You are on page 1of 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/358780840

Cyber Forensic -A Literature Review

Article · December 2019


DOI: 10.48165/tjmitm.2019.1002

CITATIONS READS

3 1,757

3 authors, including:

Surabhi Shanker
Trinity Institute of Professional Studies
19 PUBLICATIONS 10 CITATIONS

SEE PROFILE

All content following this page was uploaded by Surabhi Shanker on 22 February 2022.

The user has requested enhancement of the downloaded file.


Review Article

Trinity Journal of Management, IT & Media ISSN 2320-6470 (Print)


www.acspublisher.com ISSN A/F (Online)
Year 2019, Volume-10, Issue-1 (Jan-Dec)
DOI: 10.48165/tjmitm.2019.1002

Cyber Forensic – A Literature Review


Aparna Chaturvedi1*, Ashish Awasthi2 and Surabhi Shanker3
1Department of Mathematics, AIAS, Amity University, Noida, India
2Department of Computer Applications, SRMGPC, Lucknow (UP) (India)
3Dept. Of Computer Applications, Trinity Institute of Professional Studies

ARTICLE INFO ABSTRACT


Key word: digital evidence, Cyber Forensics is a branch of forensic science that is aimed to restore, collect and
digital forensics, cyber examine the digital evidence of materials found in digital devices, in relation to
forensics, digital forensic cybercrimes. With the advancement in cyber area, frequent use of internet and
science technologies leads to cyber-attacks. Cyber forensic is opted for acquiring electronic
information and investigation of malicious evidence found in system or on network
in such a manner that makes it admissible in court. It is also used to recover lost
information in a system. The retrived information is used to prosecute a criminal.
Number of crimes committed against an internet and malware attacks over the
digital devices have increased. This paper contains a brief review of the literature
aimed to identify the relevant pieces of knowledge in the digital forensics field.

Introduction “Digital forensics is the discipline that combines elements


of law and computer science to collect and analyze data from
In our days, all digital devices such as cell phones, tablets, computer systems, networks, wireless communications, and
laptops and desktop computers can be used for criminal storage devices in a way that is admissible as evidence in a
activities such as fraud, drug trafficking, homicide, hacking, court of law” (National Cybersecurity and Communications
forgery, terrorism, etc. To fight against these criminal Integration Center – NCCIC).
activities, cyber forensics is used to help investigate
cybercrimes and to identify the device-assisted crime and
the authors of it Mithileysh Sathiyanarayanan, 2016. Literature Review
Cyber forensics is the application of examination and Digital forensics can be divided in few steps as discussed:
analysis techniques to gather and preserve evidence from
an appropriate computing device in a way that is suitable for
presentation in a court of law. The goal of cyber forensics Forensic Evidence and Crime Investigation:
is to perform a careful investigation while maintaining a
documented chain of evidence to find out exactly what to e-evidence plays an important role in crime reconstruction.
be found on a computing device and who was blamed for Those crimes are not limited to cybercrimes because many
it. Digital Forensics tools are now used on a daily basis by traditional crimes leave cyber trails. To ensure that the
examiners and analysts (Simon L, 2010). evidence is admissible, the investigators must perform

Corresponding author.
*

E-mail address: chaturvedi.aparna.tirwa@gmail.com (Aparna Chaturvedi)


Received 05-02-2019; Accepted 15-12-2020
Copyright @ Trinity Journal of Management, IT & Media (https://acspublisher.com/journals/tjmitm/)

