Professional Documents
Culture Documents
CYBER SECURITY
PREPARED BY: PROF.NEHAL SHAH
UNIT 2
Information Security
Concepts
Introduction
• Information Security Overview
• Information Security Services
• Goals for Security
• E-commerce security
• Computer Forensics
• Digital Forensics Science
• Digital Forensics Life Cycle.
Information Security
• Information Security is not only about securing information from
unauthorized access.
• Information Security is basically the practice of preventing
unauthorized access, use, disclosure, disruption, modification,
inspection, recording or destruction of information.
• Information can be physical or electronic one. Information can be
anything like Your details or we can say your profile on social media,
your data in mobile phone, your biometrics etc.
• Thus Information Security spans so many research areas like
Cryptography, Mobile Computing, Cyber Forensics, Online
Social Media etc.
• It is a method for storing data in such a way that small changes can
be easily detected and automatically corrected.
3. Availability
• Physical Protections
• Computational Redundancies
Physical Protections
• Identification:
• The first step of cyber forensics experts are to identify what evidence is
present, where it is stored, and in which format it is stored.
• Preservation:
• After identifying the data the next step is to safely preserve the data and
not allow other people to use that device so that no one can tamper data.
• Analysis:
• After getting the data, the next step is to analyze the data or system.
Here the expert recovers the deleted files and verifies the recovered
data and finds the evidence that the criminal tried to erase by deleting
secret files. This process might take several iterations to reach the final
conclusion.
• Documentation:
• Now after analyzing data a record is created. This record contains all
the recovered and available(not deleted) data which helps in
recreating the crime scene and reviewing it.
• Presentation:
• This is the final step in which the analyzed data is presented in front of
the court to solve cases.
Types of computer forensics
• After the analysis is done, a report is generated. The report may be in oral form or in written
form or both. The report contains all the details about the evidence in analysis,
interpretation, and attribution steps. As a result of the findings in this phase, it should be
possible to confirm or discard the allegations. Some of the general elements in the report are:
• Identity of the report agency
• Case identifier or submission number
• Case investigator
• Identity of the submitter
• Date of receipt
• Date of report
• Descriptive list of items submitted for examination
• Identity and signature of the examiner
• Brief description of steps taken during examination
• Results / conclusions
7. Testifying