SlideShare a Scribd company logo
Submitted to- Submitted by-
Dr. Ankit Srivastava Sir Kunwar Srivastav
Assistant Professor M.Sc. IInd Semester
Dr. A. P. J. Abdul Kalam
Institute Of Forensic Science& Criminology
Bundelkhand University
Jhansi (Uttar Pradesh)
CYBER CRIME AND ITS
INVESTIGATION
Introduction
Definition
History of Cyber Crime
Classification Of Cyber Crime
Types Of Cyber Crime
Reasons Of Cyber Crime
Investigation Of Malicious Application
Collection and seizer procedure of digital medium
Securing the scene
Documenting the scene
Transportation
Data acquisition and data analysis
Reporting
Conclusion
Reference
Contents
Introduction-
 Any criminal activity which takes place on or over the medium of
the computers or internet or other technology recognized by the
Information Technology Act 2000.
 Definition-The Indian legislature does not provide the exact
definition of cyber crime in any state , even the Information
Technology Act, 2000, which deals with cyber crime does not
defined the term Cyber Crime.
 According to Dr. Debarati Halder and Dr. K. Jaishankar-
 “Offences that are committed against individual or groups of
individuals with a criminal motive to intentionally harm the
reputation of the victim directly or indirectly, using modern
telecommunication network such as Internet .”
History Of Cyber Crime-
 Michael Anderson , Father of computer
forensics.
 The first recorded cyber crime took place
in the year 1820.
Classification Of Cyber Crime
 Crimes Against Individual-
E-mail harassment, Child pornography, Cyber stalking etc
 Crimes Against Government –
Cyber terrorism, Cyber warfare , Distribution of pirated software etc
 Crimes Against Property-
Intellectual property crime, cyber vandalism, cyber trespass etc
Types Of Cyber Crime-
A- Computer as a target
 Unauthorized access to computer systems
 Malicious software, etc.
B- Online based Cyber Crime
 Crime Identity theft
 Internet scams
 Cyber stalking, etc.
Reasons Of Cyber Crime
Complexity Of System
Negligence Of Protection
Loss Of Cyber Evidence
Capacity to store the data
in very small space
Easy To Access
Acc. To ITA-2000 Some Crimes And Their
Punishment
Section Offences Punishment
65 Tampering with
computer source
documents
Imprisonment up to three
years, or/and with fine up to
Rs. 200,000
66 Hacking with computer
system
Imprisonment up to three
years, or/and with fine up to
Rs. 500,000
66B Receiving stolen computer or
communication device
Imprisonment up to three
years, or/and with fine up
to Rs.100,000
66C Using password of another
person
Imprisonment up to three
years, or/and with fine up to
Rs. 100,000
66D Cheating using computer
resource
Imprisonment up to three
years, or/and with fine up
to Rs.100,000
Sectio
n
Offence Punishmemt
66E Publishing private images of
others
Imprisonment up to three years, or/and
with fine up to Rs. 200,000
66F Acts of cyber terrorism Imprisonment up to life
67 Publishing information
which is obscene in
electronic form
Imprisonment up to five years, or/and with
fine up to Rs. 1,000,000
67A Publishing images
containing sexual acts
Imprisonment up to seven years, or/and
with fine up to Rs. 1,000,000
67B Publishing child porn
or predation children online
Imprisonment up to five years, or/and with
fine up to Rs. 1,000,000 on first conviction.
Imprisonment up to seven years, or/and
with fine up to Rs. 1,000,000 on second
conviction.
70 Securing access or
attempting to secure access
to a protected system
Imprisonment up to ten years, or/and with
fine.
71 Misrepresentation Imprisonment up to three years, or/and
with fine up to Rs. 100,000
Investigation Of Malicious
Application
 A- Collection-
Tools –
I. Cameras for photo and video
II. Cardboard boxes
III. Notepads
IV. Gloves
V. Nonmagnetic tools
VI. Antistatic bags
VII. Permanent markers, etc
Assess the Situation
 Situation1- The monitor is on. It displays a program,
application, work product, picture, E-mail, or Internet