24
Aparna Chaturvedi Cyber Forensic – A Literature Review

an objective examination of the evidence and objectively and lead to challenges to the admissibility of e-evidence.
interpret the evidence. The need for e-evidence has led to a new area of criminal
Different types of evidence vary in their ability to prove a investigation, namely computer forensics. This new field
fact about what has happened, when, how, and by whom. is less than 15 years old and is evolving rapidly. Computer
Without evidence of an act or activity that violated forensics depends on an understanding of technical and
a statute, in effect, there is no crime. To guard against legal issues. The most consequential legal issue in computer
wrongfully finding a person guilty of a crime, the processes forensics is the admissibility of evidence in criminal cases.
involved in gathering, searching, seizing, and admitting Computer forensics investigators must identify, gather,
evidence must follow rules of evidence and other official extract, protect, preserve, and document computer and
procedures. other e-evidence using acceptable methods to ensure
admissibility. An understanding of behavioral issues and
Electronic discovery, or e-discovery, refers to the
a grasp of the ethical problems that investigators face are
discovery of electronic documents, data, e-mail messages,
also valuable skills.
or other potential e-evidence. Technically, data or files are
electronic if they exist in a medium that can be read only The law of search and seizure, as it relates to computers
through the use of computers. E-discovery can be more and electronic equipment, must be followed. Failure to
complex than traditional paper discovery, which refers to follow proper legal procedure will result in evidence’s
the discovery of writings on paper that can be read without being ruled inadmissible in court and a guilty criminal’s
the aid of some devices, because e-evidence is more volatile going free. In addition, it is equally important to prevent
and easily altered without obvious detection. innocent people from being charged with crimes they did
Many of the processes and tools used to discover and not commit.
recover e-evidence can also be applied to recover data lost
due to a disaster or sabotage. Like most electronic files and
e-mail messages, they are rarely ever gone because they Tools, Environments, Equipment,
leave traces or backups. and Certifications
Nikita Rana,2017, The quality of e-evidence depends
Computer Forensics and Digital on skilled investigators following standard procedures
and using trusted technology (Natarajan Meghanathan,
Detective Work
2019) throughout the lifecycle of a case or investigation.
Computer forensics is the science of acquiring, Maintaining the integrity of e-evidence requires a defensible
preserving, retrieving, and presenting data that has been approach to data handling and preservation. There can be
processed electronically and stored on computer media no weak links in the investigative process. With widespread
(Michael G, 2010). use of computers to plan, facilitate, or carry out violent and
nonviolent crimes, it is vital for a forensics investigator to
We all know that that the widespread use of computers
and the Internet have contributed to traditional and be able to extract and analyze data quickly and present the
computer crimes (Garber Lee, 2012). Effective forensic evidence in an understandable format.
investigation of these offenses requires evidence gathered Frequently, investigators have to defend their
from computers, storage media, digital devices, e-mail, findings, processing methods, tools, and techniques
chat rooms, and the Internet—and any technology that against challenges raised by the opposing side. Therefore,
tracks what was done, who did it, and when. e-evidence processing must be done correctly and
Law enforcement and other investigators will produce, documented thoroughly or else any resulting court case
during the discovery process, imaged or exact copies of the may be thrown out. A key principle is that the technologies
digital media being investigated. These copies need to be and methodologies used must be well documented and
examined by trained professionals to ensure that the media repeatable.
have been secured and examined in the correct manner Documentation, collection, authentication, analysis,
and all evidence has been recovered. preservation, and production and reporting of the findings
There are numerous legal and ethical issues of require the use of specialized software and hardware tools
evidence seizure, handling, and investigation. Updated and and equipment. Because of the complexity of many of the
new federal rules and laws regulate forensic investigations tools, training in their use and certification is necessary.

