Digital Forensic Part-001
Digital Forensic Part-001
Table of Contents:
• What is Digital Forensic?
• Elements of a Digital Crime
• Goals of Digital Forensic Investigation
• Classification of Digital Forensics
• Digital Evidence
• Principles of Digital Forensics
• Process of Forensic Investigation
• Types of Tools
https://www.labellerr.com/blog/what-are-adversarial-attacks-in-machine-learning-and-how-can-you-prevent-them/
Sources of cybercrime
Insider threats and external attacks are the two primary sources of
cybercrime.
• Insider threats: Since they might go unnoticed for a long period, this is the
most significant cyber risk threatening enterprises today. Employees —or
other persons working within the target company, such as former
employees, third-party contractors, or business associates—with
authorized access to the target organization’s computing systems and/or
information about its cybersecurity procedures and defenses—commit
insider attacks.
• External attacks: These attempts are typically carried out by skilled
hackers who operate from outside the target company. These are the most
typical types of cyberattacks against organizations all across the world. A
black hat hacker may attempt to enter the target company’s networks from
another country to get illicit access.
describe the target or subject of the malicious activity, and the victim could be an individual,
an organization, or even a system.
1. Individuals or Organizations:
• Victims can be individuals who have had their personal information compromised or
misused, or organizations that have suffered from cyberattacks such as data breaches,
ransomware attacks, or other forms of digital crimes.
2. Harm or Compromise:
• The harm or compromise experienced by the victim can take various forms, including
unauthorized access to sensitive data, financial losses, disruption of services, reputation
damage, or other negative impacts resulting from cyber incidents.
3. Forensic Investigation:
• Digital forensic investigators work to uncover the details of cybercrimes and the impact
on the victim. They analyze digital evidence to determine the extent of the compromise,
identify the methods used by attackers, and gather information that can be used for
attribution or legal action.
4. Incident Response:
• In addition to forensic investigation, victims often engage in incident response activities
to mitigate the impact of the cyber incident. This can include isolating affected systems,
removing malware, restoring services, and implementing measures to prevent future
incidents.
5. Legal Considerations:
• Victims play a crucial role in legal proceedings related to cybercrimes. The evidence
collected during digital forensic investigations is often used to build a case against
perpetrators, and victims may be involved in legal actions or cooperate with law
enforcement agencies.
6. Notification and Communication:
• In cases of data breaches or other incidents involving personal information, victims may
need to be notified about the breach. Effective communication with affected individuals
or organizations is an essential aspect of handling digital incidents.
Digital Evidence
Digital evidence or electronic evidence can be defined as any object that stores digital
information and transmits it in any form which was used in the act of crime or in
supporting the investigation of the case in a trial before the court.
The evidence found at the crime scene should have two key properties
The digital evidence can be like of various types and should be availed ethically by
following the prescribed guidelines of investigations. Here are a few digital evidences in
the diagram below, but the list goes on.
https://www.hackingarticles.in/digital-forensics-an-introduction/
https://www.hackingarticles.in/ctf-challenges-walkthrough/