n.sai kiran iiita ap
TRANSCRIPT
![Page 1: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/1.jpg)
N.Sai Kiran,
IIIT Allahabad.
![Page 2: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/2.jpg)
![Page 3: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/3.jpg)
![Page 4: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/4.jpg)
![Page 5: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/5.jpg)
About Hackers
Business Response
Introduction to Forensic science
Basic Concepts
Basic cyber crime investigation tool
Firewalls
Child pornography
Precautions
![Page 6: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/6.jpg)
“Cyber crime may be said to be those
species, of which, genus is the conventional
crime, and where either the computer is an
object or subject of the conduct constituting
crime”
Old WINE IN NEW BOTTLES.o Hackers
o Crackers
o Cyber terrorists
![Page 7: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/7.jpg)
The challenge... „because it‟s there!‟
Ego
Espionage
Ideology
Mischief
Money (extortion or theft)
Revenge
![Page 8: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/8.jpg)
Predominantly male
Aged from mid-teens to mid-twenties
Lacking in social skills
Fascination or obsession with computers
Underachiever in other areas who sees
computing as a means of being important or
powerful
Discontented
employees
![Page 9: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/9.jpg)
Service %
Adult Content (XXX) 50
Online Services 19
Direct Marketing – Other 11
Direct Marketing – Catalogue 10
Gaming 5
Books 3
Other 2
Total 100
9
![Page 10: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/10.jpg)
“If you have to teach ethics it’s too late”
![Page 11: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/11.jpg)
There is no plan for review logs or scan
for unusual activity.
Physical access is not controlled in a
consistent manner.
If an intrusion detected or ever suspected
there is no procedure designed to deal
with it.
![Page 12: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/12.jpg)
Why should you care?
![Page 13: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/13.jpg)
![Page 14: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/14.jpg)
Administrative precautions
Physical precautions
Information systems
![Page 15: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/15.jpg)
Forensic science is the application of a
broad spectrum of sciences to answer
questions of interest to a legal system.
This may be in relation to a crime or a civil
action.
![Page 16: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/16.jpg)
Computer forensics is a branch of digital
forensic science pertaining to legal evidence
found in computers and digital storage media.
The goal of computer forensics is to examine
digital media in a forensically sound manner with
the aim of identifying, preserving, recovering,
analyzing and presenting facts and opinions
about the information.
![Page 17: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/17.jpg)
Protect
Discover
Recover
Reveal
Access
Analyze
Provide Expert Consultation.
![Page 18: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/18.jpg)
In the mind of a normal computer user, once
data is deleted, it is accepted that it is no
longer in existence.
On the other hand, the CFS should
understand that the data could still exist in
some other form or area on the storage
medium
![Page 19: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/19.jpg)
Disk Imaging
HashingMessage Digest 5 (MD5)
Secure Hash Algorithm (SHA)
![Page 20: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/20.jpg)
PC
Inspector
Encase Forensic
tool kit
FTK imager
File data discovery SE SE SNR SE
File data recovery SNR SNR NS SNR
Reveal file contents SNR SE SNR SNR
File access and
analysis
SNR SE SNR SNR
Imaging NS SE NS SE
MD5 NS SE SE SE
SHA1 NS NS SE SE
Summary print out NS SE SNR SE
![Page 21: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/21.jpg)
PC Inspector File Recovery
Encase
Forensic Tool Kit
FTK Imager
![Page 22: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/22.jpg)
Window GUI Technology base Forensic Software for examination of File systems FAT12, FAT16, FAT32, NTFS, LINUX, UNIX, MACINTOSH, CDROM and DVD-R.
It should able to examine and extracting slack space.
It should be able to create image of the storage media e.g. hard disk, Floppy disk.
It should show emails in developer‟s format. (With headers and attachments)
It should open document in language other English spouted by Unicode e.g. Arabian language.
It should show Internet history.
Forensic Cell phone Seizure kit with write block facility and will all required cables and adapters.
Forensic Hardware: One computer PIV 3.2 GHz with 1 GB DDR RAM and other required peripheral
One hard disk write block device
![Page 23: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/23.jpg)
Robust operating system software
Other application software facilitating word
processing, spread sheet, electronic mails,
multimedia, imaging and for identifying various other
kinds of file formats during the course of examination
Case management software for keeping records of the
cases being examined and for tracking case details at
short notice
Bootable disks to let the forensic specialist boot from
such disks instead of the suspect‟s bootable disk
![Page 24: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/24.jpg)
Bit-stream back up of data The forensic procedure prohibits examination of the original media to prevent any accidental erasure or interference during examination of such media.
Powerful password recovery tool
![Page 25: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/25.jpg)
Recovery of deleted data, image and
multimedia among other kinds of files .
For generating reports based on the
analysis of the information contained on
the suspect storage media
Searching tool for locating folders and
files on the suspect storage media.
![Page 26: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/26.jpg)
Firewall protection as well as intrusion
detection
Use of spyware prevention
Intrusion detection systems
![Page 27: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/27.jpg)
Firewalls help protect the perimeter
of your network (the hard candy
shell).
The “soft chewy centre” needs
protection too.
Firewalls can and are compromised.
![Page 28: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/28.jpg)
Identification
Authentication
The person can be identified and authenticated by
what he knows
by what he owns
by his human characteristics (biometrics).
![Page 29: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/29.jpg)
Biometric technologies are applied in the
following sectors:
Pubic Services,
Law Enforcement,
Banking,
Physical Access Control and
Computer & Networks.
![Page 30: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/30.jpg)
1. Signature Verification
2. Iris Analysis
3. Facial Analysis
4. Fingerprint verification
5. Hand Geometry
6. Voice Verification
![Page 31: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/31.jpg)
Use false identity to trap
contact children/teens in various chat rooms which are used by children/teen
Befriend the child/teen.
Extract personal information
Gets the e-mail address of the child/teen and starts making contacts on the victimâ s e-mail address as well.
![Page 32: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/32.jpg)
Starts sending pornographic images/text
Extract personal information from child/teen
At the end of it, the pedophile set up a meeting with the child/teen out of the house
![Page 33: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/33.jpg)
![Page 34: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/34.jpg)
Watch traffic to your site.
Put & configure your firewall correctly.
Develop your web content off line.
Back up your web site after every update.
Develop your web content off line.
Protect your databases.
Back up your web site after every update.
![Page 35: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/35.jpg)
Ensure physical security of equipment and
storage devices
Don't share identification numbers and passwords
Monitor dial-up facilities
Access to data
virus protection software
STAY UPDATED
![Page 36: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/36.jpg)
Avoid disclosing
Avoid sending any photograph online particularly to strangers
Use latest and up dated anti virus software.
Always keep back up volumes
Never send your credit card number to any site that is not secured
Always keep a watch on the sites that your children are accessing
Use a security programme that gives control over the cookies
![Page 37: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/37.jpg)
It is not possible to eliminate cyber crime from the cyber space.
It is quite possible to check them.
History is the witness that no legislation has succeeded in totally eliminating crime from the globe
The only possible step is to make people aware of their rights and duties
![Page 38: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/38.jpg)
Treat your password like you treat your toothbrush. Never give it to anyone else to use, and change it every few months.
![Page 39: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/39.jpg)
Unsafe to miss use
![Page 40: N.sai kiran IIITA AP](https://reader034.vdocument.in/reader034/viewer/2022042816/559598451a28ab084f8b4576/html5/thumbnails/40.jpg)
Quires?