SlideShare a Scribd company logo
1 of 3
Download to read offline
As computer forensic investigators we are asked to take an image of a hard dr
ive,
preserve it for evidentiary integrity and then perform a detailed analys
is on what we
found. Sometimes the obvious isn’t so obvious anymore. When the guilt or innocence of
a person, their reputation, their standing in the community, their jobs, their liveli
hood,
civil action (which translates to money) and possibly jail time hang in the balanc
e it is
important to perform a detailed an accurate assessment that looks at all possibl
e
scenarios.
There is the common scenario where the bad guys are using zombies or bots (small
computer programs residing on a computer and controlled by someone else) to ext
ort
money from others. According to Symantec, the city of Winsford in Cheshire is the
world’s second biggest hotspot for zombies, followed by Seoul in Korea. The anit-virus
company estimates that nearly a third of between one and two million computers
worldwide infected with the bot software are now located in the UK. In a Sept 19 2005
article in TechWorld entitled “Zombies take hold of London”, the article detail
s how
zombie computers have become a weapon of choice for spammers and phishers as well a
s
attackers looking to swamp a victim’s server with a distributed denial of servi
ce attack.
Take BetCBSports.com. In an Information Week article they tell of how the
y received an
email one day which said, “You have 3 choices. You can make a deal with us now before
the attacks start. You can make a deal with us whey you are under attack. You can ig
nore
us and plan on losing your Internet business”. This type of distributed denial of service
attack (DDos) is becoming increasingly popular against businesses that rel
y completely
on the internet for their source of revenue. Typically the amount of money asked for is
relatively small in comparison with the lost revenues the company could expect a
s a
result of being down. More times than not the extortion fee is paid. For those that don’t
pay, it is an endless battle of bandwidth. The more bots the extortionist control, the more
bandwidth they can pump into the DDos attack. The more bandwidth they throw at the
site, the more bandwidth you need to combat them.
Solution
As computer forensic investigators we are asked to take an image of a hard dr
ive,
preserve it for evidentiary integrity and then perform a detailed analys
is on what we
found. Sometimes the obvious isn’t so obvious anymore. When the guilt or innocence of
a person, their reputation, their standing in the community, their jobs, their liveli
hood,
civil action (which translates to money) and possibly jail time hang in the balanc
e it is
important to perform a detailed an accurate assessment that looks at all possibl
e
scenarios.
There is the common scenario where the bad guys are using zombies or bots (small
computer programs residing on a computer and controlled by someone else) to ext
ort
money from others. According to Symantec, the city of Winsford in Cheshire is the
world’s second biggest hotspot for zombies, followed by Seoul in Korea. The anit-virus
company estimates that nearly a third of between one and two million computers
worldwide infected with the bot software are now located in the UK. In a Sept 19 2005
article in TechWorld entitled “Zombies take hold of London”, the article detail
s how
zombie computers have become a weapon of choice for spammers and phishers as well a
s
attackers looking to swamp a victim’s server with a distributed denial of servi
ce attack.
Take BetCBSports.com. In an Information Week article they tell of how the
y received an
email one day which said, “You have 3 choices. You can make a deal with us now before
the attacks start. You can make a deal with us whey you are under attack. You can ig
nore
us and plan on losing your Internet business”. This type of distributed denial of service
attack (DDos) is becoming increasingly popular against businesses that rel
y completely
on the internet for their source of revenue. Typically the amount of money asked for is
relatively small in comparison with the lost revenues the company could expect a
s a
result of being down. More times than not the extortion fee is paid. For those that don’t
pay, it is an endless battle of bandwidth. The more bots the extortionist control, the more
bandwidth they can pump into the DDos attack. The more bandwidth they throw at the
site, the more bandwidth you need to combat them.

More Related Content

Similar to As computer forensic investigators we are asked to take an image of .pdf

What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxsmile790243
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverseMext Metaverse
 
How spam change the world
How spam change the world How spam change the world
How spam change the world Farhaan Bukhsh
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxVipinRawat52
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Faridah Husin
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Kim Moore
 

Similar to As computer forensic investigators we are asked to take an image of .pdf (15)

What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cyber crime report
Cyber crime reportCyber crime report
Cyber crime report
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
How spam change the world
How spam change the world How spam change the world
How spam change the world
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)
 

More from annammalassociates

The three domains of human development are physical, cognitive and p.pdf
The three domains of human development are physical, cognitive and p.pdfThe three domains of human development are physical, cognitive and p.pdf
The three domains of human development are physical, cognitive and p.pdfannammalassociates
 
