Unit 4-CS
Unit 4-CS
Cyber forensics
Cyber forensics, also known as digital forensics or computer forensics, is a crucial
component of cybersecurity. It involves the collection, preservation, analysis, and
presentation of electronic evidence in a way that is admissible in a court of law. Cyber
forensics plays a vital role in investigating cybercrimes, understanding security incidents, and
ensuring legal compliance. Here's how cyber forensics is connected to cybersecurity:
2. **Evidence Preservation**: One of the primary goals of cyber forensics is to ensure that
evidence related to a cybercrime or security incident is preserved in a way that maintains its
integrity and can be used in legal proceedings if necessary. This involves creating a chain of
custody for digital evidence to prove it hasn't been tampered with.
6. **Legal Proceedings**: Evidence gathered through cyber forensics is often used in legal
proceedings, such as criminal trials or civil litigation. It can help establish the facts of a case
and support legal actions against cybercriminals.
7. **Policy and Compliance**: Cyber forensics also plays a role in ensuring that
organizations comply with legal and regulatory requirements related to data protection and
cybersecurity. It helps organizations demonstrate due diligence in protecting sensitive
information.
8. **Security Improvements**: Insights gained from cyber forensics can be used to improve
an organization's cybersecurity posture. By understanding how an attack occurred,
organizations can better defend against similar threats in the future.
Digital forensic investigators use a variety of tools and software to conduct investigations that
can help to:
Discover the source and cause of a cyberattack
Identify whether a hack was perpetrated and how long the hacker had
access to the system
Create a timeline of criminal events, such as unauthorized access or
altering of data
Secure digital evidence
A digital forensic investigation can help identify and prove different kinds of wrongdoing,
including data theft or disclosure, internet abuse, network or system breaches, espionage, and
financial fraud.
In civil or criminal cases, it is crucial to carry out a structured and process-driven digital
forensics investigation, to ensure the integrity of the data and its admissibility in a court of
law. The core stages of a digital forensics investigation include:
Identification of resources and devices involved in the investigation
Preservation of the necessary data
Analysis
Documentation
Presentation
Data acquired in this way is permissible in court, and can be used as evidence to support
litigation cases. Digital forensics investigators are trained in extracting and handling evidence
in a way that is permissible in court, and their expertise can be invaluable in a litigation case
involving digital data.
The very first step in a digital forensics investigation is to identify the devices and resources
containing the data that will be a part of the investigation. The data involved in an
investigation could be on organizational devices such as computers or laptops, or on users’
personal devices like mobile phones and tablets.
These devices are then seized and isolated, to eliminate any possibility of tampering. If the
data is on a server or network, or housed on the cloud, the investigator or organization needs
to ensure that no one other than the investigating team has access to it.
After the devices involved in an investigation have been seized and stored in a secure
location, the digital forensics investigator or forensics analyst uses forensic techniques to
extract any data that may be relevant to the investigation, and stores it securely.
This phase can involve the creation of a digital copy of the relevant data, which is known as a
“forensic image.” This copy is then used for analysis and evaluation, while the original data
and devices are put in a secure location, such as a safe. This prevents any tampering with the
original data even if the investigation is compromised.
Once the devices involved have been identified and isolated, and the data has been duplicated
and stored securely, digital forensic investigators use a variety of techniques to extract
relevant data and examine it, searching for clues or evidence that points to wrongdoing. This
often involves recovering and examining deleted, damaged or encrypted files, using
techniques such as:
Reverse Steganography: a technique used to extract hidden data by examining the underlying
hash or string of characters representing an image or other data item
File or Data Carving: identifying and recovering deleted files by searching for the fragments
that deleted files may leave
Keyword Searches: using keywords to identify and analyze information relevant to the
investigation, including deleted data
These are just some of the many techniques digital forensic investigators to unearth evidence.
Post analysis, the findings of the investigation are properly documented in a way that makes
it easy to visualize the entire investigative process and its conclusions. Proper documentation
helps to formulate a timeline of the activities involved in wrongdoing, such as embezzlement,
data leakage, or network breaches.
Once the investigation is complete, the findings are presented to a court or the committee or
group that will determine the outcome of a lawsuit or an internal complaint. Digital forensics
investigators can act as expert witnesses, summarizing and presenting the evidence they
discovered, and disclosing their findings.
Data collection: In this process data is identified and collected for investigation.
Examination: In the second step the collected data is examined carefully.
Analysis: In this process, different tools and techniques are used and the collected
evidence is analyzed to reach some conclusion.
Reporting: In this final step all the documentation, reports are compiled so that
they can be submitted in court.
