SlideShare a Scribd company logo
1 of 43
Download to read offline
CYBER CRIME &
FORENSICS
Presented By
Saisha sukla (u112105)
Samikhya Joshi (u112106)
Santanu Kumar Das (u112107)
Satyanarayana Das (u112108)
Introduction to Cybercrime
 Computer or computer networks are
used as a tool or a target or a place of
criminal activity.
 First recorded cyber crime took place
in the year 1820 in France.
 Unauthorized access to computer
systems, data destruction, data
alteration, theft of intellectual
property.
 Most important revenue sector for
global organized crime.
How it differs from terrestrial crime?
 easy to learn how to commit
 require few resources relative to
the potential damage caused
 can be committed in a jurisdiction
without being physically present
in it
 are often not clearly illegal
Types of Cybercrime
• Hacking
• Phishing
• Software Piracy
• Cyber Stalking
• Denial of Service
• Financial crimes
• Sale of illegal articles
• Intellectual Property crimes
• Forgery
• Cyber Defamation
Hacking
• The actual word is “Cracking” and not “Hacking”.
• "Deliberately gaining unauthorized access to an
information system.“
• They help the government to protect national
documents of strategic importance, help
organizations to protect documents and company
secrets,
• A Cracker breaks into someone else's computer
system, often on a network, bypasses passwords or
licenses in computer programs or in other ways
intentionally breaches computer security.
• But with time , both the word are used
interchangeably.
Phishing
Acquiring information such as usernames,
password and credit card details by disguising
as a trustworthy entity.
India is among the top 15 countries hosting
"phishing" sites which aims at stealing
confidential information such as passwords and
credit card details.
Cyber Stalking
Cyber stalking is use of the Internet or other electronic means to stalk
someone. This term is used interchangeably with online harassment and
online abuse.
Denial of Service
•floods the bandwidth of the victim’s network
•fills his e-mail box with spam mail
•deprives him of the services he is entitled to access or provide
•uses a technique called spoofing and buffer overflow
Software Piracy
• illegal copying of genuine programs
• counterfeiting and distribution of products
Examples of software piracy
End user copying
Hard disk loading
Counterfeiting
Illegal downloads from the Internet
Virus Dissemination
•A program that can ‘infect’ other legitimate
programs by modifying them to include a possibly
‘evolved’ copy of itself.
•Viruses can spread themselves, without the
knowledge or permission of the users, to
potentially large numbers of programs on many
machines.
Typical action of a virus
•Erase files
•Scramble data on a hard disk
•Cause erratic screen behavior
•Halt the PC
•Just replicate itself!
Cybercriminals
Motivating factors for Cybercrimes
 The challenge….. “because it’s there!”
 Ego
 Espionage
 Ideology
 Mischief
 Money (Extortion or Theft)
Revenge
Cost of Cyber crime in India
In India in 2010
 29.9 million people fell victim to cyber crime
 $ 4 billion in direct losses
 $ 3.6 billion in time spent to resolve crimes
 80% of cyber users have been a victim of
cyber crime
 17% of adults online have experienced
cybercrime on their mobile phone
Source : Nortan Cyber Crime Report2011
Why India?
 A rapidly growing online user
 121 million internet users
 65 million active internet users, up 28%
from 51 million in 2010
 50 million users shop online on
ecommerce and online shopping sites
 46+ million social network users
 346 million mobile users had subscribed to
data packages
Source : IAMAI; Juxt; wearesocial 2011
Combating Cybercrimes
 Technological measures: Public key
cryptography, Digital signatures
,Firewalls, honey pots
 Cyber investigation: Computer forensics
is the process of identifying, preserving,
analyzing and presenting digital
evidence in a manner that is legally
acceptable in courts of law. These rules
of evidence include admissibility (in
courts), authenticity (relation to incident),
completeness, reliability and
believability.
 Legal framework-laws & enforcement
International Legislation Initiatives
 OECD
1983 – research in criminal law problems of
computer related crimes
1992 – Guidelines for the security of
information systems
 G8
1997 – Subgroup of High – Tech Crime
 OAS
1999 – Established a group of government
experts on cyber crime
 APEC
2002 – commitment to enact a comprehensive
set of laws relating to cyber security and cyber
crime
International Legislation Initiatives
 ASEAN and China
2003 – Formulate cooperative and emergency
response procedures for enhancing cyber
security and combating cyber crime
 United Nations
1998-2000 – Resolution on developments in the
field of Information and Telecommunication in
the context of International security
2003 – Resolutions on combating the criminal
misuse of Information Technology & on the