This is a templet called arrayListType.hThe templet class name as .pdf
This is a templet called arrayListType.hThe templet class name as .pdfThis is a templet called arrayListType.hThe templet class name as .pdf
This is a templet called arrayListType.hThe templet class name as .pdfannammalassociates
 
the primary purpose for developing transportation models is used to .pdf
the primary purpose for developing transportation models is used to .pdfthe primary purpose for developing transportation models is used to .pdf
the primary purpose for developing transportation models is used to .pdfannammalassociates
 
The origin of colour in complex ions containing transition metals.pdf
The origin of colour in complex ions containing transition metals.pdfThe origin of colour in complex ions containing transition metals.pdf
The origin of colour in complex ions containing transition metals.pdfannammalassociates
 
a. 0.010 M NaCl pH will be approximately 7 because the solution.pdf
 a. 0.010 M NaCl pH will be approximately 7 because the solution.pdf a. 0.010 M NaCl pH will be approximately 7 because the solution.pdf
a. 0.010 M NaCl pH will be approximately 7 because the solution.pdfannammalassociates
 
Transition metal elements have atoms or ions with partially filled .pdf
  Transition metal elements have atoms or ions with partially filled .pdf  Transition metal elements have atoms or ions with partially filled .pdf
Transition metal elements have atoms or ions with partially filled .pdfannammalassociates
 
ZnS mass ratio = 1.310.642 =2.04 .pdf
                     ZnS  mass ratio = 1.310.642 =2.04              .pdf                     ZnS  mass ratio = 1.310.642 =2.04              .pdf
ZnS mass ratio = 1.310.642 =2.04 .pdfannammalassociates
 
We know that The energy of He+ can be calculated.pdf
                     We know that The energy of He+ can be calculated.pdf                     We know that The energy of He+ can be calculated.pdf
We know that The energy of He+ can be calculated.pdfannammalassociates
 
the temperature will be higher as the pressure is.pdf
                     the temperature will be higher as the pressure is.pdf                     the temperature will be higher as the pressure is.pdf
the temperature will be higher as the pressure is.pdfannammalassociates
 
The CPSase of multienzyme pyrl-3 is inhibited by .pdf
                     The CPSase of multienzyme pyrl-3 is inhibited by .pdf                     The CPSase of multienzyme pyrl-3 is inhibited by .pdf
The CPSase of multienzyme pyrl-3 is inhibited by .pdfannammalassociates
 
pH = pKa + log[base][salt] = -log (5.6 10^-10.pdf
                     pH = pKa + log[base][salt]  = -log (5.6  10^-10.pdf                     pH = pKa + log[base][salt]  = -log (5.6  10^-10.pdf
pH = pKa + log[base][salt] = -log (5.6 10^-10.pdfannammalassociates
 
please post the clear qsn.... i ll help u in answ.pdf
                     please post the clear qsn.... i ll help u in answ.pdf                     please post the clear qsn.... i ll help u in answ.pdf
please post the clear qsn.... i ll help u in answ.pdfannammalassociates
 
Na2S + NaNO3 - No reaction Na2S + KClO3 - No re.pdf
                     Na2S + NaNO3 - No reaction Na2S + KClO3 - No re.pdf                     Na2S + NaNO3 - No reaction Na2S + KClO3 - No re.pdf
Na2S + NaNO3 - No reaction Na2S + KClO3 - No re.pdfannammalassociates
 
Its to remove the air. This prevents the molecu.pdf
                     Its to remove the air. This prevents the molecu.pdf                     Its to remove the air. This prevents the molecu.pdf
Its to remove the air. This prevents the molecu.pdfannammalassociates
 
The conclusion can be summarised as followsSolutionThe conclu.pdf
The conclusion can be summarised as followsSolutionThe conclu.pdfThe conclusion can be summarised as followsSolutionThe conclu.pdf
The conclusion can be summarised as followsSolutionThe conclu.pdfannammalassociates
 
The AutoCAD Electrical installation directory structure containsS.pdf
The AutoCAD Electrical installation directory structure containsS.pdfThe AutoCAD Electrical installation directory structure containsS.pdf
The AutoCAD Electrical installation directory structure containsS.pdfannammalassociates
 
Service that are performed by distributed objects.Objects is the s.pdf
Service that are performed by distributed objects.Objects is the s.pdfService that are performed by distributed objects.Objects is the s.pdf
Service that are performed by distributed objects.Objects is the s.pdfannammalassociates
 
