SlideShare a Scribd company logo
1 of 27
© FISE
Building A Cybercrime Case
Introduction
• The growing danger from crimes committed against
computers, or against information on computers, is beginning
to claim attention in national capitals. In most countries
around the world, however, existing laws are likely to be
unenforceable against such crimes. This lack of legal
protection means that businesses and governments must rely
solely on technical measures to protect themselves from
those who would steal, deny access to, or destroy valuable
information.
Types of Cyber Crimes:
Data crimes.
• Data Interception: Interception of data in
transmission.
• Data Modification: Alteration, destruction, or
erasing of data.
• Data Theft: Taking or copying data, regardless of
whether it is protected by other laws, e.g.,
copyright, privacy, etc.
Types of Cyber Crimes:
Network crimes
• Network Interference: Impeding or preventing access for others.
The most common example of this action is instigating
• a distributed denial of service (DDOS) attack, flooding Web sites or
Internet Service Providers. DDOS attacks are often launched from
numerous computers that have been hacked to obey commands of
the perpetrator.
• Network Sabotage: Modification or destruction of a network or
system.
Types of Cyber Crimes:
Related crimes.
• Aiding and Abetting: Enabling the commission of
a cyber crime.
• Computer-Related Forgery: Alteration of data
with intent to represent as authentic.
• Computer-Related Fraud: Alteration of data with
intent to derive economic benefit from its
misrepresentation.
Bodies Of Law
THREE bodies of law :
(1) Criminal law, or penal law
• Is the body of rules with the potential for severe
impositions as punishment for failure to comply.
Criminal punishment, depending on the offense and
jurisdiction, may include execution, loss of liberty,
government supervision (parole or probation), or
fines.
Bodies Of Law
• There are some archetypal (example) crimes, like
murder, but the acts that are forbidden are not
wholly consistent between different criminal codes,
and even within a particular code lines may be
blurred as civil infractions may give rise also to
criminal consequences. Criminal law typically is
enforced by the government, unlike the civil law,
which may be enforced by private parties.
Bodies Of Law
(2) Civil law
• As opposed to criminal law, is the branch of law
dealing with disputes between individuals and/or
organizations, in which compensation may be
awarded to the victim. For instance, if a car crash
victim claims damages against the driver for loss or
injury sustained in an accident, this will be a civil law
case.
Bodies Of Law
(3) Administrative law
• Is the body of law that governs the activities of
administrative agencies of government. Government
agency action can include rulemaking, adjudication,
or the enforcement of a specific regulatory agenda.
Administrative law is considered a branch of public
law.
Bodies Of Law
• As a body of law, administrative law deals with the decision-
making of administrative units of government (e.g., tribunals,
boards or commissions) that are part of a national regulatory
scheme in such areas as police law, international trade,
manufacturing, the environment, taxation, broadcasting,
immigration and transport. Administrative law expanded
greatly during the twentieth century, as legislative bodies
worldwide created more government agencies to regulate
the increasingly complex social, economic and political
spheres of human interaction.
Security Incident:
The attempted or successful
unauthorized access, use
disclosure, modification, or
destruction of information or
interference with system
operations in an information
system
Examples
• Bombings, explosions, fire,
flood, storm, power outage,
hardware/software failure
• Cyber-theft, identity-theft,
intellectual property theft,
regular theft (involving
information), virus, worm,
network intrusions,
unauthorized use, denial of
service, etc
} Contingency
Plan
} Incident
response
Goals
• Provide an effective and efficient means of dealing with the
situation
• in a manner that reduces the potential impact to the
organization.
• Provide management with sufficient information in order to
decide on
• an appropriate course of action.
• Maintain or restore business continuity.
• Defend against future attacks.
• Deter attacks through investigation and prosecution.
Incident Handling Steps
• Preparation
• Identification
• Containment
• Eradication
• Recovery
• Lessons learned
Incident Handling Steps
• Preparation - The organization educates users and IT staff of the
importance of updated security measures and trains them to respond
to computer and network security incidents quickly and correctly.
• Identification - The response team is activated to decide whether a
particular event is, in fact, a security incident. The team will tracks
Internet security activity and has the most current information on
viruses and worms.
• Containment - The team determines how far the problem has spread
and contains the problem by disconnecting all affected systems and
devices to prevent further damage.
Incident Handling Steps
• Eradication - The team investigates to discover the origin of
the incident. The root cause of the problem and all traces of
malicious code are removed.
• Recovery - Data and software are restored from clean backup
files, ensuring that no vulnerabilities remain. Systems are
monitored for any sign of weakness or recurrence.
• Lessons learned - The team analyzes the incident and how it
was handled, making recommendations for better future
response and for preventing a recurrence.
Why Need Structure Handling
• Structure/Organization
– Dealing with incidents can be chaotic
– Simultaneous incidents occur
– Having a predefined methodology lends structure to the chaos
• Efficiency
– Time is often of the essence when dealing with incidents
– Incidents can be costly both financially and organizationally
• Process oriented approach
– Breaks incidents into small manageable chunks
– Logical order of dealing with issues
– Includes methods for improving the overall process
Why Need Structure Handling
• Dealing with the unexpected
– Provides a mental framework for dealing with incidents in
general
– Promotes flexible thinking to deal with novel situations
• Legal Considerations
– Can demonstrate due care or due diligence
– May limit liability
– May reduce insurance premiums
Evidence Management
• During an incident, evidence may be collected during any of
the 6 steps.
• In early stages we may not know what the final outcome
might be (e.g., Job Termination, Civil or Criminal Litigation).
• Network/Computer Forensics may become an issue
• Must collect data in a “Forensically Friendly” manner
• Must maintain the chain of custody
• Important to understand the evidence lifecycle
Forensics
• Computer Forensics: The study of computer
technology as it relates to the law.
• Forensic Analysis: Examination of material and/or
data to determine its essential features and their
relationship in an effort to discover evidence in a
manner that is admissible in a court of law; post-
mortem examination.
Forensics
• Electronic Evidence:
Evidence relating to the
issue that consists of
computer files, or data, in
their electronic state.
• Electronic Media
Discovery: The
discoverability of electronic
data or files.
Forensics
• Chain of Custody: A means of
accountability, that shows who
obtained the evidence, where
and when the evidence was
obtained, who secured the
evidence, who had control or
possession of the evidence.
• Rules of Evidence: Evidence
must be competent, relevant,
and material to the issue.
Evidence Life Cycle
• Collection & identification
• Storage, preservation, and
• transportation
• Presentation in court
• Return to victim or court
Case Study:
MALAYSIAN CYBERLAWS AND THEIR IMPLE

