SlideShare a Scribd company logo
1 of 24
Forensics Geeks: Md. Safiuddin Russel
Md. Abu Taher Dulal
Md. Masud Parvez
Rajib Mahmud
Hasan Al Monsur
Md. Safiuddin Russel
 Preface... Digitization in our daily life
 The Need For Digital Forensics Investigation
Framework
 Objectives
Bangladesh is a young and rapidly growing population is 160 million. According
to BASIS 2012 survey the ICT industry is consistently growing 20% to 30% per
year. Most of our IT investment focused on Financial, Telecomm and
Government sector. Now a day we cannot think a day without Information
Technology as we are living on Information Age. We are very quickly
accustomed to keeping and using digital information. While we are keeping our
processed data on different digital media, security is one of the key issues in
contemporary computing and is relevant to a wide range of activities, including
software development, networking and system. Some people will then take
the advantages of these loosely coupled securities and involved in different
crime. Our object in this project is to make a Digital Forensics Framework
which will cover Policy, Standard and give a future Guideline for
investigation and presentation to law and enforcement agency.
Preface... Digitization in our daily life
The Need For Digital Forensics Investigation Framework
The prevention of further malicious events occurring
against the intended “target".
The successful tracing back of the events that occurred
which led to the crime, and determining the guilty parties
involved.
Bringing the perpetrators of the crime to justice.
The improvement of current prevention mechanisms in
place to prevent such an event from occurring again.
Improving standards used by corporate security
professionals to secure their respective corporate networks.
How everyone “plugged" into this digital environment can
increase their awareness about current vulnerabilities and
prevention measures.
Objectives
Analyzing the vulnerability and subsequences of
cybercrime scenario in Bangladesh.
Prepare a Policy, Standards and Guideline for
different digital forensics components and fine-tuning
based on the Bangladesh scenario.
Propose a Generic National Framework for Digital
Forensics suitable to map user activity with legal
admissibility standards as well as all types of digital
crime scene investigations and prosecution of
cybercriminal in Bangladesh.
Validate the proposed Digital Forensics Framework
based on the Bangladesh Cyber Crime Information.
Hasan Al Monsur
Most Popular Existing
Digital Forensics Models
Digital Forensics Frameworks
Existing Digital Forensics Models
 Kruse and Heiser Model: These components focus on
maintaining the integrity of the evidence during the
investigation. [1]
 Acquiring the evidence;
 Authenticating the evidence, and
 Analyzing the data.
 The United States of America’s Department of Justice
proposed model. [1]
collection;
examination;
analysis, and
reporting.
Existing Digital Forensics Models (Cont.)
 The Scientific Crime Scene Investigation Model proposed
by Lee. [2]
 Recognition;
 Identification;
 Individualization, and
 reconstruction.
 Brian Carrier and Eugene Spafford [3] proposed yet
another model that organizes the process into five groups
consisting all in all 17 phases.
Readdiness Phases Deployment Phases
Physical Crime Scene
Investigation Phases
Review Phase
Digital Crime Scene
Investigation Phases
Existing Frameworks
The Digital Forensics Research Working Group (DFRW)
developed a framework [4] :
 Identification;
 Preservation;
 Collection;
 Examination;
 Analysis;
 Presentation, and
 Decision.
Existing Frameworks (Cont.)
Reith proposed Framework [5]:
 Identification;
 Preparation;
 Approach;
 Strategy;
 Preservation;
 Collection;
 Examination;
 Analysis;
 Presentation, and
 Returning evidence.
Existing Frameworks (Cont.)
 Framework proposed by Ciardhuáin [6]
 Awareness;
 Authorization;
 Planning;
 Notification;
 Search for and identify evidence;
 Collection;
 Transportation;
 Storage;
 Examination;
 Hypothesis;
 Presentation;
 Poof/ Defense, and
 Dissemination
Md. Abu Taher Dulal
Proposed Digital Forensics Framework
 Bangladesh Context
Proposed Framework
Pre Process
Awareness
Authorization
Preparation
Planning
Approach
Approach
Strategy
Preservation
Evidence
Collection
Transport
Storage
Analysis
Evidence
Examination
Hypothesis
Evidence
Analysis
Presentation
Presentation
/ Reporting
Decision /
Critics
Post Process
Evidence
Returning
Project
Close
Send
Project to
Archive
Proposed Framework (Cont.)
 Authorization (approval)
 Preparation (intelligence for search, adequate toolkits, operational briefing,
task allocation)
 Approach strategy: that develops a procedure to use in order to maximize the
collection of untainted evidence while minimizing the impact to the victim.
 Preservation: which involves the isolation, securing and preservation of the
state of physical and digital evidence.
 Collection: that entails the recording of the physical scene and duplicate digital
