SlideShare a Scribd company logo
1 of 40
N.Sai Kiran,
IIIT Allahabad.
๏‚ž About  Hackers
๏‚ž Business Response
๏‚ž Introduction to Forensic science
๏‚ž Basic Concepts
๏‚ž Basic cyber crime investigation tool
๏‚ž Firewalls
๏‚ž Child pornography
๏‚ž Precautions
๏‚ž โ€œCyber   crime may be said to be those
    species, of which, genus is the conventional
    crime, and where either the computer is an
    object or subject of the conduct constituting
    crimeโ€
Old WINE IN NEW BOTTLES.
o   Hackers
o   Crackers
o   Cyber terrorists
๏‚ž The   challenge... โ€žbecause itโ€Ÿs there!โ€Ÿ
๏‚ž Ego
๏‚ž Espionage
๏‚ž Ideology
๏‚ž Mischief
๏‚ž Money (extortion or theft)
๏‚ž Revenge
๏‚ž Predominantly  male
๏‚ž Aged from mid-teens to mid-twenties
๏‚ž Lacking in social skills
๏‚ž Fascination or obsession with computers
๏‚ž Underachiever in other areas who sees
  computing as a means of being important or
  powerful
                       Discontented
                       employees
Service                             %
Adult Content (XXX)                 50
Online Services                     19
Direct Marketing โ€“ Other            11
Direct Marketing โ€“ Catalogue        10
Gaming                               5
Books                                3
Other                                2
Total                              100


                               9
โ€œIf you have to teach ethics itโ€™s too lateโ€
๏‚ž There   is no plan for review logs or scan
  for unusual activity.
๏‚ž Physical access is not controlled in a
  consistent manner.
๏‚ž If an intrusion detected or ever suspected
  there is no procedure designed to deal
  with it.
Why should you care?
Administrative precautions

Physical precautions

Information systems
๏‚ž Forensic science is the application of a
  broad spectrum of sciences to answer
  questions of interest to a legal system.
๏‚ž This may be in relation to a crime or a civil
  action.
๏‚ž   Computer forensics is a branch of digital
    forensic science pertaining to legal evidence
    found in computers and digital storage media.

๏‚ž   The goal of computer forensics is to examine
    digital media in a forensically sound manner with
    the aim of identifying, preserving, recovering,
    analyzing and presenting facts and opinions
    about the information.
๏‚ž Protect
๏‚ž Discover
๏‚ž Recover
๏‚ž Reveal
๏‚ž Access
๏‚ž Analyze
๏‚ž Print
๏‚ž Provide   Expert Consultation.
๏‚ž In the mind of a normal computer user, once
  data is deleted, it is accepted that it is no
  longer in existence.
๏‚ž On the other hand, the CFS should
  understand that the data could still exist in
  some other form or area on the storage
  medium
๏‚ž Disk   Imaging
๏‚ž Hashing
๏‚ž Message Digest 5 (MD5)
๏‚ž Secure Hash Algorithm (SHA)
PC        Encase Forensic   FTK imager
                      Inspector        tool kit
File data discovery   SE        SE     SNR        SE

File data recovery    SNR       SNR    NS         SNR

Reveal file contents SNR        SE     SNR        SNR

File access and       SNR       SE     SNR        SNR
analysis
Imaging               NS        SE     NS         SE

MD5                   NS        SE     SE         SE

SHA1                  NS        NS     SE         SE

Summary print out     NS        SE     SNR        SE
๏‚ž PC   Inspector File Recovery

