Introduction to digital forensics
Introduction to digital forensics
During this time, forensic techniques primarily focused on data recovery and file system
analysis.
History of Digital forensics
Late 1990s-Early 2000s: Standardization and Growth
● The forensic image is then used for in-depth analysis, ensuring the original
data remains untouched and stored securely in a safe location. This
meticulous approach safeguards the integrity of the evidence, even if the
investigation encounters unforeseen issues, preventing any tampering or data
loss.
Stage 3: Analysis
● After securing and duplicating the data, digital forensic investigators employ a
variety of advanced techniques to meticulously analyze the extracted data for
evidence of wrongdoing. This process includes:
○ Reverse Steganography: Extracting hidden data by examining the
underlying hash or character string of an image or other data items.
○ File or Data Carving: Identifying and recovering deleted files by locating
and reconstructing file fragments.
○ Keyword Searches: Using specific keywords to locate and analyze relevant
information, including deleted data.
● Investigators also use other sophisticated methods to uncover, piece together, and
interpret evidence, ensuring a thorough examination of all potential digital clues.
This comprehensive analysis helps build a clear and detailed understanding of the
activities in question.
Stage 4: Documentation
● After completing the analysis, computer forensics investigators meticulously
document their findings to provide a clear and comprehensive overview of
the entire investigative process and its results.
● This documentation includes detailed reports, logs, and visual aids such as
charts and timelines, which highlight critical activities involved in the
wrongdoing.
● They prepare comprehensive reports and visual aids to illustrate the findings
clearly and effectively, ensuring that all relevant evidence is communicated
in an understandable and persuasive manner, thereby supporting the judicial
or administrative decision-making process.
Types of digital forensics
Disk Forensics:
It deals with extracting data from storage media by searching active, modified, or deleted files.
Network Forensics:
It is a sub-branch of digital forensics. It is related to monitoring and analysis of computer network
traffic to collect important information and legal evidence.
Wireless Forensics:
It is a division of network forensics. The main aim of wireless forensics is to offers the tools need to
collect and analyze the data from wireless network traffic.
Database Forensics:
It is a branch of digital forensics relating to the study and examination of databases and their related
metadata.
Malware Forensics:
This branch deals with the identification of malicious code, to study their payload, viruses, worms,
etc.
Types of digital forensics
Email Forensics
Deals with recovery and analysis of emails, including deleted emails, calendars, and contacts.
Memory Forensics:
It deals with collecting data from system memory (system registers, cache, RAM) in raw form and then carving
the data from Raw dump.
Mobile Phone Forensics:
It mainly deals with the examination and analysis of mobile devices. It helps to retrieve phone and SIM
contacts, call logs, incoming, and outgoing SMS/MMS, Audio, videos, etc.
Uses of Digital Forensics