comscore Here’s how cyber forensics go about cleaning up the mess after an attack
News

Here’s how cyber forensics go about cleaning up the mess after an attack

Cyber Forensics needs to be of paramount importance to individuals, corporations and government agencies.

Hacker stock image

In these times of high penetration, high accessibility and low rates, internet has reached all facets of our lives. But with this rise of the internet, there has also been a considerable rise in hacking attacks or cyberattacks on individuals, businesses, corporations and government agencies. Large scale cyberattacks can even be termed as acts of Cyber Terrorism. Also Read - Internet turns 25 in India: Here's how the next 25 years may look like

Depending on the severity of the cyberattack, it could take weeks or even months to determine the answers to; ‘How it happened?’, and ‘How can it be prevented from happening again?’ This is where ‘Forensics’ comes into play. Any and all evidences left behind at the scene need to be collected very carefully and examined. From here onwards, questions of ‘who, what, where, when and why’ can be answered by forensic examiners and investigators. Also Read - Twitter reports security bug in Android, wants users to update app

Cyber Forensics is the process of uncovering and interpreting electronic data from devices used before or during a crime. The goal is to preserve any evidence in its most original form while performing a structured investigation by collecting, identifying and validating the data collected. Digital forensic services are commonly used in criminal and private investigations. Also Read - TikTok's Indian alternative Chingari's company website reportedly compromised

With the advent of cybercrimes, tracking malicious online activity has become crucial for protecting individuals and corporations, as well as preserving online operations in public safety, national security, government and law enforcement.

In order to gain access to digital evidences, a Cyber Forensic analyst might take a look at a device’s hard drive in order to gain access to all data that has been accessed on that particular device (even deleted files), or they might also analyze the system as a whole, taking the network and its structure into account.

Cyber Forensic Investigation Steps

There are five critical steps in Cyber Forensics, all of which contribute to a thorough and revealing investigation.

1. Developing & Documenting; Procedures & Policies

Whether related to malicious cyber activity, criminal conspiracy or the intent to commit a crime, digital evidence can be delicate and highly sensitive. Cybersecurity professionals understand the value of this information and respect the fact that it can be easily compromised if not properly handled and protected. Such procedures can include detailed instructions about when cyber forensics investigators are authorized to recover potential digital evidence, how to properly prepare systems for evidence retrieval, where to store any retrieved evidence, and how to document these activities to help ensure the authenticity of the data.

2. Assessment of Potential Evidence

A key component of the investigative process involves the assessment of potential evidence in a cybercrime. Central to the effective processing of evidence is a clear understanding of the details of the case at hand and thus, the classification of cybercrime in question. For instance, if an agency seeks to prove that an individual has committed crimes related to identity theft, cyber forensics investigators use sophisticated methods to sift through hard drives, email accounts, social networking sites, and other digital archives to retrieve and assess any information that can serve as viable evidence of the crime. Prior to conducting an investigation, the investigator must define the types of evidence sought have a clear understanding of how to preserve pertinent data.

3. Plan for Acquiring Evidences

Perhaps the most critical facet of successful cyber forensic investigation is a rigorous, detailed plan for acquiring evidence. Extensive documentation is needed prior to, during, and after the acquisition process. Detailed information must be recorded and preserved, including all hardware and software specifications, any systems used in the investigation process, and the systems being investigated. This step is where policies related to preserving the integrity of potential evidence are most applicable. Acquiring evidence must be accomplished in a manner both deliberate and legal.

4. Examination of the Data

In order to effectively investigate potential evidence, procedures must be in place for retrieving, copying, and storing evidence within appropriate databases. Investigators typically examine data from designated archives, using a variety of methods and approaches to analyze information; these could include utilizing analysis software to search massive archives of data for specific keywords or file types, as well as procedures for retrieving files that have been recently deleted. Data tagged with times and dates is particularly useful to investigators, as are suspicious files or programs that have been encrypted or intentionally hidden.

5. Documenting Information

In addition to fully documenting information related to hardware and software specs, forensic investigators must keep an accurate record of all activity related to the investigation, including all methods used for testing system functionality and retrieving, copying, and storing data, as well as all actions taken to acquire, examine and assess evidence. Not only does this demonstrate how the integrity of user data has been preserved, but it also ensures proper policies and procedures have been adhered to by all parties. As the purpose of the entire process is to acquire data that can be presented as evidence in a court of law, an investigator’s failure to accurately document his or her
process could compromise the validity of that evidence and ultimately, the case itself.

