Page Contents
Today we are going to see about Digital Forensics and some examples. If you haven’t read Ethical Hacking Course Part 1 , Part 2 , Part 3, Part 4 & Part 5. then I highly recommend you guys to go through them too to have a better understanding about the course.
In this digital rhetorical half , we are going to learn —
1.What is Digital Forensics?
2.History of Digital forensics
3.Objectives of pc forensics
4.Process of Digital forensics
5.Types of Digital Forensics
6.Challenges long-faced by Digital Forensics
7.Example Uses of Digital Forensics
8.Advantages of Digital forensics
9.Disadvantages of Digital Forensics
1.What is Digital Forensics?
Digital Forensics is outlined because the method of preservation, identification, extraction, and documentation of pc proof which might be utilized by the court of law. it’s a science of finding proof from digital media sort of a pc, movable, server, or network. It provides the rhetorical team with the simplest techniques and tools to resolve sophisticated digital-related cases.
Digital Forensics helps the rhetorical team to analyzes, inspect, identifies, and preserve the digital proof residing on numerous styles of electronic devices.
2.History of Digital forensics
Here, are vital landmarks from the history of Digital Forensics:
- Hans Gross (1847 -1915): initial use of scientific study to go criminal investigations
- FBI (1932): came upon a work to supply forensics services to all or any field agents and alternative law authorities across the USA.
- In 1978 the primary pc crime was recognized within the Sunshine State pc Crime Act.
- Francis man of science (1982 – 1911): Conducted initial recorded study of fingerprints
- In 1992, the term pc Forensics was employed in tutorial literature.
- 1995 international organisation on pc proof (IOCE) was fashioned.
- In 2000, the primary Federal Bureau of Investigation Regional pc rhetorical Laboratory established.
- In 2002, Scientific Working Group on Digital Evidence (SWGDE) published the first book about digital forensic called “Best practices for Computer Forensics”.
- In 2010, Simson Garfinkel known problems facing digital investigations.
3.Objectives of pc forensics
Here are the essential objectives of victimisation pc forensics:
- It helps to recover, analyze, and preserve pc and connected materials in such a way that it helps the investigation agency to gift them as proof in an exceedingly court of law.
- It helps to postulate the motive behind the crime and identity of the most perpetrator.
- Designing procedures at a suspected crime scene that helps you to make sure that the digital proof obtained isn’t corrupted.
- Data acquisition and duplication: ill deleted files and deleted partitions from digital media to extract the proof and validate them.
- Helps you to spot the proof quickly, and conjointly permits you to estimate the potential impact of the malicious activity on the victim
- Producing a pc rhetorical report that offers an entire report on the investigation method.
- Preserving the proof by following the chain of custody.
4.Process of Digital forensics
Digital forensics entails the following steps:
Identification
It is the first step in the forensic process. The identification method primarily includes things like what proof is gift, wherever it’s keep, and lastly, however it’s keep (in that format).
Electronic storage media will be personal computers, Mobile phones, PDAs, etc.
Preservation
In this part, information is isolated, secured, and preserved. It includes preventing individuals from victimisation the digital device in order that digital proof isn’t tampered with.
Analysis
In this step, investigation agents reconstruct fragments of information and draw conclusions supported proof found. However, it would take various iterations of examination to support a selected crime theory.
Documentation
In this method, a record of all the visible information should be created. It helps in recreating the crime scene and reviewing it. It Involves correct documentation of the crime scene together with photographing, sketching, and crime-scene mapping.
Presentation
In this last step, the method of summarisation and rationalization of conclusions is completed.
However, it should be written in a layperson’s terms using abstracted terminologies. All abstracted terminologies ought to reference the particular details.
5.Types of Digital Forensics
Three styles of digital forensics are:
Disk Forensics:
It deals with extracting information from storage media by looking out active, modified, or deleted files.
Network Forensics:
It may be a sub-branch of digital forensics. it’s regarding observation and analysis of electronic network traffic to gather vital data and legal proof.
