logo

Digital Forensics Challenges and Trends

   

Added on  2020-05-28

21 Pages6018 Words412 Views
 | 
 | 
 | 
Running head: CURRENT CHALLENGES IN DIGITAL FORENSICS INVESTIGATIONSCurrent Challenges in Digital Forensics InvestigationsName of the Student:Name of the University:Author note:
Digital Forensics Challenges and Trends_1

2CURRENT CHALLENGES IN DIGITAL FORENSICS INVESTIGATIONSTable of Contents1. Introduction..................................................................................................................................32. Critical evaluation of the impact of cyber crimes to digital forensic investigation.....................33. Systematic analysis of the effectiveness of present digital forensic principles, procedures,techniques and standards.................................................................................................................94. Recommendation and conclusion..............................................................................................16References......................................................................................................................................17
Digital Forensics Challenges and Trends_2

3CURRENT CHALLENGES IN DIGITAL FORENSICS INVESTIGATIONS1. IntroductionDigital forensics is considered as a technique used for identifying computer based crimes.However, there are several major challenges in digital forensics faced while it is used inconducting investigations. The challenges involved in digital forensics can be categorized inthree major categories such as technical challenges, legal challenges as well as resourcechallenges. On the other hand, the ever increasing prevalence of science and technology results acorresponding increase in the digital devices, which becomes pertinent to do criminalinvestigation. In the present study, the impact of cybercrimes to digital forensic investigation iscritically evaluated. In addition, systematic analysis has been done regarding effectiveness ofcurrent digital forensic principles, processes, techniques and standards involved with digitalforensic investigation. Recommendation is also provided in order to enhance conducting moresuccessful digital forensic investigation in the modern cyber environment. 2. Critical evaluation of the impact of cybercrimes to digital forensic investigationScanlon (2016) stated that the current development of information and communicationtechnology has brought a massive change in life. The changes are reflected in the areasassociated with cyber space. The positive influence of cyberspace on knowledge, trade as well asbusiness and communication has any doubt. However, cyberspace deteriorates has a negativeside on peaceful utilization in cybercrime. Any types of illegal activities practiced throughcyberspace and electronic environment is mentioned as cybercrime (Cahyani et al. 2017). It alsopresents a real dilemma for the particular identity of criminals hidden in virtual domain. On theother hand, the concept of digital forensics becomes popular through making an attempt offormulating the possible method for investigating cybercrimes. Cyber attacks and crimes are
Digital Forensics Challenges and Trends_3

4CURRENT CHALLENGES IN DIGITAL FORENSICS INVESTIGATIONSconsidered as major consequences, which balances out the benefits obtained from advancementsin technologies. Computer forensics makes integration in computer science and law in order to make aninvestigation of crime. In addition, digital evidence requires to be legally admissible in the courtwhere investigators requires following appropriate legal processes at the time of recovering datafrom the systems (Ab Rahman et al. 2017). On the other hand, computer forensics isindispensable in specific conviction of several well-known criminals. It consists of terrorists,sexual predators as well as murders. In addition, terrorists’ organizations may utilize internet inorder to recruit members as well as sexual predators for social networking sites for stalkingpossible victims. On the other hand, most of the criminals fail in covering their tracks at the timeof using technology for implementation of crimes (Khan et al. 2016). However, they realize thatfiles as well as data of the computer remain on specific hard drive even after deletion. Moreover,it allows investigators for tracking of criminal activities. Criminals delete incriminating files.However, it remains as binary format for data remanence.Pichan, Lazarescu, and Soh (2015) mentioned that the data may be overwritten forvolatile nature of computer memory and used data. Martini and Choo (2014) stated that thecontents can be safely utilized by lawyers as well as detectives for more analysis. Global PositionSystem software are presently embedded in smart phones as well as satellite navigation systemsthat aid prosecutors through tracking whereabouts of suspect. Digital forensic has some challenges when issue of conduction of investigation comesinto action (Al Fahdi, Clarke and Furnell 2013). In the last few years with advancement ofcomputer technologies the usage of technology can be defined as bad or good. One of the major
Digital Forensics Challenges and Trends_4

5CURRENT CHALLENGES IN DIGITAL FORENSICS INVESTIGATIONSissues encountered by various forensic officer is today’s market is that as soon as technology iscreated for identifying and investing a large number of criminals a technology is build whichhelps the various kinds of criminals to make themselves untraceable (Aminnezhad,Dehghantanha and Abdullah 2012). There are large number of anti-forensic methods likeencryption, steganography, conversion channel, hiding of various kinds in storage place, residualwiping of data, attacking tools, attacks from the sides of investigation, tail obfuscation andattacking of various kinds of tools. The age of” bring your own device” companies allow various personal to make use ofpersonal mobile device for providing mobile device which is used for providing an access tovarious kinds of officials which can easily gather for contributing to various challenges duringinvestigation (Aminnezhad, Dehghantanha and Abdullah 2012). Accessing mail from variouswebmail through various devices and can download attachments which can have an issue of theftconfidential information. Some particular or specific information which was downloaded and italso contains details on certain number of files which are considered to be difficult for tracing inthe present or current environment. Encryption is defined as a method which is used forscrambling various kinds of information which can be easily decoded by making use of variouskinds of keys. Method of encryption is used for hiding evidence which is used in unreadableform for evidence on the compromised system. Resource challenges is generally involving data which might be very large in many cases.As time is considered to be a limiting factor, it can easily become a challenging issue in the fieldor domain of digital forensic. In cases of volatile memory of forensic since data which stored areoverwritten in volatile memory. So the investigation can analyze the various kinds of informationwhich is stored in the volatile memory which ultimately reduces its value for various kinds of
Digital Forensics Challenges and Trends_5

6CURRENT CHALLENGES IN DIGITAL FORENSICS INVESTIGATIONSinvestigation (Aminnezhad, Dehghantanha and Abdullah 2012). When data is collected from asource which an investigator which checks or make sure of the fact none of the important data ischanged or modified during the whole investigation of the case and also ensures about the factthat data has be secured for its usage. Sources of data which are easily damaged cannot be usedfor any kinds of investigation. A major issue encountered by investigator is to find the sourcewhich is not in usable form. Privacy is considered as an important factor for an enterprise or various kinds of victimsassociated with it. In some of the cases it is seen that it requires computer forensics analyst orexperts for sharing or distributing of data or making adjustment with the privacy for having thetruth (Jang and Kwak 2015). A private organization may have lots of private information whichis generated on a day to day basis. So it is considered to be risky for analyzing the data at the riskof privacy which is being delivered or revealed. The degree of enablement in various operating systems for computers has changed for better.It has now taken into account the requirement of gathering various kinds of backgroundinformation for accessing application, usage and other kinds of information at the level of user.In many cases it is seen that evolution is progressing at a much faster rate on mobile devices butit is yet to be matured (Damshenas et al. 2012). The accessibility of various applications of datahas various constraints which generally works in the nature of data in which operating systemand various kinds of application are defined properly. For example, changes which are made inthe file can be traced until and unless it is compared with previous version of file or its lastmodification with kind of stamp of time. This can be quite challenging for various kinds ofdocuments which are suspected. Apart from this certain number of logs and applicationinformation are generally gathered by operating system which can be considered to be helpful in
Digital Forensics Challenges and Trends_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents