Computer Forensics and Cyber Crimes. Computer Forensics The systematic identification, preservation, extraction, documentation, and analysis of electronic.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Chapter 14 Cyber Crimes © 2012 Cengage Learning. All Rights Reserved.
2 Language of Computer Crime Investigation
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
How It Applies In A Virtual World
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Digital Citizenship By: Miranda Scorver.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Essential Computer Concepts
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
CYBER CRIME.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Chapter 16 Computer Crime. Three Key Characteristics of Computer Crime Computer Crimes are relatively easy to commit and difficult to detect. Most computer.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Topic 5: Basic Security.
Viruses A computer virus is a virus that can copy itself and infect a computer. A Trojan virus called WinFixer coerced users into installing it by telling.
Cybercrime What is it, what does it cost, & how is it regulated?
Computer Skills and Applications Computer Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
INTRODUCTION & QUESTIONS.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Cybersecurity Test Review Introduction to Digital Technology.
Vocabulary Cassandra Peoples. Pharming the practice of redirecting computer users from legitimate websites to fraudulent ones for the purposes of extracting.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer and Network Security Brendan Duncombe Bahein Maung.
Computer Forensics Kelsey Bretz. Overview Introduction What happens when a file is deleted Typical Computer Forensic Investigations Who uses Computer.
Issues for Computer Users, Electronic Devices, Computer and Safety.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
14 Cybercrime.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Chapter 14 Cyber Crimes © 2012 Cengage Learning. All Rights Reserved.
IT Security  .
Computer Forensics Kelsey Bretz.
Malware, Phishing and Network Policies
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Computer Forensics and Cyber Crimes

Computer Forensics The systematic identification, preservation, extraction, documentation, and analysis of electronic data that could potentially be used as evidence in court. Internet Forensics places emphasis on Cybercrime or crimes committed on the Internet and Internet related Crimes Requires extensive knowledge of computer hardware software

Media Devices that hold Potential Data Computers and laptops iPads iPods Smartphones and most other cell phones MP3 music players Hard Drives Digital Cameras USB Memory Devices PDAs (Personal Digital Assistants) Backup Tapes CD-ROMs & DVD’s

Computer Forensic Capabilities Recover deleted files Find out what external devices have been attached and what users accessed them Determine what programs ran Recover webpages Recover s and users who read them Recover chat logs Determine file servers used Discover document’s hidden history Recover phone records and SMS text messages from mobile devices Find malware and data collected

Typical Investigations Theft of Company Secrets (client, customer or employee lists) Employee Sabotage Credit Card Fraud Financial Crimes Embezzlement (money or information) Economic Crimes Harassment Child Pornography Other Major Crimes Identity Theft

What Happens when a File is Deleted? Windows Operating System – File Allocation Table (FAT) – Master File Table (MFT) FAT/MFT tells the computer where the file begins and ends Deleted pointers to the file – FAT/MFT space occupied by the file is mark as available The actual data that was contained in the file is not deleted – Unallocated space

Types of Cyber Crime Computer Integrity Crimes- Illegally accessing data on a computer or network system Computer-assisted Crimes- using a computer to deceive and individual or business Computer Content Crimes-involve illegal content

Phishing Computer Integrity Crimes Phishing Fraudulent that looks remarkably real asks the recipient to update his or her personal information. – usually looks like it from the victim’s bank or an online retailer tricks individuals into providing information by threatening disruption of service or denial of access Identity Theft is main motive

Hacking Computer Integrity Crimes Hacking Hacking is intentionally entering an unauthorized network system – Gain access to protected information by destroying security of network – Usually intention is to gain access to and steal proprietary, commercial information, or personal identity data – Hackers may also destroy internal structure Black Hat- bad guys White Hat- good guys Grey Hat- play both sides

Cyber-Terrorism Computer Integrity Crimes Cyber-Terrorism Hacking into a governmental or company’s networking system for the purpose of demonstrating or protesting political agenda – Causes fear of loss, destruction, or theft of stored data

Malware Malware is software designed to provide unauthorized access to a computer system – Trojan Horse is software that is designed with intention to harm a computer or information stored on computer Appears to be legitimate useful software yet whe n run or installed provides access to data on the system – Spyware-software that tracks and colllects information about a computer’s user Tracks internet activity Some gain access to general computer activity use May include password –sniffing technology

Malware Malicious Destruction – Worms are self replicating malware that sends copies of itself to other computers on a network Cause network and computer damage – Viruses are similar to worms, cause network and computer damage, requires a specific command or file be executed or opened before it can attach itself and infect a computer

Computer-Assisted Crimes Virtual Robbery- opening bank accounts, credit card accounts, or loans under false identities. Virtual Sting- buying goods or purhases under false pretenses (stolen or falsified credit card). Another type is arbitrage, or purchasing goods or services that are illegal in one’s home jurisdiction. Virtual Scams- tricks victims into purchasing investments or below-market-value product – Many are “get rich quick sceams” – Usually little to know product or service in return

Computer Content Crimes Involve posting illegal content – Sexually explicit material – Child pornography – Hateful or aggressive speech or test related to race and extreme politics – Violent content

Entering the Crime Scene Identify computer hardware and other devices that may served valuable – Computer hardware components may also contain trace evidence

Preserving the Evidence Caution- Turning computer on or off may delete files – Cleansing software – Data rewrite Software may be installed to obtain data via a USB drive – Warrant required Computer copying software clones/copies data

Common Computer Forensic Software ArcSight Logger Netwitness Investigator Quest Change Auditor Cellebrite Physical Analyzer Lantern Access Data’s Forensic Toolkit (FTK) EnCase Cybersecurity EnCase eDiscovery EnCase Portable EnCase Forensic*

Analyzing the Evidence An exact copy of the hard drive is made and investigators have to look for evidence that may be subtle, hidden, or damaged – Allocated space- reserved saved documents/files – Unallocated- non reserved space – 15 KB doc saved into allocated space If deleted space is now nonallocated and data can be replaced on hard drive – A new 10 KB doc saved, could replace 10/15 KB of data on hard drive, the rest of the 5KB from original document falls into slack space and can be retrieved Partial data can be obtained from doc What info is pertinent or meaningful?

Documenting Cyber Crime Evidence Chain of Custody of Hardware Written findings of data documented in logs – Procedures used to extract and analyze data documented

Expert Testimony