creation of a global culture of cyber security.
 Europe union
2003-2005 – Council framework decision on
attacks against information system
What about the law? (Indian perspective)
Information Technology Act (Amendment) Act 2008 – Chapter XI
 65 – Tempering with computer source documents
 66 – Computer related offences
 66A – punishment for sending offensive messages through
communication services etc.
 66B – Punishment for dishonestly receiving stolen computer
resources or communication devices
 66C – Punishment for identity theft
 66D – Punishment for cheating by personation by using
computer device
 66E – Punishment for violation of privacy
 66F – punishment for cyber terrorism
 67 – punishment for publishing or transmitting obscene
material in electronic form
Major Objectives
 Create effective cyber crime laws
 Develop acceptable practices for
search and seizure
 Handle jurisdiction issues
 Cooperate in international
investigations
 Establish effective public/private
sector interaction
Safety tips to avoid Cybercrime
 Use anti-virus software and firewalls
- keep them up to date
 Keep your operating system up to
date with critical security updates and
patches
 Don't open emails or attachments
from unknown sources
 Use hard-to-guess passwords. Don’t
use words found in a dictionary.
Remember that password cracking
tools exist
 Back-up your computer data on disks
or CDs often
 Don't share access to your
computers with strangers
 If you have a Wi-Fi network,
password protect it
 Disconnect from the Internet
when not in use
 Reevaluate your security on a
regular basis
 Make sure your employees and
family members know this info
too!
Prominent news for Cyber crimes
 Kevin Mitnick’s (“Condor”) hacking spree cost high-tech companies at
least $ 291.8 million over a two year span before his capture
 David L. Smith, a31 year old programmer ,pleaded guilty to creating the
Melissa virus and using an ex-rated web site to spread it through cyberspace,
causing $80 million damages.
 Four high school Kids hacked into a Bay Area internet server and used
stolen credit card number to order computer equipment: $200k
 A temporary employer broke into Forbes, computers, caused a computer crash,
that cost Forbes $100,000 to restore
Case study 1
The Chennai city police have busted an international gang involved in
cyber crime, with arrest of Deepak Prem Manwani (22), who was
caught red handed while breaking into an ATM in the city.
The dimensions of the city cops’ achievement can be gauged from
the fact that they have netted a man who is on the wanted list of
formidable FBI of US.
At the time of his detention, he had with him Rs 7.5 lakhs knocked off
from two ATMs in T Nagar and Abiramipuram in the city. Prior to that,
he had walked away with Rs 50,000 from an ATM in Mumbai.
While investigating it was found that his audacious crime career
started in the internet café. While browsing the net one day, he got
attracted to a site which offered him assistance in breaking into the
ATMs
Case study 1
His contacts sitting some where in Europe were ready to give him
credit card numbers of few American banks for $5 per card. This site
also offered the magnetic codes of these cards, but charged $200
per code.
The operators of the site had devised a fascinating idea to get the
PIN of the card users. They floated a new site which resembled that
of a reputed telecom company. That company has millions of
subscribers. The fake site offered the visitors to return $11.75 per
head which, the site promoters said, had been collected in excess by
mistake from them.
Believing that it was a genuine offer from the telecom company in
question, several lakh subscribers logged on the site to get back the
little money. But in the process parted with their PINs
Case study 1
Armed with all requisite data to hack the bank ATMs, the gang
started its systematic looting. Apparently Manwani and many others
of his group entered into a deal with the gang behind the site and
could purchase any amount of data.
Meanwhile, Manwani also managed to generate 30 plastic cards that
contained necessary data to enable him to break into ATMs. He was
so enterprising that he was able to sell away a few such cards to his
contacts in Mumbai.
On receipt of large scale complaints from the billed credit card users
and banks in the US, the FBI started investigation into the affair and
also alerted the CBI
Manwani has since been enlarged on bail after interrogation by CBI.
But the city police believe that this is the beginning of a major cyber
crime.
Case study 2
In 1988 Robert Morris, Jr. a 23 year old graduate student in computer
science at Cornell and the son of a NSA computer security expert,
wrote an experimental, self replicating, self-propagating program
called a worm (99 lines of code) and injected into the internet. He
choose to release it from MIT, to disguise the fact that the warm
came from Cornell.