site on the screen.
 Situation 2-The monitor is on and a screen saver or
picture is visible.
 Situation 3- The monitor is on, however, the display is
blank as if the monitor is off.
 Situation 4a-The monitor is powered off. The display
is blank.
 Situation 4b-The monitor is powered off. The display
is blank.
 Situation 5- The monitor is on. The display is blank.
 If the Computer is OFF
 If the computer is ON
Seizure Procedure Of Digital
Mediums
secure
physical
scene
secure
digital
scene
seize all
hardware
and
media
document
, label and
package
to delivery
for lab
at the
lab, all
seized
data is
analyzed
digital media
identification
minimize the
crime scene by
prioritizing the
physical media
seizure of
storage device
and media
Securing The Scene
 When securing and evaluating the scene, the first
responder should—
 Follow departmental policy .
 Immediately secure all electronic devices, including
personal or portable devices.
 Ensure that no unauthorized person has access to
any electronic devices at the crime scene.
 Refuse offers of help or technical assistance from
any unauthorized persons.
 Remove all persons from the crime scene or the
immediate area from which evidence is to be
collected.
 Ensure that the condition of any electronic device is
not altered.
 Leave a computer or electronic device off if it is
already turned off.
Documenting The Scene
 Documentation of a crime scene creates a
record for the investigation.
 Includes a detailed record using video,
photography, notes & sketches to help
recreate the details.
 Some circumstances may not permit first
responders to collect all electronic devices or
components at a scene or location.
Transportation
When transporting digital evidence, the first responder
should—
 Keep digital evidence as If the Computer Is OFF
 Avoid keeping digital evidence in a vehicle for
prolonged periods of time. Heat, cold, and humidity can
damage or destroy digital evidence.
 Ensure that computers and electronic devices are
packaged and secured during transportation to prevent
damage from shock and vibration.
 Document the transportation of the digital evidence
and maintain the chain of custody on all evidence
transported.
Data Acquisition(Data Logger)
 It is an information system that collects, stores
and distributes information. All data
acquisition systems consist of three essential
elements-
Sensor
Signal
Conditioning
Analog
Data Analysis
 Initially we need to analyze the evidences which we
gathered and examined.
 By the outcomes of those analyses, we will come to
know whether any malicious activities are presented or
not.
 In order to find the malicious code capabilities and its
aim, we have to do the malware executable analysis.
The malware executable analysis can be divided into
Static Analysis and Behavioral Analysis.
Reporting
 The report is compilation of all the documentation,
evidence from the examinations, and the analysis.
 The report needs to contain the documentation of
all the systems analyzed, the tools used, and the
discoveries made.
 contain the documentation of all the systems
analyzed, the tools used, and the discoveries
made.
 The report needs to have the dates and times of the
analysis, and detailed results. The report may be
the most important phase of digital forensics
Conclusion
 Cyber is indeed getting the recognition it
deserves. However, it is not going to restricted
that easily. In fact, it is highly likely that cyber
crime and its hackers will continue developing
and upgrading to stay ahead of the law.
So, to make us a safer we must need cyber
security.
References-
 Dr. R. K. Tiwari, P. K. Sartry and K. V. R.
Kumar/Computer Crimes And Computer
Forensics.
 David W. Hagy/Electronic Crime Scene
Investigation:- A Guide for first Responder.
 Anthony Reyes/Cyber Crime Investigation.
 Marjie T. Britz/ Computer Forensics And
Cyber crime.
Cuber crime and its investigation

