Digital forensics is a branch of forensics science deals with the identification, acquisition and validation of digital evidence obtained from digital storage device, computers and networks. This project is mainly focusing on creating a digital forensic scenario challenge combining both network and disk forensics. It also involves analyzing the challenge with various tools and techniques. The implementation include setting up the network and services, capturing network traffic and creating disk image for further analysis. The scope of the project involves the assessment, acquisition, examine and reporting of forensics evidence obtained from the scenario. The project deliverables include the network capture file, disk image …show more content…
The challenge is also resolved using different forensic tools.
The main objectives of the project are:
1. To study the different scenario and techniques used in digital forensics
Need to do some research on various digital forensics scenarios and the method used to resolve the digital forensic scenario challenge.
2. To create a sample scenario including both network and computer forensics
Need to be fictional cases include network and data analysis. For eg: sharing company confidential data with the competitor.
3. To resolve the case and report using appropriate tools and methods.
The case needs to be resolved using specific tools such as wire shark, network miner. Also to find out any other specific tools to resolve the issue.
The main significance of digital forensics is to identify the proof of a crime, it is able to be utilized to facts to particular suspect, affirm explanations or articulations, focus goal, distinguish sources or authenticate documents. The forensic tools can help us to identify potential digital evidence. In addition to the identification of evidence of murders, terrorism, where the tools are used commonly but it is also used in other types of crime such as child pornography or stalking. Also helps to guarantee the overall reliability and survivability of the network infrastructure. Considerate the lawful and specialized parts of …show more content…
In right on time days, it was called computer forensics since the proof gathered was confined to computers. On the other hand, as of late, with a few innovative advances, this limitation is no more genuine. Hence, the procedure of leading forensic examinations including contemporary advanced confirmation has turned out to be all the more demanding.
Digital forensic sciences created as a unrestricted field in late 1990s and mid-2000 when computer based corruption began developing with the expanding prevalence of computers and particularly the Internet. Of the around half of respondents who experienced no less than one security occurrence a year ago, completely 45.6 percent of them reported they'd been the subject of no less than one focused on