60,000 computer site at university sites, hospitals, research facilities,
corporations and govt. institutions were affected; the estimated cost
of dealing with the worms ranged from $200 to $50,000 for each site.
Morris was convicted of violating the computer fraud and Abuse Act;
he received 3 years probation, 400 hours of community service and a
fine of $10050
Next steps
A final word
Treat your password like you treat your tooth brush. Never
give to any one else to use, and change it every few months.
CYBER FORENSICS
 Forensic Science or forensic is the application of
broad spectrum of sciences to answer to
questions related to legal system, may be for
crime or civil actions.
 The use of science and technology to investigate
and establish facts in criminal or civil courts of
law.
FORENSICS
Goal of computer forensics is to examine digital
media in a forensically sound manner with the
aim of identifying, preserving, recovering,
analyzing and presenting facts and opinions
about the information.
COMPUTER FORENSICS
 Michael Anderson
“Father of computer forensics”
special agent with IRS
 Meeting in 1988 (Portland, Oregon)
creation of IACIS, the International Association of Computer
Investigative Specialists
the first Seized Computer Evidence Recovery Specialists (SCERS)
classes held
HISTORY
 The main task or the advantage from the computer
forensic is to catch the culprit or the criminal who is
involved in the crime related to the computers.
 Computer forensics has emerged as important part in the
disaster recovery management
 Ability to search through a massive amount of data-
Quickly, Thoroughly and In any language
 The importance lies mainly in handling criminal actions
such as fraud, phishing, identity theft or many other
criminal activities
WHY?
 Criminal Prosecutors
 Civil litigators
 Insurance Companies
 Corporations
 Law Enforcement Officials
 Individuals
WHO USES FORENSICS
 Identify root cause of an event to ensure it won’t happen again
– Must understand the problem before you can be sure it won’t be
exploited again.
 • Who was responsible for the event?
 • Most computer crime cases are not prosecuted
– Consider acceptability in court of law as our standard for
investigative practice.
– Ultimate goal is to conduct investigation in a manner that will
stand up to legal scrutiny.
– Treat every case like a court case!
What cyber forensics aims at?
Acquisition
Identification
Evaluation
Presentation
STEPS FOR COMPUTER FORENSICS:
1) Shut Down the Computer
2) Document the Hardware Configuration of The System
3) Transport the Computer System to A Secure Location
4) Make Bit Stream Backups of Hard Disks and Floppy Disks
5) Mathematically Verify Data on All Storage Devices
6) Document the System Date and Time
7) Make a List of Key Search Words
8) Evaluate the Windows Swap File
9) Evaluate File Slack
10) Evaluate Unallocated Space (Erased Files)
11) Search Files, File Slack and Unallocated Space for Key Words
12) Document File Names, Dates and Times
13) Identify File, Program and Storage Anomalies
14) Evaluate Program Functionality
15) Document Your Findings
METHEDOLOGY:
Forensics involves collection of evidences as an important part for investigation.
5 rules of evidences:
1) Admissible
Must be able to be used in court or elsewhere.
1) Authentic
Evidence relates to incident in relevant way.
1) Complete
Exculpatory evidence for alternative suspects.
1) Reliable
No question about authenticity & veracity.
1) Believable
Clear, easy to understand, and believable by a jury.
EVIDENCES:
TOP 10 LOCATION FOR EVIDENCE
1) Internet History Files
2) Temporary Internet Files
3) Slack/Unallocated Space
4) Buddy lists, personal chat room records, P2P, others saved areas
5) News groups/club lists/posting
6) Settings, folder structure, file names
7) File Storage Dates
8) Software/Hardware added
9) File Sharing ability
10) E-mails
 There are two types of computer data
1. Persistent data
2. Volatile data
 There are different tools used to collect data
 An essential toolkit should contain-backup, authentication,
decryption, disk editing, log file auditing, IP tracking, data recovery,
and file examination.
 Tools used depend on what data has to be analyzed
TOOLS AND TECHNIQUES
 Drivespy
 Encase
 Forensic tool kit
 I Look
 Norton utilies
 Xways
Some common tools:
Cross Drive Analysis
Deleted files analysis
Live analysis
TECHNIQUES:
 It may happen in some cases that the privacy of the client is
compromised.
 There are also the chances of introduction of some malicious
programs in the computer system that may corrupt the data at a
later stage of time.
 It is also possible that the data is in dispute and neither of the
disputing parties can use the data. Due to this reason the business
operations may also be affected.
 Producing electronic records & preserving them is extremely costly
 Legal practitioners must have extensive computer knowledge and
vice versa
DISADVANTAGES
THANK YOU