More Related Content

What's hot

What's hot (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackingCehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hacking
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - Explained
 
Cyber security
Cyber security Cyber security
Cyber security
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threats
 
Cyber security
 Cyber security Cyber security
Cyber security
 
Web Application Security Session for Web Developers
Web Application Security Session for Web DevelopersWeb Application Security Session for Web Developers
Web Application Security Session for Web Developers
 
What is Importance of Cyber Security
What is Importance of Cyber Security What is Importance of Cyber Security
What is Importance of Cyber Security
 
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking Overview
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 

Viewers also liked

Viewers also liked (18)

Installing driver
Installing driverInstalling driver
Installing driver
 
Business etiquette
Business etiquetteBusiness etiquette
Business etiquette
 
Note taking
Note takingNote taking
Note taking
 
Tense
TenseTense
Tense
 
An introduction to cost terms and purposes
An introduction to cost terms and purposesAn introduction to cost terms and purposes
An introduction to cost terms and purposes
 
Process losses
Process lossesProcess losses
Process losses
 
Network servers
Network serversNetwork servers
Network servers
 
Client server system and remote connectivity
Client server system and remote connectivityClient server system and remote connectivity
Client server system and remote connectivity
 
Managers & global information technology
Managers & global information technologyManagers & global information technology
Managers & global information technology
 
Factor market
Factor marketFactor market
Factor market
 
Philosophy of early childhood education 2
Philosophy of early childhood education 2Philosophy of early childhood education 2
Philosophy of early childhood education 2
 
Management information system database management
Management information system database managementManagement information system database management
Management information system database management
 
Wan technologies
Wan technologiesWan technologies
Wan technologies
 
Fiscal policy
Fiscal policyFiscal policy
Fiscal policy
 
Mergers and acquisitions
Mergers and acquisitionsMergers and acquisitions
Mergers and acquisitions
 
Introduction to corporate finance
Introduction to corporate financeIntroduction to corporate finance
Introduction to corporate finance
 
New classical analysis of
New classical analysis ofNew classical analysis of
New classical analysis of
 
Multimedia authoring tools
Multimedia authoring toolsMultimedia authoring tools
Multimedia authoring tools
 

Similar to Building a cybercrime case

Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
misecho
 
Thinking Ahead to Litigation While Developing Cybersecurity Plans
Thinking Ahead to Litigation While Developing Cybersecurity PlansThinking Ahead to Litigation While Developing Cybersecurity Plans
Thinking Ahead to Litigation While Developing Cybersecurity Plans
Jason Glass, CFA, CISSP
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Lisa Abe-Oldenburg, B.Comm., JD.
 

