Digital forensics is crucial to the security chain

1 November 2018 Information Security

The past decade has seen developments in technology that were previously unimagined. Businesses around the globe are increasingly reliant on the Internet and other technologies that keep them connected to their customers, supply chains and crucial business applications.

However, while these technologies have brought significant benefits in terms of productivity and efficiency, they have also become tools for cybercriminals to steal money and information.

“Cybercrooks use technology to breach networks to exfiltrate valuable data, or damage systems. They also use sophisticated tools to hide their malfeasance, and to evade detection,” says Simon Campbell-Young, MD of Credence Security.

This has resulted in the IT department having to employ new solutions to detect malicious activity and mitigate the damage. “The ability to root out and track illegal activities has become an integral part of the security chain, and this is where digital forensics come in. These tools help to investigate fraudulent activity, and conduct thorough analysis to expose the criminals and hopefully retrieve any stolen information.”

He says many think of forensics as a bunch of people in white coats taking swabs at crime scenes. “In reality, it is quite different. It involves the application of forensic tools to recover, scrutinise and analyse masses of data and logs to uncover what has happened, and to track and build a case against the perpetrators of online fraud.”

However, Campbell-Young says digital forensics is not without its challenges. The collection, classification, evaluation and analysis of digital evidence is a highly complex process, requiring digital tools and technologies. “Remember, today it’s seldom about a standalone PC. We have complex networks, multiple services, connected devices, and of course the cloud, which has significantly added to the complexity of the exercise.”

Moreover, all these sources and infrastructure can be spread over multiple locations and jurisdictions, and with that, a variety of rules and regulations governing them. “There will also be the question of duplicate and modified data, and mountains of other information that simply isn’t relevant to the investigation, but still needs to be looked at. Sometimes it’s a case of finding the proverbial needle in the haystack.”

The first step is identifying, collecting and producing all the data that is stored electronically, which, due to its sheer volume, is an onerous task, he says. Following this, digital forensics, which means analysing and recovering data from the plethora of devices such as servers, smartphones, wearables, printers, PCs, laptops – any device that stores electronic information. “Then there’s securely storing all this information to avoid tampering, and to follow the letter of the law in the jurisdiction in question. Any tampering or mishandling of this data could ruin the entire investigation.”

Campbell-Young says once all the information has been captured, stored and preserved, the true process of analysis can take place. “This is done by forensic professionals who use highly specialised skills and tools to extract the relevant information from the data. Doing this manually would be impossible, so sophisticated algorithms and tools are employed to drill down into the data, and retrieve the desired information. Then a case can be properly built.”

There’s no doubt that cybercriminals are using increasingly complex and sophisticated tools to carry out their evil deeds and avoid getting caught. However, even these tools leave a digital trail that a digital forensics professional can follow to identify them, and possibly even recover stolen assets, Campbell-Young concludes.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
Welcome to the new cyber battleground
Information Security
The Iran-Israel conflict is rapidly redefining modern warfare, pushing the boundaries of cyber capabilities and creating a new, borderless digital battlefield. Fortinet’s CISO, Dr Carl Windsor, offers a critical, in-depth analysis of the escalating tactics and global implications in his latest report.

Read more...
African industries may overestimate cyber defences
Information Security
A significant perception gap exists in security awareness training: 68% of leaders believe training is tailored to roles, yet only a third of employees feel adequately trained. Many organisations only conduct annual or biannual generic training that may not effectively change behaviour.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.