SlideShare a Scribd company logo
Lecture #32: Digital Forensics : Evidence
Handling, Validation and Reporting
Dr.Ramchandra Mangrulkar
October 7, 2020
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 1 / 18
The principles of digital evidence
1 No action taken by law enforcement agencies, persons employed
within those agencies or their agents should change data which
may subsequently be relied upon in court.
2 In circumstances where a person finds it necessary to access
original data, that person must be competent to do so and be
able to give evidence explaining the relevance and the
implications of their actions.
3 An audit trail or other record of all processes applied to digital
evidence should be created and preserved. An independent third
party should be able to examine those processes and achieve the
same result.
4 The person in charge of the investigation has overall
responsibility for ensuring that the law and these principles are
adhered to.
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 2 / 18
The principles of digital evidence
1 No action taken by law enforcement agencies, persons employed
within those agencies or their agents should change data which
may subsequently be relied upon in court.
2 In circumstances where a person finds it necessary to access
original data, that person must be competent to do so and be
able to give evidence explaining the relevance and the
implications of their actions.
3 An audit trail or other record of all processes applied to digital
evidence should be created and preserved. An independent third
party should be able to examine those processes and achieve the
same result.
4 The person in charge of the investigation has overall
responsibility for ensuring that the law and these principles are
adhered to.
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 2 / 18
The principles of digital evidence
1 No action taken by law enforcement agencies, persons employed
within those agencies or their agents should change data which
may subsequently be relied upon in court.
2 In circumstances where a person finds it necessary to access
original data, that person must be competent to do so and be
able to give evidence explaining the relevance and the
implications of their actions.
3 An audit trail or other record of all processes applied to digital
evidence should be created and preserved. An independent third
party should be able to examine those processes and achieve the
same result.
4 The person in charge of the investigation has overall
responsibility for ensuring that the law and these principles are
adhered to.
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 2 / 18
The principles of digital evidence
1 No action taken by law enforcement agencies, persons employed
within those agencies or their agents should change data which
may subsequently be relied upon in court.
2 In circumstances where a person finds it necessary to access
original data, that person must be competent to do so and be
able to give evidence explaining the relevance and the
implications of their actions.
3 An audit trail or other record of all processes applied to digital
evidence should be created and preserved. An independent third
party should be able to examine those processes and achieve the
same result.
4 The person in charge of the investigation has overall
responsibility for ensuring that the law and these principles are
adhered to.
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 2 / 18
Evidence Collections
After securing the evidence, a survey of the scene will give
investigators an accurate sense of what’s ahead. Several questions
need to be answered
What kinds of devices are present?
How many devices are we dealing with?
Are any of the devices running?
What tools will be needed?
Do we have the necessary expertise on hand?
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 3 / 18
Evidence Collections
After securing the evidence, a survey of the scene will give
investigators an accurate sense of what’s ahead. Several questions
need to be answered
What kinds of devices are present?
How many devices are we dealing with?
Are any of the devices running?
What tools will be needed?
Do we have the necessary expertise on hand?
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 3 / 18
Evidence Collections
After securing the evidence, a survey of the scene will give
investigators an accurate sense of what’s ahead. Several questions
need to be answered
What kinds of devices are present?
How many devices are we dealing with?
Are any of the devices running?
What tools will be needed?
Do we have the necessary expertise on hand?
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 3 / 18
Evidence Collections
After securing the evidence, a survey of the scene will give
investigators an accurate sense of what’s ahead. Several questions
need to be answered
What kinds of devices are present?
How many devices are we dealing with?
Are any of the devices running?
What tools will be needed?
Do we have the necessary expertise on hand?
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 3 / 18
Evidence Collections
After securing the evidence, a survey of the scene will give
investigators an accurate sense of what’s ahead. Several questions
need to be answered
What kinds of devices are present?
How many devices are we dealing with?
Are any of the devices running?
What tools will be needed?
Do we have the necessary expertise on hand?
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 3 / 18
What to take along
1. Evidence Tape
2. Chain of custody form
3. Inventory forms
4. Digital camera
5. Toolkit ( Screw driver set with pentalobe Screwdriver for removing
HDDs from Mac laptops)
6. Adhesive tape, Sticky note
7. New/ wiped pen drives, hard drives
8. Gloves, static wrist band
9. Write blockers (e.g. ATA, SATA, SCSI, firewire, USB, e-sata,
SSD) with cables.
10. Hardware for Imaging (TD2U, Falcon, TrueImager) if available
11. Laptop with FTK (Crossover Tested)
12. Card readers
13. Magnifying glass, Flash Light
14. Faraday bag/Aluminium foil, Bubble wraps
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 4 / 18
Order of Volatility
CPU, cache, and register content
Routing table, ARP cache, process table, kernel statistics
Memory
Temporary file system/swap space
Data on hard disk
Remotely logged data
Data contained on archival media
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 5 / 18