๏‚ž Encase


๏‚ž Forensic   Tool Kit

๏‚ž FTK   Imager
๏‚ž   Window GUI Technology base Forensic Software for examination
    of File systems FAT12, FAT16, FAT32, NTFS, LINUX, UNIX,
    MACINTOSH, CDROM and DVD-R.
๏‚ž   It should able to examine and extracting slack space.
๏‚ž   It should be able to create image of the storage media e.g. hard
    disk, Floppy disk.
๏‚ž   It should show emails in developerโ€Ÿs format. (With headers and
    attachments)
๏‚ž   It should open document in language other English spouted by
    Unicode e.g. Arabian language.
๏‚ž   It should show Internet history.
๏‚ž   Forensic Cell phone Seizure kit with write block facility and will
    all required cables and adapters.
๏‚ž   Forensic Hardware: One computer PIV 3.2 GHz with 1 GB DDR
    RAM and other required peripheral
๏‚ž   One hard disk write block device
Robust operating system software
๏‚ก Other application software facilitating word
  processing, spread sheet, electronic mails,
  multimedia, imaging and for identifying various other
  kinds of file formats during the course of examination
๏‚ก Case management software for keeping records of the
  cases being examined and for tracking case details at
  short notice
๏‚ก Bootable disks to let the forensic specialist boot from
  such disks instead of the suspectโ€Ÿs bootable disk
๏‚ข Bit-stream back up of data
  The forensic procedure prohibits
  examination of the original media
  to prevent any accidental erasure
  or interference during examination
  of such media.
๏‚ข Powerful password recovery tool
๏‚ข   Recovery of deleted data, image and
    multimedia among other kinds of files .

๏‚ข   For generating reports based on the
    analysis of the information contained on
    the suspect storage media
 Searching tool for locating folders and
files on the suspect storage media.
๏‚ž Firewall
         protection as well as intrusion
 detection

๏‚ž Use   of spyware prevention

๏‚ž Intrusion   detection systems
๏‚ž Firewalls help protect the perimeter
  of your network (the hard candy
  shell).
๏‚ž The โ€œsoft chewy centreโ€ needs
  protection too.
๏‚ž Firewalls can and are compromised.
๏‚ž   Identification

๏‚ž   Authentication

๏‚ž   The person can be identified and authenticated
    by
     ๏‚ง     what he knows
     ๏‚ง     by what he owns
     ๏‚ง     by his human characteristics (biometrics).
Biometric technologies are applied in the
  following sectors:
๏‚ž Pubic Services,
๏‚ž Law Enforcement,
๏‚ž Banking,
๏‚ž Physical Access Control and
๏‚ž Computer & Networks.
๏‚ž 1. Signature Verification
๏‚ž 2. Iris Analysis
๏‚ž 3. Facial Analysis
๏‚ž 4. Fingerprint verification
๏‚ž 5. Hand Geometry
๏‚ž 6. Voice Verification
๏‚ž   Use false identity to trap
๏‚ž   contact children/teens in various chat rooms which are used by
    children/teen
๏‚ž   Befriend the child/teen.
๏‚ž   Extract personal information
๏‚ž   Gets the e-mail address of the child/teen and starts making
    contacts on the victimรข s e-mail address as well.
๏‚ž   Starts sending pornographic images/text

๏‚ž   Extract personal information from child/teen

๏‚ž   At the end of it, the pedophile set up a meeting with the
    child/teen out of the house
๏‚ž   Watch traffic to your site.

๏‚ž   Put & configure your firewall correctly.

๏‚ž   Develop your web content off line.

๏‚ž   Back up your web site after every update.

๏‚ž   Develop your web content off line.

๏‚ž   Protect your databases.

๏‚ž   Back up your web site after every update.
๏‚ž Ensure physical security of equipment and
  storage devices
๏‚ž Don't share identification numbers and passwords
๏‚ž Monitor dial-up facilities
๏‚ž Access to data
๏‚ž virus protection software

             STAY UPDATED
๏‚ž Avoid  disclosing
๏‚ž Avoid sending any photograph online
  particularly to strangers
๏‚ž Use latest and up dated anti virus software.
๏‚ž Always keep back up volumes
๏‚ž Never send your credit card number to any
  site that is not secured
๏‚ž Always keep a watch on the sites that your
  children are accessing
๏‚ž Use a security programme that gives control
  over the cookies
๏‚ž It is not possible to eliminate cyber crime
  from the cyber space.
๏‚ž It is quite possible to check them.
๏‚ž History is the witness that no legislation has
  succeeded in totally eliminating crime from
  the globe
๏‚ž The only possible step is to make people
  aware of their rights and duties
๏‚ž Treatyour password like you treat
 your toothbrush. Never give it to
 anyone else to use, and change it
 every few months.
Unsafe to miss use
Quires?

