5. ๏ About Hackers
๏ Business Response
๏ Introduction to Forensic science
๏ Basic Concepts
๏ Basic cyber crime investigation tool
๏ Firewalls
๏ Child pornography
๏ Precautions
6. ๏ โCyber crime may be said to be those
species, of which, genus is the conventional
crime, and where either the computer is an
object or subject of the conduct constituting
crimeโ
Old WINE IN NEW BOTTLES.
o Hackers
o Crackers
o Cyber terrorists
8. ๏ Predominantly male
๏ Aged from mid-teens to mid-twenties
๏ Lacking in social skills
๏ Fascination or obsession with computers
๏ Underachiever in other areas who sees
computing as a means of being important or
powerful
Discontented
employees
9. Service %
Adult Content (XXX) 50
Online Services 19
Direct Marketing โ Other 11
Direct Marketing โ Catalogue 10
Gaming 5
Books 3
Other 2
Total 100
9
11. ๏ There is no plan for review logs or scan
for unusual activity.
๏ Physical access is not controlled in a
consistent manner.
๏ If an intrusion detected or ever suspected
there is no procedure designed to deal
with it.
15. ๏ Forensic science is the application of a
broad spectrum of sciences to answer
questions of interest to a legal system.
๏ This may be in relation to a crime or a civil
action.
16. ๏ Computer forensics is a branch of digital
forensic science pertaining to legal evidence
found in computers and digital storage media.
๏ The goal of computer forensics is to examine
digital media in a forensically sound manner with
the aim of identifying, preserving, recovering,
analyzing and presenting facts and opinions
about the information.
18. ๏ In the mind of a normal computer user, once
data is deleted, it is accepted that it is no
longer in existence.
๏ On the other hand, the CFS should
understand that the data could still exist in
some other form or area on the storage
medium
20. PC Encase Forensic FTK imager
Inspector tool kit
File data discovery SE SE SNR SE
File data recovery SNR SNR NS SNR
Reveal file contents SNR SE SNR SNR
File access and SNR SE SNR SNR
analysis
Imaging NS SE NS SE
MD5 NS SE SE SE
SHA1 NS NS SE SE
Summary print out NS SE SNR SE
22. ๏ Window GUI Technology base Forensic Software for examination
of File systems FAT12, FAT16, FAT32, NTFS, LINUX, UNIX,
MACINTOSH, CDROM and DVD-R.
๏ It should able to examine and extracting slack space.
๏ It should be able to create image of the storage media e.g. hard
disk, Floppy disk.
๏ It should show emails in developerโs format. (With headers and
attachments)
๏ It should open document in language other English spouted by
Unicode e.g. Arabian language.
๏ It should show Internet history.
๏ Forensic Cell phone Seizure kit with write block facility and will
all required cables and adapters.
๏ Forensic Hardware: One computer PIV 3.2 GHz with 1 GB DDR
RAM and other required peripheral
๏ One hard disk write block device
23. Robust operating system software
๏ก Other application software facilitating word
processing, spread sheet, electronic mails,
multimedia, imaging and for identifying various other
kinds of file formats during the course of examination
๏ก Case management software for keeping records of the
cases being examined and for tracking case details at
short notice
๏ก Bootable disks to let the forensic specialist boot from
such disks instead of the suspectโs bootable disk
24. ๏ข Bit-stream back up of data
The forensic procedure prohibits
examination of the original media
to prevent any accidental erasure
or interference during examination
of such media.
๏ข Powerful password recovery tool
25. ๏ข Recovery of deleted data, image and
multimedia among other kinds of files .
๏ข For generating reports based on the
analysis of the information contained on
the suspect storage media
Searching tool for locating folders and
files on the suspect storage media.
26. ๏ Firewall
protection as well as intrusion
detection
๏ Use of spyware prevention
๏ Intrusion detection systems
27. ๏ Firewalls help protect the perimeter
of your network (the hard candy
shell).
๏ The โsoft chewy centreโ needs
protection too.
๏ Firewalls can and are compromised.
28. ๏ Identification
๏ Authentication
๏ The person can be identified and authenticated
by
๏ง what he knows
๏ง by what he owns
๏ง by his human characteristics (biometrics).
29. Biometric technologies are applied in the
following sectors:
๏ Pubic Services,
๏ Law Enforcement,
๏ Banking,
๏ Physical Access Control and
๏ Computer & Networks.
31. ๏ Use false identity to trap
๏ contact children/teens in various chat rooms which are used by
children/teen
๏ Befriend the child/teen.
๏ Extract personal information
๏ Gets the e-mail address of the child/teen and starts making
contacts on the victimรข s e-mail address as well.
32. ๏ Starts sending pornographic images/text
๏ Extract personal information from child/teen
๏ At the end of it, the pedophile set up a meeting with the
child/teen out of the house
33.
34. ๏ Watch traffic to your site.
๏ Put & configure your firewall correctly.
๏ Develop your web content off line.
๏ Back up your web site after every update.
๏ Develop your web content off line.
๏ Protect your databases.
๏ Back up your web site after every update.
35. ๏ Ensure physical security of equipment and
storage devices
๏ Don't share identification numbers and passwords
๏ Monitor dial-up facilities
๏ Access to data
๏ virus protection software
STAY UPDATED
36. ๏ Avoid disclosing
๏ Avoid sending any photograph online
particularly to strangers
๏ Use latest and up dated anti virus software.
๏ Always keep back up volumes
๏ Never send your credit card number to any
site that is not secured
๏ Always keep a watch on the sites that your
children are accessing
๏ Use a security programme that gives control
over the cookies
37. ๏ It is not possible to eliminate cyber crime
from the cyber space.
๏ It is quite possible to check them.
๏ History is the witness that no legislation has
succeeded in totally eliminating crime from
the globe
๏ The only possible step is to make people
aware of their rights and duties
38. ๏ Treatyour password like you treat
your toothbrush. Never give it to
anyone else to use, and change it
every few months.