Wireless Forensics:
It may be a division of network forensics. the most aim of wireless forensics is to offers the tools got to collect and analyze the information from wireless network traffic.
Database Forensics:
It may be a branch of digital forensics regarding the study and examination of databases and their connected data.
Malware Forensics:
This branch deals with the identification of malicious code, to check their payload, viruses, worms, etc.
Email Forensics :
Deals with recovery and analysis of emails, as well as deleted emails, calendars, and contacts.
Memory Forensics:
It deals with aggregation information from system memory (system registers, cache, RAM) in raw kind so carving the information from Raw dump.
Mobile Phone Forensics:
It primarily deals with the examination and analysis of mobile devices. It helps to retrieve phone and SIM contacts, call logs, incoming, and outgoing SMS/MMS, Audio, videos, etc.
6.Challenges long-faced by Digital Forensics
Here, are major challenges faced by the Digital Forensic:
- The increase of PC’s and extensive use of internet access
- Easy availability of hacking tools
- Lack of physical evidence makes prosecution difficult.
- The great amount of space for storing into Terabytes that produces this investigation job tough.
- Any technological changes need associate degree upgrade or changes to solutions.
7.Example Uses of Digital Forensics
In recent time, industrial organizations have used digital forensics in following a sort of cases:
- Intellectual Property theft
- Industrial espionage
- Employment disputes
- Fraud investigations
- Inappropriate use of the web and email within the workplace
- Forgeries connected matters
- Bankruptcy investigations
- Issues concern with the regulative compliance
8.Advantages of Digital forensics
Here, are pros/benefits of Digital forensics
- To make sure the integrity of the pc system.
- To manufacture proof within the court, which might result in the penalization of the perpetrator.
- It helps the businesses to capture vital data if their pc systems or networks are compromised.
- Efficiently tracks down cybercriminals from anyplace within the world.
- Helps to protect the organization’s money and valuable time.
- Allows to extract, process, and interpret the factual proof, so it proves the cybercriminal action’s in the court.
9.Disadvantages of Digital Forensics
Here, are major cos/ drawbacks of victimisation Digital Forensic
- Digital proof accepted into court. However, it’s should be proven that there’s no tampering
- Producing electronic records and storing them is a very expensive affair
- Legal practitioners must have intensive pc knowledge
- Need to provide authentic and convincing evidence
- If the tool used for digital rhetorical isn’t in line with nominative standards, then within the court of law, the proof will be marginal by justice.
- Lack of technical information by the investigation officer won’t supply the required result .
Conclusion
Hope you’ll perceive this post , you need to conjointly realize this subject . Moral Hacking ( half – vi ) is completed . In next half we have a tendency to are about to find out how to hack an online server (In sight of Education ) . conjointly raise your doubt within the comments .
March Long Challenge 2021 Solutions
- An Interesting Sequence ISS SOLUTION
- Tree House THOUSES SOLUTION
- Valid Paths VPATH SOLUTION
- Modular Equation MODEQ SOLUTION
- Tic Tac Toe TCTCTOE SOLUTION
- Xor Equality XOREQUAL SOLUTION