evidence using standardized and accepted procedures.
 Examination: which involves an in-depth systematic search of evidence
relating to the suspected crime.
 Analysis: which involves determination of the significance, reconstructing
fragments of data and drawing conclusions based on evidence found.
 Presentation: that involves the summary and explanation of conclusions.
 Returning evidence: that ensures physical and digital property is returned to
proper owner.
Md. Masud Parvez
Cyber Crime Cases Reported in Bangladesh
Cases Validate Proposed Digital Forensics Framework.
Cyber Crime Cases Reported in Bangladesh
Case
No.
Case description
01
To Submit a report, A central bank probe blamed the lax monitoring of Sonali Bank's
treasury division for the illegal transfer of $250,000 to a Turkish bank. The treasury
division did not even perform its own duty,” Bangladesh Bank said in its probe
conducted in July last year. In June 2013, the passwords of two officials of the state-
run commercial bank's Shilpa Bhaban corporate branch were used to send payment
instructions for $250,000 and €250,000 to Sonali Bank UK within a space of five days.
02
To Submit a report, A university teacher was posting a comment on Facebook
wishing the death for Prime Minister Sheikh Hasina.
03
Mr. X sent himself spoofed e-mails, which were supposedly from the Euro Lottery
Company. These mails informed him that he had won the largest lottery.
04 Malicious Mail to Foreign Diplomatic Mission and Other VIPs
05 Use of e-mail for illegal activities
06 Illegal Prostitution Promotion Sites from Bangladesh
07
To submit a report on usage of certain computers for making pornography and
indecent films.
Cases Validate Proposed Digital Forensics Framework.
Case
No D e s c r i p t i o n
Awaren
ess
Authori
zation
Prepara
tion
Plannin
g
Approac
h
Preserv
ation
Collecti
on
Transpo
rt
Storage
Examin
ation
Hypoth
esis
Analysis
Present
ation
Decisio
n
Retunin
g
Evidenc
01
Sonali Bank treasury blamed for illegal cash
transfer
Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y
02
To Submit a report, A university teacher was
posting a comment on Facebook wishing
the death for Prime Minister Sheikh Hasina.
Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y
03
Mr. X sent himself spoofed e-mails, which
were supposedly from the Euro Lottery
Company. These mails informed him that
he had won the largest lottery.
Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y
04
Malicious Mail to Foreign Diplomatic
Mission and Other VIPs
Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y
05
Report summit for Illegal Prostitution
Promotion Sites from Bangladesh
Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y
06
To check a report on usage of certain
computers for making pornography and
indecent films.
N N N N N N Y Y Y Y Y Y Y Y Y
Rajib Mahmud
Challenges
Expected Outcomes
Upcoming Activity Plan & Timeline
Challenges
 Device Diversity
 Volume of Evidence
 Video and Rich Media
 Encryption
 Anti-forensics
 Virtualization
 Live Response
 Distributed Evidence
 Usability & Visualization
 Education & Certification
 Embedded Systems
 Corporate Governance & Forensic Readiness
 Monitoring
 Tools
 Data Volumes
 Counter Forensics
 Networked Evidence
A Generic National Framework for Digital Forensics
Investigation in Bangladesh Context
 Digital Forensics Investigation Process
 Digital Forensics Policies
 Standards for investigation process
 Guideline for Digital Forensics Investigation
Expected Outcomes
SL Activities Expected
Deadline
1
Preparing a generic Policy for the
Bangladesh context based on the
framework developed.
April 23, 2015
2
Preparing a set of Standards for every
components so that digital forensics
investigation will be proceed in a
organized manner.
April 30, 2015
3
Proposing a Guideline that how the digital
forensics investigation will be proceed.
May 05, 2015
4 Project Final Presentation May 08, 2015
Upcoming Activity Plan & Timeline
Reference
 [1] Framework for a Digital Forensic Investigation Michael Kohn1, JHP Eloff2
and MS Olivier3 1mkohn@cs.up.ac.za, et al, Information and Computer
Security Architectures Research Group (ICSA) Department of Computer
Science University of Pretoria
 [2] Casey, E.: Digital Evidence and Computer Crime, 2nd Edition, Elsevier
Academic Press, 2004.
 [3] Brian Carrier and Eugene H Spafford,(2003) Getting Physical with the
Investigative Process International Journal of Digital Evidence. Fall
2003,Volume 2, Issue 2.
 [4] National Institute of Justice. Results from Tools and Technologies
Working Group, Goverors Summit on Cybercrime and Cyberterrorism,
Princeton NJ, 2002.
 [5] Reith, M., Carr, C. and Gunsch, G.:An Examination of Digital Forensic
Models, International Journal of Digital Evidence. Fall 2002, Volume 1, Issue 3,
2002.
 [6] Ciardhuáin, SO.: An Extended Model of Cybercrime Investigations,
International Journal of Digital Evidence. Summer 2004, Volume 3, Issue1,
2004.
Thank you for your patience

