20IT84-Cyber Security & Digital Forensics
B.Tech. (OPEN ELECTIVES)
By
Mrs.T. KARUNA LATHA,
,
Assistant Professor,
Dept. of IT,
LBRCE.
UNIT-IV Contents
What is Digital Evidence?
Characteristics of Digital Evidence�
Volatile: Can be easily altered or destroyed.
Malleable: Can be easily copied, modified, or deleted.
Ubiquitous: Exists in many forms and can be located on various devices.
Invisible: May be hidden or require specialized tools to be accessed.
Why is Digital Evidence Collection Important?�
To preserve the integrity of the evidence.
To ensure acceptability in court.
To reconstruct the events of a crime or incident.
To identify potential suspects or witnesses.
Digital evidence can be broadly categorized into two groups based on its source:�
7
2 July 2025
8
2 July 2025
Handling Evidence from Specific Sources�
Digital forensics tools
Digital forensics tools play a crucial role in investigations by aiding in the recovery, analysis, and preservation of digital evidence. Here are some commonly used tools in digital forensics:
Digital forensics tools
Other notable digital forensics tools include Autopsy, FTK (Forensic Toolkit), Sleuth Kit, VIP 2.0 (Video Investigation Portable), and more.
Operating Systems and their Boot Processes in Digital Forensics�
Operating Systems and their Boot Processes in Digital Forensics
Understanding the boot process of different operating systems is crucial in digital forensics. It helps investigators:
Common Boot Process Stages�
While the specifics may differ between operating systems, the general stages of the boot process are:
Popular Operating Systems and their Boot Processes�
Windows:
Popular Operating Systems and their Boot Processes�
Linux:
File System in Digital Evidence
The file system is a critical component in digital forensics investigations. It acts as the organizer and keeper of digital evidence on storage devices like hard drives, solid-state drives, and memory cards. Understanding file systems empowers investigators to:
File System in Digital Evidence
Types of File Systems�
There are various types of file systems, each with its own structure and functionalities. Understanding the specific file system used by the device under investigation is essential for effective analysis. Here are some common types:
Challenges and Considerations:�
What is the Windows Registry?
Structure of the Windows Registry
Forensic Significance
Tools
Windows Artifacts: Uncovering Clues in Digital Investigations
Within the vast world of digital forensics, Windows artifacts play a critical role in uncovering evidence and piecing together the puzzle of an investigation. These artifacts are essentially digital traces left behind by various activities on a Windows system. They can be found in various locations and formats, offering valuable insights into:
Key categories of Windows artifacts that investigators often examine
Key categories of Windows artifacts that investigators often examine
Key categories of Windows artifacts that investigators often examine
Other Windows Artifacts:
Browser artifacts
Browser artifacts are significant sources of digital evidence in forensic investigations, as web browsers are among the most frequently used applications on computing devices. They store a wealth of information about user activities, including browsing history, bookmarks, cookies, download history, form data, and cached web content. Analyzing browser artifacts can provide valuable insights into user behavior, online activities, visited websites, and interactions with web-based services. Here are some common types of browser artifacts and their relevance in digital evidence analysis:
Browser artifacts
Browser artifacts
Browser artifacts
Top Web Browser Activity Artifacts for Android
Chrome Browser Data:
Linux artifacts
Linux artifacts serve as vital pieces of evidence scattered across a Linux system, providing valuable insights into user activity, system configuration, and potential security concerns. These digital traces hold the key to reconstructing events and uncovering information that might otherwise remain hidden.
Here are some key categories of Linux artifacts frequently examined by investigators:
1. User and Group Information:
2. System Logs:
Linux artifacts
3. Shell History:
4. Process Information:
5. File System Metadata:
Linux artifacts
6. Network Artifacts:
7. Scheduled Tasks:
8. User Data:
Digital Evidence on the Internet
The internet presents a unique challenge for digital forensics due to its vastness, dynamism, and inherent complexities. While it may seem like online activity is ephemeral, digital traces can linger in various forms, potentially serving as valuable evidence in investigations. Here's an overview of digital evidence on the internet:
Types of Digital Evidence:
Types of Digital Evidence
Challenges and impediments faced during the collection of digital evidence
Challenges and impediments faced during the collection of digital evidence in the field of digital forensics:
Challenges and impediments faced during the collection of digital evidence
Challenges and impediments faced during the collection of digital evidence