SlideShare a Scribd company logo
1 of 27
Download to read offline
Cyber Forensics in the New Age of Cyber Security
Soham Das
MAKAUT
14th September 2023
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
Profile
Hi , Friends I am Soham , i am Cyber Security
Researcher. My qualification MS Information Technology in Cyber
Security from Maulana Abul Kalam Azad University of Technology,
West Bengal.
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
Disclaimer
Warning: This lecture will not make you a certified digital forensics
technician. This lexture is designed to provide an introduction to
this field from both a theoretical and practical perspective.Digital
forensics is a maturing scientific field with many sub-disciplines.
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
Introduction
Cyber Forensics is the systematic collection, analysis, and
preservation of digital evidence for legal purposes. In the new age
of cyber security, it plays a crucial role in uncovering cybercrimes
and strengthening cybersecurity measures. With the increasing
complexity of cyber threats, cyber forensics is more essential than
ever. For instance, consider a case where a company’s sensitive
customer data is breached. Cyber forensics can help trace the
attack, identify the culprits, and prevent future incidents.
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
The Evolution of Cybersecurity
Cybersecurity has evolved significantly, from basic antivirus
software to advanced threat detection systems. For example, early
antivirus programs only scanned for known malware, whereas
modern systems use machine learning algorithms to identify new
threats in real-time.
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
The Need for Cyber Forensics
In the modern age, the need for cyber forensics is paramount due
to the surge in cybercrime. Consider the rise of ransomware
attacks, where cybercriminals encrypt victim’s data and demand a
ransom. Cyber forensics can help victims recover their data and
track down the perpetrators.
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
Key Components of Cyber Forensics
Cyber forensics consists of digital evidence, forensic tools, and
forensic procedures. Digital evidence can include logs, network
traffic, and emails, all of which are vital for investigations. Forensic
tools like EnCase and Autopsy aid in analyzing this evidence, while
forensic procedures ensure proper handling and documentation.
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
Digital Evidence
Digital evidence, such as metadata in files or timestamps in logs,
can provide critical clues in investigations. For instance, analyzing
the metadata of a document can reveal who created it and when.
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
Forensic Tools - Slide 1
Tools like Wireshark, which captures network traffic, or FTK
(Forensic Toolkit), which assists in analyzing hard drives, are
instrumental in cyber forensic investigations.
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
Forensic Tools - Slide 2
1. EnCase: EnCase is a widely used commercial forensic tool
known for its robust capabilities in acquiring, analyzing, and
reporting on digital evidence. It is favored by law enforcement
and cybersecurity professionals.
2. AccessData Forensic Toolkit (FTK): FTK is a
comprehensive digital forensics platform used for analyzing
and processing digital evidence, including hard drives, mobile
devices, and network data.
3. Autopsy: An open-source digital forensics platform that
offers a range of features for analyzing disk images,
smartphones, and other sources of digital evidence. It has a
user-friendly interface and is commonly used in both law
enforcement and corporate investigations.
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
Forensic Tools - Slide 3
4. Sleuth Kit: Also open-source, Sleuth Kit is a collection of
command-line-based forensic tools for analyzing disk images
and file systems. It is often used in conjunction with Autopsy.
5. X-Ways Forensics: A comprehensive commercial forensic
tool used for data carving, analysis, and reporting. It offers
advanced features for examining file systems and artifacts.
6. Volatility: An open-source memory forensics framework used
for analyzing volatile memory (RAM). It helps in the
identification of running processes, network connections, and
other artifacts that can be crucial in cyber investigations.
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
Forensic Tools - Slide 4
7. Wireshark: Although primarily a network protocol analyzer,
Wireshark is valuable for capturing and analyzing network
traffic, making it a useful tool for cyber forensics when
investigating network-related incidents.
8. Cellebrite UFED: This tool is focused on mobile device