More Related Content

What's hot

Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
 
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Mark Jhon Oxillo
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality reportJonan Momo
 
Cybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnershipsCybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnershipsJacqueline Fick
 
An introduction to cyber law
An introduction to cyber lawAn introduction to cyber law
An introduction to cyber lawshreya sanghvi
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportAbdul Rehman
 
Scenario of social network crime in bangladesh
Scenario of social network crime in bangladeshScenario of social network crime in bangladesh
Scenario of social network crime in bangladeshBank Alfalah Limited
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Jautkarshjani
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-finalAldrin SuperGo
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekarPravinGhosekar
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaUniversitas Pembangunan Panca Budi
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crimevishalgohel12195
 

What's hot (20)

Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Cybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnershipsCybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnerships
 
An introduction to cyber law
An introduction to cyber lawAn introduction to cyber law
An introduction to cyber law
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 Report
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Scenario of social network crime in bangladesh
Scenario of social network crime in bangladeshScenario of social network crime in bangladesh
Scenario of social network crime in bangladesh
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
Cyber crime 4th may,2018
Cyber crime 4th may,2018Cyber crime 4th may,2018
Cyber crime 4th may,2018
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 

Similar to National framework for digital forensics bangladesh context

BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...IJARIIT
 
An insight view of digital forensics
An insight view of digital forensicsAn insight view of digital forensics
An insight view of digital forensicsijcsa
 
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1MalikPinckney86
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningIRJET Journal
 
Enhancements in the world of digital forensics
Enhancements in the world of digital forensicsEnhancements in the world of digital forensics
Enhancements in the world of digital forensicsIAESIJAI
 
Review on effectiveness of deep learning approach in digital forensics
Review on effectiveness of deep learning approach in digital  forensicsReview on effectiveness of deep learning approach in digital  forensics
Review on effectiveness of deep learning approach in digital forensicsIJECEIAES
 
A proposed model_for_cybercrime_detectio
A proposed model_for_cybercrime_detectioA proposed model_for_cybercrime_detectio
A proposed model_for_cybercrime_detectioHossam Al-Ansary
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer ForensicEditor IJCTER
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceDr. Richard Otieno
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessEditor IJCATR
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicIRJET Journal
 
Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...
Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...
Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...DaveNjoga1
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEWFORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEWcscpconf
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Kayisa Herman Dube
 
Cybercrime Investigation | Cybersecurity | PPT
Cybercrime Investigation | Cybersecurity | PPTCybercrime Investigation | Cybersecurity | PPT
Cybercrime Investigation | Cybersecurity | PPTCyber Security Experts
 

Similar to National framework for digital forensics bangladesh context (20)

BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
 
An insight view of digital forensics
An insight view of digital forensicsAn insight view of digital forensics
An insight view of digital forensics
 
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
 
Enhancements in the world of digital forensics
Enhancements in the world of digital forensicsEnhancements in the world of digital forensics
Enhancements in the world of digital forensics
 
Review on effectiveness of deep learning approach in digital forensics
Review on effectiveness of deep learning approach in digital  forensicsReview on effectiveness of deep learning approach in digital  forensics
Review on effectiveness of deep learning approach in digital forensics
 
A proposed model_for_cybercrime_detectio
A proposed model_for_cybercrime_detectioA proposed model_for_cybercrime_detectio
A proposed model_for_cybercrime_detectio
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer Forensic
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital Evidence
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation Process
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital Forensic
 
Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...
Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...
Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEWFORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016
 
Cybercrime Investigation | Cybersecurity | PPT
Cybercrime Investigation | Cybersecurity | PPTCybercrime Investigation | Cybersecurity | PPT
Cybercrime Investigation | Cybersecurity | PPT
 

