Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

N.sai kiran IIITA AP


Published on

  • Be the first to comment

  • Be the first to like this

N.sai kiran IIITA AP

  1. 1. N.Sai Kiran,IIIT Allahabad.
  2. 2.  About Hackers Business Response Introduction to Forensic science Basic Concepts Basic cyber crime investigation tool Firewalls Child pornography Precautions
  3. 3.  “Cyber crime may be said to be those species, of which, genus is the conventional crime, and where either the computer is an object or subject of the conduct constituting crime”Old WINE IN NEW BOTTLES.o Hackerso Crackerso Cyber terrorists
  4. 4.  The challenge... „because it‟s there!‟ Ego Espionage Ideology Mischief Money (extortion or theft) Revenge
  5. 5.  Predominantly male Aged from mid-teens to mid-twenties Lacking in social skills Fascination or obsession with computers Underachiever in other areas who sees computing as a means of being important or powerful Discontented employees
  6. 6. Service %Adult Content (XXX) 50Online Services 19Direct Marketing – Other 11Direct Marketing – Catalogue 10Gaming 5Books 3Other 2Total 100 9
  7. 7. “If you have to teach ethics it’s too late”
  8. 8.  There is no plan for review logs or scan for unusual activity. Physical access is not controlled in a consistent manner. If an intrusion detected or ever suspected there is no procedure designed to deal with it.
  9. 9. Why should you care?
  10. 10. Administrative precautionsPhysical precautionsInformation systems
  11. 11.  Forensic science is the application of a broad spectrum of sciences to answer questions of interest to a legal system. This may be in relation to a crime or a civil action.
  12. 12.  Computer forensics is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information.
  13. 13.  Protect Discover Recover Reveal Access Analyze Print Provide Expert Consultation.
  14. 14.  In the mind of a normal computer user, once data is deleted, it is accepted that it is no longer in existence. On the other hand, the CFS should understand that the data could still exist in some other form or area on the storage medium
  15. 15.  Disk Imaging Hashing Message Digest 5 (MD5) Secure Hash Algorithm (SHA)
  16. 16. PC Encase Forensic FTK imager Inspector tool kitFile data discovery SE SE SNR SEFile data recovery SNR SNR NS SNRReveal file contents SNR SE SNR SNRFile access and SNR SE SNR SNRanalysisImaging NS SE NS SEMD5 NS SE SE SESHA1 NS NS SE SESummary print out NS SE SNR SE
  17. 17.  PC Inspector File Recovery Encase Forensic Tool Kit FTK Imager
  18. 18.  Window GUI Technology base Forensic Software for examination of File systems FAT12, FAT16, FAT32, NTFS, LINUX, UNIX, MACINTOSH, CDROM and DVD-R. It should able to examine and extracting slack space. It should be able to create image of the storage media e.g. hard disk, Floppy disk. It should show emails in developer‟s format. (With headers and attachments) It should open document in language other English spouted by Unicode e.g. Arabian language. It should show Internet history. Forensic Cell phone Seizure kit with write block facility and will all required cables and adapters. Forensic Hardware: One computer PIV 3.2 GHz with 1 GB DDR RAM and other required peripheral One hard disk write block device
  19. 19. Robust operating system software Other application software facilitating word processing, spread sheet, electronic mails, multimedia, imaging and for identifying various other kinds of file formats during the course of examination Case management software for keeping records of the cases being examined and for tracking case details at short notice Bootable disks to let the forensic specialist boot from such disks instead of the suspect‟s bootable disk
  20. 20.  Bit-stream back up of data The forensic procedure prohibits examination of the original media to prevent any accidental erasure or interference during examination of such media. Powerful password recovery tool
  21. 21.  Recovery of deleted data, image and multimedia among other kinds of files . For generating reports based on the analysis of the information contained on the suspect storage media Searching tool for locating folders andfiles on the suspect storage media.
  22. 22.  Firewall protection as well as intrusion detection Use of spyware prevention Intrusion detection systems
  23. 23.  Firewalls help protect the perimeter of your network (the hard candy shell). The “soft chewy centre” needs protection too. Firewalls can and are compromised.
  24. 24.  Identification Authentication The person can be identified and authenticated by  what he knows  by what he owns  by his human characteristics (biometrics).
  25. 25. Biometric technologies are applied in the following sectors: Pubic Services, Law Enforcement, Banking, Physical Access Control and Computer & Networks.
  26. 26.  1. Signature Verification 2. Iris Analysis 3. Facial Analysis 4. Fingerprint verification 5. Hand Geometry 6. Voice Verification
  27. 27.  Use false identity to trap contact children/teens in various chat rooms which are used by children/teen Befriend the child/teen. Extract personal information Gets the e-mail address of the child/teen and starts making contacts on the victimâ s e-mail address as well.
  28. 28.  Starts sending pornographic images/text Extract personal information from child/teen At the end of it, the pedophile set up a meeting with the child/teen out of the house
  29. 29.  Watch traffic to your site. Put & configure your firewall correctly. Develop your web content off line. Back up your web site after every update. Develop your web content off line. Protect your databases. Back up your web site after every update.
  30. 30.  Ensure physical security of equipment and storage devices Dont share identification numbers and passwords Monitor dial-up facilities Access to data virus protection software STAY UPDATED
  31. 31.  Avoid disclosing Avoid sending any photograph online particularly to strangers Use latest and up dated anti virus software. Always keep back up volumes Never send your credit card number to any site that is not secured Always keep a watch on the sites that your children are accessing Use a security programme that gives control over the cookies
  32. 32.  It is not possible to eliminate cyber crime from the cyber space. It is quite possible to check them. History is the witness that no legislation has succeeded in totally eliminating crime from the globe The only possible step is to make people aware of their rights and duties
  33. 33.  Treatyour password like you treat your toothbrush. Never give it to anyone else to use, and change it every few months.
  34. 34. Unsafe to miss use
  35. 35. Quires?