Profits increase by 41 (I just took the Quiz)SolutionProfits .pdf
Profits increase by 41 (I just took the Quiz)SolutionProfits .pdfProfits increase by 41 (I just took the Quiz)SolutionProfits .pdf
Profits increase by 41 (I just took the Quiz)SolutionProfits .pdfannammalassociates
 

More from annammalassociates (20)

The three domains of human development are physical, cognitive and p.pdf
The three domains of human development are physical, cognitive and p.pdfThe three domains of human development are physical, cognitive and p.pdf
The three domains of human development are physical, cognitive and p.pdf
 
This is a templet called arrayListType.hThe templet class name as .pdf
This is a templet called arrayListType.hThe templet class name as .pdfThis is a templet called arrayListType.hThe templet class name as .pdf
This is a templet called arrayListType.hThe templet class name as .pdf
 
the primary purpose for developing transportation models is used to .pdf
the primary purpose for developing transportation models is used to .pdfthe primary purpose for developing transportation models is used to .pdf
the primary purpose for developing transportation models is used to .pdf
 
The origin of colour in complex ions containing transition metals.pdf
The origin of colour in complex ions containing transition metals.pdfThe origin of colour in complex ions containing transition metals.pdf
The origin of colour in complex ions containing transition metals.pdf
 
a. 0.010 M NaCl pH will be approximately 7 because the solution.pdf
 a. 0.010 M NaCl pH will be approximately 7 because the solution.pdf a. 0.010 M NaCl pH will be approximately 7 because the solution.pdf
a. 0.010 M NaCl pH will be approximately 7 because the solution.pdf
 
Transition metal elements have atoms or ions with partially filled .pdf
  Transition metal elements have atoms or ions with partially filled .pdf  Transition metal elements have atoms or ions with partially filled .pdf
Transition metal elements have atoms or ions with partially filled .pdf
 
ZnS mass ratio = 1.310.642 =2.04 .pdf
                     ZnS  mass ratio = 1.310.642 =2.04              .pdf                     ZnS  mass ratio = 1.310.642 =2.04              .pdf
ZnS mass ratio = 1.310.642 =2.04 .pdf
 
We know that The energy of He+ can be calculated.pdf
                     We know that The energy of He+ can be calculated.pdf                     We know that The energy of He+ can be calculated.pdf
We know that The energy of He+ can be calculated.pdf
 
two lone pairs Solution .pdf
                     two lone pairs  Solution                     .pdf                     two lone pairs  Solution                     .pdf
two lone pairs Solution .pdf
 
the temperature will be higher as the pressure is.pdf
                     the temperature will be higher as the pressure is.pdf                     the temperature will be higher as the pressure is.pdf
the temperature will be higher as the pressure is.pdf
 
The CPSase of multienzyme pyrl-3 is inhibited by .pdf
                     The CPSase of multienzyme pyrl-3 is inhibited by .pdf                     The CPSase of multienzyme pyrl-3 is inhibited by .pdf
The CPSase of multienzyme pyrl-3 is inhibited by .pdf
 
replaces OH with COCH3 .pdf
                     replaces OH with COCH3                           .pdf                     replaces OH with COCH3                           .pdf
replaces OH with COCH3 .pdf
 
pH = pKa + log[base][salt] = -log (5.6 10^-10.pdf
                     pH = pKa + log[base][salt]  = -log (5.6  10^-10.pdf                     pH = pKa + log[base][salt]  = -log (5.6  10^-10.pdf
pH = pKa + log[base][salt] = -log (5.6 10^-10.pdf
 
please post the clear qsn.... i ll help u in answ.pdf
                     please post the clear qsn.... i ll help u in answ.pdf                     please post the clear qsn.... i ll help u in answ.pdf
please post the clear qsn.... i ll help u in answ.pdf
 
Na2S + NaNO3 - No reaction Na2S + KClO3 - No re.pdf
                     Na2S + NaNO3 - No reaction Na2S + KClO3 - No re.pdf                     Na2S + NaNO3 - No reaction Na2S + KClO3 - No re.pdf
Na2S + NaNO3 - No reaction Na2S + KClO3 - No re.pdf
 
Its to remove the air. This prevents the molecu.pdf
                     Its to remove the air. This prevents the molecu.pdf                     Its to remove the air. This prevents the molecu.pdf
Its to remove the air. This prevents the molecu.pdf
 
The conclusion can be summarised as followsSolutionThe conclu.pdf
The conclusion can be summarised as followsSolutionThe conclu.pdfThe conclusion can be summarised as followsSolutionThe conclu.pdf
The conclusion can be summarised as followsSolutionThe conclu.pdf
 
The AutoCAD Electrical installation directory structure containsS.pdf
The AutoCAD Electrical installation directory structure containsS.pdfThe AutoCAD Electrical installation directory structure containsS.pdf
The AutoCAD Electrical installation directory structure containsS.pdf
 
Service that are performed by distributed objects.Objects is the s.pdf
Service that are performed by distributed objects.Objects is the s.pdfService that are performed by distributed objects.Objects is the s.pdf
Service that are performed by distributed objects.Objects is the s.pdf
 
Profits increase by 41 (I just took the Quiz)SolutionProfits .pdf
Profits increase by 41 (I just took the Quiz)SolutionProfits .pdfProfits increase by 41 (I just took the Quiz)SolutionProfits .pdf
Profits increase by 41 (I just took the Quiz)SolutionProfits .pdf
 

Recently uploaded

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 

Recently uploaded (20)

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 

As computer forensic investigators we are asked to take an image of .pdf

  • 1. As computer forensic investigators we are asked to take an image of a hard dr ive, preserve it for evidentiary integrity and then perform a detailed analys is on what we found. Sometimes the obvious isn’t so obvious anymore. When the guilt or innocence of a person, their reputation, their standing in the community, their jobs, their liveli hood, civil action (which translates to money) and possibly jail time hang in the balanc e it is important to perform a detailed an accurate assessment that looks at all possibl e scenarios. There is the common scenario where the bad guys are using zombies or bots (small computer programs residing on a computer and controlled by someone else) to ext ort money from others. According to Symantec, the city of Winsford in Cheshire is the world’s second biggest hotspot for zombies, followed by Seoul in Korea. The anit-virus company estimates that nearly a third of between one and two million computers worldwide infected with the bot software are now located in the UK. In a Sept 19 2005 article in TechWorld entitled “Zombies take hold of London”, the article detail s how zombie computers have become a weapon of choice for spammers and phishers as well a s attackers looking to swamp a victim’s server with a distributed denial of servi ce attack. Take BetCBSports.com. In an Information Week article they tell of how the y received an email one day which said, “You have 3 choices. You can make a deal with us now before the attacks start. You can make a deal with us whey you are under attack. You can ig nore us and plan on losing your Internet business”. This type of distributed denial of service attack (DDos) is becoming increasingly popular against businesses that rel y completely on the internet for their source of revenue. Typically the amount of money asked for is relatively small in comparison with the lost revenues the company could expect a
  • 2. s a result of being down. More times than not the extortion fee is paid. For those that don’t pay, it is an endless battle of bandwidth. The more bots the extortionist control, the more bandwidth they can pump into the DDos attack. The more bandwidth they throw at the site, the more bandwidth you need to combat them. Solution As computer forensic investigators we are asked to take an image of a hard dr ive, preserve it for evidentiary integrity and then perform a detailed analys is on what we found. Sometimes the obvious isn’t so obvious anymore. When the guilt or innocence of a person, their reputation, their standing in the community, their jobs, their liveli hood, civil action (which translates to money) and possibly jail time hang in the balanc e it is important to perform a detailed an accurate assessment that looks at all possibl e scenarios. There is the common scenario where the bad guys are using zombies or bots (small computer programs residing on a computer and controlled by someone else) to ext ort money from others. According to Symantec, the city of Winsford in Cheshire is the world’s second biggest hotspot for zombies, followed by Seoul in Korea. The anit-virus company estimates that nearly a third of between one and two million computers worldwide infected with the bot software are now located in the UK. In a Sept 19 2005 article in TechWorld entitled “Zombies take hold of London”, the article detail s how zombie computers have become a weapon of choice for spammers and phishers as well a s attackers looking to swamp a victim’s server with a distributed denial of servi ce attack. Take BetCBSports.com. In an Information Week article they tell of how the y received an email one day which said, “You have 3 choices. You can make a deal with us now before
  • 3. the attacks start. You can make a deal with us whey you are under attack. You can ig nore us and plan on losing your Internet business”. This type of distributed denial of service attack (DDos) is becoming increasingly popular against businesses that rel y completely on the internet for their source of revenue. Typically the amount of money asked for is relatively small in comparison with the lost revenues the company could expect a s a result of being down. More times than not the extortion fee is paid. For those that don’t pay, it is an endless battle of bandwidth. The more bots the extortionist control, the more bandwidth they can pump into the DDos attack. The more bandwidth they throw at the site, the more bandwidth you need to combat them.