The reticent hero in the cybersecurity space – Digital forensics to the rescue

With the recent surge in cyber-attacks including major attacks like the Airline data breach, Domino’s customer data breach, ransomware attacks, the need for digital forensics has undoubtedly sky-rocketed in the recent times. No matter what, a lot of organizations have been employing the use of digital forensics, the potential of the discipline is yet to be seen in reducing this surge of attacks. EC-Council defines Digital forensic science as a branch of forensic science that focuses on the recovery and investigation of material found in digital devices related to cybercrime. Initially the term was interchangeably used with computer forensics but in today’s digital world, digital forensics has branched into various multi-disciplines like network forensics, hard disk forensics, memory forensics, server forensics, mobile forensics and IoT forensics being the latest addition to the list. The significance of performing digital forensics has been of great significance since time immemorial and today the importance has become paramount.

Mordor Intelligence has quoted that the digital forensics market was valued at USD 4490 million in 2020, and it is expected to reach USD 8210.5 million by 2026, registering a CAGR of 10.97% during the forecast period of 2021-2026. Digital forensics has grown from addressing minor computer crimes to the investigation of complex international cases that significantly affect the world. Also some of the key trends in the digital forensics market is that network security is expected to hold a higher market share. Many companies are implementing SaaS backups that come with an intrusion detection system that safeguards critical data from malicious attacks, whether its external or internal. For instance, in 2020, Attivo Networks announced the availability of its ADSecure solution for Google Cloud’s Managed Service for Microsoft Active Directory (AD). The Google Cloud team has reviewed the Attivo solution that operates and reduces the risk of attack escalation for organizations running Active Directory with Google’s managed service.  [Reference]

Source : Reference

The new advances in hardware and information technology have accelerated the deployment of billions of interconnected, smart and adaptive devices in critical infrastructures like health infrastructure, transportation, ecological control, and home automation. Moving data over a network without requiring any sort of human-to-PC or human-to-human communication, carries unwavering quality and comfort to consumers, yet additionally opens another universe of chance for gate crashers, and presents an entire arrangement of novel and muddled inquiries to the field of Digital Forensics. Despite the fact that IoT data could be a rich wellspring of proof, crime scene investigation experts adapt to different issues, beginning from the enormous assortment of IoT devices and non-standard arrangements, to the multi-occupant cloud foundation and the subsequent multi-jurisdictional cases. A further test is the end-to-end encryption which addresses a compromise between clients’ entitlement to security and the achievement of the forensics examination. Because of its volatile nature, digital evidence has to be acquired and analyzed using validated tools and techniques that ensure the maintenance of the Chain of Custody. [Reference]

Existing research and studies have embraced distributed computing to gather proof followed by utilization of blockchain to help the straightforwardness, changeableness, and auditability of the evidence. Deplorably, such examinations just depend on a powerless security show and don’t cover the whole life pattern of the proof or address the key protection issues, i.e., witness security in proof assortment and hearer security in court preliminaries. A recent research has been proposed called LEChain – a blockchain-based lawful evidence management scheme to supervise the entire evidence flow and all of the court data, extending from evidence collection and access during the police investigation to jury voting in the court trials. [Reference]

Digital forensics has been a significant factor and will continue to be so in understanding the nature of these recent attacks and breaches so that lessons can be learnt and vulnerabilities can be patched thereby providing greater attention to Forensics-as-a-Service (FaaS).

Article by Kaushik Sundararajan

I am a security professional specializing in network security. With vivid experience in different industries, I am looking to explore the current cyberspace and discuss the ideology of certain ideas from a different perspective

Published by The Art of Cyber-Space

I am a security professional specializing in network security. With vivid experience in different industries, I am looking to explore the current cyberspace and discuss the ideology of certain ideas from a different perspective.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: