In
2008 FBI reported that Internet fraud had resulted in $264.6.The
government and other large important organizations are also at
high risk of having confidential and sensitive data (i.e. bank
account holders credentials) which can be easily stolen from
their online database. The problem was detected when series
of denial-of-service (DoS) attacks happened in 2009, targeting
some government agencies websites in the South Korea and
USA, including the website of White House and the National
Security Agency [source: Olsen], highlighting the need to
educate the people regarding the recent trends in hacktivism.
B. In Cloud Computing
Cloud computing provides large scale pool of resources,
wide access, dynamicity, cost effective solution for storage.
Public, Private and Hybrid deployment models exist for cloud
computing along with various service models like Software as
service, Integration as service, Database as service, and
Security as service.
D. Phishing
Given that a typical phishing campaign
takes at least one hour to be identified by IT security vendors,
which doesnt include the time required to take down the
phishing Web site, the first 60 minutes of a phishing sites
C. Online Disks
These days online disks are used frequently for various
purposes (i.e. for storing data of clients). Again it creates lots
of problem in the device imaging step of digital forensics
evidence generation process like imaging large online active
disk farms. Because in the imaging process of disks these
firms (i.e. amazon.com) have to discontinue their service until
all the drives are being copied
D. Anonymity of the IP
The second big challenge of network forensics is the inherent
G. Size of Evidence
With the examination of any evidence, a well-documented
chain of custody must be there. Forensic analysis process
should include notes taken by the forensic expert. The report
has the details of hardware examined (i.e. hard disk etc), the
procedures and software tools used in the examination and the
evidences found. The volume of evidence is not fixed and it
can vary according to the crime
VII. CONCLUSION
There is always a competition between the development of
digital forensics and anti digital forensics tools. The pace of
the hackers is almost same as that of the ethical hackers
making the process of creation of digital evidences delayed.
As a result of this the culprit is not able to get the punishment
within the defined interval of time. The main problem being
faced by the digital forensics is the absence of cyber laws
making the cyber security an issue in these countries. Even if
the cyber laws are present the cyber policing system is not that
advance to tackle such issues making it quite easy for
criminals to commit crime without being caught.
The latest to add to this list is the defective cyber forensics approach of
Central Bureau of
Investigation (CBI) in Aarushi Talwars murder case. According to media
sources, the
defence counsel in the Aarushi Talwars murder case had challenged the
prosecution
version of CBI that Rajesh Talwar was awake on the night when crime took
place and
had used Internet connection at regular intervals