SlideShare a Scribd company logo
1 of 40
N.Sai Kiran,
IIIT Allahabad.
 About  Hackers
 Business Response
 Introduction to Forensic science
 Basic Concepts
 Basic cyber crime investigation tool
 Firewalls
 Child pornography
 Precautions
 “Cyber   crime may be said to be those
    species, of which, genus is the conventional
    crime, and where either the computer is an
    object or subject of the conduct constituting
    crime”
Old WINE IN NEW BOTTLES.
o   Hackers
o   Crackers
o   Cyber terrorists
 The   challenge... „because it‟s there!‟
 Ego
 Espionage
 Ideology
 Mischief
 Money (extortion or theft)
 Revenge
 Predominantly  male
 Aged from mid-teens to mid-twenties
 Lacking in social skills
 Fascination or obsession with computers
 Underachiever in other areas who sees
  computing as a means of being important or
  powerful
                       Discontented
                       employees
Service                             %
Adult Content (XXX)                 50
Online Services                     19
Direct Marketing – Other            11
Direct Marketing – Catalogue        10
Gaming                               5
Books                                3
Other                                2
Total                              100


                               9
“If you have to teach ethics it’s too late”
 There   is no plan for review logs or scan
  for unusual activity.
 Physical access is not controlled in a
  consistent manner.
 If an intrusion detected or ever suspected
  there is no procedure designed to deal
  with it.
Why should you care?
Administrative precautions

Physical precautions

Information systems
 Forensic science is the application of a
  broad spectrum of sciences to answer
  questions of interest to a legal system.
 This may be in relation to a crime or a civil
  action.
   Computer forensics is a branch of digital
    forensic science pertaining to legal evidence
    found in computers and digital storage media.

   The goal of computer forensics is to examine
    digital media in a forensically sound manner with
    the aim of identifying, preserving, recovering,
    analyzing and presenting facts and opinions
    about the information.
 Protect
 Discover
 Recover
 Reveal
 Access
 Analyze
 Print
 Provide   Expert Consultation.
 In the mind of a normal computer user, once
  data is deleted, it is accepted that it is no
  longer in existence.
 On the other hand, the CFS should
  understand that the data could still exist in
  some other form or area on the storage
  medium
 Disk   Imaging
 Hashing
 Message Digest 5 (MD5)
 Secure Hash Algorithm (SHA)
PC        Encase Forensic   FTK imager
                      Inspector        tool kit
File data discovery   SE        SE     SNR        SE

File data recovery    SNR       SNR    NS         SNR

Reveal file contents SNR        SE     SNR        SNR

File access and       SNR       SE     SNR        SNR
analysis
Imaging               NS        SE     NS         SE

MD5                   NS        SE     SE         SE

SHA1                  NS        NS     SE         SE

Summary print out     NS        SE     SNR        SE
 PC   Inspector File Recovery

 Encase


 Forensic   Tool Kit

 FTK   Imager
   Window GUI Technology base Forensic Software for examination
    of File systems FAT12, FAT16, FAT32, NTFS, LINUX, UNIX,
    MACINTOSH, CDROM and DVD-R.
   It should able to examine and extracting slack space.
   It should be able to create image of the storage media e.g. hard
    disk, Floppy disk.
   It should show emails in developer‟s format. (With headers and
    attachments)
   It should open document in language other English spouted by
    Unicode e.g. Arabian language.
   It should show Internet history.
   Forensic Cell phone Seizure kit with write block facility and will
    all required cables and adapters.
   Forensic Hardware: One computer PIV 3.2 GHz with 1 GB DDR
    RAM and other required peripheral
   One hard disk write block device
Robust operating system software
 Other application software facilitating word
  processing, spread sheet, electronic mails,
  multimedia, imaging and for identifying various other
  kinds of file formats during the course of examination
 Case management software for keeping records of the
  cases being examined and for tracking case details at
  short notice
 Bootable disks to let the forensic specialist boot from
  such disks instead of the suspect‟s bootable disk
 Bit-stream back up of data
  The forensic procedure prohibits
  examination of the original media
  to prevent any accidental erasure
  or interference during examination
  of such media.
 Powerful password recovery tool
   Recovery of deleted data, image and
    multimedia among other kinds of files .

