Eti Unit III Basics of Digital Forensics
Eti Unit III Basics of Digital Forensics
BASICS OF DIGITAL
FORENSICS
MR. S. P. KHOLAMBE
LECTURER IN CO DEPTT., MET BKC IOTP NASHIK
Digital Forensics
2
The Digital Forensic Process
4
The Digital Forensic Process
The digital forensic process has the following five basic stages:
1. Identification – the first stage identifies potential sources of relevant
evidence/information (devices) as well as key custodians and location of
data.
2. Preservation – the process of preserving relevant electronically stored
information (ESI) by protecting the crime or incident scene, capturing
visual images of the scene and documenting all relevant information about
the evidence and how it was acquired.
3. Collection – collecting digital information that may be relevant to the
investigation. Collection may involve removing the electronic device(s)
from the crime or incident scene and then imaging, copying or printing
out its (their) content.
5
The Digital Forensic Process
6
Rules Of Digital Forensic
7
8
Different Types Of Digital Forensics
9
Digital Forensics Goal
The main object in the digital forensic analysis is the digital device related
to the security incident under investigation.
The digital device was either used to commit a crime, to target an attack,
or is a source of information for the analyst.
The goals of the analysis phase in the digital forensics process differ from
one case to another.
It can be used to support or refute assumptions against individuals or
entities, or it can be used to investigate information security incidents
locally on the system or over a network.
10
Models of Digital Forensic Investigation
11
Digital Forensic Research Workshop Group
(DFRWS) Investigative Model
12
Digital Forensic Research Workshop Group
(DFRWS) Investigative Model
13
14
Abstract Digital Forensics Model (ADFM)
15
Identification phase: In this phase, the task to recognize and determine type of
incident is performed. Once the incident type was ascertained.
Preparation phase is conducted, followed by Approach Strategy phase. Physical
and digital data acquired must be properly isolated, secured and preserved.
There is also a need to pay attention to a proper chain of custody. All of these
tasks are performed under Preservation phase.
Collection phase: data extraction and duplication were done. Identification and
locating the potential evidence from the collected data, using a systematic
approach are conducted in the next following phase, known as Examination
phase.
The task of determining the significant of evidence and drawing conclusion
based on the evidence found is done in Analysis phase.
Presentation phase, the findings are summarized and presented. The
investigation processes is completed with the carrying out of Returning
Evidence phase.
Integrated Digital Investigation Process (IDIP)
16
Integrated Digital Investigation Process (IDIP)
17
The process started with a phase that require for the physical and
operational infrastructure to be ready to support any future
investigation.
In this Readiness phase, the equipment's must be ever ready and the
personnel must be capable to use it effectively. This phase is indeed an
ongoing phase throughout the lifecycle of an organization. It also
consists of 2 sub-phases namely, Operation Readiness and
Infrastructure Readiness.
Deployment phase, which provide a mechanism for an incident to
be detected and confirmed. Two sub-phases are further introduced,
namely, Detection & Notification and Confirmation & Authorization.
Integrated Digital Investigation Process (IDIP)
18
19
End To End Digital Investigation Process (EEDIP)
20
The investigation process started with Readiness phase and the tasks
performed are the same as in IDIP.
Deployment phase, provides a mechanism for an incident to be
detected and confirmed. It consists of 5 sub-phases namely. Unlike
DIP, this phase includes both physical and digital crime Detection &
Notification, Physical Crime Scene Investigation, Digital Crime
Scene Investigation, Confirmation and lastly, Submission scene
investigations and presentation of findings to legal.
In Traceback phase, tracking down the source crime scene, including
the devices and location is the main objective. It is supported by two
sub-phases namely, Digital Crime Scene Investigation and
Authorization.
End To End Digital Investigation Process (EEDIP)
21
22
UML Modeling Of Digital Forensic Process Model
(UMDFPM)
23
Ethical Issues In Digital Forensic
24