N.Sai Kiran,IIIT Allahabad.
 About  Hackers Business Response Introduction to Forensic science Basic Concepts Basic cyber crime investigation too...
 “Cyber   crime may be said to be those    species, of which, genus is the conventional    crime, and where either the co...
 The   challenge... „because it‟s there!‟ Ego Espionage Ideology Mischief Money (extortion or theft) Revenge
 Predominantly  male Aged from mid-teens to mid-twenties Lacking in social skills Fascination or obsession with comput...
Service                             %Adult Content (XXX)                 50Online Services                     19Direct Ma...
“If you have to teach ethics it’s too late”
 There   is no plan for review logs or scan  for unusual activity. Physical access is not controlled in a  consistent ma...
Why should you care?
Administrative precautionsPhysical precautionsInformation systems
 Forensic science is the application of a  broad spectrum of sciences to answer  questions of interest to a legal system....
   Computer forensics is a branch of digital    forensic science pertaining to legal evidence    found in computers and d...
 Protect Discover Recover Reveal Access Analyze Print Provide   Expert Consultation.
 In the mind of a normal computer user, once  data is deleted, it is accepted that it is no  longer in existence. On the...
 Disk   Imaging Hashing Message Digest 5 (MD5) Secure Hash Algorithm (SHA)
PC        Encase Forensic   FTK imager                      Inspector        tool kitFile data discovery   SE        SE   ...
 PC   Inspector File Recovery Encase Forensic   Tool Kit FTK   Imager
   Window GUI Technology base Forensic Software for examination    of File systems FAT12, FAT16, FAT32, NTFS, LINUX, UNIX...
Robust operating system software Other application software facilitating word  processing, spread sheet, electronic mails...
 Bit-stream back up of data  The forensic procedure prohibits  examination of the original media  to prevent any accident...
   Recovery of deleted data, image and    multimedia among other kinds of files .   For generating reports based on the ...
 Firewall         protection as well as intrusion detection Use   of spyware prevention Intrusion   detection systems
 Firewalls help protect the perimeter  of your network (the hard candy  shell). The “soft chewy centre” needs  protectio...
   Identification   Authentication   The person can be identified and authenticated    by          what he knows     ...
Biometric technologies are applied in the  following sectors: Pubic Services, Law Enforcement, Banking, Physical Acces...
 1. Signature Verification 2. Iris Analysis 3. Facial Analysis 4. Fingerprint verification 5. Hand Geometry 6. Voice...
   Use false identity to trap   contact children/teens in various chat rooms which are used by    children/teen   Befri...
   Starts sending pornographic images/text   Extract personal information from child/teen   At the end of it, the pedop...
   Watch traffic to your site.   Put & configure your firewall correctly.   Develop your web content off line.   Back ...
 Ensure physical security of equipment and  storage devices Dont share identification numbers and passwords Monitor dia...
 Avoid  disclosing Avoid sending any photograph online  particularly to strangers Use latest and up dated anti virus so...
 It is not possible to eliminate cyber crime  from the cyber space. It is quite possible to check them. History is the ...
 Treatyour password like you treat your toothbrush. Never give it to anyone else to use, and change it every few months.
Unsafe to miss use
Quires?
N.sai kiran IIITA AP
N.sai kiran IIITA AP
N.sai kiran IIITA AP
N.sai kiran IIITA AP
N.sai kiran IIITA AP
Upcoming SlideShare
Loading in …5
×

N.sai kiran IIITA AP

291 views
262 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
291
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