More Related Content

What's hot

IRJET- Biometric Voting Machine
IRJET- Biometric Voting MachineIRJET- Biometric Voting Machine
IRJET- Biometric Voting Machine
IRJET Journal
 
Network forensic
Network forensicNetwork forensic
Network forensic
Manjushree Mashal
 
Detecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data AnalysisDetecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data Analysis
Editor IJMTER
 
Practical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approachesPractical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approaches
Full Stack Developer at Electro Mizan Andisheh
 
Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.
Adwiteeya Agrawal
 
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
Dr. Amrita .
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Jowin John Chemban
 
Identifying Malicious Data in Social Media
Identifying Malicious Data in Social MediaIdentifying Malicious Data in Social Media
Identifying Malicious Data in Social Media
IRJET Journal
 
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Ashish Karan
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
ijtsrd
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...
CloudTechnologies
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
IJMER
 
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori AlgorithmIRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET Journal
 
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
ijcsit
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile application
Alexander Decker
 

What's hot (15)

IRJET- Biometric Voting Machine
IRJET- Biometric Voting MachineIRJET- Biometric Voting Machine
IRJET- Biometric Voting Machine
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
Detecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data AnalysisDetecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data Analysis
 
Practical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approachesPractical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approaches
 
Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.
 
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
 
Identifying Malicious Data in Social Media
Identifying Malicious Data in Social MediaIdentifying Malicious Data in Social Media
Identifying Malicious Data in Social Media
 
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
 
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori AlgorithmIRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
 
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile application
 

Similar to Cuber crime and its investigation

Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
Sagar Rahurkar
 
Cyber evidence at crime scene
Cyber evidence at crime sceneCyber evidence at crime scene
Cyber evidence at crime scene
Applied Forensic Research Sciences
 
Computer Forensics.pptx
Computer Forensics.pptxComputer Forensics.pptx
Computer Forensics.pptx
Happyness Mkumbo
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Deepak Bhojwani
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptx
VaishnaviBorse8
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
gamemaker762
 
computer forensics
computer forensicscomputer forensics
computer forensics
shivi123456
 
The Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptxThe Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptx
Applied Forensic Research Sciences
 
Scope of Cyber forensics
Scope of Cyber forensicsScope of Cyber forensics
Scope of Cyber forensics
Applied Forensic Research Sciences
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
AliAshraf68199
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
anilinvns
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
Dhiren Gala
 
Cybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBICybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBI
Benjamin Ang
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
ibraheem ogundele
 
cyber_crime_investigation_ppt.pdf
cyber_crime_investigation_ppt.pdfcyber_crime_investigation_ppt.pdf
cyber_crime_investigation_ppt.pdf
ArifAhmad83
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital Forensic
IRJET Journal
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
Zyxware Technologies
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
vishnuv43
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
BRNSSPublicationHubI
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
Mayank Diwakar
 

Similar to Cuber crime and its investigation (20)

Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
Cyber evidence at crime scene
Cyber evidence at crime sceneCyber evidence at crime scene
Cyber evidence at crime scene
 
Computer Forensics.pptx
Computer Forensics.pptxComputer Forensics.pptx
Computer Forensics.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptx
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
The Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptxThe Scope of Cyber Forensic.pptx
The Scope of Cyber Forensic.pptx
 
Scope of Cyber forensics
Scope of Cyber forensicsScope of Cyber forensics
Scope of Cyber forensics
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Cybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBICybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBI
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
cyber_crime_investigation_ppt.pdf
cyber_crime_investigation_ppt.pdfcyber_crime_investigation_ppt.pdf
cyber_crime_investigation_ppt.pdf
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital Forensic
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
 

Recently uploaded

BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdfIGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
Amin Marwan
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
Chevonnese Chevers Whyte, MBA, B.Sc.
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 

Recently uploaded (20)

BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdfIGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 