More Related Content

What's hot

01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
Kranthi
ย 
computer forensics
computer forensics computer forensics
computer forensics
samantha jarrett
ย 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
Kranthi
ย 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
Nikhil Mashruwala
ย 
Digital forensics
Digital forensics Digital forensics
Digital forensics
Adriana Backman
ย 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
Milap Oza
ย 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
Kranthi
ย 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
Kranthi
ย 

What's hot (20)

01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
ย 
computer forensics
computer forensics computer forensics
computer forensics
ย 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domain
ย 
cyber Forensics
cyber Forensicscyber Forensics
cyber Forensics
ย 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
ย 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
ย 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensics
ย 
Digital forensics
Digital forensics Digital forensics
Digital forensics
ย 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
ย 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
ย 
Cs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qbCs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qb
ย 
Digital forensics
Digital forensics Digital forensics
Digital forensics
ย 
Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009
ย 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
ย 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
ย 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
ย 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
ย 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
ย 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
ย 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
ย 

Viewers also liked (11)

Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
ย 
Basic about cyber crime, computer crime
Basic about cyber crime, computer crimeBasic about cyber crime, computer crime
Basic about cyber crime, computer crime
ย 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
ย 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
ย 
Cyber crime
Cyber crimeCyber crime
Cyber crime
ย 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
ย 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
ย 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
ย 
Cyber law
Cyber lawCyber law
Cyber law
ย 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
ย 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
ย 

Similar to N.sai kiran IIITA AP

Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
Kolluru N Rao
ย 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
Gnanavi2
ย 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
forensicsnation
ย 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
forensicsnation
ย 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
forensicsnation
ย 

Similar to N.sai kiran IIITA AP (20)

Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh t
ย 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
ย 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
ย 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
ย 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
ย 
Computer forensic
Computer forensicComputer forensic
Computer forensic
ย 
Computer forensic
Computer forensicComputer forensic
Computer forensic
ย 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
ย 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
ย 
Codebits 2010
Codebits 2010Codebits 2010
Codebits 2010
ย 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
ย 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
ย 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
ย 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
ย 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
ย 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
ย 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
ย 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
ย 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
ย 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
ย 