N.sai kiran IIITA AP

  1. 1. N.Sai Kiran,IIIT Allahabad.
  2. 2.  About Hackers Business Response Introduction to Forensic science Basic Concepts Basic cyber crime investigation tool Firewalls Child pornography Precautions
  3. 3.  “Cyber crime may be said to be those species, of which, genus is the conventional crime, and where either the computer is an object or subject of the conduct constituting crime”Old WINE IN NEW BOTTLES.o Hackerso Crackerso Cyber terrorists
  4. 4.  The challenge... „because it‟s there!‟ Ego Espionage Ideology Mischief Money (extortion or theft) Revenge
  5. 5.  Predominantly male Aged from mid-teens to mid-twenties Lacking in social skills Fascination or obsession with computers Underachiever in other areas who sees computing as a means of being important or powerful Discontented employees
  6. 6. Service %Adult Content (XXX) 50Online Services 19Direct Marketing – Other 11Direct Marketing – Catalogue 10Gaming 5Books 3Other 2Total 100 9
  7. 7. “If you have to teach ethics it’s too late”
  8. 8.  There is no plan for review logs or scan for unusual activity. Physical access is not controlled in a consistent manner. If an intrusion detected or ever suspected there is no procedure designed to deal with it.
  9. 9. Why should you care?
  10. 10. Administrative precautionsPhysical precautionsInformation systems
  11. 11.  Forensic science is the application of a broad spectrum of sciences to answer questions of interest to a legal system. This may be in relation to a crime or a civil action.
  12. 12.  Computer forensics is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information.
  13. 13.  Protect Discover Recover Reveal Access Analyze Print Provide Expert Consultation.
  14. 14.  In the mind of a normal computer user, once data is deleted, it is accepted that it is no longer in existence. On the other hand, the CFS should understand that the data could still exist in some other form or area on the storage medium
  15. 15.  Disk Imaging Hashing Message Digest 5 (MD5) Secure Hash Algorithm (SHA)
  16. 16. PC Encase Forensic FTK imager Inspector tool kitFile data discovery SE SE SNR SEFile data recovery SNR SNR NS SNRReveal file contents SNR SE SNR SNRFile access and SNR SE SNR SNRanalysisImaging NS SE NS SEMD5 NS SE SE SESHA1 NS NS SE SESummary print out NS SE SNR SE
  17. 17.  PC Inspector File Recovery Encase Forensic Tool Kit FTK Imager
  18. 18.  Window GUI Technology base Forensic Software for examination of File systems FAT12, FAT16, FAT32, NTFS, LINUX, UNIX, MACINTOSH, CDROM and DVD-R. It should able to examine and extracting slack space. It should be able to create image of the storage media e.g. hard disk, Floppy disk. It should show emails in developer‟s format. (With headers and attachments) It should open document in language other English spouted by Unicode e.g. Arabian language. It should show Internet history. Forensic Cell phone Seizure kit with write block facility and will all required cables and adapters. Forensic Hardware: One computer PIV 3.2 GHz with 1 GB DDR RAM and other required peripheral One hard disk write block device
  19. 19. Robust operating system software Other application software facilitating word processing, spread sheet, electronic mails, multimedia, imaging and for identifying various other kinds of file formats during the course of examination Case management software for keeping records of the cases being examined and for tracking case details at short notice Bootable disks to let the forensic specialist boot from such disks instead of the suspect‟s bootable disk
  20. 20.  Bit-stream back up of data The forensic procedure prohibits examination of the original media to prevent any accidental erasure or interference during examination of such media. Powerful password recovery tool
  21. 21.  Recovery of deleted data, image and multimedia among other kinds of files . For generating reports based on the analysis of the information contained on the suspect storage media Searching tool for locating folders andfiles on the suspect storage media.
  22. 22.  Firewall protection as well as intrusion detection Use of spyware prevention Intrusion detection systems
  23. 23.  Firewalls help protect the perimeter of your network (the hard candy shell). The “soft chewy centre” needs protection too. Firewalls can and are compromised.
  24. 24.  Identification Authentication The person can be identified and authenticated by  what he knows  by what he owns  by his human characteristics (biometrics).
  25. 25. Biometric technologies are applied in the following sectors: Pubic Services, Law Enforcement, Banking, Physical Access Control and Computer & Networks.
  26. 26.  1. Signature Verification 2. Iris Analysis 3. Facial Analysis 4. Fingerprint verification 5. Hand Geometry 6. Voice Verification
  27. 27.  Use false identity to trap contact children/teens in various chat rooms which are used by children/teen Befriend the child/teen. Extract personal information Gets the e-mail address of the child/teen and starts making contacts on the victimâ s e-mail address as well.
  28. 28.  Starts sending pornographic images/text Extract personal information from child/teen At the end of it, the pedophile set up a meeting with the child/teen out of the house
  29. 29.  Watch traffic to your site. Put & configure your firewall correctly. Develop your web content off line. Back up your web site after every update. Develop your web content off line. Protect your databases. Back up your web site after every update.
  30. 30.  Ensure physical security of equipment and storage devices Dont share identification numbers and passwords Monitor dial-up facilities Access to data virus protection software STAY UPDATED
  31. 31.  Avoid disclosing Avoid sending any photograph online particularly to strangers Use latest and up dated anti virus software. Always keep back up volumes Never send your credit card number to any site that is not secured Always keep a watch on the sites that your children are accessing Use a security programme that gives control over the cookies
  32. 32.  It is not possible to eliminate cyber crime from the cyber space. It is quite possible to check them. History is the witness that no legislation has succeeded in totally eliminating crime from the globe The only possible step is to make people aware of their rights and duties
  33. 33.  Treatyour password like you treat your toothbrush. Never give it to anyone else to use, and change it every few months.
  34. 34. Unsafe to miss use
  35. 35. Quires?

×