forensics, supporting the extraction and analysis of data from
a wide range of smartphones and tablets.
9. OpenVAS: Open Vulnerability Assessment System
(OpenVAS) is an open-source vulnerability scanner used to
identify and assess security vulnerabilities in networks and
systems, which is crucial in forensic analysis.
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
Forensic Tools - Slide 5
10. RegRipper: An open-source tool for parsing and analyzing
Windows Registry data. It helps investigators gather
information about system configuration, user activity, and
more.
11. OSForensics: OSForensics is a commercial forensic tool that
covers a wide range of digital forensic tasks, from data
recovery to password cracking.
12. FTimes: FTimes is a lightweight open-source tool used for
gathering and comparing file attributes across different points
in time, helping to detect file tampering or unusual changes.
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
Forensic Tools - Slide 6
13. Bulk Extractor: This open-source tool specializes in
extracting and analyzing digital artifacts from various data
sources, such as disk images and memory dumps.
14. Log2Timeline: An open-source tool for timeline analysis of
system events, helping investigators create a chronological
view of system activity.
15. Paladin Forensic Suite: A live forensic system that provides
a comprehensive set of tools and utilities for conducting
digital investigations.
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
Forensic Procedures
Following proper forensic procedures, like maintaining the chain of
custody, ensures that evidence is admissible in court. For instance,
if evidence is mishandled, it may be deemed unreliable in legal
proceedings.
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
Challenges in Cyber Forensics
Challenges include encryption, where data is scrambled and
inaccessible without decryption keys. A notable example is the
FBI’s battle with Apple to unlock the iPhone of a suspect involved
in the San Bernardino terrorist attack.
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
Cybercrime Trends
Ransomware attacks, like the Colonial Pipeline attack in 2021,
highlight current trends. These attacks demand large ransoms to
decrypt systems, making them lucrative for cybercriminals.
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
Legal and Ethical Considerations
Adhering to legal and ethical standards is crucial. An example is
the General Data Protection Regulation (GDPR) in Europe, which
mandates strict data protection and privacy regulations.
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
Case Study 1: Financial Data Breach
The Equifax data breach in 2017 exposed the personal information
of 147 million people. Cyber forensics helped trace the breach to a
software vulnerability, leading to legal action against the
responsible parties.
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
Case Study 2: Insider Threat Investigation
In the case of Edward Snowden, a former NSA contractor, cyber
forensics was used to investigate the theft and disclosure of
classified documents.
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
Emerging Technologies
Emerging technologies like quantum computing pose new
challenges. Quantum computers could potentially break encryption
algorithms, requiring the development of quantum-resistant
encryption methods.
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
Future Trends
Future trends include the growth of IoT and its impact on cyber
forensics. For instance, IoT forensics will be necessary to
investigate crimes involving connected devices.
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
Best Practices
Best practices involve continuous training, certification, and
staying updated with the latest forensic techniques to ensure the
effectiveness of cyber forensics in an ever-changing landscape.
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
Autopsy (Practical)
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
Conclusion
In conclusion, cyber forensics is the linchpin of modern
cybersecurity. Its ability to investigate cybercrimes, recover data,
and prevent future attacks makes it indispensable in the new age
of cyber security.
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
Contact Information
Soham Das,BCA,MS in Cyber Security(MAKAUT)
Ph/Whatsapp- (+91) 6289071973
E-mail- juhinsohamdas@gamil.com
Linkedin- https://www.linkedin.com/in/soham-das-2ab73212b
Github-https://github.com/sohamjuhin
Website:-https://sohamjuhin.github.io/SohamJuhinDas.github.io/
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security
QA and Thank You
QA and Thank You
Soham Das MAKAUT
Cyber Forensics in the New Age of Cyber Security