Similar to Building a cybercrime case (20)

Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
 
164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
The general data protection act overview
The general data protection act overviewThe general data protection act overview
The general data protection act overview
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Mis
MisMis
Mis
 
Thinking Ahead to Litigation While Developing Cybersecurity Plans
Thinking Ahead to Litigation While Developing Cybersecurity PlansThinking Ahead to Litigation While Developing Cybersecurity Plans
Thinking Ahead to Litigation While Developing Cybersecurity Plans
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
File000168
File000168File000168
File000168
 
2. Defence Systems
2. Defence Systems2. Defence Systems
2. Defence Systems
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf
 
Flight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawFlight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the Law
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Mis
MisMis
Mis
 
Lecture 8 privacy, security, ergonomics and the environment
Lecture 8   privacy, security, ergonomics and the environment Lecture 8   privacy, security, ergonomics and the environment
Lecture 8 privacy, security, ergonomics and the environment
 

More from Online

More from Online (20)

Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3
 
Philosophy of early childhood education 1
Philosophy of early childhood education 1Philosophy of early childhood education 1
Philosophy of early childhood education 1
 
Philosophy of early childhood education 4
Philosophy of early childhood education 4Philosophy of early childhood education 4
Philosophy of early childhood education 4
 
Operation and expression in c++
Operation and expression in c++Operation and expression in c++
Operation and expression in c++
 
Functions
FunctionsFunctions
Functions
 
Formatted input and output
Formatted input and outputFormatted input and output
Formatted input and output
 
Control structures selection
Control structures   selectionControl structures   selection
Control structures selection
 
Control structures repetition
Control structures   repetitionControl structures   repetition
Control structures repetition
 
Introduction to problem solving in c++
Introduction to problem solving in c++Introduction to problem solving in c++
Introduction to problem solving in c++
 
Optical transmission technique
Optical transmission techniqueOptical transmission technique
Optical transmission technique
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technology
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocols
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Application protocols
Application protocolsApplication protocols
Application protocols
 
Addressing
AddressingAddressing
Addressing
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Leadership
LeadershipLeadership
Leadership
 
Introduction to management
Introduction to managementIntroduction to management
Introduction to management
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 

Building a cybercrime case

  • 1. © FISE Building A Cybercrime Case
  • 2. Introduction • The growing danger from crimes committed against computers, or against information on computers, is beginning to claim attention in national capitals. In most countries around the world, however, existing laws are likely to be unenforceable against such crimes. This lack of legal protection means that businesses and governments must rely solely on technical measures to protect themselves from those who would steal, deny access to, or destroy valuable information.
  • 3. Types of Cyber Crimes: Data crimes. • Data Interception: Interception of data in transmission. • Data Modification: Alteration, destruction, or erasing of data. • Data Theft: Taking or copying data, regardless of whether it is protected by other laws, e.g., copyright, privacy, etc.
  • 4. Types of Cyber Crimes: Network crimes • Network Interference: Impeding or preventing access for others. The most common example of this action is instigating • a distributed denial of service (DDOS) attack, flooding Web sites or Internet Service Providers. DDOS attacks are often launched from numerous computers that have been hacked to obey commands of the perpetrator. • Network Sabotage: Modification or destruction of a network or system.
  • 5. Types of Cyber Crimes: Related crimes. • Aiding and Abetting: Enabling the commission of a cyber crime. • Computer-Related Forgery: Alteration of data with intent to represent as authentic. • Computer-Related Fraud: Alteration of data with intent to derive economic benefit from its misrepresentation.
  • 6. Bodies Of Law THREE bodies of law : (1) Criminal law, or penal law • Is the body of rules with the potential for severe impositions as punishment for failure to comply. Criminal punishment, depending on the offense and jurisdiction, may include execution, loss of liberty, government supervision (parole or probation), or fines.
  • 7. Bodies Of Law • There are some archetypal (example) crimes, like murder, but the acts that are forbidden are not wholly consistent between different criminal codes, and even within a particular code lines may be blurred as civil infractions may give rise also to criminal consequences. Criminal law typically is enforced by the government, unlike the civil law, which may be enforced by private parties.
  • 8. Bodies Of Law (2) Civil law • As opposed to criminal law, is the branch of law dealing with disputes between individuals and/or organizations, in which compensation may be awarded to the victim. For instance, if a car crash victim claims damages against the driver for loss or injury sustained in an accident, this will be a civil law case.
  • 9. Bodies Of Law (3) Administrative law • Is the body of law that governs the activities of administrative agencies of government. Government agency action can include rulemaking, adjudication, or the enforcement of a specific regulatory agenda. Administrative law is considered a branch of public law.
  • 10. Bodies Of Law • As a body of law, administrative law deals with the decision- making of administrative units of government (e.g., tribunals, boards or commissions) that are part of a national regulatory scheme in such areas as police law, international trade, manufacturing, the environment, taxation, broadcasting, immigration and transport. Administrative law expanded greatly during the twentieth century, as legislative bodies worldwide created more government agencies to regulate the increasingly complex social, economic and political spheres of human interaction.
  • 11. Security Incident: The attempted or successful unauthorized access, use disclosure, modification, or destruction of information or interference with system operations in an information system
  • 12. Examples • Bombings, explosions, fire, flood, storm, power outage, hardware/software failure • Cyber-theft, identity-theft, intellectual property theft, regular theft (involving information), virus, worm, network intrusions, unauthorized use, denial of service, etc } Contingency Plan } Incident response
  • 13.
  • 14.
  • 15.
  • 16. Goals • Provide an effective and efficient means of dealing with the situation • in a manner that reduces the potential impact to the organization. • Provide management with sufficient information in order to decide on • an appropriate course of action. • Maintain or restore business continuity. • Defend against future attacks. • Deter attacks through investigation and prosecution.
  • 17. Incident Handling Steps • Preparation • Identification • Containment • Eradication • Recovery • Lessons learned
  • 18. Incident Handling Steps • Preparation - The organization educates users and IT staff of the importance of updated security measures and trains them to respond to computer and network security incidents quickly and correctly. • Identification - The response team is activated to decide whether a particular event is, in fact, a security incident. The team will tracks Internet security activity and has the most current information on viruses and worms. • Containment - The team determines how far the problem has spread and contains the problem by disconnecting all affected systems and devices to prevent further damage.
  • 19. Incident Handling Steps • Eradication - The team investigates to discover the origin of the incident. The root cause of the problem and all traces of malicious code are removed. • Recovery - Data and software are restored from clean backup files, ensuring that no vulnerabilities remain. Systems are monitored for any sign of weakness or recurrence. • Lessons learned - The team analyzes the incident and how it was handled, making recommendations for better future response and for preventing a recurrence.
  • 20. Why Need Structure Handling • Structure/Organization – Dealing with incidents can be chaotic – Simultaneous incidents occur – Having a predefined methodology lends structure to the chaos • Efficiency – Time is often of the essence when dealing with incidents – Incidents can be costly both financially and organizationally • Process oriented approach – Breaks incidents into small manageable chunks – Logical order of dealing with issues – Includes methods for improving the overall process
  • 21. Why Need Structure Handling • Dealing with the unexpected – Provides a mental framework for dealing with incidents in general – Promotes flexible thinking to deal with novel situations • Legal Considerations – Can demonstrate due care or due diligence – May limit liability – May reduce insurance premiums
  • 22. Evidence Management • During an incident, evidence may be collected during any of the 6 steps. • In early stages we may not know what the final outcome might be (e.g., Job Termination, Civil or Criminal Litigation). • Network/Computer Forensics may become an issue • Must collect data in a “Forensically Friendly” manner • Must maintain the chain of custody • Important to understand the evidence lifecycle
  • 23. Forensics • Computer Forensics: The study of computer technology as it relates to the law. • Forensic Analysis: Examination of material and/or data to determine its essential features and their relationship in an effort to discover evidence in a manner that is admissible in a court of law; post- mortem examination.
  • 24. Forensics • Electronic Evidence: Evidence relating to the issue that consists of computer files, or data, in their electronic state. • Electronic Media Discovery: The discoverability of electronic data or files.
  • 25. Forensics • Chain of Custody: A means of accountability, that shows who obtained the evidence, where and when the evidence was obtained, who secured the evidence, who had control or possession of the evidence. • Rules of Evidence: Evidence must be competent, relevant, and material to the issue.
  • 26. Evidence Life Cycle • Collection & identification • Storage, preservation, and • transportation • Presentation in court • Return to victim or court