Jay Mehta is a cyber forensics investigator. His responsibilities include identifying and preserving crime scenes and evidence, documenting findings, and maintaining chain of custody of electronic evidence. Cyber forensics is important because digital evidence can be altered, damaged, or destroyed easily and crosses borders quickly. Various groups like law enforcement, companies and individuals use cyber forensics to investigate crimes and lawsuits.
4. Forensics Investigator ?
Identifying the crime scene
Protecting the crime scene
Preserving temporary and fragile evidence
Collecting complete information about the incident
Documenting all findings
Packaging and transporting the electronic evidence
Gather preliminary information at the scene
7. Digital Evidence ?
Latent/Hidden
Crosses jurisdictional borders quickly and easily
Can be altered, damaged, or destroyed easily
Can be time sensitive
8. Chain of Custody ?
A list of all devices that were secured from the crime scene for further
Investigation
Accurate information about the devices that has been copied, transferred,
and collected
Timestamp of all the collected evidence
Who processed the item?
Who is the owner of the item?
Where was it taken or seized from?
All electronic evidence that was collected from the crime scene must be
properly documented each time that evidence is viewed
Such documentation must be made available, if requested by the client,
throughout the pre-trial discovery phase.
9. Forensic Investigation Challenges
Inadequate chain of custody
Not maintaining legal procedures
Inadequate evidential integrity
Inadequate evidence gathering and maintaining accuracy,
authenticity, completeness
10. Who uses Cyber Forensics ?
Criminal Prosecutors
Civil Litigations
Insurance Companies
Private Corporations
Law Enforcement Officials
Individual/Private Citizens
11. Evidence Processing Guidelines
Step 1: Shut down the computer
Step 2: Document the Hardware Configuration of The System
Step 3: Transport the Computer System to A Secure Location
Step 4: Make Bit Stream Backups of Hard Disks and Floppy Disks
Step 5: Mathematically Authenticate Data on All Storage Devices
Step 6: Document the System Date and Time
Step 7: Make a List of Key Search Words
Step 8: Evaluate Unallocated Space (Erased Files)
Step 9: Document File Names, Dates and Times
Step 10: Identify File, Program and Storage Anomalies
Step 11: Evaluate Program Functionality
Step 12: Document Your Findings
Step 13: Retain Copies of Software Used
12. Types of Cyber Forensics
Database forensics
Email forensics
Malware forensics
Memory forensics
Mobile forensics
Network forensics