Order of Volatility
CPU, cache, and register content
Routing table, ARP cache, process table, kernel statistics
Memory
Temporary file system/swap space
Data on hard disk
Remotely logged data
Data contained on archival media
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 5 / 18
Order of Volatility
CPU, cache, and register content
Routing table, ARP cache, process table, kernel statistics
Memory
Temporary file system/swap space
Data on hard disk
Remotely logged data
Data contained on archival media
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 5 / 18
Order of Volatility
CPU, cache, and register content
Routing table, ARP cache, process table, kernel statistics
Memory
Temporary file system/swap space
Data on hard disk
Remotely logged data
Data contained on archival media
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 5 / 18
Order of Volatility
CPU, cache, and register content
Routing table, ARP cache, process table, kernel statistics
Memory
Temporary file system/swap space
Data on hard disk
Remotely logged data
Data contained on archival media
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 5 / 18
Order of Volatility
CPU, cache, and register content
Routing table, ARP cache, process table, kernel statistics
Memory
Temporary file system/swap space
Data on hard disk
Remotely logged data
Data contained on archival media
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 5 / 18
Order of Volatility
CPU, cache, and register content
Routing table, ARP cache, process table, kernel statistics
Memory
Temporary file system/swap space
Data on hard disk
Remotely logged data
Data contained on archival media
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 5 / 18
Documenting the Scene
There is an old tried and true saying in law enforcement: “If you don’t
write it down, it didn’t happen.” These are words of wisdom indeed.
photographs
written notes
video
process begins the moment investigators arrive at the scene
noting the date and time
all the people at the scene
detailed descriptions of the evidence we collect
its location, the names of who discovered and collected it
item’s condition, especially if there is visible damage.
digital evidence is described by type, make, model, serial
number, or other similar descriptors.
device is on or off or if it’s connected to other devices (such as
printers) or a network (like the Internet).
Virtually everything we see, find, and do should be documented.
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 6 / 18
Evidence into Custody
Place the phone in special containers that shield the phone from
wireless signals. Empty paint cans and Faraday bags are two of the
more typical choices.
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 7 / 18
Protecting Cell Phones from Network Signals
It’s essential to isolate a live cell phone from the network. If not, it
can receive calls, text messages, or even commands to delete all the
data. A Faraday bag is one way to prevent a network signal from
reaching the phone. A Faraday bag is made of “some type of
conducting material or mesh” that repels these signals. 1
.
1
The function of the bag is based on the work of Michael Faraday, an English
scientist who specialized in electromagnetism (Microsoft Corporation)
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 8 / 18
Evidence Label Format
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 9 / 18
Evidence Labelling
The Basics of Digital Forensics: The Primer for Getting Started in
Digital Forensics
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 10 / 18
Chain of Custody
Before a piece of evidence gets in front of a jury, it must first meet a
series of strict legal requirements, well-documented called chain of
custody.
evidence makes many stops on its road to trial.
Each of these stops must be noted, tracking each and every time
the evidence item changes hands or locations
Without this detailed accounting, the evidence will be deemed
untrustworthy and inadmissible.
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 11 / 18
Chain of Custody
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 12 / 18
Chain of Custody : Marking Evidence
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 13 / 18
Chain of Custody :Cloning Evidence
A forensic clone is an exact, bit for bit copy of a hard drive. It’s
also known as a bit stream image. In other words, every bit (1 or
0) is duplicated on a separate, forensically clean piece of media,
such as a hard drive.
Hard drives are susceptible to failure. Having two clones gives
you one to examine and one to fall back on.
Forensically Clean Media : Drives can be cleaned with the same
devices used to make the clones. The cleaning process
overwrites the entire hard drive with a particular pattern of data
such as 1111111111111
Forensic Image Formats : The end result of the cloning process
is a forensic image of the source hard drive : EnCase (Extension
.E01) Raw dd (Extension .001) AccessData Custom Content
Image (Extension .AD1)
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 14 / 18
Evidence Validation: Hashing
How do we know our clone is an exact duplicate of the evidence
drive?
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 15 / 18
Evidence Validation: Hashing Example
How do we know our clone is an exact duplicate of the evidence
drive?
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 16 / 18
Final Report
Conclusion of the analysis, the examiner will generate a final
report detailing what was done, what was found, and their
findings.
Ideally, final reports need to be crafted with the intended
audience in mind.
Must be addressed wrt nontechnical reader’s such as judges,
attorneys and juries.
major forensic tools, such as EnCase and FTK
Final report should include a detailed narrative of all the actions
taken by the examiner, starting at the scene if they were present.
The examination should be documented with sufficient detail so
that the procedure can be duplicated by another examiner
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 17 / 18
Home work
https://www.forensic.co.in
http://www.forensicsciencesimplified.org/digital/
how.html
https://nij.ojp.gov/topics/articles/
new-approaches-digital-evidence-acquisition-and-analy
https://www.ncjrs.gov/pdffiles1/nij/250700.pdf
Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 18 / 18

