notes
notes
Q. Questions Mapped
No
01 What is Digital Forensics? Explain the steps of Digital Forensics. CO1
Steps:
1. dentification: The first step is to identify the digital devices that need to be
analyzed. This can include computers, smartphones, and other digital devices.
2. Collection: The next step is to collect the digital data from the identified
devices. This can involve seizing the devices, making copies of the data, and
analyzing the copies.
3. Preservation: Once the data has been collected, it needs to be preserved to
ensure that it is not altered or destroyed. This involves creating a forensic copy
of the data and storing it in a secure location.
4. Analysis: The data is then analyzed to identify any relevant information. This
can involve searching for specific keywords, analyzing metadata, and recovering
deleted files.
5. Reporting: The final step is to report the findings of the investigation. This can
involve presenting the evidence in court, providing a written report, or giving a
verbal testimony.
2. Objective of CyberCriminal
Ans: aim to disable, disrupt, destroy or control computer systems or to alter,
block, delete, manipulate or steal the data held within these systems.
04 What is the role and responsibility of Forensic Investigator? CO1
06 List and explain the objective and goals of Digital forensics. CO2
objectives of using digital forensics:
It aids in determining the motive for the crime and the identity of the
primary perpetrator
The main object in the digital forensic analysis is the digital device related to the
security incident under investigation. The digital device was either used to
commit a crime, to target an attack, or is a source of information for the analyst.
The goals of the analysis phase in the digital forensics process differ from one
case to another. It can be used to support or refute assumptions against
individuals or entities, or it can be used to investigate information security
incidents locally on the system or over a network.
07 Explain the rules of collecting digital evidence. CO2
there are five general rules of evidence that apply to digital forensics and need
to be followed in order for evidence to be useful. Ignoring these rules makes
evidence inadmissible, and your case could be thrown out. These five rules are
—admissible, authentic, complete, reliable, and believable.
Admissible
This is the most basic rule and a measure of evidence validity and importance.
The evidence must be preserved and gathered in such a way that it can be used
in court or elsewhere. Many errors can be made that could cause a judge to rule
a piece of evidence as inadmissible. For example, evidence that is gathered
using illegal methods is commonly ruled inadmissible.
Authentic
The evidence must be tied to the incident in a relevant way to prove something.
The forensic examiner must be accountable for the origin of the evidence.
Complete
When evidence is presented, it must be clear and complete and should reflect the
whole story. It is not enough to collect evidence that just shows one perspective
of the incident. Presenting incomplete evidence is more dangerous than not
providing any evidence at all as it could lead to a different judgment.
Reliable
G H RAISONI
Department of Computer UNIVERSITY
Science and Engineering
(Established Under UGC (2f) and Madhya Pradesh Niji Vishwavidyalaya (Sthapana evam
Sanchalan) Adhiniyam Act No. 17 of 2007), Gram Dhoda Borgaon, Village-Saikheda,
Teh-Saunsar, Dist.-Chhindwara, (M.P.) – 480337
Tel: +91 9111104290/91, Web: www.ghru.edu.in, E-Mail: info@ghru.edu.in
Believable
A forensic examiner must be able to explain, with clarity and conciseness, what
processes they used and the way the integrity of the evidence was preserved.
The evidence presented by the examiner must be clear, easy to understand, and
believable by jury.
The main processes involved in digital evidence collection are given below:
Data collection: In this process data is identified and collected for
investigation.
Examination: In the second step the collected data is examined carefully.
Analysis: In this process, different tools and techniques are used and the
collected evidence is analyzed to reach some conclusion.
Reporting: In this final step all the documentation, reports are compiled so
that they can be submitted in court.
Types of Evidence:
Collecting the shreds of evidence is really important in any investigation to
support the claims in court. Below are some major types of evidence.
Real Evidence: These pieces of evidence involve physical or tangible
evidence such as flash drives, hard drives, documents, etc. an eyewitness
can also be considered as a shred of tangible evidence.
Hearsay Evidence: These pieces of evidence are referred to as out-of-
court statements. These are made in courts to prove the truth of the matter.
Original Evidence: These are the pieces of evidence of a statement that is
made by a person who is not a testifying witness. It is done in order to
prove that the statement was made rather than to prove its truth.