25
Aparna Chaturvedi Cyber Forensic – A Literature Review

There are also general training and certifications available making at least two copies of the data so that you can work
for computer forensics investigators. on one copy while safeguarding the original copy and the
suspect’s device. Other guidelines are specific to a device,
such as the importance of maintaining power to a PDA to
Policies and Procedures avoid data loss.
Alec Yasinsac, 2001, The key to a consistent and methodical A number of suppliers such as Guidance, Paraben,
investigation is a good set of policies and procedures that AccessData, and Logicube have developed tools for
serve as guidelines or baselines for any investigation. These capturing and analyzing data. Some of these tools are
policies and procedures are designed not only to delineate designed to work with a specific type of data, such as that
the process of an investigation but also to aid in the acquired from PDAs, while others can be used for several
management of a computer forensics lab. This is not to say different types of data.
you cannot be flexible; to the contrary, your policies and
procedures should be designed to be flexible and adjust as
necessary for each case. Operating Systems and Data Transmission
The actual process of conducting a forensic Basics for Digital Investigations:
examination from the first phone call you receive to the
time when you turn over the final report. The four main The operating system of a computer is the program that
steps of any computer forensics investigation are planning, controls the basic functions of a computer and acts as
acquisition, analysis, and reporting. Forensic investigation the intermediary between the application programs and
is not an exact science, and steps will vary depending on the hardware of a computer. The two types of interfaces used
case, so the processes outlined for each step provide broad to communicate with an operating system are command-
guidelines; however, these steps are generally accepted by line interface (CLI) and graphical user interface (GUI).
most computer forensics professionals and can be adapted The CLI interface consists of a text-based interface where
to your needs. commands are entered via a prompt. A GUI interface
usually consists of a pointing device such as a mouse being
The science behind the technology is fairly well
used to interface with graphical objects, such as icons or
understood, and the tools used by computer forensic
menus, on a monitor.
analysts are becoming much easier to use. The field of
computer forensics science will gradually give way to the The functions basic to an operating system are file
field of computer forensic art. The science of computer management, memory management, job management,
forensics will always strive to keep up with the technology device management, and security management. Early
of the day, but it is the computer forensic analyst, who computers did not need an operating system because
understands how people use this technology, who will be applications handled all computer functions. Modern
able to solve the difficult cases. In essence, the scientist computers have many applications and thus require a
must also be a psychologist with the ability to use high- centralized operating system to handle applications and
technology tools. system information. DOS, Windows, UNIX/Linux, and
Macintosh OS X are all examples of operating systems used
on modern computer systems.
Data, PDA, and Cell Phone Forensics
File systems manage the basic unit of data storage
The basic media types and devices that you will encounter called a file. Various file systems in use include FAT 16,
when doing a forensic examination. You are most likely FAT 32, NTFS, efs, UFS, and OS X.
to encounter magnetic media devices such as hard drives
and optical media devices such as CDs, but electronic The OSI model standardized the methods used to
devices such as USB drives are becoming more prevalent. transmit data on a network. The OSI model consists
Your job as a forensic investigator may also require you to of a seven-layer approach. While the OSI model is the
know about data from PDAs and cellular phones (Greg theoretical model to follow, the TCP/IP model is the de
Gogolin, 2013). facto standard of the Internet. The TCP/IP model consists
of a four-layer approach.
After learning how data is stored in these various types
of devices, you learned specific methods for acquiring data The two address schemes used to transmit data across
from each category. Some guidelines for data acquisition networks are logical addressing and physical addressing.
are the same for any device, such as the importance of Logical addressing usually consists of IP addressing,

26
Aparna Chaturvedi Cyber Forensic – A Literature Review

and physical addressing consists of media access control conversation. However, if IM messages can be found, they
addressing. often contain very powerful evidence because most people
use them with unguarded attitudes.