More Related Content

What's hot

87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrTushar Rajput
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Faridah Husin
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Adv Prashant Mali
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyPELUMI APANTAKU
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsPrabesh Shrestha
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal guptakg19
 
CYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORCYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORDharmik Navadiya
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the countryUjjwal Tripathi
 
Cyber crime
Cyber crimeCyber crime
Cyber crimedixitas
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & LawYash
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesAshesh R
 

What's hot (20)

87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethics
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal gupta
 
CYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORCYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIOR
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Cyber security
Cyber securityCyber security
Cyber security
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & Law
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 

Similar to Cybercrimeandforensic 120828021931-phpapp02

Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber CrimeSyangba132
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its toolsKathirvel Ayyaswamy
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 

Similar to Cybercrimeandforensic 120828021931-phpapp02 (20)

Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 

More from Gol D Roger

Seizing Electronic Evidence & Best Practices – Secret Service
Seizing Electronic Evidence & Best Practices – Secret ServiceSeizing Electronic Evidence & Best Practices – Secret Service
Seizing Electronic Evidence & Best Practices – Secret ServiceGol D Roger
 
Forensic artifacts in modern linux systems
Forensic artifacts in modern linux systemsForensic artifacts in modern linux systems
Forensic artifacts in modern linux systemsGol D Roger
 
8 0-os file-system management
8 0-os file-system management8 0-os file-system management
8 0-os file-system managementGol D Roger
 
8 1-os file system implementation
8 1-os file system implementation8 1-os file system implementation
8 1-os file system implementationGol D Roger
 
Desktop Forensics: Windows
Desktop Forensics: WindowsDesktop Forensics: Windows
Desktop Forensics: WindowsGol D Roger
 
Windows logon password – get windows logon password using wdigest in memory d...
Windows logon password – get windows logon password using wdigest in memory d...Windows logon password – get windows logon password using wdigest in memory d...
Windows logon password – get windows logon password using wdigest in memory d...Gol D Roger
 
HTTPs Strict Transport Security
HTTPs    Strict Transport Security HTTPs    Strict Transport Security
HTTPs Strict Transport Security Gol D Roger
 
IT Passport Examination.
IT Passport Examination.IT Passport Examination.
IT Passport Examination.Gol D Roger
 
Basic configuration fortigate v4.0 mr2
Basic configuration fortigate v4.0 mr2Basic configuration fortigate v4.0 mr2
Basic configuration fortigate v4.0 mr2Gol D Roger
 
windows server 2012 R2
windows server 2012 R2windows server 2012 R2
windows server 2012 R2Gol D Roger
 
Users guide-to-winfe
Users guide-to-winfeUsers guide-to-winfe
Users guide-to-winfeGol D Roger
 
10 things group policy preferences does better
10 things group policy preferences does better10 things group policy preferences does better
10 things group policy preferences does betterGol D Roger
 

More from Gol D Roger (14)

Seizing Electronic Evidence & Best Practices – Secret Service
Seizing Electronic Evidence & Best Practices – Secret ServiceSeizing Electronic Evidence & Best Practices – Secret Service
Seizing Electronic Evidence & Best Practices – Secret Service
 
Forensic artifacts in modern linux systems
Forensic artifacts in modern linux systemsForensic artifacts in modern linux systems
Forensic artifacts in modern linux systems
 
8 0-os file-system management
8 0-os file-system management8 0-os file-system management
8 0-os file-system management
 
8 1-os file system implementation
8 1-os file system implementation8 1-os file system implementation
8 1-os file system implementation
 
Deep Web
Deep WebDeep Web
Deep Web
 
Desktop Forensics: Windows
Desktop Forensics: WindowsDesktop Forensics: Windows
Desktop Forensics: Windows
 
Email Forensics
Email ForensicsEmail Forensics
Email Forensics
 
Windows logon password – get windows logon password using wdigest in memory d...
Windows logon password – get windows logon password using wdigest in memory d...Windows logon password – get windows logon password using wdigest in memory d...
Windows logon password – get windows logon password using wdigest in memory d...
 
HTTPs Strict Transport Security
HTTPs    Strict Transport Security HTTPs    Strict Transport Security
HTTPs Strict Transport Security
 
IT Passport Examination.
IT Passport Examination.IT Passport Examination.
IT Passport Examination.
 