   For generating reports based on the
    analysis of the information contained on
    the suspect storage media
 Searching tool for locating folders and
files on the suspect storage media.
 Firewall
         protection as well as intrusion
 detection

 Use   of spyware prevention

 Intrusion   detection systems
 Firewalls help protect the perimeter
  of your network (the hard candy
  shell).
 The “soft chewy centre” needs
  protection too.
 Firewalls can and are compromised.
   Identification

   Authentication

   The person can be identified and authenticated
    by
          what he knows
          by what he owns
          by his human characteristics (biometrics).
Biometric technologies are applied in the
  following sectors:
 Pubic Services,
 Law Enforcement,
 Banking,
 Physical Access Control and
 Computer & Networks.
 1. Signature Verification
 2. Iris Analysis
 3. Facial Analysis
 4. Fingerprint verification
 5. Hand Geometry
 6. Voice Verification
   Use false identity to trap
   contact children/teens in various chat rooms which are used by
    children/teen
   Befriend the child/teen.
   Extract personal information
   Gets the e-mail address of the child/teen and starts making
    contacts on the victimâ s e-mail address as well.
   Starts sending pornographic images/text

   Extract personal information from child/teen

   At the end of it, the pedophile set up a meeting with the
    child/teen out of the house
   Watch traffic to your site.

   Put & configure your firewall correctly.

   Develop your web content off line.

   Back up your web site after every update.

   Develop your web content off line.

   Protect your databases.

   Back up your web site after every update.
 Ensure physical security of equipment and
  storage devices
 Don't share identification numbers and passwords
 Monitor dial-up facilities
 Access to data
 virus protection software

             STAY UPDATED
 Avoid  disclosing
 Avoid sending any photograph online
  particularly to strangers
 Use latest and up dated anti virus software.
 Always keep back up volumes
 Never send your credit card number to any
  site that is not secured
 Always keep a watch on the sites that your
  children are accessing
 Use a security programme that gives control
  over the cookies
 It is not possible to eliminate cyber crime
  from the cyber space.
 It is quite possible to check them.
 History is the witness that no legislation has
  succeeded in totally eliminating crime from
  the globe
 The only possible step is to make people
  aware of their rights and duties
 Treatyour password like you treat
 your toothbrush. Never give it to
 anyone else to use, and change it
 every few months.
Unsafe to miss use
Quires?

More Related Content

What's hot

01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domainppd1961
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensicsMarco Alamanni
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - NotesKranthi
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaNew Horizons Bulgaria
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - NotesKranthi
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareFelipe Prado
 

What's hot (20)

01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
computer forensics
computer forensics computer forensics
computer forensics
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domain
 
cyber Forensics
cyber Forensicscyber Forensics
cyber Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensics
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Cs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qbCs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qb
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
 

Viewers also liked

Viewers also liked (11)

Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Basic about cyber crime, computer crime
Basic about cyber crime, computer crimeBasic about cyber crime, computer crime
Basic about cyber crime, computer crime
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 

Similar to N.sai kiran IIITA AP

Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh tManesh T
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsZyxware Technologies
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic InvestigatorAgape Inc
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)JIEMS Akkalkuwa
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)CA.Kolluru Narayanarao
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsdeaneal
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfGnanavi2
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop newforensicsnation
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshopforensicsnation
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics SlidesVarun Sehgal
 

Similar to N.sai kiran IIITA AP (20)

Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh t
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Codebits 2010
Codebits 2010Codebits 2010
Codebits 2010
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 

Recently uploaded

Biswanath Byam Samiti Open Quiz 2022 by Qui9 Grand Finale
Biswanath Byam Samiti Open Quiz 2022 by Qui9 Grand FinaleBiswanath Byam Samiti Open Quiz 2022 by Qui9 Grand Finale
Biswanath Byam Samiti Open Quiz 2022 by Qui9 Grand FinaleQui9 (Ultimate Quizzing)
 
Taken Pilot Episode Story pitch Document
Taken Pilot Episode Story pitch DocumentTaken Pilot Episode Story pitch Document
Taken Pilot Episode Story pitch Documentf4ssvxpz62
 
GRADE 7 NEW PPT ENGLISH 1 [Autosaved].pp
GRADE 7 NEW PPT ENGLISH 1 [Autosaved].ppGRADE 7 NEW PPT ENGLISH 1 [Autosaved].pp
GRADE 7 NEW PPT ENGLISH 1 [Autosaved].ppJasmineLinogon
 
NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...
NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...
NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...Amil Baba Dawood bangali
 
Call Girls Near The Corus Hotel New Delhi 9873777170
Call Girls Near The Corus Hotel New Delhi 9873777170Call Girls Near The Corus Hotel New Delhi 9873777170
Call Girls Near The Corus Hotel New Delhi 9873777170Sonam Pathan
 