More Related Content

Similar to Cyber_Forensics_in_the_New_Age_of_Cyber_Security.pdf

An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsZyxware Technologies
 
A Novel Methodology for Offline Forensics Triage in Windows Systems
A Novel Methodology for Offline Forensics Triage in Windows SystemsA Novel Methodology for Offline Forensics Triage in Windows Systems
A Novel Methodology for Offline Forensics Triage in Windows SystemsIRJET Journal
 
Combating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsCombating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsVenkata Sreeram
 
Network Forensic Investigation of HTTPS Protocol
Network Forensic Investigation of HTTPS ProtocolNetwork Forensic Investigation of HTTPS Protocol
Network Forensic Investigation of HTTPS ProtocolIJMER
 
Cyber Forensics|Digital Forensics|Cyber Crime-2023
Cyber Forensics|Digital Forensics|Cyber Crime-2023Cyber Forensics|Digital Forensics|Cyber Crime-2023
Cyber Forensics|Digital Forensics|Cyber Crime-2023Cyber Security Experts
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCSITiaesprime
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsSamantha Vargas
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxVaishnaviBorse8
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewFaith Nweke
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptxMijanurSepai1
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1ricky098
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1zamayla143
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptxKellyIsaac3
 

Similar to Cyber_Forensics_in_the_New_Age_of_Cyber_Security.pdf (20)

An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
A Novel Methodology for Offline Forensics Triage in Windows Systems
A Novel Methodology for Offline Forensics Triage in Windows SystemsA Novel Methodology for Offline Forensics Triage in Windows Systems
A Novel Methodology for Offline Forensics Triage in Windows Systems
 
Combating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsCombating cyber security through forensic investigation tools
Combating cyber security through forensic investigation tools
 
Network Forensic Investigation of HTTPS Protocol
Network Forensic Investigation of HTTPS ProtocolNetwork Forensic Investigation of HTTPS Protocol
Network Forensic Investigation of HTTPS Protocol
 
Cyber Forensics|Digital Forensics|Cyber Crime-2023
Cyber Forensics|Digital Forensics|Cyber Crime-2023Cyber Forensics|Digital Forensics|Cyber Crime-2023
Cyber Forensics|Digital Forensics|Cyber Crime-2023
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
network_security_ppt[1].pptx
network_security_ppt[1].pptxnetwork_security_ppt[1].pptx
network_security_ppt[1].pptx
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidence
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
 
Big security for big data
Big security for big dataBig security for big data
Big security for big data
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptx
 
The Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptxThe Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptx
 
Scope of Cyber forensics
Scope of Cyber forensicsScope of Cyber forensics
Scope of Cyber forensics
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
Cryptoandnetworksecuritylitreview
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1
 
Hacking
Hacking Hacking
Hacking
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 

More from null - The Open Security Community

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Immutable Desktop using Container Orchestration By Mohammed Danish Amber .pdf
Immutable Desktop using Container Orchestration By Mohammed Danish Amber .pdfImmutable Desktop using Container Orchestration By Mohammed Danish Amber .pdf
Immutable Desktop using Container Orchestration By Mohammed Danish Amber .pdfnull - The Open Security Community
 
Digital Personal Data Protection Act 2023 by S Ramakrishnan.pdf
Digital Personal Data Protection Act 2023 by S Ramakrishnan.pdfDigital Personal Data Protection Act 2023 by S Ramakrishnan.pdf
Digital Personal Data Protection Act 2023 by S Ramakrishnan.pdfnull - The Open Security Community
 
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...null - The Open Security Community
 
Reverse Engineering and It’s Basic by Prasenjit Kanti Paul.pptx
Reverse Engineering and It’s Basic by Prasenjit Kanti Paul.pptxReverse Engineering and It’s Basic by Prasenjit Kanti Paul.pptx
Reverse Engineering and It’s Basic by Prasenjit Kanti Paul.pptxnull - The Open Security Community
 
Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...null - The Open Security Community
 
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptx
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptxDemystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptx
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptxnull - The Open Security Community
 

More from null - The Open Security Community (18)

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Hardware-Hacking-101 By Asutosh Kumar.pdf
Hardware-Hacking-101 By Asutosh Kumar.pdfHardware-Hacking-101 By Asutosh Kumar.pdf
Hardware-Hacking-101 By Asutosh Kumar.pdf
 
Demystifying-DNS-Attack-by-Rakesh Seal.pdf
Demystifying-DNS-Attack-by-Rakesh Seal.pdfDemystifying-DNS-Attack-by-Rakesh Seal.pdf
Demystifying-DNS-Attack-by-Rakesh Seal.pdf
 
Immutable Desktop using Container Orchestration By Mohammed Danish Amber .pdf
Immutable Desktop using Container Orchestration By Mohammed Danish Amber .pdfImmutable Desktop using Container Orchestration By Mohammed Danish Amber .pdf
Immutable Desktop using Container Orchestration By Mohammed Danish Amber .pdf
 
Recon for Bug Bounty by Agnibha Dutta.pdf
Recon for Bug Bounty by Agnibha  Dutta.pdfRecon for Bug Bounty by Agnibha  Dutta.pdf
Recon for Bug Bounty by Agnibha Dutta.pdf
 
A talk on OWASP Top 10 by Mukunda Tamly
A talk on  OWASP Top 10 by Mukunda TamlyA talk on  OWASP Top 10 by Mukunda Tamly
A talk on OWASP Top 10 by Mukunda Tamly
 
The Mysterious Paradigm of Fuzzing by Rakesh Seal
The Mysterious Paradigm of Fuzzing by Rakesh SealThe Mysterious Paradigm of Fuzzing by Rakesh Seal
The Mysterious Paradigm of Fuzzing by Rakesh Seal
 