Types of Collectible Data:
The computer investigator and experts who investigate the seized devices have to understand
what kind of potential shreds of evidence could there be and what type of shreds of evidence
they are looking for. So, that they could structure their search pattern. Crimes and criminal
activities that involve computers can range across a wide spectrum; they could go from
trading illegal things such as rare and endangered animals, damaging intellectual property, to
personal data theft, etc.
The investigator must pick the suitable tools to use during the analysis. Investigators can
encounter several problems while investigating the case such as files may have been deleted
from the computer, they could be damaged or may even be encrypted, So the investigator
should be familiar with a variety of tools, methods, and also the software to prevent the data
from damaging during the data recovery process.
There are two types of data, that can be collected in a computer forensics investigation:
Persistent data: It is the data that is stored on a non-volatile memory type storage
device such as a local hard drive, external storage devices like SSDs, HDDs, pen
drives, CDs, etc. the data on these devices is preserved even when the computer is
turned off.
Volatile data: It is the data that is stored on a volatile memory type storage such
as memory, registers, cache, RAM, or it exists in transit, that will be lost once the
computer is turned off or it loses power. Since volatile data is evanescent, it is
crucial that an investigator knows how to reliably capture it.
Types of Evidence:
Collecting the shreds of evidence is really important in any investigation to support the
claims in court. Below are some major types of evidence.
1. Executive Summary :
Executive Summary section of computer forensics report template provides
background data of conditions that needs a requirement for investigation.
Executive Summary or the Translation Summary is read by Senior Management
as they do not read detailed report. This section must contain short description,
details and important pointers. This section could be one page long. Executive
Summary Section consists of following :
Taking account of who authorized the forensic examination.
List of the significant evidences in a short detail.
Explaining why a forensic examination of computing device was
necessary.
Including a signature block for the examiners who performed the
work.
Full, legitimate and proper name of all people who are related or
involved in case, Job Titles, dates of initial contacts or
communications.
2. Objectives :
Objectives section is used to outline all tasks that an investigation has planned to
complete. In some cases, it might happen that forensics examination may not do a
full fledged investigation when reviewing contents of media. The prepared plan list
must be discussed and approved by legal council, decision makers and client before
any forensic analysis. This list should consist tasks undertaken and method
undertaken by an examiner for each task and status of each task at the end of report.
4. Relevant Findings :
This section of Relevant Findings gives summary of evidences found of probative
Value.When a match is found between forensic science material recovered from a
crime scene e.g., a fingerprint, a strand of hair, a shoe print, etc. and a reference
sample provided by a suspect of case, match is widely considered as strong evidence
that suspect is source of recovered material.
5. Supporting Details :
Supporting Details is section where in-depth analysis of relevant findings is done.
‘How we found conclusions outlined in Relevant Findings?’, is outlined by this
section. It contains table of vital files with a full path name, results of string
searches, Emails/URLs reviewed, number of files reviewed and any other relevant
data. All tasks undertaken to meet objectives is outlined by this section. In
Supporting Details we focus more on technical depth. It includes charts, tables and
illustrations as it conveys much more than written texts. To meet outlined
objectives, many subsections are also included. This section is longest section. It
starts with giving background details of media analyzed. It is not easy to report
number of files reviewed and size of hard drive in a human understandable
language. Therefore, your client must know how much data you wanted to review to
arrive at a conclusion.
6. Investigative Leads :
Investigative Leads performs action items that could help to discover additional
information related to the investigation of case. The investigators perform all
outstanding tasks to find extra information if more time is left. Investigative Lead
section is very critical to law enforcement. This section suggests extra tasks that
discovers information needed to move on case. e.g. finding out if there are any
firewall logs that date any far enough into past to give a correct picture of any
attacks that might have taken place. This section is important for a hired forensic
consultant.
7. Additional Subsections :
Various additional subsections are included in a forensic report. These subsections
are dependent on clients want and their need. The following subsections are useful
in specific cases :
Attacker Methodology –
Additional briefing to help reader understand general or exact attacks
performed is given in this section of attacker methodology. This section is
useful in computer intrusion cases. Inspection of how attacks are done and
what bits and pieces of attacks look like in standard logs is done here.
User Applications –
In this section we discuss relevant applications that are installed on media
analyzed because it is observed that in many cases applications present on
system are very relevant. Give a title to this section, if you are investigating
any system that is used by an attacker .e.g Cyber Attack Tools.
