"Network Forensics Is A Science That Centers On The Discovery and Retrieval of Information Surrounding A Cybercrime Within A Networked Environment
"Network Forensics Is A Science That Centers On The Discovery and Retrieval of Information Surrounding A Cybercrime Within A Networked Environment
Advantages:
Network forensics helps in identifying security threats and vulnerabilities.
It analyzes and monitors network performance demands.
Network forensics helps in reducing downtime.
Network resources can be used in a better way by reporting and better
planning.
It helps in a detailed network search for any trace of evidence left on the
network.
Disadvantage:
The only disadvantage of network forensics is that It is difficult to
implement.
NetFlow Analyzer: The advanced network forensics
tool
NetFlow Analyzer is a network forensic analysis tool that captures the raw data and provides you
with accurate insights about the bandwidth usage, security, and performance of your network. You
can leverage the tool to receive forensics reports that go back in time so you can determine the root
cause of bottlenecks and see how the patterns have changed. This can help you build policies and
restrict certain harmful traffic from penetrating your network.
and is often used to unearth evidence in litigation cases, criminal cases, or in internal
investigations. Electronic data can provide critical evidence and clues in many cases,
and aid in the discovery of cybercrime, data theft, crypto crimes, security breaches,
instances of hacking, and more. Digital forensics play an instrumental role in getting to
Identify whether a hack was perpetrated and how long the hacker had access
to the system
of data
A digital forensic investigation can help identify and prove different kinds of
forensics investigation, to ensure the integrity of the data and its admissibility in a court
Data acquired in this way is permissible in court, and can be used as evidence to
The very first step in a digital forensics investigation is to identify the devices and
resources containing the data that will be a part of the investigation. The data involved
These devices are then seized and isolated, to eliminate any possibility of tampering. If
organization needs to ensure that no one other than the investigating team has access
to it.
After the devices involved in an investigation have been seized and stored in a secure
location, the digital forensics investigator or forensics analyst uses forensic techniques
to extract any data that may be relevant to the investigation, and stores it securely.
This phase can involve the creation of a digital copy of the relevant data, which is
known as a “forensic image.” This copy is then used for analysis and evaluation, while
the original data and devices are put in a secure location, such as a safe. This prevents
any tampering with the original data even if the investigation is compromised.
Once the devices involved have been identified and isolated, and the data has been
duplicated and stored securely, digital forensic investigators use a variety of techniques
to extract relevant data and examine it, searching for clues or evidence that points to
These are just some of the many techniques digital forensic investigators to unearth
evidence.
Post analysis, the findings of the investigation are properly documented in a way that
makes it easy to visualize the entire investigative process and its conclusions. Proper
Once the investigation is complete, the findings are presented to a court or the
complaint. Digital forensics investigators can act as expert witnesses, summarizing and
Although social networking sites have their uses, there are several associated security
threats. The concerns regarding social networking sites are:
Does the social networking site violate people’s intellectual property rights
Whether these sites infringe the privacy of their own users
Whether these sites promote fraudulent and illegal activities
Content preservation can be challenging given the dynamic, short-lived and often multi-
format nature of social media. There is generally no control over the content posted on
social media networking sites. High level of forensic skill is required to analyze and
quantify the preserved data to answer questions such as:
Is there a real live person to whom the offending content can be attributed even
when evidence exists?
Can we identify the time frame associated with the posting of the offending
content?
How much of the offending content exists across the entire social networking
platform?
Is there other content that supports interpretation of the relevant content?
How accurate is the reported physical location?
Security issues that are associated with social networking sites are:
Corporate espionage
Cross site scripting
Virus and Worms
Social networking site aggregators
Phishing
Network infiltration leading to data leakage
ID theft
Cyberbullying
Content-Based Image Retrieval (CBIR)
Spam
Stalking
Digital Forensics techniques in social media networking are used to detect many types
of cyber-crimes like (figure 1) [2]:
Photo-morphing- In this case, hackers morph the pictures of people and post
them to pornographic websites, or they may use them to blackmail them into
providing sexual or financial favors.
Shopping Scams- Hackers post many fake retail ads on social networking sites,
and when users click on these ads, the cybercriminal obtains their personal
information.
Cyberbullying- Cyberbullying is defined as the act of sending or posting obscene
or embarrassing messages or material online, as well as making threatening to
conduct violent actions.
Link baiting- When scam artists use this tactic, they offer the victim a link that
tugs at their emotional investment in order to increase the likelihood of
exploitation. When the link is opened, it takes the user to a bogus landing page
that asks them to input their account credentials, and by this fake page, hackers
steal the user’s credentials.