Basic configuration fortigate v4.0 mr2
Basic configuration fortigate v4.0 mr2Basic configuration fortigate v4.0 mr2
Basic configuration fortigate v4.0 mr2
 
windows server 2012 R2
windows server 2012 R2windows server 2012 R2
windows server 2012 R2
 
Users guide-to-winfe
Users guide-to-winfeUsers guide-to-winfe
Users guide-to-winfe
 
10 things group policy preferences does better
10 things group policy preferences does better10 things group policy preferences does better
10 things group policy preferences does better
 

Recently uploaded

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Recently uploaded (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Cybercrimeandforensic 120828021931-phpapp02

  • 1. CYBER CRIME & FORENSICS Presented By Saisha sukla (u112105) Samikhya Joshi (u112106) Santanu Kumar Das (u112107) Satyanarayana Das (u112108)
  • 2. Introduction to Cybercrime  Computer or computer networks are used as a tool or a target or a place of criminal activity.  First recorded cyber crime took place in the year 1820 in France.  Unauthorized access to computer systems, data destruction, data alteration, theft of intellectual property.  Most important revenue sector for global organized crime.
  • 3. How it differs from terrestrial crime?  easy to learn how to commit  require few resources relative to the potential damage caused  can be committed in a jurisdiction without being physically present in it  are often not clearly illegal
  • 4. Types of Cybercrime • Hacking • Phishing • Software Piracy • Cyber Stalking • Denial of Service • Financial crimes • Sale of illegal articles • Intellectual Property crimes • Forgery • Cyber Defamation
  • 5. Hacking • The actual word is “Cracking” and not “Hacking”. • "Deliberately gaining unauthorized access to an information system.“ • They help the government to protect national documents of strategic importance, help organizations to protect documents and company secrets, • A Cracker breaks into someone else's computer system, often on a network, bypasses passwords or licenses in computer programs or in other ways intentionally breaches computer security. • But with time , both the word are used interchangeably.
  • 6. Phishing Acquiring information such as usernames, password and credit card details by disguising as a trustworthy entity. India is among the top 15 countries hosting "phishing" sites which aims at stealing confidential information such as passwords and credit card details.
  • 7. Cyber Stalking Cyber stalking is use of the Internet or other electronic means to stalk someone. This term is used interchangeably with online harassment and online abuse. Denial of Service •floods the bandwidth of the victim’s network •fills his e-mail box with spam mail •deprives him of the services he is entitled to access or provide •uses a technique called spoofing and buffer overflow
  • 8. Software Piracy • illegal copying of genuine programs • counterfeiting and distribution of products Examples of software piracy End user copying Hard disk loading Counterfeiting Illegal downloads from the Internet
  • 9. Virus Dissemination •A program that can ‘infect’ other legitimate programs by modifying them to include a possibly ‘evolved’ copy of itself. •Viruses can spread themselves, without the knowledge or permission of the users, to potentially large numbers of programs on many machines. Typical action of a virus •Erase files •Scramble data on a hard disk •Cause erratic screen behavior •Halt the PC •Just replicate itself!
  • 11. Motivating factors for Cybercrimes  The challenge….. “because it’s there!”  Ego  Espionage  Ideology  Mischief  Money (Extortion or Theft) Revenge
  • 12. Cost of Cyber crime in India In India in 2010  29.9 million people fell victim to cyber crime  $ 4 billion in direct losses  $ 3.6 billion in time spent to resolve crimes  80% of cyber users have been a victim of cyber crime  17% of adults online have experienced cybercrime on their mobile phone Source : Nortan Cyber Crime Report2011
  • 13. Why India?  A rapidly growing online user  121 million internet users  65 million active internet users, up 28% from 51 million in 2010  50 million users shop online on ecommerce and online shopping sites  46+ million social network users  346 million mobile users had subscribed to data packages Source : IAMAI; Juxt; wearesocial 2011
  • 14. Combating Cybercrimes  Technological measures: Public key cryptography, Digital signatures ,Firewalls, honey pots  Cyber investigation: Computer forensics is the process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally acceptable in courts of law. These rules of evidence include admissibility (in courts), authenticity (relation to incident), completeness, reliability and believability.  Legal framework-laws & enforcement
  • 15. International Legislation Initiatives  OECD 1983 – research in criminal law problems of computer related crimes 1992 – Guidelines for the security of information systems  G8 1997 – Subgroup of High – Tech Crime  OAS 1999 – Established a group of government experts on cyber crime  APEC 2002 – commitment to enact a comprehensive set of laws relating to cyber security and cyber crime
  • 16. International Legislation Initiatives  ASEAN and China 2003 – Formulate cooperative and emergency response procedures for enhancing cyber security and combating cyber crime  United Nations 1998-2000 – Resolution on developments in the field of Information and Telecommunication in the context of International security 2003 – Resolutions on combating the criminal misuse of Information Technology & on the creation of a global culture of cyber security.  Europe union 2003-2005 – Council framework decision on attacks against information system
  • 17. What about the law? (Indian perspective) Information Technology Act (Amendment) Act 2008 – Chapter XI  65 – Tempering with computer source documents  66 – Computer related offences  66A – punishment for sending offensive messages through communication services etc.  66B – Punishment for dishonestly receiving stolen computer resources or communication devices  66C – Punishment for identity theft  66D – Punishment for cheating by personation by using computer device  66E – Punishment for violation of privacy  66F – punishment for cyber terrorism  67 – punishment for publishing or transmitting obscene material in electronic form
  • 18. Major Objectives  Create effective cyber crime laws  Develop acceptable practices for search and seizure  Handle jurisdiction issues  Cooperate in international investigations  Establish effective public/private sector interaction
  • 19. Safety tips to avoid Cybercrime  Use anti-virus software and firewalls - keep them up to date  Keep your operating system up to date with critical security updates and patches  Don't open emails or attachments from unknown sources  Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist  Back-up your computer data on disks or CDs often  Don't share access to your computers with strangers  If you have a Wi-Fi network, password protect it  Disconnect from the Internet when not in use  Reevaluate your security on a regular basis  Make sure your employees and family members know this info too!
  • 20. Prominent news for Cyber crimes  Kevin Mitnick’s (“Condor”) hacking spree cost high-tech companies at least $ 291.8 million over a two year span before his capture  David L. Smith, a31 year old programmer ,pleaded guilty to creating the Melissa virus and using an ex-rated web site to spread it through cyberspace, causing $80 million damages.  Four high school Kids hacked into a Bay Area internet server and used stolen credit card number to order computer equipment: $200k  A temporary employer broke into Forbes, computers, caused a computer crash, that cost Forbes $100,000 to restore
  • 21. Case study 1 The Chennai city police have busted an international gang involved in cyber crime, with arrest of Deepak Prem Manwani (22), who was caught red handed while breaking into an ATM in the city. The dimensions of the city cops’ achievement can be gauged from the fact that they have netted a man who is on the wanted list of formidable FBI of US. At the time of his detention, he had with him Rs 7.5 lakhs knocked off from two ATMs in T Nagar and Abiramipuram in the city. Prior to that, he had walked away with Rs 50,000 from an ATM in Mumbai. While investigating it was found that his audacious crime career started in the internet café. While browsing the net one day, he got attracted to a site which offered him assistance in breaking into the ATMs
  • 22. Case study 1 His contacts sitting some where in Europe were ready to give him credit card numbers of few American banks for $5 per card. This site also offered the magnetic codes of these cards, but charged $200 per code. The operators of the site had devised a fascinating idea to get the PIN of the card users. They floated a new site which resembled that of a reputed telecom company. That company has millions of subscribers. The fake site offered the visitors to return $11.75 per head which, the site promoters said, had been collected in excess by mistake from them. Believing that it was a genuine offer from the telecom company in question, several lakh subscribers logged on the site to get back the little money. But in the process parted with their PINs
  • 23. Case study 1 Armed with all requisite data to hack the bank ATMs, the gang started its systematic looting. Apparently Manwani and many others of his group entered into a deal with the gang behind the site and could purchase any amount of data. Meanwhile, Manwani also managed to generate 30 plastic cards that contained necessary data to enable him to break into ATMs. He was so enterprising that he was able to sell away a few such cards to his contacts in Mumbai. On receipt of large scale complaints from the billed credit card users and banks in the US, the FBI started investigation into the affair and also alerted the CBI Manwani has since been enlarged on bail after interrogation by CBI. But the city police believe that this is the beginning of a major cyber crime.