Recently uploaded

VIP Model Call Girls Budhwar Peth ( Pune ) Call ON 8005736733 Starting From 5...
VIP Model Call Girls Budhwar Peth ( Pune ) Call ON 8005736733 Starting From 5...VIP Model Call Girls Budhwar Peth ( Pune ) Call ON 8005736733 Starting From 5...
VIP Model Call Girls Budhwar Peth ( Pune ) Call ON 8005736733 Starting From 5...
SUHANI PANDEY
ย 
Top Rated Kolkata Call Girls Khardah โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex S...
Top Rated Kolkata Call Girls Khardah โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex S...Top Rated Kolkata Call Girls Khardah โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex S...
Top Rated Kolkata Call Girls Khardah โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex S...
ritikasharma
ย 
Navsari Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...
Navsari Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...Navsari Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...
Navsari Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...
mriyagarg453
ย 
Dum Dum ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready...
Dum Dum ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready...Dum Dum ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready...
Dum Dum ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready...
ritikasharma
ย 
Model Call Girls In Velappanchavadi WhatsApp Booking 7427069034 call girl ser...
Model Call Girls In Velappanchavadi WhatsApp Booking 7427069034 call girl ser...Model Call Girls In Velappanchavadi WhatsApp Booking 7427069034 call girl ser...
Model Call Girls In Velappanchavadi WhatsApp Booking 7427069034 call girl ser...
Shivani Pandey
ย 
Hotel And Home Service Available Kolkata Call Girls Howrah โœ” 6297143586 โœ”Call...
Hotel And Home Service Available Kolkata Call Girls Howrah โœ” 6297143586 โœ”Call...Hotel And Home Service Available Kolkata Call Girls Howrah โœ” 6297143586 โœ”Call...
Hotel And Home Service Available Kolkata Call Girls Howrah โœ” 6297143586 โœ”Call...
ritikasharma
ย 
Beautiful ๐Ÿ˜‹ Call girls in Lahore 03210033448
Beautiful ๐Ÿ˜‹ Call girls in Lahore 03210033448Beautiful ๐Ÿ˜‹ Call girls in Lahore 03210033448
Beautiful ๐Ÿ˜‹ Call girls in Lahore 03210033448
ont65320
ย 
Call Girls Bellandur โ˜Ž 7737669865โ˜Ž Book Your One night Stand (Bangalore)
Call Girls Bellandur โ˜Ž 7737669865โ˜Ž Book Your One night Stand (Bangalore)Call Girls Bellandur โ˜Ž 7737669865โ˜Ž Book Your One night Stand (Bangalore)
Call Girls Bellandur โ˜Ž 7737669865โ˜Ž Book Your One night Stand (Bangalore)
amitlee9823
ย 
Verified Trusted Call Girls Ambattur Chennai โœ”โœ”7427069034 Independent Chenna...
Verified Trusted Call Girls Ambattur Chennai โœ”โœ”7427069034  Independent Chenna...Verified Trusted Call Girls Ambattur Chennai โœ”โœ”7427069034  Independent Chenna...
Verified Trusted Call Girls Ambattur Chennai โœ”โœ”7427069034 Independent Chenna...
Shivani Pandey
ย 
Sonagachi ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Rea...
Sonagachi ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Rea...Sonagachi ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Rea...
Sonagachi ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Rea...
rahim quresi
ย 
Hotel And Home Service Available Kolkata Call Girls South End Park โœ” 62971435...
Hotel And Home Service Available Kolkata Call Girls South End Park โœ” 62971435...Hotel And Home Service Available Kolkata Call Girls South End Park โœ” 62971435...
Hotel And Home Service Available Kolkata Call Girls South End Park โœ” 62971435...
ritikasharma
ย 
Science City Kolkata ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sex...
Science City Kolkata ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sex...Science City Kolkata ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sex...
Science City Kolkata ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sex...
rahim quresi
ย 
Verified Trusted Call Girls Tambaram Chennai โœ”โœ”7427069034 Independent Chenna...
Verified Trusted Call Girls Tambaram Chennai โœ”โœ”7427069034  Independent Chenna...Verified Trusted Call Girls Tambaram Chennai โœ”โœ”7427069034  Independent Chenna...
Verified Trusted Call Girls Tambaram Chennai โœ”โœ”7427069034 Independent Chenna...
Shivani Pandey
ย 
Hotel And Home Service Available Kolkata Call Girls Park Street โœ” 6297143586 ...
Hotel And Home Service Available Kolkata Call Girls Park Street โœ” 6297143586 ...Hotel And Home Service Available Kolkata Call Girls Park Street โœ” 6297143586 ...
Hotel And Home Service Available Kolkata Call Girls Park Street โœ” 6297143586 ...
ritikasharma
ย 

Recently uploaded (20)

VIP Model Call Girls Budhwar Peth ( Pune ) Call ON 8005736733 Starting From 5...
VIP Model Call Girls Budhwar Peth ( Pune ) Call ON 8005736733 Starting From 5...VIP Model Call Girls Budhwar Peth ( Pune ) Call ON 8005736733 Starting From 5...
VIP Model Call Girls Budhwar Peth ( Pune ) Call ON 8005736733 Starting From 5...
ย 
Top Rated Kolkata Call Girls Khardah โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex S...
Top Rated Kolkata Call Girls Khardah โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex S...Top Rated Kolkata Call Girls Khardah โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex S...
Top Rated Kolkata Call Girls Khardah โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex S...
ย 
Navsari Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...
Navsari Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...Navsari Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...
Navsari Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...
ย 
2k Shot Call girls Laxmi Nagar Delhi 9205541914
2k Shot Call girls Laxmi Nagar Delhi 92055419142k Shot Call girls Laxmi Nagar Delhi 9205541914
2k Shot Call girls Laxmi Nagar Delhi 9205541914
ย 
Dum Dum ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready...
Dum Dum ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready...Dum Dum ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready...
Dum Dum ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Ready...
ย 
โคPersonal Whatsapp Number Mukteshwar Call Girls 8617697112 ๐Ÿ’ฆโœ….
โคPersonal Whatsapp Number Mukteshwar Call Girls 8617697112 ๐Ÿ’ฆโœ….โคPersonal Whatsapp Number Mukteshwar Call Girls 8617697112 ๐Ÿ’ฆโœ….
โคPersonal Whatsapp Number Mukteshwar Call Girls 8617697112 ๐Ÿ’ฆโœ….
ย 
Model Call Girls In Velappanchavadi WhatsApp Booking 7427069034 call girl ser...
Model Call Girls In Velappanchavadi WhatsApp Booking 7427069034 call girl ser...Model Call Girls In Velappanchavadi WhatsApp Booking 7427069034 call girl ser...
Model Call Girls In Velappanchavadi WhatsApp Booking 7427069034 call girl ser...
ย 
Call Girls Manjri Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Manjri Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Manjri Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Manjri Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Hotel And Home Service Available Kolkata Call Girls Howrah โœ” 6297143586 โœ”Call...
Hotel And Home Service Available Kolkata Call Girls Howrah โœ” 6297143586 โœ”Call...Hotel And Home Service Available Kolkata Call Girls Howrah โœ” 6297143586 โœ”Call...
Hotel And Home Service Available Kolkata Call Girls Howrah โœ” 6297143586 โœ”Call...
ย 
Beautiful ๐Ÿ˜‹ Call girls in Lahore 03210033448
Beautiful ๐Ÿ˜‹ Call girls in Lahore 03210033448Beautiful ๐Ÿ˜‹ Call girls in Lahore 03210033448
Beautiful ๐Ÿ˜‹ Call girls in Lahore 03210033448
ย 
Call Girls Bellandur โ˜Ž 7737669865โ˜Ž Book Your One night Stand (Bangalore)
Call Girls Bellandur โ˜Ž 7737669865โ˜Ž Book Your One night Stand (Bangalore)Call Girls Bellandur โ˜Ž 7737669865โ˜Ž Book Your One night Stand (Bangalore)
Call Girls Bellandur โ˜Ž 7737669865โ˜Ž Book Your One night Stand (Bangalore)
ย 
๐Ÿ“ž Contact Number 8617697112 VIP East Sikkim Call Girls
๐Ÿ“ž Contact Number 8617697112 VIP East Sikkim Call Girls๐Ÿ“ž Contact Number 8617697112 VIP East Sikkim Call Girls
๐Ÿ“ž Contact Number 8617697112 VIP East Sikkim Call Girls
ย 
Verified Trusted Call Girls Ambattur Chennai โœ”โœ”7427069034 Independent Chenna...
Verified Trusted Call Girls Ambattur Chennai โœ”โœ”7427069034  Independent Chenna...Verified Trusted Call Girls Ambattur Chennai โœ”โœ”7427069034  Independent Chenna...
Verified Trusted Call Girls Ambattur Chennai โœ”โœ”7427069034 Independent Chenna...
ย 
Sonagachi ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Rea...
Sonagachi ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Rea...Sonagachi ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Rea...
Sonagachi ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sexy Bhabi Rea...
ย 
Borum Call Girls Service โ˜Ž ๏ธ93326-06886 โค๏ธโ€๐Ÿ”ฅ Enjoy 24/7 Escortย Service
Borum Call Girls Service โ˜Ž ๏ธ93326-06886 โค๏ธโ€๐Ÿ”ฅ Enjoy 24/7 Escortย ServiceBorum Call Girls Service โ˜Ž ๏ธ93326-06886 โค๏ธโ€๐Ÿ”ฅ Enjoy 24/7 Escortย Service
Borum Call Girls Service โ˜Ž ๏ธ93326-06886 โค๏ธโ€๐Ÿ”ฅ Enjoy 24/7 Escortย Service
ย 
Hotel And Home Service Available Kolkata Call Girls South End Park โœ” 62971435...
Hotel And Home Service Available Kolkata Call Girls South End Park โœ” 62971435...Hotel And Home Service Available Kolkata Call Girls South End Park โœ” 62971435...
Hotel And Home Service Available Kolkata Call Girls South End Park โœ” 62971435...
ย 
Kanpur call girls ๐Ÿ“ž 8617697112 At Low Cost Cash Payment Booking
Kanpur call girls ๐Ÿ“ž 8617697112 At Low Cost Cash Payment BookingKanpur call girls ๐Ÿ“ž 8617697112 At Low Cost Cash Payment Booking
Kanpur call girls ๐Ÿ“ž 8617697112 At Low Cost Cash Payment Booking
ย 
Science City Kolkata ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sex...
Science City Kolkata ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sex...Science City Kolkata ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sex...
Science City Kolkata ( Call Girls ) Kolkata โœ” 6297143586 โœ” Hot Model With Sex...
ย 
Verified Trusted Call Girls Tambaram Chennai โœ”โœ”7427069034 Independent Chenna...
Verified Trusted Call Girls Tambaram Chennai โœ”โœ”7427069034  Independent Chenna...Verified Trusted Call Girls Tambaram Chennai โœ”โœ”7427069034  Independent Chenna...
Verified Trusted Call Girls Tambaram Chennai โœ”โœ”7427069034 Independent Chenna...
ย 
Hotel And Home Service Available Kolkata Call Girls Park Street โœ” 6297143586 ...
Hotel And Home Service Available Kolkata Call Girls Park Street โœ” 6297143586 ...Hotel And Home Service Available Kolkata Call Girls Park Street โœ” 6297143586 ...
Hotel And Home Service Available Kolkata Call Girls Park Street โœ” 6297143586 ...
ย 