More Related Content

What's hot

Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)AltheimPrivacy
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
deaneal
 
Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.
Vishal Tandel
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
rakesh mishra
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
Aung Thu Rha Hein
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
Lalit Garg
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Alchemist095
 
Digital Forensic Case Study
Digital Forensic Case StudyDigital Forensic Case Study
Digital Forensic Case Study
MyAssignmenthelp.com
 
Lecture 8 comp forensics 03 10-18 file system
Lecture 8 comp forensics 03 10-18 file systemLecture 8 comp forensics 03 10-18 file system
Lecture 8 comp forensics 03 10-18 file system
Alchemist095
 
cyber forensics
cyber forensicscyber forensics
cyber forensics
Ambuj Kumar
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating proceduresSoumen Debgupta
 
CS6004 Cyber Forensics - UNIT V
CS6004 Cyber Forensics - UNIT VCS6004 Cyber Forensics - UNIT V
CS6004 Cyber Forensics - UNIT V
ArthyR3
 
Introduction To Forensic Methodologies
Introduction To Forensic MethodologiesIntroduction To Forensic Methodologies
Introduction To Forensic Methodologies
Ledjit
 
Cyber forensics question bank
Cyber forensics   question bankCyber forensics   question bank
Cyber forensics question bank
ArthyR3
 
CS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IVCS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IV
ArthyR3
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
newbie2019
 
An Introduction to Asset Recovery
An Introduction to Asset RecoveryAn Introduction to Asset Recovery
An Introduction to Asset Recovery
mylespilkington
 
AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014Leonard Cibelli
 
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Facultad de Informática UCM
 

What's hot (20)

Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Digital Forensic Case Study
Digital Forensic Case StudyDigital Forensic Case Study
Digital Forensic Case Study
 
Lecture 8 comp forensics 03 10-18 file system
Lecture 8 comp forensics 03 10-18 file systemLecture 8 comp forensics 03 10-18 file system
Lecture 8 comp forensics 03 10-18 file system
 
DF Process Models
DF Process ModelsDF Process Models
DF Process Models
 
cyber forensics
cyber forensicscyber forensics
cyber forensics
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating procedures
 
CS6004 Cyber Forensics - UNIT V
CS6004 Cyber Forensics - UNIT VCS6004 Cyber Forensics - UNIT V
CS6004 Cyber Forensics - UNIT V
 
Introduction To Forensic Methodologies
Introduction To Forensic MethodologiesIntroduction To Forensic Methodologies
Introduction To Forensic Methodologies
 
Cyber forensics question bank
Cyber forensics   question bankCyber forensics   question bank
Cyber forensics question bank
 
CS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IVCS6004 Cyber Forensics - UNIT IV
CS6004 Cyber Forensics - UNIT IV
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
An Introduction to Asset Recovery
An Introduction to Asset RecoveryAn Introduction to Asset Recovery
An Introduction to Asset Recovery
 
AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014
 
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
 

Similar to Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting

Cyber evidence at crime scene
Cyber evidence at crime sceneCyber evidence at crime scene
Cyber evidence at crime scene
Applied Forensic Research Sciences
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
BhagyasriPatel2
 
sakshi Computer_forensics_ppt.ppt
sakshi Computer_forensics_ppt.pptsakshi Computer_forensics_ppt.ppt
sakshi Computer_forensics_ppt.ppt
SakshiAlex
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
YashPatel132112
 
Best Practices For Seizing Electronic Evidence -- DoJ
 Best Practices For Seizing Electronic Evidence  -- DoJ Best Practices For Seizing Electronic Evidence  -- DoJ
Best Practices For Seizing Electronic Evidence -- DoJ
David Sweigert
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
Anyck Turgeon, CFE/GRCP/CEFI/CCIP/C|CISO/CBA
 
Evidence and data
Evidence and dataEvidence and data
Evidence and data
Atul Rai
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
Manik Bhola
 
Computer forensics intro(Pendahuluan Komputer Forensik).ppt
Computer forensics intro(Pendahuluan Komputer Forensik).pptComputer forensics intro(Pendahuluan Komputer Forensik).ppt
Computer forensics intro(Pendahuluan Komputer Forensik).ppt
BudiHsnDaulay
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital Evidence
Dr. Richard Otieno
 
Computer_forensics_ppt.ppt
Computer_forensics_ppt.pptComputer_forensics_ppt.ppt
Computer_forensics_ppt.ppt
Gnanavi2
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
Samantha Vargas
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
Varun Sehgal
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Somya Johri
 
An American Legal Perspective
An American Legal PerspectiveAn American Legal Perspective
An American Legal Perspective
Agustin Argelich Casals
 
How digital technology is shaping the future of marthab
How digital technology is shaping the future of marthabHow digital technology is shaping the future of marthab
How digital technology is shaping the future of marthab
Argelich Networks
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
Mayank Diwakar
 

Similar to Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting (20)

219941
219941219941
219941
 
219941
219941219941
219941
 
Cyber evidence at crime scene
Cyber evidence at crime sceneCyber evidence at crime scene
Cyber evidence at crime scene
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
sakshi Computer_forensics_ppt.ppt
sakshi Computer_forensics_ppt.pptsakshi Computer_forensics_ppt.ppt
sakshi Computer_forensics_ppt.ppt
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Best Practices For Seizing Electronic Evidence -- DoJ
 Best Practices For Seizing Electronic Evidence  -- DoJ Best Practices For Seizing Electronic Evidence  -- DoJ
Best Practices For Seizing Electronic Evidence -- DoJ
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Evidence and data
Evidence and dataEvidence and data
Evidence and data
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
 
Computer forensics intro(Pendahuluan Komputer Forensik).ppt
Computer forensics intro(Pendahuluan Komputer Forensik).pptComputer forensics intro(Pendahuluan Komputer Forensik).ppt
Computer forensics intro(Pendahuluan Komputer Forensik).ppt
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital Evidence
 
Computer_forensics_ppt.ppt
Computer_forensics_ppt.pptComputer_forensics_ppt.ppt
Computer_forensics_ppt.ppt
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
 
3.2
3.23.2
3.2
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
An American Legal Perspective
An American Legal PerspectiveAn American Legal Perspective
An American Legal Perspective
 
How digital technology is shaping the future of marthab
How digital technology is shaping the future of marthabHow digital technology is shaping the future of marthab
How digital technology is shaping the future of marthab
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
 

More from Dr. Ramchandra Mangrulkar

Blockchain#2.pdf
Blockchain#2.pdfBlockchain#2.pdf
Blockchain#2.pdf
Dr. Ramchandra Mangrulkar
 
Blockchain#1.pdf
Blockchain#1.pdfBlockchain#1.pdf
Blockchain#1.pdf
Dr. Ramchandra Mangrulkar
 
Blockchain#3.pdf
Blockchain#3.pdfBlockchain#3.pdf
Blockchain#3.pdf
Dr. Ramchandra Mangrulkar
 