Digital Personal Data Protection Act 2023 by S Ramakrishnan.pdf
Digital Personal Data Protection Act 2023 by S Ramakrishnan.pdfDigital Personal Data Protection Act 2023 by S Ramakrishnan.pdf
Digital Personal Data Protection Act 2023 by S Ramakrishnan.pdf
 
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
 
GSM-CallFlowAndSecurity Features (2G-3G-4G).pptx
GSM-CallFlowAndSecurity Features (2G-3G-4G).pptxGSM-CallFlowAndSecurity Features (2G-3G-4G).pptx
GSM-CallFlowAndSecurity Features (2G-3G-4G).pptx
 
Reverse Engineering and It’s Basic by Prasenjit Kanti Paul.pptx
Reverse Engineering and It’s Basic by Prasenjit Kanti Paul.pptxReverse Engineering and It’s Basic by Prasenjit Kanti Paul.pptx
Reverse Engineering and It’s Basic by Prasenjit Kanti Paul.pptx
 
Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...
 
Evolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptxEvolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptx
 
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptx
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptxDemystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptx
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptx
 
C&C Framework- Ayan Saha.pptx
C&C Framework- Ayan Saha.pptxC&C Framework- Ayan Saha.pptx
C&C Framework- Ayan Saha.pptx
 

Recently uploaded

microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 

Recently uploaded (20)

microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 

Cyber_Forensics_in_the_New_Age_of_Cyber_Security.pdf

  • 1. Cyber Forensics in the New Age of Cyber Security Soham Das MAKAUT 14th September 2023 Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 2. Profile Hi , Friends I am Soham , i am Cyber Security Researcher. My qualification MS Information Technology in Cyber Security from Maulana Abul Kalam Azad University of Technology, West Bengal. Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 3. Disclaimer Warning: This lecture will not make you a certified digital forensics technician. This lexture is designed to provide an introduction to this field from both a theoretical and practical perspective.Digital forensics is a maturing scientific field with many sub-disciplines. Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 4. Introduction Cyber Forensics is the systematic collection, analysis, and preservation of digital evidence for legal purposes. In the new age of cyber security, it plays a crucial role in uncovering cybercrimes and strengthening cybersecurity measures. With the increasing complexity of cyber threats, cyber forensics is more essential than ever. For instance, consider a case where a company’s sensitive customer data is breached. Cyber forensics can help trace the attack, identify the culprits, and prevent future incidents. Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 5. The Evolution of Cybersecurity Cybersecurity has evolved significantly, from basic antivirus software to advanced threat detection systems. For example, early antivirus programs only scanned for known malware, whereas modern systems use machine learning algorithms to identify new threats in real-time. Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 6. The Need for Cyber Forensics In the modern age, the need for cyber forensics is paramount due to the surge in cybercrime. Consider the rise of ransomware attacks, where cybercriminals encrypt victim’s data and demand a ransom. Cyber forensics can help victims recover their data and track down the perpetrators. Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 7. Key Components of Cyber Forensics Cyber forensics consists of digital evidence, forensic tools, and forensic procedures. Digital evidence can include logs, network traffic, and emails, all of which are vital for investigations. Forensic tools like EnCase and Autopsy aid in analyzing this evidence, while forensic procedures ensure proper handling and documentation. Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 8. Digital Evidence Digital evidence, such as metadata in files or timestamps in logs, can provide critical clues in investigations. For instance, analyzing the metadata of a document can reveal who created it and when. Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 9. Forensic Tools - Slide 1 Tools like Wireshark, which captures network traffic, or FTK (Forensic Toolkit), which assists in analyzing hard drives, are instrumental in cyber forensic investigations. Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 10. Forensic Tools - Slide 2 1. EnCase: EnCase is a widely used commercial forensic tool known for its robust capabilities in acquiring, analyzing, and reporting on digital evidence. It is favored by law enforcement and cybersecurity professionals. 2. AccessData Forensic Toolkit (FTK): FTK is a comprehensive digital forensics platform used for analyzing and processing digital evidence, including hard drives, mobile devices, and network data. 3. Autopsy: An open-source digital forensics platform that offers a range of features for analyzing disk images, smartphones, and other sources of digital evidence. It has a user-friendly interface and is commonly used in both law enforcement and corporate investigations. Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 11. Forensic Tools - Slide 3 4. Sleuth Kit: Also open-source, Sleuth Kit is a collection of command-line-based forensic tools for analyzing disk images and file systems. It is often used in conjunction with Autopsy. 5. X-Ways Forensics: A comprehensive commercial forensic tool used for data carving, analysis, and reporting. It offers advanced features for examining file systems and artifacts. 6. Volatility: An open-source memory forensics framework used for analyzing volatile memory (RAM). It helps in the identification of running processes, network connections, and other artifacts that can be crucial in cyber investigations. Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 12. Forensic Tools - Slide 4 7. Wireshark: Although primarily a network protocol analyzer, Wireshark is valuable for capturing and analyzing network traffic, making it a useful tool for cyber forensics when investigating network-related incidents. 8. Cellebrite UFED: This tool is focused on mobile device forensics, supporting the extraction and analysis of data from a wide range of smartphones and tablets. 9. OpenVAS: Open Vulnerability Assessment System (OpenVAS) is an open-source vulnerability scanner used to identify and assess security vulnerabilities in networks and systems, which is crucial in forensic analysis. Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 13. Forensic Tools - Slide 5 10. RegRipper: An open-source tool for parsing and analyzing Windows Registry data. It helps investigators gather information about system configuration, user activity, and more. 11. OSForensics: OSForensics is a commercial forensic tool that covers a wide range of digital forensic tasks, from data recovery to password cracking. 12. FTimes: FTimes is a lightweight open-source tool used for gathering and comparing file attributes across different points in time, helping to detect file tampering or unusual changes. Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 14. Forensic Tools - Slide 6 13. Bulk Extractor: This open-source tool specializes in extracting and analyzing digital artifacts from various data sources, such as disk images and memory dumps. 14. Log2Timeline: An open-source tool for timeline analysis of system events, helping investigators create a chronological view of system activity. 15. Paladin Forensic Suite: A live forensic system that provides a comprehensive set of tools and utilities for conducting digital investigations. Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 15. Forensic Procedures Following proper forensic procedures, like maintaining the chain of custody, ensures that evidence is admissible in court. For instance, if evidence is mishandled, it may be deemed unreliable in legal proceedings. Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 16. Challenges in Cyber Forensics Challenges include encryption, where data is scrambled and inaccessible without decryption keys. A notable example is the FBI’s battle with Apple to unlock the iPhone of a suspect involved in the San Bernardino terrorist attack. Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 17. Cybercrime Trends Ransomware attacks, like the Colonial Pipeline attack in 2021, highlight current trends. These attacks demand large ransoms to decrypt systems, making them lucrative for cybercriminals. Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 18. Legal and Ethical Considerations Adhering to legal and ethical standards is crucial. An example is the General Data Protection Regulation (GDPR) in Europe, which mandates strict data protection and privacy regulations. Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 19. Case Study 1: Financial Data Breach The Equifax data breach in 2017 exposed the personal information of 147 million people. Cyber forensics helped trace the breach to a software vulnerability, leading to legal action against the responsible parties. Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 20. Case Study 2: Insider Threat Investigation In the case of Edward Snowden, a former NSA contractor, cyber forensics was used to investigate the theft and disclosure of classified documents. Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 21. Emerging Technologies Emerging technologies like quantum computing pose new challenges. Quantum computers could potentially break encryption algorithms, requiring the development of quantum-resistant encryption methods. Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 22. Future Trends Future trends include the growth of IoT and its impact on cyber forensics. For instance, IoT forensics will be necessary to investigate crimes involving connected devices. Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 23. Best Practices Best practices involve continuous training, certification, and staying updated with the latest forensic techniques to ensure the effectiveness of cyber forensics in an ever-changing landscape. Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 24. Autopsy (Practical) Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 25. Conclusion In conclusion, cyber forensics is the linchpin of modern cybersecurity. Its ability to investigate cybercrimes, recover data, and prevent future attacks makes it indispensable in the new age of cyber security. Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 26. Contact Information Soham Das,BCA,MS in Cyber Security(MAKAUT) Ph/Whatsapp- (+91) 6289071973 E-mail- juhinsohamdas@gamil.com Linkedin- https://www.linkedin.com/in/soham-das-2ab73212b Github-https://github.com/sohamjuhin Website:-https://sohamjuhin.github.io/SohamJuhinDas.github.io/ Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security
  • 27. QA and Thank You QA and Thank You Soham Das MAKAUT Cyber Forensics in the New Age of Cyber Security