Internet Activity –
Internet Activity or Web Browsing History section gives web surfing history
of user of media analyzed. The browsing history is also useful to suggest
intent, downloading of malicious tools, unallocated space, online researches,
downloading of secure deleted programs or evidence removal type programs
that wipe files slack and temporary files that often harbor evidence very
important to an investigation.
Recommendations –
This section gives recommendation to posture client to be more prepared and
trained for next computer security incident. We investigate some host-based,
network-based and procedural countermeasures are given to clients to reduce
or eliminate risk of incident security.
Auditing
Recent studies and statistics highlight the growing severity of cyber risks to businesses. For
example, according to a report by Cybersecurity Ventures, it is estimated that cybercrime
will cost the global economy a staggering $10.5 trillion annually by 2025. This projection
showcases the massive financial impact that businesses could face if they fail to address
cyber risks effectively.
It is not enough to simply have security plans; they require consistent auditing. When was
the last revision made to your cyber risk management plans? Are your security documents
regularly reviewed and adjusted to align with the specific requirements of each department?
Cybersecurity is not just about technical resilience or IT security but about Information
and Data Security. Misguided assurances from the internal team or a cybersecurity
company and a false sense of security are the primary reasons hackers succeed in their
attempts. They target your processes, people, procedures, and weakest links.
Data Security – involves reviewing network access control, encryption use, data
security at rest, and transmissions.
Operational Security – involves a review of security policies, procedures, and
controls.
Network Security – a review of network & security controls, anti-virus
configurations, security monitoring capabilities, etc.
System Security – This review covers hardening processes, patching processes,
privileged account management, role-based access, etc.
Physical Security – a review that covers disk encryption, role-based access
controls, biometric data, multifactor authentication, etc.
Beyond these, a cybersecurity audit can also cover cybersecurity risk management, cyber
risk governance, training & awareness, legal, regulatory & contractual requirements,
technical security controls, business continuity & incident management, and third-party
management.
On the other hand, internal security audits are conducted by an organization’s in-house
team. These audits can be performed more frequently and provide the advantage of having
direct access to internal systems and processes. Internal auditors are familiar with the
organization’s specific security requirements and can tailor the audit to address its unique
challenges.
Both external and internal security audits offer distinct advantages and serve different
purposes. Key points to consider include:
To get better value from the external security audit, you must find the right and affordable
auditing company, set expectations for auditors, submit relevant and accurate information,
and implement suggested changes.
Despite the benefits of external audits, many organizations opt for internal cybersecurity
audits due to their cost, efficiency, speed, and consistency.
An information security management system (ISMS) is a set of policies and procedures for
systematically managing an organization's sensitive data. The goal of an ISMS is to minimize
risk and ensure business continuity by proactively limiting the impact of a security breach.
An ISMS typically addresses employee behavior and processes as well as data and
technology. It can be targeted toward a particular type of data, such as customer data, or it
can be implemented in a comprehensive way that becomes part of the company's culture.
ISO/IEC 27001 is the international standard for information security and for creating an
ISMS. Jointly published by the International Organization for Standardization and the
International Electrotechnical Commission, the standard doesn't mandate specific actions but
includes suggestions for documentation, internal audits, continual improvement, and
corrective and preventive action. To become ISO 27001 certified, an organization requires an
ISMS that identifies the organizational assets and provides the following assessment:
The goal of an ISMS isn't necessarily to maximize information security, but rather to reach an
organization's desired level of information security. Depending on the specific needs of the
industry, these levels of control may vary. For example, since healthcare is a highly regulated
field, a healthcare organization may develop a system to ensure sensitive patient data is fully
protected.
Reduces costs. An ISMS offers a thorough risk assessment of all assets. This
enables organizations to prioritize the highest risk assets to prevent indiscriminate
spending on unneeded defenses and provide a focused approach toward securing
them. This structured approach, along with less downtime due to a reduction in
security incidents, significantly cuts an organization's total spending.
Information security at the organizational level is centered around the triad of confidentiality,
integrity and availability (CIA). Information security controls are put in place to ensure the
CIA of protected information. InfoSec specialists and SecOps teams must understand each
newly implemented control in terms of how it promotes the CIA triad for a protected data
class.
Confidentiality - When it comes to InfoSec, confidentiality and privacy are essentially the
same thing. Preserving the confidentiality of information means ensuring that only authorized
persons can access or modify the data. Information security management teams may classify
or categorize data based on the perceived risk and anticipated impact that would result if the
data were compromised. Additional privacy controls can be implemented for higher-risk data.