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Dr. Ramchandra Mangrulkar
 
Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0
Dr. Ramchandra Mangrulkar
 
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)
Dr. Ramchandra Mangrulkar
 
Lecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security BreachLecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security Breach
Dr. Ramchandra Mangrulkar
 
Lecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security BreachLecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
Dr. Ramchandra Mangrulkar
 
Lecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLSLecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLS
Dr. Ramchandra Mangrulkar
 
Lecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application SecurityLecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application Security
Dr. Ramchandra Mangrulkar
 
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Dr. Ramchandra Mangrulkar
 
Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks
Dr. Ramchandra Mangrulkar
 
Lecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part ILecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part I
Dr. Ramchandra Mangrulkar
 
Lecture #9 : Single Sign on and Federation Identity Management
Lecture #9 :  Single Sign on and Federation Identity ManagementLecture #9 :  Single Sign on and Federation Identity Management
Lecture #9 : Single Sign on and Federation Identity Management
Dr. Ramchandra Mangrulkar
 
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel SecurityLecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Dr. Ramchandra Mangrulkar
 
Lecture #6: Multilevel Security Models
Lecture #6: Multilevel Security ModelsLecture #6: Multilevel Security Models
Lecture #6: Multilevel Security Models
Dr. Ramchandra Mangrulkar
 
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel SecurityLecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Dr. Ramchandra Mangrulkar
 
Lecture #4: Access Control Policies
Lecture #4: Access Control PoliciesLecture #4: Access Control Policies
Lecture #4: Access Control Policies
Dr. Ramchandra Mangrulkar
 
Lecture #3: Defense Strategies and Techniques: Part II
 Lecture #3: Defense Strategies and Techniques: Part II Lecture #3: Defense Strategies and Techniques: Part II
Lecture #3: Defense Strategies and Techniques: Part II
Dr. Ramchandra Mangrulkar
 
Lecture #2: Defence Strategies and Techniques (Security): Part I
Lecture #2: Defence Strategies and Techniques (Security): Part ILecture #2: Defence Strategies and Techniques (Security): Part I
Lecture #2: Defence Strategies and Techniques (Security): Part I
Dr. Ramchandra Mangrulkar
 

More from Dr. Ramchandra Mangrulkar (20)

Blockchain#2.pdf
Blockchain#2.pdfBlockchain#2.pdf
Blockchain#2.pdf
 
Blockchain#1.pdf
Blockchain#1.pdfBlockchain#1.pdf
Blockchain#1.pdf
 
Blockchain#3.pdf
Blockchain#3.pdfBlockchain#3.pdf
Blockchain#3.pdf
 
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
 
Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0
 
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)
 
Lecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security BreachLecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security Breach
 
Lecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security BreachLecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
 
Lecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLSLecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLS
 
Lecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application SecurityLecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application Security
 
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
 
Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks
 
Lecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part ILecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part I
 
Lecture #9 : Single Sign on and Federation Identity Management
Lecture #9 :  Single Sign on and Federation Identity ManagementLecture #9 :  Single Sign on and Federation Identity Management
Lecture #9 : Single Sign on and Federation Identity Management
 
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel SecurityLecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
 
Lecture #6: Multilevel Security Models
Lecture #6: Multilevel Security ModelsLecture #6: Multilevel Security Models
Lecture #6: Multilevel Security Models
 
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel SecurityLecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
 
Lecture #4: Access Control Policies
Lecture #4: Access Control PoliciesLecture #4: Access Control Policies
Lecture #4: Access Control Policies
 
Lecture #3: Defense Strategies and Techniques: Part II
 Lecture #3: Defense Strategies and Techniques: Part II Lecture #3: Defense Strategies and Techniques: Part II
Lecture #3: Defense Strategies and Techniques: Part II
 
Lecture #2: Defence Strategies and Techniques (Security): Part I
Lecture #2: Defence Strategies and Techniques (Security): Part ILecture #2: Defence Strategies and Techniques (Security): Part I
Lecture #2: Defence Strategies and Techniques (Security): Part I
 

Recently uploaded

Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 

Recently uploaded (20)

Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 

Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting

  • 1. Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting Dr.Ramchandra Mangrulkar October 7, 2020 Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 1 / 18
  • 2. The principles of digital evidence 1 No action taken by law enforcement agencies, persons employed within those agencies or their agents should change data which may subsequently be relied upon in court. 2 In circumstances where a person finds it necessary to access original data, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions. 3 An audit trail or other record of all processes applied to digital evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result. 4 The person in charge of the investigation has overall responsibility for ensuring that the law and these principles are adhered to. Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 2 / 18
  • 3. The principles of digital evidence 1 No action taken by law enforcement agencies, persons employed within those agencies or their agents should change data which may subsequently be relied upon in court. 2 In circumstances where a person finds it necessary to access original data, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions. 3 An audit trail or other record of all processes applied to digital evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result. 4 The person in charge of the investigation has overall responsibility for ensuring that the law and these principles are adhered to. Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 2 / 18
  • 4. The principles of digital evidence 1 No action taken by law enforcement agencies, persons employed within those agencies or their agents should change data which may subsequently be relied upon in court. 2 In circumstances where a person finds it necessary to access original data, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions. 3 An audit trail or other record of all processes applied to digital evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result. 4 The person in charge of the investigation has overall responsibility for ensuring that the law and these principles are adhered to. Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 2 / 18
  • 5. The principles of digital evidence 1 No action taken by law enforcement agencies, persons employed within those agencies or their agents should change data which may subsequently be relied upon in court. 2 In circumstances where a person finds it necessary to access original data, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions. 3 An audit trail or other record of all processes applied to digital evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result. 4 The person in charge of the investigation has overall responsibility for ensuring that the law and these principles are adhered to. Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 2 / 18
  • 6. Evidence Collections After securing the evidence, a survey of the scene will give investigators an accurate sense of what’s ahead. Several questions need to be answered What kinds of devices are present? How many devices are we dealing with? Are any of the devices running? What tools will be needed? Do we have the necessary expertise on hand? Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 3 / 18
  • 7. Evidence Collections After securing the evidence, a survey of the scene will give investigators an accurate sense of what’s ahead. Several questions need to be answered What kinds of devices are present? How many devices are we dealing with? Are any of the devices running? What tools will be needed? Do we have the necessary expertise on hand? Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 3 / 18
  • 8. Evidence Collections After securing the evidence, a survey of the scene will give investigators an accurate sense of what’s ahead. Several questions need to be answered What kinds of devices are present? How many devices are we dealing with? Are any of the devices running? What tools will be needed? Do we have the necessary expertise on hand? Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 3 / 18
  • 9. Evidence Collections After securing the evidence, a survey of the scene will give investigators an accurate sense of what’s ahead. Several questions need to be answered What kinds of devices are present? How many devices are we dealing with? Are any of the devices running? What tools will be needed? Do we have the necessary expertise on hand? Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 3 / 18
  • 10. Evidence Collections After securing the evidence, a survey of the scene will give investigators an accurate sense of what’s ahead. Several questions need to be answered What kinds of devices are present? How many devices are we dealing with? Are any of the devices running? What tools will be needed? Do we have the necessary expertise on hand? Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 3 / 18
  • 11. What to take along 1. Evidence Tape 2. Chain of custody form 3. Inventory forms 4. Digital camera 5. Toolkit ( Screw driver set with pentalobe Screwdriver for removing HDDs from Mac laptops) 6. Adhesive tape, Sticky note 7. New/ wiped pen drives, hard drives 8. Gloves, static wrist band 9. Write blockers (e.g. ATA, SATA, SCSI, firewire, USB, e-sata, SSD) with cables. 10. Hardware for Imaging (TD2U, Falcon, TrueImager) if available 11. Laptop with FTK (Crossover Tested) 12. Card readers 13. Magnifying glass, Flash Light 14. Faraday bag/Aluminium foil, Bubble wraps Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 4 / 18
  • 12. Order of Volatility CPU, cache, and register content Routing table, ARP cache, process table, kernel statistics Memory Temporary file system/swap space Data on hard disk Remotely logged data Data contained on archival media Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 5 / 18