原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证
原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证
原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证gwhohjj
 
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...Amil Baba Company
 
Call Girls Near Delhi Pride Hotel New Delhi 9873777170
Call Girls Near Delhi Pride Hotel New Delhi 9873777170Call Girls Near Delhi Pride Hotel New Delhi 9873777170
Call Girls Near Delhi Pride Hotel New Delhi 9873777170Sonam Pathan
 
Call Girls Near Taurus Sarovar Portico Hotel New Delhi 9873777170
Call Girls Near Taurus Sarovar Portico Hotel New Delhi 9873777170Call Girls Near Taurus Sarovar Portico Hotel New Delhi 9873777170
Call Girls Near Taurus Sarovar Portico Hotel New Delhi 9873777170Sonam Pathan
 
办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书
办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书
办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书zdzoqco
 
North Avenue Call Girls Services, Hire Now for Full Fun
North Avenue Call Girls Services, Hire Now for Full FunNorth Avenue Call Girls Services, Hire Now for Full Fun
North Avenue Call Girls Services, Hire Now for Full FunKomal Khan
 
8377087607 Full Enjoy @24/7 Call Girls in Patel Nagar Delhi NCR
8377087607 Full Enjoy @24/7 Call Girls in Patel Nagar Delhi NCR8377087607 Full Enjoy @24/7 Call Girls in Patel Nagar Delhi NCR
8377087607 Full Enjoy @24/7 Call Girls in Patel Nagar Delhi NCRdollysharma2066
 
在线办理曼大毕业证曼尼托巴大学毕业证成绩单留信学历认证
在线办理曼大毕业证曼尼托巴大学毕业证成绩单留信学历认证在线办理曼大毕业证曼尼托巴大学毕业证成绩单留信学历认证
在线办理曼大毕业证曼尼托巴大学毕业证成绩单留信学历认证nhjeo1gg
 
Vip Delhi Ncr Call Girls Best Services Available
Vip Delhi Ncr Call Girls Best Services AvailableVip Delhi Ncr Call Girls Best Services Available
Vip Delhi Ncr Call Girls Best Services AvailableKomal Khan
 
Amil baba in Pakistan amil baba Karachi amil baba in pakistan amil baba in la...
Amil baba in Pakistan amil baba Karachi amil baba in pakistan amil baba in la...Amil baba in Pakistan amil baba Karachi amil baba in pakistan amil baba in la...
Amil baba in Pakistan amil baba Karachi amil baba in pakistan amil baba in la...Amil Baba Company
 
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...Amil baba
 
QUIZ BOLLYWOOD ( weekly quiz ) - SJU quizzers
QUIZ BOLLYWOOD ( weekly quiz ) - SJU quizzersQUIZ BOLLYWOOD ( weekly quiz ) - SJU quizzers
QUIZ BOLLYWOOD ( weekly quiz ) - SJU quizzersSJU Quizzers
 

Recently uploaded (20)

Biswanath Byam Samiti Open Quiz 2022 by Qui9 Grand Finale
Biswanath Byam Samiti Open Quiz 2022 by Qui9 Grand FinaleBiswanath Byam Samiti Open Quiz 2022 by Qui9 Grand Finale
Biswanath Byam Samiti Open Quiz 2022 by Qui9 Grand Finale
 
Taken Pilot Episode Story pitch Document
Taken Pilot Episode Story pitch DocumentTaken Pilot Episode Story pitch Document
Taken Pilot Episode Story pitch Document
 
GRADE 7 NEW PPT ENGLISH 1 [Autosaved].pp
GRADE 7 NEW PPT ENGLISH 1 [Autosaved].ppGRADE 7 NEW PPT ENGLISH 1 [Autosaved].pp
GRADE 7 NEW PPT ENGLISH 1 [Autosaved].pp
 
NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...
NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...
NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...
 
Call Girls Near The Corus Hotel New Delhi 9873777170
Call Girls Near The Corus Hotel New Delhi 9873777170Call Girls Near The Corus Hotel New Delhi 9873777170
Call Girls Near The Corus Hotel New Delhi 9873777170
 
原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证
原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证
原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证
 
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...
 