N.sai kiran IIITA AP

  • 2.
  • 3.
  • 4.
  • 5. ๏‚ž About Hackers ๏‚ž Business Response ๏‚ž Introduction to Forensic science ๏‚ž Basic Concepts ๏‚ž Basic cyber crime investigation tool ๏‚ž Firewalls ๏‚ž Child pornography ๏‚ž Precautions
  • 6. ๏‚ž โ€œCyber crime may be said to be those species, of which, genus is the conventional crime, and where either the computer is an object or subject of the conduct constituting crimeโ€ Old WINE IN NEW BOTTLES. o Hackers o Crackers o Cyber terrorists
  • 7. ๏‚ž The challenge... โ€žbecause itโ€Ÿs there!โ€Ÿ ๏‚ž Ego ๏‚ž Espionage ๏‚ž Ideology ๏‚ž Mischief ๏‚ž Money (extortion or theft) ๏‚ž Revenge
  • 8. ๏‚ž Predominantly male ๏‚ž Aged from mid-teens to mid-twenties ๏‚ž Lacking in social skills ๏‚ž Fascination or obsession with computers ๏‚ž Underachiever in other areas who sees computing as a means of being important or powerful Discontented employees
  • 9. Service % Adult Content (XXX) 50 Online Services 19 Direct Marketing โ€“ Other 11 Direct Marketing โ€“ Catalogue 10 Gaming 5 Books 3 Other 2 Total 100 9
  • 10. โ€œIf you have to teach ethics itโ€™s too lateโ€
  • 11. ๏‚ž There is no plan for review logs or scan for unusual activity. ๏‚ž Physical access is not controlled in a consistent manner. ๏‚ž If an intrusion detected or ever suspected there is no procedure designed to deal with it.
  • 12. Why should you care?
  • 13.
  • 15. ๏‚ž Forensic science is the application of a broad spectrum of sciences to answer questions of interest to a legal system. ๏‚ž This may be in relation to a crime or a civil action.
  • 16. ๏‚ž Computer forensics is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. ๏‚ž The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information.
  • 17. ๏‚ž Protect ๏‚ž Discover ๏‚ž Recover ๏‚ž Reveal ๏‚ž Access ๏‚ž Analyze ๏‚ž Print ๏‚ž Provide Expert Consultation.
  • 18. ๏‚ž In the mind of a normal computer user, once data is deleted, it is accepted that it is no longer in existence. ๏‚ž On the other hand, the CFS should understand that the data could still exist in some other form or area on the storage medium
  • 19. ๏‚ž Disk Imaging ๏‚ž Hashing ๏‚ž Message Digest 5 (MD5) ๏‚ž Secure Hash Algorithm (SHA)
  • 20. PC Encase Forensic FTK imager Inspector tool kit File data discovery SE SE SNR SE File data recovery SNR SNR NS SNR Reveal file contents SNR SE SNR SNR File access and SNR SE SNR SNR analysis Imaging NS SE NS SE MD5 NS SE SE SE SHA1 NS NS SE SE Summary print out NS SE SNR SE
  • 21. ๏‚ž PC Inspector File Recovery ๏‚ž Encase ๏‚ž Forensic Tool Kit ๏‚ž FTK Imager
  • 22. ๏‚ž Window GUI Technology base Forensic Software for examination of File systems FAT12, FAT16, FAT32, NTFS, LINUX, UNIX, MACINTOSH, CDROM and DVD-R. ๏‚ž It should able to examine and extracting slack space. ๏‚ž It should be able to create image of the storage media e.g. hard disk, Floppy disk. ๏‚ž It should show emails in developerโ€Ÿs format. (With headers and attachments) ๏‚ž It should open document in language other English spouted by Unicode e.g. Arabian language. ๏‚ž It should show Internet history. ๏‚ž Forensic Cell phone Seizure kit with write block facility and will all required cables and adapters. ๏‚ž Forensic Hardware: One computer PIV 3.2 GHz with 1 GB DDR RAM and other required peripheral ๏‚ž One hard disk write block device