Testimony: Testimony is when a witness takes oath in a court of law and
G H RAISONI
Department of Computer UNIVERSITY
Science and Engineering
(Established Under UGC (2f) and Madhya Pradesh Niji Vishwavidyalaya (Sthapana evam
Sanchalan) Adhiniyam Act No. 17 of 2007), Gram Dhoda Borgaon, Village-Saikheda,
Teh-Saunsar, Dist.-Chhindwara, (M.P.) – 480337
Tel: +91 9111104290/91, Web: www.ghru.edu.in, E-Mail: info@ghru.edu.in
Ans:
Header Analysis
Email header analysis is the primary analytical technique. This involves
analyzing metadata in the email header. It is evident that analyzing
headers helps to identify the majority of email-related crimes. Email
spoofing, phishing, spam, scams and even internal data leakages can be
G H RAISONI
Department of Computer UNIVERSITY
Science and Engineering
(Established Under UGC (2f) and Madhya Pradesh Niji Vishwavidyalaya (Sthapana evam
Sanchalan) Adhiniyam Act No. 17 of 2007), Gram Dhoda Borgaon, Village-Saikheda,
Teh-Saunsar, Dist.-Chhindwara, (M.P.) – 480337
Tel: +91 9111104290/91, Web: www.ghru.edu.in, E-Mail: info@ghru.edu.in
Ans:-
G H RAISONI
Department of Computer UNIVERSITY
Science and Engineering
(Established Under UGC (2f) and Madhya Pradesh Niji Vishwavidyalaya (Sthapana evam
Sanchalan) Adhiniyam Act No. 17 of 2007), Gram Dhoda Borgaon, Village-Saikheda,
Teh-Saunsar, Dist.-Chhindwara, (M.P.) – 480337
Tel: +91 9111104290/91, Web: www.ghru.edu.in, E-Mail: info@ghru.edu.in
1. Physical location of crime & evidence –a. primary crime scene b. Secondary crime
scene
2. Evidence and crime scene size:- a. microscopic b. Macroscopic
3. Location :- 1. Indoor 2. Outdoor 3. vehicular
04 Explain the process of mobile forensics ? What are the sources of mobile evidence? CO3
Ans:-
G H RAISONI
Department of Computer UNIVERSITY
Science and Engineering
(Established Under UGC (2f) and Madhya Pradesh Niji Vishwavidyalaya (Sthapana evam
Sanchalan) Adhiniyam Act No. 17 of 2007), Gram Dhoda Borgaon, Village-Saikheda,
Teh-Saunsar, Dist.-Chhindwara, (M.P.) – 480337
Tel: +91 9111104290/91, Web: www.ghru.edu.in, E-Mail: info@ghru.edu.in
2.
05 Explain the process of email forensics? What is the role of email forensics investigator ? CO4
Ans:
07 Explain the data format for storing the digital evidence? Explain the method of collecting CO3
the data.
Ans: Data format:
1. Raw format
2. Proprietary format
3. Advance forensics format(AFF)
G H RAISONI
Department of Computer UNIVERSITY
Science and Engineering
(Established Under UGC (2f) and Madhya Pradesh Niji Vishwavidyalaya (Sthapana evam
Sanchalan) Adhiniyam Act No. 17 of 2007), Gram Dhoda Borgaon, Village-Saikheda,
Teh-Saunsar, Dist.-Chhindwara, (M.P.) – 480337
Tel: +91 9111104290/91, Web: www.ghru.edu.in, E-Mail: info@ghru.edu.in
Ans:Types
G H RAISONI
Department of Computer UNIVERSITY
Science and Engineering
(Established Under UGC (2f) and Madhya Pradesh Niji Vishwavidyalaya (Sthapana evam
Sanchalan) Adhiniyam Act No. 17 of 2007), Gram Dhoda Borgaon, Village-Saikheda,
Teh-Saunsar, Dist.-Chhindwara, (M.P.) – 480337
Tel: +91 9111104290/91, Web: www.ghru.edu.in, E-Mail: info@ghru.edu.in
1. Email spoofing
2. Email frauds
3. Email bombing
4. Defamatory mail
5. Threatening mail
10 Short Note: CO4
1. 3A’s
Ans: 1. Aquire
2. Analysis
3. Authentication
Locard Exchange Principle :- 'Locard's Exchange Principle' in forensic science holds
that the perpetrator of a crime will bring something to the crime scene and will leave with
something from it
4. Levels of acquisitions .:
Ans:-
1. Micro read
2. Chip off
3. physical extraction
3. logical extraction
4. Manual extraction
Session 2023-24
Q. No Questions CO
G H RAISONI
Department of Computer UNIVERSITY
Science and Engineering Mapped
(Established Under UGC (2f) and Madhya Pradesh Niji Vishwavidyalaya (Sthapana evam
01 Explain the goal of Investigation report writing? CO5
Sanchalan) Adhiniyam Act No. 17 of 2007), Gram Dhoda Borgaon, Village-Saikheda,
Teh-Saunsar, Dist.-Chhindwara, (M.P.) – 480337
Ans:-1. Accurately describe the details
Tel: +91 9111104290/91, Web: of an incident
www.ghru.edu.in, E-Mail: info@ghru.edu.in
School
2. Be Understandable of Engineering
to decision makers & Technology
3. Be Unambiguous and not open to misinterpretation
Executive summary
Objective
Relevant document
Supporting details
Investigative leads
Ans: