CAREERS IN CYBER FORENSICS
CAREERS IN CYBER FORENSICS
Top Gun Job
Are you excited by the prospect of investigating cyber crime, tracking criminals, hackers and the like? A career in Cyber Forensics would be the right choice
From Talking to Walking to Writing to Watching Information Technology (IT) has engulfed our lives. So many people are using it as part of their lives- some for legal and some for illegal activities. It is not just an individual who is threatened by illegal activities in cyberspace, but even an entire country’s security could be at risk. High security data, commercial data, important contacts, secret letters, secret deals, bank information everything could be easily stolen and misused which may embarrass an individual as well as a nation.
It is in such cases that a cyber forensic expert dons his gloves to follow the digital trail left by criminals and helps bring perpetrators of such criminal activities to justice.
THE NEED OF CYBER FORENSICS PROFESSIONALS
Cyber Forensics is a new and developing field. It is the study of digital evidence resulting from an incidence of crime. It involves investigating a computer activity to determine the potential of legal evidence. It helps create preventive intelligence and threat monitoring besides post incident investigations. The fast growing e-commerce and web-based business transactions have changed the way white- collar crime is committed. Enterprises using computer networks are becoming increasingly vulnerable of corporate spying. Nations are faced with extraordinary risk factors such as terrorism (we have seen how e-mails have been used by terrorists in threatening, planning terror acts etc).
From the government’s perspective, cyber security has become as important a parameter for national security as physically safeguarding the nation’s borders. In fact, there exists a critical dependence of various industries and business sectors on the government-controlled IT infrastructure and networks. And if any vulnerability is attacked by terrorists, it can be disastrous for the country’s corporate and businesses. This has further escalated the need to have Cyber Forensics experts in India to preserve country’s IT assets against operational and reputation risks. Thus, Cyber Forensics professionals are not just required by enterprises for their information security, but also by government agencies to keep track of nation’s cyber security and preserve it from malicious attacks.
National Cyber Security Policy 2013 which is unveiled this year provides a roadmap for a secure computing framework in the country. This means the Indian market is to evolve fast to meet information security norms and governance policies be followed by corporates in accordance with the Indian IT Act. And the demand/ supply ratio for Cyber Forensics professionals is 10:1 in India, thus, creating vast opportunities for professionals to enter this domain.
A beginner can expect a pay package between Rs.4 to6 lakhs per annum. Candidates with higher academic qualifications and work experience draw up to Rs.30 lakhs based on the job role. According to market experts salaries for information security professionals are at least 25 per cent higher than for most other positions at the same level in other fields of IT.
Before anybody can even start doing any Cyber Forensics – one should be well trained in a vast array of IT aspects – like hardware, networking, Internet security and operating systems. After a few years of hands-on experience in the above mentioned aspects, the person can start learning Forensic Acquisition (Imaging) with various commercial and Open source tools, Analysis/ Correlation of the information and finally E-Discovery. Cyber Forensic experts are typically needed by Law Enforcement Agencies – as the agencies themselves might not have the tooling/expertise to conduct very high end data analysis. The demand/supply ratio for cyber forensic professional is 1:10 – that says how hard it is to find a decent CF professional in India.
Major IT companies : HCL, NIIT, HP, Microsoft, IBM
Cyber Forensics professionals are sought by both public as well as private sector. In the public sector, people are being inducted mostly in law enforcement agencies like cyber crime cells, state forensics departments and central agencies like the CBI. In the private sector, they basically safeguard data from being stolen and misused and also preserve them from hackers. Besides there are independently working specialists and consultants that work on Ethical Hacking, Cyber Forensics and IT Security.
ROLES THEY PLAY
In investigative agencies they are involved in range of activities – intelligence gathering to ‘Trackback Analysis to monitor and trackle online threats and their patterns . As a case in point, with the increasing dependence of terrorists on the cyber space, rigorous and consistent network monitoring and forensics can isolate patterns and pick up indicators or triggers. This also applies to organized crime syndicates involved in identity and data thefts, money frauds, fraudulent schemes and counterfeit sales through Internet. In today’s world, preemptive intelligence plays an even more crucial role since many countries have developed advanced capabilities to launch cyber wars/attacks. Recent reports have indicated that more and more countries are creating the capability for high level cyber attacks directed toward hampering the operations of critical national infrastructure.
Also in the post event scenario an investigative approach deals with the forensics of all the evidence that is part of the crime or associated with a cyber incident. Here, the Cyber Evidence Chain Management plays a pivotal role followed by ‘construction’ of events for legal prosecution.
The other facet of Cyber Forensics is the criminal litigation process, which requires the knowledge of the cyber laws and security compliance. An expert in these areas can advise companies on how to proceed with a cyber crime investigation. Also, since most Indian companies do business in the US and European countries, it’s mandatory for them to comply with laws of respective countries while doing business there. Hence, the knowledge of such laws can be an advantage for a Cyber Forensics expert.
The field requires professionals who have specialized in gathering evidence over IT networks. This requires in-depth understanding of networking technologies, operating systems, storage and memory devices, and how various applications interact with hardware and operating systems. Specialized forensic skills can be only built upon the above pre-requisites. The other requirement is expertise in cyber threat investigation, evidence management, legal knowledge, encryption and cryptography, and search technologies. Specialized training and experience is required to acquire these skills.
Those who want to enter the predictive side of the forensics need to have excellent analysis skills which would require deep knowledge of networking, packet analysis, cryptography, data mining, legal understanding and ethical hacking.
Graduates/postgraduates and engineers in Computer Science/Information Technology and allied streams can take up a course in Ethical Hacking. A certification from a reputed institute enhances the chances of getting hired. International certifications like Certified Ethical Hacker (EC-Council), Certified Hacking Forensic Investigator (EC-Council), GIAC Certified Penetration Tester (GPEN) offered by SAN and GIAC Certified Intrusion Analyst (GCIA) can further improve job prospects. The training for the certifications is available in regular and online modes.
Globally Recognized Certifications:
EnCase Certified Examiner (EnCE)
Certified Forensics Analyst (GFCA)
Certified Computer Examiner
Certified Ethical Hacker Certifies
CISA (Certified Information System Auditor),
CISM (Certified Information Security Management),
CISSP (Certified Information Systems Security Professionals)
CCSP (Cisco Certified Security Professional)
MCSE (Microsoft Certified System Engineer)
WHERE TO GET TRAINED
1. IFS Education online courses
3. Institute of Information Security
4. IMT, Ghaziabad
5. Asian School of Cyber Laws, Pune
6. International Institute of Information Technology
7. Information System Audit and Control Association (ISACA)
8. International Information systems Security Certification Consortium (ISC)2
9. Faridabad Institute Of Management Studies – Faridabad
10. Indian Institute of Information Technology (IIIT), Allahabad
MS in Cyber Law and Information Security
11. Atal Bihari Vajpayee Indian Institute of Information Technology and Management, Gwalior
M.Tech.in computer science with specialization in information security
12. Indian Institute of Technology (IIT), Guwahati,
M.Tech in information security
13. Motilal Nehru National Institute of Technology, Allahabad
Master of Technology in Information Security
14. National Institute of Technology (NIT), Calicut,
M.Tech Computer Science & Engineering (Information Security)
15. Amrita School of Engineering, Coimbatore
M.Tech. in cyber security.
16. SRM University, Tamil Nadu
M.Tech (Information Security and Computer Forensics).
17. The International Institute of Information Technology (IIIT-H) , Hyderabad
Master of Technology in Computer Science and Information Security
18.University of Madras, Chennai
M.Sc in Cyber Forensics and Information Security.
19. Centre for Development of Advanced Computing, Hyderabad
‘C-DAC’s Course on Cyber
20. Centre for Development of Advanced Computing, Pune
PG Diploma in Information System & Cyber Security
21. JSS Academy of Technical Education, Bangalore and IGNOU
M.Tech in Cyber Forensics
Post Graduate Diploma in Information Security (PGDIS),
Advanced Certificate in Information Security (ACISE)
23. National Institute of Electronics and Information Technology
(Formerly DOEACC Centre) Calicut
PG Diploma in Information Security.
24. Tilak Maharashtra Vidyapeeth
Post Graduate diploma
Diploma in Cyber Security
25. Yashwantrao Chavan Maharashtra Open University,Nashik,
Diploma in Cyber Security
26. Amity university
Master of Technology in Information security and cyber forensics
PG Diploma in Cyber Crime & Cyber Law
Certificate course in cyber security.
About The Author
Leave a Comment
You must be logged in to post a comment.