  • 23. Robust operating system software ๏‚ก Other application software facilitating word processing, spread sheet, electronic mails, multimedia, imaging and for identifying various other kinds of file formats during the course of examination ๏‚ก Case management software for keeping records of the cases being examined and for tracking case details at short notice ๏‚ก Bootable disks to let the forensic specialist boot from such disks instead of the suspectโ€Ÿs bootable disk
  • 24. ๏‚ข Bit-stream back up of data The forensic procedure prohibits examination of the original media to prevent any accidental erasure or interference during examination of such media. ๏‚ข Powerful password recovery tool
  • 25. ๏‚ข Recovery of deleted data, image and multimedia among other kinds of files . ๏‚ข For generating reports based on the analysis of the information contained on the suspect storage media Searching tool for locating folders and files on the suspect storage media.
  • 26. ๏‚ž Firewall protection as well as intrusion detection ๏‚ž Use of spyware prevention ๏‚ž Intrusion detection systems
  • 27. ๏‚ž Firewalls help protect the perimeter of your network (the hard candy shell). ๏‚ž The โ€œsoft chewy centreโ€ needs protection too. ๏‚ž Firewalls can and are compromised.
  • 28. ๏‚ž Identification ๏‚ž Authentication ๏‚ž The person can be identified and authenticated by ๏‚ง what he knows ๏‚ง by what he owns ๏‚ง by his human characteristics (biometrics).
  • 29. Biometric technologies are applied in the following sectors: ๏‚ž Pubic Services, ๏‚ž Law Enforcement, ๏‚ž Banking, ๏‚ž Physical Access Control and ๏‚ž Computer & Networks.
  • 30. ๏‚ž 1. Signature Verification ๏‚ž 2. Iris Analysis ๏‚ž 3. Facial Analysis ๏‚ž 4. Fingerprint verification ๏‚ž 5. Hand Geometry ๏‚ž 6. Voice Verification
  • 31. ๏‚ž Use false identity to trap ๏‚ž contact children/teens in various chat rooms which are used by children/teen ๏‚ž Befriend the child/teen. ๏‚ž Extract personal information ๏‚ž Gets the e-mail address of the child/teen and starts making contacts on the victimรข s e-mail address as well.
  • 32. ๏‚ž Starts sending pornographic images/text ๏‚ž Extract personal information from child/teen ๏‚ž At the end of it, the pedophile set up a meeting with the child/teen out of the house
  • 33.
  • 34. ๏‚ž Watch traffic to your site. ๏‚ž Put & configure your firewall correctly. ๏‚ž Develop your web content off line. ๏‚ž Back up your web site after every update. ๏‚ž Develop your web content off line. ๏‚ž Protect your databases. ๏‚ž Back up your web site after every update.
  • 35. ๏‚ž Ensure physical security of equipment and storage devices ๏‚ž Don't share identification numbers and passwords ๏‚ž Monitor dial-up facilities ๏‚ž Access to data ๏‚ž virus protection software STAY UPDATED
  • 36. ๏‚ž Avoid disclosing ๏‚ž Avoid sending any photograph online particularly to strangers ๏‚ž Use latest and up dated anti virus software. ๏‚ž Always keep back up volumes ๏‚ž Never send your credit card number to any site that is not secured ๏‚ž Always keep a watch on the sites that your children are accessing ๏‚ž Use a security programme that gives control over the cookies
  • 37. ๏‚ž It is not possible to eliminate cyber crime from the cyber space. ๏‚ž It is quite possible to check them. ๏‚ž History is the witness that no legislation has succeeded in totally eliminating crime from the globe ๏‚ž The only possible step is to make people aware of their rights and duties
  • 38. ๏‚ž Treatyour password like you treat your toothbrush. Never give it to anyone else to use, and change it every few months.