0% found this document useful (0 votes)
19 views4 pages

Digital Forensics Semester Preparation

The document outlines the branches of Digital Forensics, including Computer, Mobile Device, Network, Cloud, Database, and IoT Forensics, each with specific focuses and tools. It also discusses Email Crimes, detailing types such as phishing and spoofing, alongside forensic investigation techniques like header analysis and metadata extraction. The content serves as a preparation guide for the B.Tech 8th Semester Digital Forensics exam.

Uploaded by

Subham Garain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views4 pages

Digital Forensics Semester Preparation

The document outlines the branches of Digital Forensics, including Computer, Mobile Device, Network, Cloud, Database, and IoT Forensics, each with specific focuses and tools. It also discusses Email Crimes, detailing types such as phishing and spoofing, alongside forensic investigation techniques like header analysis and metadata extraction. The content serves as a preparation guide for the B.Tech 8th Semester Digital Forensics exam.

Uploaded by

Subham Garain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Digital Forensics Semester Exam Preparation - B.

Tech 8th Semester

1. Compare the different branches of Digital Forensics with examples (10 marks)

Introduction:

Digital forensics is a multidisciplinary field involving the recovery and investigation of data from

various digital sources. It branches out depending on the type of device or environment under

investigation.

1. Computer Forensics

- Focus: Extraction and analysis of data from personal computers and laptops.

- Tools: EnCase, FTK.

- Example: Recovering deleted documents from an employee's workstation.

2. Mobile Device Forensics

- Focus: Examination of mobile phones, tablets, and SIM cards.

- Tools: Cellebrite, XRY.

- Example: Retrieving WhatsApp messages from a suspect's smartphone.

3. Network Forensics

- Focus: Monitoring and analysis of network traffic and intrusions.

- Tools: Wireshark, NetworkMiner.

- Example: Tracing IP addresses involved in a DDoS attack.

4. Cloud Forensics

- Focus: Investigation of data stored or processed in cloud environments.

- Tools: Elcomsoft Cloud Explorer.


- Example: Investigating unauthorized access to Google Drive.

5. Database Forensics

- Focus: Analysis of structured data in databases like SQL.

- Tools: ApexSQL, DBF Recovery.

- Example: Detecting tampered entries in a financial transaction database.

6. IoT Forensics

- Focus: Examining data from IoT devices such as smart home appliances or wearables.

- Example: Using fitness tracker data to verify alibis.

Conclusion:

Each branch serves a unique role depending on the source of evidence. Collectively, they support a

holistic digital investigation approach.

2. What do you mean by Email Crime? Discuss some Email Forensic Investigation Techniques (10

marks)

Introduction:

Email crimes involve the misuse of email platforms for illegal or unethical activities such as fraud,

harassment, phishing, and corporate espionage.

1. Common Types of Email Crimes

- Phishing Attacks: Fraudulent emails to steal credentials.

- Email Spoofing: Faking sender identity.

- Cyberstalking/Harassment: Sending threatening or offensive emails.

- Business Email Compromise (BEC): Targeting businesses to extract money.


2. Email Forensic Investigation Techniques

i. Header Analysis

- Reveals routing details and originating IP address.

- Helps trace the sender's location.

ii. Keyword Search

- Forensics tools search specific terms across emails for leads.

iii. Hashing Attachments

- Attachments are hashed to check for tampering or comparison with known malware.

iv. Email Server Logs

- Investigators review logs for login attempts, sent/received timestamps.

v. Metadata Extraction

- Extracting details like creation time, sender/receiver info using tools like FTK.

vi. Email Recovery

- Use of forensic tools to recover deleted emails.

3. Tools Used

- FTK, X1 Social Discovery, Paraben Email Examiner.

Conclusion:

Email forensics is a crucial subfield in digital forensics, especially for investigating cybercrimes and

fraud. Accurate recovery and interpretation of email data can be decisive in court proceedings.
More answers are available as requested by the user for different marks criteria (2, 5, 10 marks).

Prepared for: 8th Semester [Link] Digital Forensics Exam

You might also like