Cuber crime and its investigation

  • 1. Submitted to- Submitted by- Dr. Ankit Srivastava Sir Kunwar Srivastav Assistant Professor M.Sc. IInd Semester Dr. A. P. J. Abdul Kalam Institute Of Forensic Science& Criminology Bundelkhand University Jhansi (Uttar Pradesh) CYBER CRIME AND ITS INVESTIGATION
  • 2. Introduction Definition History of Cyber Crime Classification Of Cyber Crime Types Of Cyber Crime Reasons Of Cyber Crime Investigation Of Malicious Application Collection and seizer procedure of digital medium Securing the scene Documenting the scene Transportation Data acquisition and data analysis Reporting Conclusion Reference Contents
  • 3. Introduction-  Any criminal activity which takes place on or over the medium of the computers or internet or other technology recognized by the Information Technology Act 2000.  Definition-The Indian legislature does not provide the exact definition of cyber crime in any state , even the Information Technology Act, 2000, which deals with cyber crime does not defined the term Cyber Crime.  According to Dr. Debarati Halder and Dr. K. Jaishankar-  “Offences that are committed against individual or groups of individuals with a criminal motive to intentionally harm the reputation of the victim directly or indirectly, using modern telecommunication network such as Internet .”
  • 4. History Of Cyber Crime-  Michael Anderson , Father of computer forensics.  The first recorded cyber crime took place in the year 1820.
  • 5. Classification Of Cyber Crime  Crimes Against Individual- E-mail harassment, Child pornography, Cyber stalking etc  Crimes Against Government – Cyber terrorism, Cyber warfare , Distribution of pirated software etc  Crimes Against Property- Intellectual property crime, cyber vandalism, cyber trespass etc Types Of Cyber Crime- A- Computer as a target  Unauthorized access to computer systems  Malicious software, etc. B- Online based Cyber Crime  Crime Identity theft  Internet scams  Cyber stalking, etc.
  • 6. Reasons Of Cyber Crime Complexity Of System Negligence Of Protection Loss Of Cyber Evidence Capacity to store the data in very small space Easy To Access
  • 7. Acc. To ITA-2000 Some Crimes And Their Punishment Section Offences Punishment 65 Tampering with computer source documents Imprisonment up to three years, or/and with fine up to Rs. 200,000 66 Hacking with computer system Imprisonment up to three years, or/and with fine up to Rs. 500,000 66B Receiving stolen computer or communication device Imprisonment up to three years, or/and with fine up to Rs.100,000 66C Using password of another person Imprisonment up to three years, or/and with fine up to Rs. 100,000 66D Cheating using computer resource Imprisonment up to three years, or/and with fine up to Rs.100,000
  • 8. Sectio n Offence Punishmemt 66E Publishing private images of others Imprisonment up to three years, or/and with fine up to Rs. 200,000 66F Acts of cyber terrorism Imprisonment up to life 67 Publishing information which is obscene in electronic form Imprisonment up to five years, or/and with fine up to Rs. 1,000,000 67A Publishing images containing sexual acts Imprisonment up to seven years, or/and with fine up to Rs. 1,000,000 67B Publishing child porn or predation children online Imprisonment up to five years, or/and with fine up to Rs. 1,000,000 on first conviction. Imprisonment up to seven years, or/and with fine up to Rs. 1,000,000 on second conviction. 70 Securing access or attempting to secure access to a protected system Imprisonment up to ten years, or/and with fine. 71 Misrepresentation Imprisonment up to three years, or/and with fine up to Rs. 100,000
  • 9. Investigation Of Malicious Application  A- Collection- Tools – I. Cameras for photo and video II. Cardboard boxes III. Notepads IV. Gloves V. Nonmagnetic tools VI. Antistatic bags VII. Permanent markers, etc
  • 10. Assess the Situation  Situation1- The monitor is on. It displays a program, application, work product, picture, E-mail, or Internet site on the screen.  Situation 2-The monitor is on and a screen saver or picture is visible.  Situation 3- The monitor is on, however, the display is blank as if the monitor is off.  Situation 4a-The monitor is powered off. The display is blank.  Situation 4b-The monitor is powered off. The display is blank.  Situation 5- The monitor is on. The display is blank.  If the Computer is OFF  If the computer is ON
  • 11. Seizure Procedure Of Digital Mediums secure physical scene secure digital scene seize all hardware and media document , label and package to delivery for lab at the lab, all seized data is analyzed digital media identification minimize the crime scene by prioritizing the physical media seizure of storage device and media
  • 12. Securing The Scene  When securing and evaluating the scene, the first responder should—  Follow departmental policy .  Immediately secure all electronic devices, including personal or portable devices.  Ensure that no unauthorized person has access to any electronic devices at the crime scene.  Refuse offers of help or technical assistance from any unauthorized persons.  Remove all persons from the crime scene or the immediate area from which evidence is to be collected.  Ensure that the condition of any electronic device is not altered.  Leave a computer or electronic device off if it is already turned off.
  • 13. Documenting The Scene  Documentation of a crime scene creates a record for the investigation.  Includes a detailed record using video, photography, notes & sketches to help recreate the details.  Some circumstances may not permit first responders to collect all electronic devices or components at a scene or location.
  • 14. Transportation When transporting digital evidence, the first responder should—  Keep digital evidence as If the Computer Is OFF  Avoid keeping digital evidence in a vehicle for prolonged periods of time. Heat, cold, and humidity can damage or destroy digital evidence.  Ensure that computers and electronic devices are packaged and secured during transportation to prevent damage from shock and vibration.  Document the transportation of the digital evidence and maintain the chain of custody on all evidence transported.
  • 15. Data Acquisition(Data Logger)  It is an information system that collects, stores and distributes information. All data acquisition systems consist of three essential elements- Sensor Signal Conditioning Analog
  • 16. Data Analysis  Initially we need to analyze the evidences which we gathered and examined.  By the outcomes of those analyses, we will come to know whether any malicious activities are presented or not.  In order to find the malicious code capabilities and its aim, we have to do the malware executable analysis. The malware executable analysis can be divided into Static Analysis and Behavioral Analysis.
  • 17. Reporting  The report is compilation of all the documentation, evidence from the examinations, and the analysis.  The report needs to contain the documentation of all the systems analyzed, the tools used, and the discoveries made.  contain the documentation of all the systems analyzed, the tools used, and the discoveries made.  The report needs to have the dates and times of the analysis, and detailed results. The report may be the most important phase of digital forensics
  • 18. Conclusion  Cyber is indeed getting the recognition it deserves. However, it is not going to restricted that easily. In fact, it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us a safer we must need cyber security.
  • 19. References-  Dr. R. K. Tiwari, P. K. Sartry and K. V. R. Kumar/Computer Crimes And Computer Forensics.  David W. Hagy/Electronic Crime Scene Investigation:- A Guide for first Responder.  Anthony Reyes/Cyber Crime Investigation.  Marjie T. Britz/ Computer Forensics And Cyber crime.