Investigating Windows, Linux, and


Graphics Files Internet and Network Forensics and
Intrusion Detection
The evidence search times can be reduced by looking
in predictable areas, such as default folders and This area of computer forensics is just beginning to expand
operating systems artifacts, during the beginning of to the point where the technology is robust and reliable
the investigation before initiating intense and detailed enough to be accepted in a court of law. Additionally, the
probes. The skill level of the user will more than likely sheer power to collect wide ranges of data from networks
determine whether this is effective for your case. A savvy is now well within the computational and storage power
user can hide data by using nonstandard file folders to of most organizations. This factor, coupled with the fact
place information, renaming file types, using layered that NFAT systems can enable an organization to deal in
graphics, and masquerading data with steganographic real time with internal and external network threats and
techniques (Jun-Hyung Park, 2006). to recreate what happened for future use, make this type of
software extremely versatile. This chapter only covered the
surface possibilities and uses for the forensic use of such
E-Mail and Webmail Forensics: software. More and more organizations will eventually
move to this forensic model because it uses the power of
Electronic mail and instant messages can be important the network to accomplish forensic tasks that at present are
evidence to find. They provide a more realistic view of done in a more labor intensive and costly way.
the candor of a person because of their ubiquitous use
and informality. For both of these technologies, a client
program and a server are required. The client program Tracking Down Those Who Intend to
may be resident on a user’s PC and store data on the hard
Do Harm on a Large Scale
drive, or the client may be Web-based. Web-based clients
often do not leave a complete data trail on the PC itself The methods used by those intent on causing harm on a
and may require an investigator to harvest this data from large scale. The same challenges that face investigators of
the server or servers involved in the transmission of the small cases involving one or a few individuals apply to large-
message. When trying to recover data from a server, you scale cases. Each type of forensics, namely e-mail, network,
must determine the data storage structure being used and data, cell phone, and IRC forensics, come into play when
the size of the composite data storage pool, plus you need investigating terrorists, cyberextortionists, hackers, and
to ensure that you have appropriate authorization to work botmasters. It is critical to understand their motives and
on the server. You must compose a good plan with realistic methods, intelligence activities, and concealment tactics.
values for time and storage requirements before beginning Investigations of these criminals require the resources and
a forensic review of a server. cooperation of the FBI, other federal agencies, and foreign
Using e-mail headers and IM logs can provide governments. Computer forensics experts may be called
additional sources of possible data locations, such as upon to support these agencies and defend against crimes
recipient/sender PCs and intermediate servers. Tracing aimed at destroying human life, critical infrastructures, or
the IP addresses may involve the use of regional Internet private property.
registries, such as ARIN, to determine the registered owner
of an IP address range and a contact address for that owner.
Fraud and Forensic Accounting
IM has become a mechanism that users believe to be Investigation:
inherent in daily life. Like e-mail, it is a client/server–based
technology; however, with today’s clients, the messages In this Internet era, more and more frauds will be
may not be saved to any hard drive. Because of the volume perpetrated using computers and networks. Whether
of IM, public servers such as AOL and Google typically the potential fraudster is a disgruntled employee, greedy
do not keep logs of message content and may not even executive, or unethical business partner, there are many
keep transaction logs. IM may be as intangible as a phone opportunities to defraud a company or organization.

