Wednesday, June 28, 2023

COMPUTER OR CYBER FORENSICS

COMPUTER OR CYBER FORENSICS (CYBER INVESTIGATION)

This article will be discussing about the concept of Computer or Cyber Forensics in cyber-crime investigation including its issues and challenges

 

1. INTRODUCTION:

 

Our world is being developed gradually with the hand of technology which is become more operable with the emergence of internet. The use of computers increasing rapidly day by day as more as users are being connected with others through the internet.  One can easily access any information and can be connected with anyone while sitting far away from the destination and even can destroy any information through the use of internet.

 

The rapid development of information technology globally has led to the occurrence of new form of crime which is termed as Cyber-crime. Such crime has no boundary because it is committed with the use of internet which do not have any territorial boundary.

 

This kind of criminal activities directly relate to the use of computers or any electronic devices run through internet likewise mobile phone, especially trespass into the computer system or database of another, manipulation or theft of stored data, data diddling, tampering with the computer source code.

 

2. COMPUTER OR CYBER FORENSICS:

 

Forensic science is the scientific method of collecting, filtering, analysing and examining of a specific information. This science is being used and important in law enforcement where it plays a vital role in investigation a specific event.

 

Cyber forensics can also be defined as the process of extracting information and data from any specific computer system.

 

Cyber forensic experts can draw an array of method for collecting data that resides in a computer system or recovering deleted, encrypt or damages file information.

 

McCombie and Warren (2003) suggested that computer forensics can be defined as the collection, preservation, analysis and court presentation of computer related evidence.

 

3. EMERGENCE OF COMPUTER OR CYBER FORENSICS:

 

As a result of the first computer virus attacks on the World Wide Web, computer forensics as a field of study began in the late 1980s. The practice became more common and popular with increase in the number of personal computers specifically having access to the internet. Law enforcement agencies started assembling data for investigations into fraud and pornography that predominantly used computers as storage devices. The International Organisation on Computer Evidence was founded in 1995 during an international conference in Baltimore, Maryland, in the United States, with the goal of developing effective techniques for computer analysis. Digital evidence with a focus on computer forensics was acknowledged at the international conference held in Melbourne, Australia, in February 1996, following the establishment of the International Organisation on Computer Evidence. The CCRDU serves as a liaison organisation in India for the assimilation of cutting-edge methods used in other nations.

 

5. TYPES OF COMPUTER OR CYBER FORENSICS:

 

Following are the various types of computer forensics.

 

  • Database Forensics: It focuses on the research and analysis of databases and the associated metadata.
  • o Memory Forensics: it focuses on obtaining raw data from system memory and analyzing it for further research.
  • o Malware Forensics: It is concerned with locating suspicious code and researching viruses, worms, etc.
  • o Email Forensics: It deals with emails, their analysis and recovery, including contacts, calendars, and deleted emails.
  • o Disk Forensics: It deals with locating active, modified, or deleted files in order to extract raw data from the device's primary or secondary storage.
  • o Network Forensics: The monitoring and analysis of computer network traffic falls under this category of computer forensics.
  • o Mobile Phone Forensics: It mainly focuses on the inspection and evaluation of phones and smartphones, and it aids in retrieving contacts, call logs, incoming and outgoing SMS, etc., as well as other data that may be present.

 

6. PROCEDURE OF INVESTIGATION:

 

An investigation conducted using computer forensics typically consists of four steps or stages.  These steps include:

 

a. Collection and preservation of evidence

b. Extraction of evidence

c. Examination of evidence

d. Organization of evidence

 

let’s discuss in detail;

 

a. Collection and preservation of Evidence:

 

The first step in the cyber forensic process is the Collection and preservation of Evidence. The investigator must first ascertain few things, including the type of computer, the use for which it was intended, whether it was used alone or as part of a network, whether it was password-protected, and whether external storage devices were connected to the system or not. The most immediate and important objective of the collection and preservation process is the imaging of the evidentiary device.

 

There are several stages involved in the entire data collection process, including

 

i) identifying the nature and the location of data,

ii) preserving data in such a manner that that causes the least amount of disruption to the original data

iii) analysis of the data for intelligence and evidential purposes

iv) presentation of the data and evidence derived from the investigation in a court of law.

 

Computer forensic specialists must conduct a thorough analysis of the computer system, computer networks, malfunctioning computers, password cracking, audit trails, imaging or cloning of hard drives, etc. The process of imaging is crucial to the collection and preservation of data. The images are accepted as an accurate representation of the original digital media. The image is duplicated several times for various uses. The following are some of the tools that are frequently used for gathering and preserving evidence:

 

i. Hardware Imaging Devices

ii. Software Imaging Tools

iii. Imaging Validation Tools

iv. Write Blocking Tools

 

b. Extraction of Evidence:

 

Extraction of evidence is the second crucial phase after data collection and preservation. Following are the tools frequently used for the purpose of extraction of evidence:

 

i. Hidden data Recovery Tools

ii.  Known File Filtering

iii. Encryption Identification Tools

iv. Password Recovery Utilities

v.  Steganography Detection Tools

vi. Virus Detection Capabilities

 

c. Examination of Evidence:

 

Examination of Evidence means after the extracted evidence need to be examined by the forensic investigator. The expert must refine and examine what has been collected. At the time of, the investigator uses the available tools to examine specific evidence.at the end, the investigator can focus only on relevant information. Searching for documents, deleted files, images, emails, and other items on the computer is a common activity during the examination of the evidence.

 

d. Organization of evidence:

 

This phase of the investigation is the most crucial and significant. The examined data is methodically arranged in order to be produce before the court of law. The Link Analysis tool and time lining utilities are frequently used tools for organization of evidence.


7. CHALLENGES OF COMPUTER FORENSICS TECHNIQUES:

 

One of the biggest challenges posed by information technology is that the cybercrimes are relatively new and that existing legal frameworks are redundant in dealing with them is one of the biggest problems. Similarly, there is a significant gap between the cyber tools used by criminals and those available to law enforcement authorities to investigate and prevent cybercrimes. The tools currently in use to combat cybercrime are insufficient and less effective. Some challenges in the different forensics tools are as follows: Lack of forensic tools that verify data during acquisition, collection of volatile evidence, collection of data from active systems, labour-intensive nature of the current forensic tools, etc.

 

8. LEGAL ISSUES:

 

In the field of law, forensic evidence is crucial. The investigation and recording of data for evidence are extremely vulnerable to claims of error, technical malfunction, or unfair interference from the defence due to the new and constantly evolving information technology. A lack of adequate and proper training of law officers and forensic experts led to difficulty in collecting admissible, authentic, complete, reliable and believable data. There are two key challenges in a digital investigation: firstly; identifying the suspect and obtaining data relevant to the suspect’s criminal activities. Similarly, another challenge is to carry out digital investigation in case of data stored in the form of cloud environment. There are challenges such as lack of framework, lack of specialist tools, data is stored in multiple jurisdictions making it difficult to collect it, lack of tested and certified tools etc. 

 

9. CONCLUSION:

 

The science of computer forensics plays a vital role in the world of cyber law. It is the Combining use of law and technology which makes it easier to identify the crime and the criminal. The greatest challenge to the advancement in technology is the antiqueness of the old criminal justice system. Laws that are coming into force must be in form of tackle the continuous advancement of technology. The police officers and forensic specialists must be trained, and the forensic equipment must be updated. The search, seizure and investigation procedure are required to match with the changes in the manner of committing crime. The forensic expert must always act with care and caution in order to protect the integrity of the data and the evidence.

 


No comments:

Post a Comment