Skip to main content

What if Sherlock Holmes is a Digital Detective?


In this series of the blog, I’m going to put Windows Forensics with Sherlock Holmes. In this series, Sherlock Holmes is going to teach you how to solve the cases in the Digital world.

John Watson: Hey, Sherlock how you are going to start your first digital case?
Sherlock Holmes: Let me explain you the style of investigation that I follow to solve a digital case
Main Part of Forensic investigation is Collection of Scientific evidence
·        Rule 1: Maintain Integrity.
·        Rule 2: Maintain the chain of custody. 
·        Rule 3: Document everything
·        Rule 4: Follow standard practices.
Phases of Investigation
·        Evidence Preservation.
·        Evidence Searching.
·        Event reconstruction.
Watson: Where you are going to do all this, do we have proper setup?
Sherlock: Don’t worry Pal, it just requires a simple setup


Response kit

·        CD-ROM and USB.

·        Hardware: Write Blocker.
·        Linux Distro and Windows 7.
Watson: What is the procedure to Start a investigation ?
Sherlock:
Starting an Investigation
·        Open a Case file.
·        Talk to user
·        Why did they call you?
·        Why do they think there is a problem?
·        What is known about the potential victim system.
·        Document everything.
Constable Clark: Hey Sherlock !! We had a case for you Sir …..

To be continued !!!
The outcome of this blog is to understand the basic concepts of Digital Forensics. The next blog will be on live analysis of the system.

Comments

Popular posts from this blog

Can Blockchain be the Iron Man of Data Security?

  Recent incident in Cyber Space shown that how vulnerable the data is and how important data security is to the user or an organization. There are various mechanisms out in the market in terms of data protection. What may be the reason for Data Thefts and Loss of Data Privacy? Lack of privacy towards the system is becoming more vulnerable to data thefts. For example, using weak passwords and lack of application regarding Cryptography. Cyber Criminals are finding the vulnerabilities in the system like Thanos finding the Infinity stones. Blockchain is the Iron Man of the Data Security. Blockchain Architecture will help reduce data theft and data tempering. What is Blockchain? Blockchain is growing list of records called blocks which are cryptographically hashed with pervious block. Blockchain follows the Merkle tree Data Structure Merkle Tree : In  cryptography  and  computer science , a hash tree or Merkle tree is a  tree  in which every  leaf node  is labelled with the 

Sherlock says “A World with the Internet is Unsafe”

  Once a journalist in Baker street interviewed Mr Sherlock Holmes about a cybercrime happening in the Cyberspace. Disclaimer : This article is about privacy and security measure that needs to be taken in   cyberspace Journalist: Hello Sir, I am a Steve working as journalist and I have few queries about the cybercrime happening nowadays and the reasons behind it. Sherlock: A world with the internet is unsafe, the technologies and applications that we use are often not secure and our data might not be safe. Journalist: Sir, can you explain briefly? Sherlock: We download applications, files, music etc from different sites. This may trigger a Malware. This Malware acts as Spyware. Through this malware, we will have full access to the entire mobile such as a camera, microphone, messages, contacts and logs. Malware will also be able to gain access to content-sensitive information such as OTPs, bank details and these confidential details will help hackers gain access to the bank accou

The Defense Against the Dark Arts

The Defense against the dark arts refers to defending yourself in the world Cyber against the Dark arts like hacking, data theft and social engineering attacks. Professor Snape for Hogwarts School of Witchcraft and Wizardry and Ilvermorny School of Witchcraft and Wizardry will teach the subject Defense against the Darks arts; ie Professor will teach how to protect your self from the Cyberworld. “Your defences must, therefore, be as flexible and inventive as the arts you seek to undo”    -Professor Snape Rule 1: “Don’t click unwanted links that you receive by E-Mails or by forwarded messages in Whats App” Once a student of Hogwarts came to know about the chamber of secrets, We all know the curiosity that the students of Hogwarts had They started digging into mystery while searching for the mystery they found something like what they want without knowing they started reading the spell and that resulted in huge damage. Rule 2: “Don’t connect to public WI-FI’s