Recently uploaded

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Recently uploaded (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

National framework for digital forensics bangladesh context

  • 1. Forensics Geeks: Md. Safiuddin Russel Md. Abu Taher Dulal Md. Masud Parvez Rajib Mahmud Hasan Al Monsur
  • 2. Md. Safiuddin Russel  Preface... Digitization in our daily life  The Need For Digital Forensics Investigation Framework  Objectives
  • 3. Bangladesh is a young and rapidly growing population is 160 million. According to BASIS 2012 survey the ICT industry is consistently growing 20% to 30% per year. Most of our IT investment focused on Financial, Telecomm and Government sector. Now a day we cannot think a day without Information Technology as we are living on Information Age. We are very quickly accustomed to keeping and using digital information. While we are keeping our processed data on different digital media, security is one of the key issues in contemporary computing and is relevant to a wide range of activities, including software development, networking and system. Some people will then take the advantages of these loosely coupled securities and involved in different crime. Our object in this project is to make a Digital Forensics Framework which will cover Policy, Standard and give a future Guideline for investigation and presentation to law and enforcement agency. Preface... Digitization in our daily life
  • 4. The Need For Digital Forensics Investigation Framework The prevention of further malicious events occurring against the intended “target". The successful tracing back of the events that occurred which led to the crime, and determining the guilty parties involved. Bringing the perpetrators of the crime to justice. The improvement of current prevention mechanisms in place to prevent such an event from occurring again. Improving standards used by corporate security professionals to secure their respective corporate networks. How everyone “plugged" into this digital environment can increase their awareness about current vulnerabilities and prevention measures.
  • 5. Objectives Analyzing the vulnerability and subsequences of cybercrime scenario in Bangladesh. Prepare a Policy, Standards and Guideline for different digital forensics components and fine-tuning based on the Bangladesh scenario. Propose a Generic National Framework for Digital Forensics suitable to map user activity with legal admissibility standards as well as all types of digital crime scene investigations and prosecution of cybercriminal in Bangladesh. Validate the proposed Digital Forensics Framework based on the Bangladesh Cyber Crime Information.
  • 6. Hasan Al Monsur Most Popular Existing Digital Forensics Models Digital Forensics Frameworks
  • 7. Existing Digital Forensics Models  Kruse and Heiser Model: These components focus on maintaining the integrity of the evidence during the investigation. [1]  Acquiring the evidence;  Authenticating the evidence, and  Analyzing the data.  The United States of America’s Department of Justice proposed model. [1] collection; examination; analysis, and reporting.
  • 8. Existing Digital Forensics Models (Cont.)  The Scientific Crime Scene Investigation Model proposed by Lee. [2]  Recognition;  Identification;  Individualization, and  reconstruction.  Brian Carrier and Eugene Spafford [3] proposed yet another model that organizes the process into five groups consisting all in all 17 phases. Readdiness Phases Deployment Phases Physical Crime Scene Investigation Phases Review Phase Digital Crime Scene Investigation Phases
  • 9. Existing Frameworks The Digital Forensics Research Working Group (DFRW) developed a framework [4] :  Identification;  Preservation;  Collection;  Examination;  Analysis;  Presentation, and  Decision.
  • 10. Existing Frameworks (Cont.) Reith proposed Framework [5]:  Identification;  Preparation;  Approach;  Strategy;  Preservation;  Collection;  Examination;  Analysis;  Presentation, and  Returning evidence.
  • 11. Existing Frameworks (Cont.)  Framework proposed by Ciardhuáin [6]  Awareness;  Authorization;  Planning;  Notification;  Search for and identify evidence;  Collection;  Transportation;  Storage;  Examination;  Hypothesis;  Presentation;  Poof/ Defense, and  Dissemination
  • 12. Md. Abu Taher Dulal Proposed Digital Forensics Framework  Bangladesh Context
  • 14. Proposed Framework (Cont.)  Authorization (approval)  Preparation (intelligence for search, adequate toolkits, operational briefing, task allocation)  Approach strategy: that develops a procedure to use in order to maximize the collection of untainted evidence while minimizing the impact to the victim.  Preservation: which involves the isolation, securing and preservation of the state of physical and digital evidence.  Collection: that entails the recording of the physical scene and duplicate digital evidence using standardized and accepted procedures.  Examination: which involves an in-depth systematic search of evidence relating to the suspected crime.  Analysis: which involves determination of the significance, reconstructing fragments of data and drawing conclusions based on evidence found.  Presentation: that involves the summary and explanation of conclusions.  Returning evidence: that ensures physical and digital property is returned to proper owner.
  • 15. Md. Masud Parvez Cyber Crime Cases Reported in Bangladesh Cases Validate Proposed Digital Forensics Framework.
  • 16. Cyber Crime Cases Reported in Bangladesh Case No. Case description 01 To Submit a report, A central bank probe blamed the lax monitoring of Sonali Bank's treasury division for the illegal transfer of $250,000 to a Turkish bank. The treasury division did not even perform its own duty,” Bangladesh Bank said in its probe conducted in July last year. In June 2013, the passwords of two officials of the state- run commercial bank's Shilpa Bhaban corporate branch were used to send payment instructions for $250,000 and €250,000 to Sonali Bank UK within a space of five days. 02 To Submit a report, A university teacher was posting a comment on Facebook wishing the death for Prime Minister Sheikh Hasina. 03 Mr. X sent himself spoofed e-mails, which were supposedly from the Euro Lottery Company. These mails informed him that he had won the largest lottery. 04 Malicious Mail to Foreign Diplomatic Mission and Other VIPs 05 Use of e-mail for illegal activities 06 Illegal Prostitution Promotion Sites from Bangladesh 07 To submit a report on usage of certain computers for making pornography and indecent films.
  • 17. Cases Validate Proposed Digital Forensics Framework. Case No D e s c r i p t i o n Awaren ess Authori zation Prepara tion Plannin g Approac h Preserv ation Collecti on Transpo rt Storage Examin ation Hypoth esis Analysis Present ation Decisio n Retunin g Evidenc 01 Sonali Bank treasury blamed for illegal cash transfer Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y 02 To Submit a report, A university teacher was posting a comment on Facebook wishing the death for Prime Minister Sheikh Hasina. Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y 03 Mr. X sent himself spoofed e-mails, which were supposedly from the Euro Lottery Company. These mails informed him that he had won the largest lottery. Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y 04 Malicious Mail to Foreign Diplomatic Mission and Other VIPs Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y 05 Report summit for Illegal Prostitution Promotion Sites from Bangladesh Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y 06 To check a report on usage of certain computers for making pornography and indecent films. N N N N N N Y Y Y Y Y Y Y Y Y
  • 19. Challenges  Device Diversity  Volume of Evidence  Video and Rich Media  Encryption  Anti-forensics  Virtualization  Live Response  Distributed Evidence  Usability & Visualization  Education & Certification  Embedded Systems  Corporate Governance & Forensic Readiness  Monitoring  Tools  Data Volumes  Counter Forensics  Networked Evidence
  • 20. A Generic National Framework for Digital Forensics Investigation in Bangladesh Context  Digital Forensics Investigation Process  Digital Forensics Policies  Standards for investigation process  Guideline for Digital Forensics Investigation Expected Outcomes
  • 21. SL Activities Expected Deadline 1 Preparing a generic Policy for the Bangladesh context based on the framework developed. April 23, 2015 2 Preparing a set of Standards for every components so that digital forensics investigation will be proceed in a organized manner. April 30, 2015 3 Proposing a Guideline that how the digital forensics investigation will be proceed. May 05, 2015 4 Project Final Presentation May 08, 2015 Upcoming Activity Plan & Timeline
  • 22. Reference  [1] Framework for a Digital Forensic Investigation Michael Kohn1, JHP Eloff2 and MS Olivier3 1mkohn@cs.up.ac.za, et al, Information and Computer Security Architectures Research Group (ICSA) Department of Computer Science University of Pretoria  [2] Casey, E.: Digital Evidence and Computer Crime, 2nd Edition, Elsevier Academic Press, 2004.  [3] Brian Carrier and Eugene H Spafford,(2003) Getting Physical with the Investigative Process International Journal of Digital Evidence. Fall 2003,Volume 2, Issue 2.  [4] National Institute of Justice. Results from Tools and Technologies Working Group, Goverors Summit on Cybercrime and Cyberterrorism, Princeton NJ, 2002.  [5] Reith, M., Carr, C. and Gunsch, G.:An Examination of Digital Forensic Models, International Journal of Digital Evidence. Fall 2002, Volume 1, Issue 3, 2002.  [6] Ciardhuáin, SO.: An Extended Model of Cybercrime Investigations, International Journal of Digital Evidence. Summer 2004, Volume 3, Issue1, 2004.
  • 23.
  • 24. Thank you for your patience