Cyber Forensics needs to be of paramount importance to individuals, corporations and government agencies. There is often the thought among intellectuals that simply fortifying the lines of defense with firewalls, routers, etc. will be enough to stop or prevent cyberattacks but security professionals will know this is not true, given how sophisticated today’s Cyber hackers are. In Cyber Forensics, it is important to implement a dynamic investigation methodology as each cyberattack is very different from one another.

The article is written by Rahul Dwivedi, CEO, Pelorus.

For the latest tech news across the world, latest PC and Mobile games, tips & tricks, top-notch gadget reviews of most exciting releases follow BGR India’s Facebook, Twitter, subscribe our YouTube Channel.
  • Published Date: February 20, 2019 4:30 PM IST



new arrivals in india

Realme Narzo 20 Pro
Realme Narzo 20 Pro

14,999

Oppo F17
Oppo F17

17,990

Samsung Galaxy M51
Samsung Galaxy M51

24,999

Poco M2
Poco M2

10,999

Oppo F17 Pro
Oppo F17 Pro

22,990

Realme 7 Pro
Realme 7 Pro

19,999

Realme 7
Realme 7

14,999

Xiaomi Redmi 9A
Xiaomi Redmi 9A

6,799

Vivo Y20
Vivo Y20

12,990

Xiaomi Redmi 9
Xiaomi Redmi 9

8,999

Nokia 5.3
Nokia 5.3

13,999

Motorola Moto G9
Motorola Moto G9

11,499

Realme C15
Realme C15

9,999

Realme C12
Realme C12

8,999

Samsung Galaxy Note 20
Samsung Galaxy Note 20

77,999

Xiaomi Redmi 9 Prime
Xiaomi Redmi 9 Prime

9,999

Oppo Reno4 Pro
Oppo Reno4 Pro

34,990

Samsung Galaxy M01 Core
Samsung Galaxy M01 Core

5,499

Realme 6i
Realme 6i

12,999

Asus Rog Phone 3
Asus Rog Phone 3

49,999

OnePlus Nord
OnePlus Nord

24,999

Infinix Smart 4 Plus
Infinix Smart 4 Plus

7,999

Xiaomi Redmi Note 9
Xiaomi Redmi Note 9

11,999

Samsung Galaxy M01s
Samsung Galaxy M01s

9,999

Vivo X50 Pro 5G
Vivo X50 Pro 5G

49,990

Vivo X50 5G
Vivo X50 5G

34,990

Realme C11
Realme C11

7,499

Poco M2 Pro
Poco M2 Pro

13,999

Realme X3
Realme X3

24,999

Realme X3 SuperZoom
Realme X3 SuperZoom

27,999

Tecno Spark Power 2
Tecno Spark Power 2

9,999

Oppo A12
Oppo A12

9,990

Oppo A52
Oppo A52

16,990

Samsung Galaxy A21s
Samsung Galaxy A21s

15,999

Oppo Find X2
Oppo Find X2

64,990

Motorola One Fusion Plus
Motorola One Fusion Plus

17,499

Samsung Galaxy A31
Samsung Galaxy A31

20,999

Samsung Galaxy M01
Samsung Galaxy M01

8,999

Samsung Galaxy M11
Samsung Galaxy M11

10,999

Infinix Hot 9 Pro
Infinix Hot 9 Pro

9,999

LG Velvet
LG Velvet

Price Not Available

Xiaomi Mi Note 10 Lite
Xiaomi Mi Note 10 Lite

Price Not Available

Apple iPhone SE 2020
Apple iPhone SE 2020

42,500

Honor 30 Pro
Honor 30 Pro

Price Not Available

Honor 30
Honor 30

Price Not Available

OnePlus 8
OnePlus 8

44,999

OnePlus 8 Pro
OnePlus 8 Pro

54,999

Xiaomi Redmi Note 9 Pro
Xiaomi Redmi Note 9 Pro

13,999

Motorola Moto E4
Motorola Moto E4

8,999

Samsung Galaxy On Max
Samsung Galaxy On Max

9,775

nubia N2
nubia N2

15,999

Karbonn K9 Kavach 4G
Karbonn K9 Kavach 4G

5,290

Motorola Moto C Plus
Motorola Moto C Plus

6,999

Best Sellers