence Storage Devices


Advanced tools for analyzing Devices that prevent alteration Specialized storage solutions for
digital evidence, including file of data on storage devices preserving digital evidence,
recovery, data decryption, and during the process of evidence ensuring its security and
forensic data examination. collection and preservation. integrity throughout the
investigative process.
Forensic Imaging and Data Acquisition

1 2
Bit-level Imaging Hash Calculation
Capturing an exact replica of digital media, Generating cryptographic hashes to verify the
including hidden and deleted data, for integrity of forensic images and ensure data
comprehensive analysis and investigation. authenticity.
Data Recovery and Analysis
File Recovery Specialized tools for restoring deleted or
corrupted files from digital media.

Metadata Examination Analyzing file metadata to extract valuable


information and establish crucial timelines for
investigative purposes.
Chain of Custody and Legal Considerations

Evidence Documentation Legal Compliance


Thoroughly documenting the details of collected Adhering to legal protocols and regulations to
evidence, including timestamps, handling ensure the admissibility and reliability of digital
personnel, and transfer records. evidence in court proceedings.
Challenges and Limitations in Cyber
Forensics
1 Encryption Complexity
Overcoming the challenges presented by strong encryption methods that hinder
access to critical digital evidence.

2 Data Obfuscation
Dealing with obfuscated data and concealed digital footprints that complicate the
forensic analysis process.

3 Data Jurisdiction
Navigating jurisdictional complexities and international legal frameworks for cross-
border data acquisition and evidence admissibility.
Conclusion and Future
Developments
Cyber forensics continues to evolve alongside technological advancements.
The integration of AI and big data analytics holds promise for more efficient
and accurate digital investigations in the future.
THANK YOU

You might also like