27
Aparna Chaturvedi Cyber Forensic – A Literature Review

Pressure, opportunity, and rationalization are the and there are no technical jury qualification guidelines
three elements of every fraud. Investigators should look for cases involving complex computer data. Working as an
for evidence of each of these factors—and not focus solely expert witness can be as challenging as the investigation
on opportunity. In order to prove fraud, the prosecutor and perhaps more demanding. You may need to critically
must show intent and deceit. E-mail and other electronic review and then validate or refute the testimony of other
communication media often contain evidence of deceit investigators—or be the subject of another expert’s critique
and intent as well as pressures or rationalization for stealing of your methods and opinions. Witnesses need to be
from a company. prepared to be able to withstand scrutiny from judges,
The purpose of a fraud or forensic accounting jurors, and attorneys who may know very little about
investigation is to detect ongoing fraud or to investigate e-evidence (Computer Forensics US-CERT.).
it after it has occurred. The word forensic in financial To provide testimony as an expert witness. Given
investigations implies that the information that is uncovered what is at stake, witnesses have ethical responsibilities that
is capable of being used in court. Forensic accounting is the cannot be compromised. In addition to understanding
investigation and analysis of financial evidence that, like the technologies that may be at issue in a given case, to be
other forensic investigations, requires proper procedures an effective expert witness you must understand the legal
and detailed evidence to ensure its admissibility. system, specific courtroom communication skills, skills for
enduring cross-examination, and how to prepare for legal
testimony.
Federal Rules and Criminal Codes
The Federal Rules of Evidence and Procedure that directly
impact investigative procedures and the admissibility Conclusion
of evidence. Actual federal cases and court decisions
This paper, is a literature review of cyber forensics. Cyber
were presented to illustrate the tough challenges to an
forensics has many challenges for investigators. These
investigator’s experience, evidence handling, hardware,
challenges become more and more complex because
and procedures. Clearly, investigators need a working
criminals also learn to hide evidences or have advanced
knowledge of what constitutes a legal search so as not
computers knowledge. we examined distinctive forensic
to compromise cases, convict innocent people, or let
tools used for analysing security flaws in digital forensics
guilty people go free. Before seizing computers, Fourth
Amendment search warrant requirements need to be and also the detailed review of cyber forensics. Due to rapid
met. Before accessing stored data, the requirements of increase in the number of Internet users across the world,
the Electronic Communication Privacy Act must be the frequency of digital attacks has increased. Therefore,
considered. Conducting real-time electronic surveillance the need to devise effective methodologies and develop
may require a wiretap order from a judge. In the next efficient tools to detect these attacks timely. In this paper,
chapter, you will learn how to present testimony about we have examined different tools for performing digital
evidence and methods in court or legal action. forensic analysis. This research provides a provisional
study of the tools regarding cyber forensic analysis.
Amendments to anticrime legislation, particularly the
USA PATRIOT Act, have given greater search and seizure
authority to law officials and investigators— at the expense References
of privacy. The next chapter also examines ethical issues
and dilemmas. Mithileysh Sathiyanarayanan, Introduction to Digital Forensics,
2016. https://www.academia.edu/download/61723117/Intro-
duction_to_Digital_Forensics20200108-92193-k0ho5z.pdf
Ethical and Professional Responsibility Garfinkel SL. Digital forensics research: The next 10 years. digital
in Testimony investigation. 2010 Aug 1;7:S64-73.
Working in the legal system imposes a huge responsibility Noblett MG, Pollitt MM, Presley LA. Recovering and
on you to perform your work with diligence, competence, examining computer forensic evidence. Forensic Science
and good judgment. Computer crimes do not have Communications. 2000 Oct 1;2(4).
eyewitnesses, so juries rely on forensics experts to help Park JH, Kim M, Noh BN, Joshi JB. A similarity based technique
them understand the meaning of the e-evidence. Jurors for detecting malicious executable files for computer
are not required to hold any professional qualifications, forensics. In2006 IEEE International Conference on

28
Aparna Chaturvedi Cyber Forensic – A Literature Review

Information Reuse & Integration 2006 Sep 16 (pp. 188- Meghanathan N, Allam SR, Moore LA. Tools and techniques for
193). IEEE.. network forensics. arXiv preprint arXiv:1004.0570. 2010
Computer Forensics US-CERT. https://www.us-cert .gov/ Apr 5.
security-publications/computer-forensics, National Cyber- Infosec, https://resources.infosecinstitute.com/ computer-
security and Communications Integration Center – forensics-tools/, 2019.
NCCIC, US. Garber L. Encase: A case study in computer-forensic technology.
Gogolin G, editor. Digital forensics explained. CRC Press; 2021 IEEE Computer Magazine January. 2001 Jan.
Apr 11. Yasinsac A, Manzano Y. Policies to enhance computer and
U.S. Department of Justice, Forensic Examination of Digital network forensics. InProceedings of the 2001 IEEE
Evidence: A Guide for Law Enforcement, https://www. workshop on information assurance and security 2001 Jun
ncjrs.gov/. 5 (pp. 289-295).
Nikita Rana1, Gunjan Sansanwal, Kiran Khatter1, Sukhdev Raghavan S, Raghavan SV. A study of forensic & analysis
Singh, Taxonomy of Digital Forensics: Investigation Tools tools. In2013 8th International Workshop on Systematic
and Challenges, 2017, https://arxiv.org. Approaches to Digital Forensics Engineering (SADFE)
The Importance of Memory Forensics Tools, https://lifars. 2013 Nov 21 (pp. 1-5). IEEE.
com/2017/06/memory-forensics- tools/, 2017.

29

View publication stats

You might also like