- Golf LKDNGOLF SOLUTION
- Solubility SOLBLTY SOLUTION
April Long Challenge 2021 Solutions
- Chef and Dice SDICE Solution
- Worthy Matrix KAVGMAT Solution
- Binary String MEX MEXSTR Solution
- Boolean Game BOOLGAME Solution
- Tree Permutations TREEPERM Solution
- Destroy the EMP Chip CHAOSEMP Solution
- Chef and Pair Flips PAIRFLIP Solution
- String Power STRPOW Solution
- Brahma and Shiva SHRINES Solution
- Water Sort Puzzle (Challenge) WTRSORT Solution
- World Record BOLT Solution
- Strong Language SSCRIPT Solution
- Valid Pair SOCKS1 Solution
Codechef Long Challenge Solutions
February Long Challenge 2021
1. Frog Sort Solution Codechef
2. Chef and Meetings Solution Codechef
3. Maximise Function Solution Codechef
4. Highest Divisor Solution Codechef
5. Cut the Cake Challenge Solution Codechef
6. Dream and the Multiverse Solution Codechef
7. Cell Shell Solution Codechef
8. Multiple Games Solution Codechef
9. Another Tree with Number Theory Solution Codechef
10. XOR Sums Solution Codechef
11. Prime Game Solution CodeChef
12. Team Name Solution Codechef
January Long Challenge 2021
- Chef and Division 3 DIVTHREE SOLUTION Code Chef
- Encoded String DECODEIT SOLUTION Code Chef
- Point Of Impact BILLRD SOLUTION Code Chef
- Fair Elections FAIRELCT SOLUTION Code Chef
- Watching CPL WIPL SOLUTION Code Chef
- Chef and Ants ANTSCHEF SOLUTION Code Chef
- Blackjack BLKJK SOLUTION Code Chef
- And-Or Game ORAND SOLUTION Code Chef
- Stack-Queue Sort (Challenge) SQSORT SOLUTION Code Chef
- Expected Number of SCCs RCTEXSCC SOLUTION Code Chef
- Curious Matrix CURMAT SOLUTION Code Chef
- Cool Subsets COOLSBST SOLUTION Code Chef
- Sequence Creation ARCRT SOLUTION Code Chef
- Greedy Students GRDSTD SOLUTION Code Chef
November Challenge 2020 SOLUTION CodeChef
- Ada and Dishes SOLUTION ADADISH
- Iron Magnet and Wall SOLUTION FEMA2
- Magical Candy Store SOLUTION CNDYGAME
- Unusual Queries SOLUTION UNSQUERS
- Red-Black Boolean Expression SOLUTION RB2CNF
- Chef and the Combination Lock SOLUTION CHEFSSM
- Scalar Product Tree SOLUTION SCALSUM
- Connect on a Grid (Challenge) SOLUTION CONGRID
October Lunchtime 2020 CodeChef SOLUTIONS
- AND Plus OR SOLUTION ANDOR
- Chef and Subtree MEXs SOLUTION SUBMEXS
- Chef Likes Good Sequences SOLUTION GSUB
- Cute Chef Gift SOLUTION COPAR
- Chef Is Just Throwing Random Words SOLUTION SSO
- Counting Spaghetti SOLUTION CDSUMS
- Chef and Edge Flipping SOLUTION EFLIP
RELATED :
- Top Best Keylogger in Python 3 Make One
- What is Hacking?
- Secrets of the Deep Dark Web
- CODECHEF September Lunchtime 2020 SOLUTIONS
- August Lunchtime 2020 SOLUTIONS
Related :
- A. Shandom Ruffle SOLUTION
- B. Pear TreaP SOLUTION
- C. Sneetches and Speeches 3 SOLUTION
- D. The Grim Treaper SOLUTION
- Y. Sneetches and Speeches 1 SOLUTION
- Z. Trick or Treap SOLUTION
- A. Floor Number SOLUTION CODE FORCES
- B. Symmetric Matrix SOLUTION CODE FORCES
- C. Increase and Copy SOLUTION CODE FORCES
- D. Non-zero Segments SOLUTION CODE FORCES
- E. Rock, Paper, Scissors SOLUTION CODE FORCES
- F. Number of Subsequences SOLUTION CODE FORCES
Related :
- Chef and Easy Queries SOLUTIONS CHEFEZQ
- Covid Run SOLUTIONS CVDRUN OCTOBER CHALLENGE
- Positive AND SOLUTIONS POSAND
- Replace for X SOLUTIONS REPLESX
- Village Road Network SOLUTIONS VILLNET
- Random Knapsack SOLUTIONS RANDKNAP
- D-Dimensional MST SOLUTIONS DDIMMST
- Compress all Subsegments SOLUTIONS SEGCOMPR
- Adding Squares SOLUTIONS ADDSQURE
- Inversions SOLUTIONS INVSMOD2 OCOTBER CHALLENGE
- Rooted Minimum Spanning Tree SOLUTIONS ROOTMST