  • 13. Order of Volatility CPU, cache, and register content Routing table, ARP cache, process table, kernel statistics Memory Temporary file system/swap space Data on hard disk Remotely logged data Data contained on archival media Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 5 / 18
  • 14. Order of Volatility CPU, cache, and register content Routing table, ARP cache, process table, kernel statistics Memory Temporary file system/swap space Data on hard disk Remotely logged data Data contained on archival media Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 5 / 18
  • 15. Order of Volatility CPU, cache, and register content Routing table, ARP cache, process table, kernel statistics Memory Temporary file system/swap space Data on hard disk Remotely logged data Data contained on archival media Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 5 / 18
  • 16. Order of Volatility CPU, cache, and register content Routing table, ARP cache, process table, kernel statistics Memory Temporary file system/swap space Data on hard disk Remotely logged data Data contained on archival media Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 5 / 18
  • 17. Order of Volatility CPU, cache, and register content Routing table, ARP cache, process table, kernel statistics Memory Temporary file system/swap space Data on hard disk Remotely logged data Data contained on archival media Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 5 / 18
  • 18. Order of Volatility CPU, cache, and register content Routing table, ARP cache, process table, kernel statistics Memory Temporary file system/swap space Data on hard disk Remotely logged data Data contained on archival media Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 5 / 18
  • 19. Documenting the Scene There is an old tried and true saying in law enforcement: “If you don’t write it down, it didn’t happen.” These are words of wisdom indeed. photographs written notes video process begins the moment investigators arrive at the scene noting the date and time all the people at the scene detailed descriptions of the evidence we collect its location, the names of who discovered and collected it item’s condition, especially if there is visible damage. digital evidence is described by type, make, model, serial number, or other similar descriptors. device is on or off or if it’s connected to other devices (such as printers) or a network (like the Internet). Virtually everything we see, find, and do should be documented. Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 6 / 18
  • 20. Evidence into Custody Place the phone in special containers that shield the phone from wireless signals. Empty paint cans and Faraday bags are two of the more typical choices. Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 7 / 18
  • 21. Protecting Cell Phones from Network Signals It’s essential to isolate a live cell phone from the network. If not, it can receive calls, text messages, or even commands to delete all the data. A Faraday bag is one way to prevent a network signal from reaching the phone. A Faraday bag is made of “some type of conducting material or mesh” that repels these signals. 1 . 1 The function of the bag is based on the work of Michael Faraday, an English scientist who specialized in electromagnetism (Microsoft Corporation) Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 8 / 18
  • 22. Evidence Label Format Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 9 / 18
  • 23. Evidence Labelling The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 10 / 18
  • 24. Chain of Custody Before a piece of evidence gets in front of a jury, it must first meet a series of strict legal requirements, well-documented called chain of custody. evidence makes many stops on its road to trial. Each of these stops must be noted, tracking each and every time the evidence item changes hands or locations Without this detailed accounting, the evidence will be deemed untrustworthy and inadmissible. Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 11 / 18
  • 25. Chain of Custody Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 12 / 18
  • 26. Chain of Custody : Marking Evidence Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 13 / 18
  • 27. Chain of Custody :Cloning Evidence A forensic clone is an exact, bit for bit copy of a hard drive. It’s also known as a bit stream image. In other words, every bit (1 or 0) is duplicated on a separate, forensically clean piece of media, such as a hard drive. Hard drives are susceptible to failure. Having two clones gives you one to examine and one to fall back on. Forensically Clean Media : Drives can be cleaned with the same devices used to make the clones. The cleaning process overwrites the entire hard drive with a particular pattern of data such as 1111111111111 Forensic Image Formats : The end result of the cloning process is a forensic image of the source hard drive : EnCase (Extension .E01) Raw dd (Extension .001) AccessData Custom Content Image (Extension .AD1) Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 14 / 18
  • 28. Evidence Validation: Hashing How do we know our clone is an exact duplicate of the evidence drive? Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 15 / 18
  • 29. Evidence Validation: Hashing Example How do we know our clone is an exact duplicate of the evidence drive? Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 16 / 18
  • 30. Final Report Conclusion of the analysis, the examiner will generate a final report detailing what was done, what was found, and their findings. Ideally, final reports need to be crafted with the intended audience in mind. Must be addressed wrt nontechnical reader’s such as judges, attorneys and juries. major forensic tools, such as EnCase and FTK Final report should include a detailed narrative of all the actions taken by the examiner, starting at the scene if they were present. The examination should be documented with sufficient detail so that the procedure can be duplicated by another examiner Dr.Ramchandra Mangrulkar Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingOctober 7, 2020 17 / 18