Call Girls Near Delhi Pride Hotel New Delhi 9873777170
Call Girls Near Delhi Pride Hotel New Delhi 9873777170Call Girls Near Delhi Pride Hotel New Delhi 9873777170
Call Girls Near Delhi Pride Hotel New Delhi 9873777170
 
Call Girls Koti 7001305949 all area service COD available Any Time
Call Girls Koti 7001305949 all area service COD available Any TimeCall Girls Koti 7001305949 all area service COD available Any Time
Call Girls Koti 7001305949 all area service COD available Any Time
 
Call Girls Near Taurus Sarovar Portico Hotel New Delhi 9873777170
Call Girls Near Taurus Sarovar Portico Hotel New Delhi 9873777170Call Girls Near Taurus Sarovar Portico Hotel New Delhi 9873777170
Call Girls Near Taurus Sarovar Portico Hotel New Delhi 9873777170
 
办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书
办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书
办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书
 
young call girls in Hari Nagar,🔝 9953056974 🔝 escort Service
young call girls in Hari Nagar,🔝 9953056974 🔝 escort Serviceyoung call girls in Hari Nagar,🔝 9953056974 🔝 escort Service
young call girls in Hari Nagar,🔝 9953056974 🔝 escort Service
 
Environment Handling Presentation by Likhon Ahmed.pptx
Environment Handling Presentation by Likhon Ahmed.pptxEnvironment Handling Presentation by Likhon Ahmed.pptx
Environment Handling Presentation by Likhon Ahmed.pptx
 
North Avenue Call Girls Services, Hire Now for Full Fun
North Avenue Call Girls Services, Hire Now for Full FunNorth Avenue Call Girls Services, Hire Now for Full Fun
North Avenue Call Girls Services, Hire Now for Full Fun
 
8377087607 Full Enjoy @24/7 Call Girls in Patel Nagar Delhi NCR
8377087607 Full Enjoy @24/7 Call Girls in Patel Nagar Delhi NCR8377087607 Full Enjoy @24/7 Call Girls in Patel Nagar Delhi NCR
8377087607 Full Enjoy @24/7 Call Girls in Patel Nagar Delhi NCR
 
在线办理曼大毕业证曼尼托巴大学毕业证成绩单留信学历认证
在线办理曼大毕业证曼尼托巴大学毕业证成绩单留信学历认证在线办理曼大毕业证曼尼托巴大学毕业证成绩单留信学历认证
在线办理曼大毕业证曼尼托巴大学毕业证成绩单留信学历认证
 
Vip Delhi Ncr Call Girls Best Services Available
Vip Delhi Ncr Call Girls Best Services AvailableVip Delhi Ncr Call Girls Best Services Available
Vip Delhi Ncr Call Girls Best Services Available
 
Amil baba in Pakistan amil baba Karachi amil baba in pakistan amil baba in la...
Amil baba in Pakistan amil baba Karachi amil baba in pakistan amil baba in la...Amil baba in Pakistan amil baba Karachi amil baba in pakistan amil baba in la...
Amil baba in Pakistan amil baba Karachi amil baba in pakistan amil baba in la...
 
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...
 
QUIZ BOLLYWOOD ( weekly quiz ) - SJU quizzers
QUIZ BOLLYWOOD ( weekly quiz ) - SJU quizzersQUIZ BOLLYWOOD ( weekly quiz ) - SJU quizzers
QUIZ BOLLYWOOD ( weekly quiz ) - SJU quizzers
 