  • 24. Case study 2 In 1988 Robert Morris, Jr. a 23 year old graduate student in computer science at Cornell and the son of a NSA computer security expert, wrote an experimental, self replicating, self-propagating program called a worm (99 lines of code) and injected into the internet. He choose to release it from MIT, to disguise the fact that the warm came from Cornell. 60,000 computer site at university sites, hospitals, research facilities, corporations and govt. institutions were affected; the estimated cost of dealing with the worms ranged from $200 to $50,000 for each site. Morris was convicted of violating the computer fraud and Abuse Act; he received 3 years probation, 400 hours of community service and a fine of $10050
  • 26. A final word Treat your password like you treat your tooth brush. Never give to any one else to use, and change it every few months.
  • 28.  Forensic Science or forensic is the application of broad spectrum of sciences to answer to questions related to legal system, may be for crime or civil actions.  The use of science and technology to investigate and establish facts in criminal or civil courts of law. FORENSICS
  • 29. Goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information. COMPUTER FORENSICS
  • 30.  Michael Anderson “Father of computer forensics” special agent with IRS  Meeting in 1988 (Portland, Oregon) creation of IACIS, the International Association of Computer Investigative Specialists the first Seized Computer Evidence Recovery Specialists (SCERS) classes held HISTORY
  • 31.  The main task or the advantage from the computer forensic is to catch the culprit or the criminal who is involved in the crime related to the computers.  Computer forensics has emerged as important part in the disaster recovery management  Ability to search through a massive amount of data- Quickly, Thoroughly and In any language  The importance lies mainly in handling criminal actions such as fraud, phishing, identity theft or many other criminal activities WHY?
  • 32.  Criminal Prosecutors  Civil litigators  Insurance Companies  Corporations  Law Enforcement Officials  Individuals WHO USES FORENSICS
  • 33.
  • 34.  Identify root cause of an event to ensure it won’t happen again – Must understand the problem before you can be sure it won’t be exploited again.  • Who was responsible for the event?  • Most computer crime cases are not prosecuted – Consider acceptability in court of law as our standard for investigative practice. – Ultimate goal is to conduct investigation in a manner that will stand up to legal scrutiny. – Treat every case like a court case! What cyber forensics aims at?
  • 36. 1) Shut Down the Computer 2) Document the Hardware Configuration of The System 3) Transport the Computer System to A Secure Location 4) Make Bit Stream Backups of Hard Disks and Floppy Disks 5) Mathematically Verify Data on All Storage Devices 6) Document the System Date and Time 7) Make a List of Key Search Words 8) Evaluate the Windows Swap File 9) Evaluate File Slack 10) Evaluate Unallocated Space (Erased Files) 11) Search Files, File Slack and Unallocated Space for Key Words 12) Document File Names, Dates and Times 13) Identify File, Program and Storage Anomalies 14) Evaluate Program Functionality 15) Document Your Findings METHEDOLOGY:
  • 37. Forensics involves collection of evidences as an important part for investigation. 5 rules of evidences: 1) Admissible Must be able to be used in court or elsewhere. 1) Authentic Evidence relates to incident in relevant way. 1) Complete Exculpatory evidence for alternative suspects. 1) Reliable No question about authenticity & veracity. 1) Believable Clear, easy to understand, and believable by a jury. EVIDENCES:
  • 38. TOP 10 LOCATION FOR EVIDENCE 1) Internet History Files 2) Temporary Internet Files 3) Slack/Unallocated Space 4) Buddy lists, personal chat room records, P2P, others saved areas 5) News groups/club lists/posting 6) Settings, folder structure, file names 7) File Storage Dates 8) Software/Hardware added 9) File Sharing ability 10) E-mails
  • 39.  There are two types of computer data 1. Persistent data 2. Volatile data  There are different tools used to collect data  An essential toolkit should contain-backup, authentication, decryption, disk editing, log file auditing, IP tracking, data recovery, and file examination.  Tools used depend on what data has to be analyzed TOOLS AND TECHNIQUES
  • 40.  Drivespy  Encase  Forensic tool kit  I Look  Norton utilies  Xways Some common tools:
  • 41. Cross Drive Analysis Deleted files analysis Live analysis TECHNIQUES:
  • 42.  It may happen in some cases that the privacy of the client is compromised.  There are also the chances of introduction of some malicious programs in the computer system that may corrupt the data at a later stage of time.  It is also possible that the data is in dispute and neither of the disputing parties can use the data. Due to this reason the business operations may also be affected.  Producing electronic records & preserving them is extremely costly  Legal practitioners must have extensive computer knowledge and vice versa DISADVANTAGES