The ISO 27001, along with the ISO 27002 standards, offers best-practice guidelines for
setting up an ISMS. The following is a checklist of best practices to consider before investing
in an ISMS:
Understand business needs. Before executing an ISMS, it's important for organizations to
get a bird's eye view of the business operations, tools and information security management
systems to understand the business and security requirements. It also helps to study how the
ISO 27001 framework can help with data protection and the individuals who will be
responsible for executing the ISMS.
Monitor data access. Companies must monitor their access control policies to ensure only
authorized individuals are gaining access to sensitive information. This monitoring should
observe who is accessing the data, when and from where. Besides monitoring data access,
companies should also track logins and authentications and keep a record of them for further
investigation.
Conduct security awareness training. All employees should receive regular security
awareness training. The training should introduce users to the evolving threat landscape, the
common data vulnerabilities surrounding information systems, and mitigation and prevention
techniques to protect data from being compromised.
Secure devices. Protect all organizational devices from physical damage and tampering by
taking security measures to ward off hacking attempts. Tools including Google Workspace
and Office 365 should be installed on all devices, as they offer built-in device security.
Encrypt data. Encryption prevents unauthorized access and is the best form of defense
against security threats. All organizational data should be encrypted before setting up an
ISMS, as it will prevent any unauthorized attempts to sabotage critical data.
Back up data. Backups play a key role in preventing data loss and should be a part of a
company's security policy before setting up an ISMS. Besides regular backups, the location
and frequency of the backups should be planned out. Organizations should also design a plan
to keep the backups secure, which should apply to both on-premises and cloud backups.
Conduct an internal security audit. An internal security audit should be conducted before
executing an ISMS. Internal audits are a great way to for organizations to gain visibility over
their security systems, software and devices, as they can identify and fix security loopholes
before executing an ISMS.
ISO 27001:2013
ISO 27001:2013 is an international security standard that lays out best practices for how
organizations should manage their data. It outlines how companies should manage
information security risk by creating an information security management system (ISMS).
This approach demands executive leadership while embedding data security at all
organizational levels. The standard is voluntary, but organizations that follow its
guidelines can seek ISO 27001 certification.
Once an organization has answered these questions, they can choose from several “risk
treatment” options:
Eliminate the risk (either by eliminating the data or the behavior that is putting data
at risk).
Share the risk by outsourcing to a third-party or through insurance
Accept the risk after concluding that the threat is highly unlikely, the consequences
would be minimal, or the costs of changes outweigh the potential benefits
Control the risk to reduce the likelihood of bad outcomes
Annex A forms the bulk of ISO 27001, and it deals with the risk controls organizations can
implement, based on the results of their risk assessment. ISO 27001:2013 lists 114
controls, divided into 14 categories.
Annex A.5: Information Security Policies
This annex mandates the creation of a written set of information security policies,
published with the approval of management. These policies will collect the controls
established through the rest of the annex. They must be reviewed at regular intervals or in
the event of an internal or external change that would impact information security.
The first part of Annex A.6 concerns assigning responsibility for information security to
all relevant stakeholders. Part two specifically concerns maintaining data security on
mobile devices and with remote workers.
This section concerns ensuring that employees and contractors understand and are capable
of fulfilling their obligations to data security, starting from before they are hired and
ending with the off-boarding procedure.
As the name indicates, this annex identifies information assets and classifies them
according to the level of protection they require.
Annex 9 concerns a crucial element of any ISMS: controlling access to information. It’s
divided into four sections, which outline the responsibilities of organizations to provision
and deprovision users and implement secure login procedures, as well as the responsibility
of individuals to respect IT security policies for authentication.
This section concerns the proper use of encryption and how to protect cryptographic keys.
Annex A.11: Physical and Environmental Security
This is the longest section, with 15 individual controls, all of which deal with policies that
protect an organization’s physical premises and the equipment in which it stores
information.
Annex A.12 includes best practices for ensuring data protection and integrity, from
conducting data backups to malware prevention to maintaining internal logs.
There are two sections to this annex. The first deals with maintaining internal network
security, while the second addresses the security of information that leaves the
organization.
This section mandates that information systems be analyzed with regard to their impact on
security throughout their existence. It deals with the development, testing, implementation,
and updates of information systems.
Unsurprisingly, this section concerns maintaining data security with third-party suppliers
and maintaining an agreed-upon level of security.
In this annex, organizations determine how they will deal with security incidents. This
includes designating employees to take responsibilities for different types of events,
including reporting them to authorities.
Annex A.17 illustrates a bedrock principle of ISO 27001: that information security be
directly tied to business outcomes at all levels. This section is devoted to minimizing
business disruption by including information security in a business continuity management
system.
Here, organizations must identify their legal and regulatory obligations to incorporate
them into their ISMS.