N.sai kiran IIITA AP

  • 2.
  • 3.
  • 4.
  • 5.  About Hackers  Business Response  Introduction to Forensic science  Basic Concepts  Basic cyber crime investigation tool  Firewalls  Child pornography  Precautions
  • 6.  “Cyber crime may be said to be those species, of which, genus is the conventional crime, and where either the computer is an object or subject of the conduct constituting crime” Old WINE IN NEW BOTTLES. o Hackers o Crackers o Cyber terrorists
  • 7.  The challenge... „because it‟s there!‟  Ego  Espionage  Ideology  Mischief  Money (extortion or theft)  Revenge
  • 8.  Predominantly male  Aged from mid-teens to mid-twenties  Lacking in social skills  Fascination or obsession with computers  Underachiever in other areas who sees computing as a means of being important or powerful Discontented employees
  • 9. Service % Adult Content (XXX) 50 Online Services 19 Direct Marketing – Other 11 Direct Marketing – Catalogue 10 Gaming 5 Books 3 Other 2 Total 100 9
  • 10. “If you have to teach ethics it’s too late”
  • 11.  There is no plan for review logs or scan for unusual activity.  Physical access is not controlled in a consistent manner.  If an intrusion detected or ever suspected there is no procedure designed to deal with it.
  • 12. Why should you care?
  • 13.
  • 15.  Forensic science is the application of a broad spectrum of sciences to answer questions of interest to a legal system.  This may be in relation to a crime or a civil action.
  • 16. Computer forensics is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media.  The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information.
  • 17.  Protect  Discover  Recover  Reveal  Access  Analyze  Print  Provide Expert Consultation.
  • 18.  In the mind of a normal computer user, once data is deleted, it is accepted that it is no longer in existence.  On the other hand, the CFS should understand that the data could still exist in some other form or area on the storage medium
  • 19.  Disk Imaging  Hashing  Message Digest 5 (MD5)  Secure Hash Algorithm (SHA)
  • 20. PC Encase Forensic FTK imager Inspector tool kit File data discovery SE SE SNR SE File data recovery SNR SNR NS SNR Reveal file contents SNR SE SNR SNR File access and SNR SE SNR SNR analysis Imaging NS SE NS SE MD5 NS SE SE SE SHA1 NS NS SE SE Summary print out NS SE SNR SE
  • 21.  PC Inspector File Recovery  Encase  Forensic Tool Kit  FTK Imager
  • 22. Window GUI Technology base Forensic Software for examination of File systems FAT12, FAT16, FAT32, NTFS, LINUX, UNIX, MACINTOSH, CDROM and DVD-R.  It should able to examine and extracting slack space.  It should be able to create image of the storage media e.g. hard disk, Floppy disk.  It should show emails in developer‟s format. (With headers and attachments)  It should open document in language other English spouted by Unicode e.g. Arabian language.  It should show Internet history.  Forensic Cell phone Seizure kit with write block facility and will all required cables and adapters.  Forensic Hardware: One computer PIV 3.2 GHz with 1 GB DDR RAM and other required peripheral  One hard disk write block device
  • 23. Robust operating system software  Other application software facilitating word processing, spread sheet, electronic mails, multimedia, imaging and for identifying various other kinds of file formats during the course of examination  Case management software for keeping records of the cases being examined and for tracking case details at short notice  Bootable disks to let the forensic specialist boot from such disks instead of the suspect‟s bootable disk
  • 24.  Bit-stream back up of data The forensic procedure prohibits examination of the original media to prevent any accidental erasure or interference during examination of such media.  Powerful password recovery tool
  • 25. Recovery of deleted data, image and multimedia among other kinds of files .  For generating reports based on the analysis of the information contained on the suspect storage media Searching tool for locating folders and files on the suspect storage media.
  • 26.  Firewall protection as well as intrusion detection  Use of spyware prevention  Intrusion detection systems
  • 27.  Firewalls help protect the perimeter of your network (the hard candy shell).  The “soft chewy centre” needs protection too.  Firewalls can and are compromised.
  • 28. Identification  Authentication  The person can be identified and authenticated by  what he knows  by what he owns  by his human characteristics (biometrics).
  • 29. Biometric technologies are applied in the following sectors:  Pubic Services,  Law Enforcement,  Banking,  Physical Access Control and  Computer & Networks.
  • 30.  1. Signature Verification  2. Iris Analysis  3. Facial Analysis  4. Fingerprint verification  5. Hand Geometry  6. Voice Verification
  • 31. Use false identity to trap  contact children/teens in various chat rooms which are used by children/teen  Befriend the child/teen.  Extract personal information  Gets the e-mail address of the child/teen and starts making contacts on the victimâ s e-mail address as well.
  • 32. Starts sending pornographic images/text  Extract personal information from child/teen  At the end of it, the pedophile set up a meeting with the child/teen out of the house
  • 33.
  • 34. Watch traffic to your site.  Put & configure your firewall correctly.  Develop your web content off line.  Back up your web site after every update.  Develop your web content off line.  Protect your databases.  Back up your web site after every update.
  • 35.  Ensure physical security of equipment and storage devices  Don't share identification numbers and passwords  Monitor dial-up facilities  Access to data  virus protection software STAY UPDATED
  • 36.  Avoid disclosing  Avoid sending any photograph online particularly to strangers  Use latest and up dated anti virus software.  Always keep back up volumes  Never send your credit card number to any site that is not secured  Always keep a watch on the sites that your children are accessing  Use a security programme that gives control over the cookies
  • 37.  It is not possible to eliminate cyber crime from the cyber space.  It is quite possible to check them.  History is the witness that no legislation has succeeded in totally eliminating crime from the globe  The only possible step is to make people aware of their rights and duties
  • 38.  Treatyour password like you treat your toothbrush. Never give it to anyone else to use, and change it every few months.