Computer forensics once specialized is now mainstream due to our total dependence on data. Experts deal not only with computer related crime such as hacking, software piracy, and viruses but also with conventional crimes including fraud, embezzlement, organized crime and child pornography.
"How private is your privacy" is a descriptive travel from history into recent incidents that triggered an unbelievable ignorance towards the value of one's virtual privacy.
Computer forensics once specialized is now mainstream due to our total dependence on data. Experts deal not only with computer related crime such as hacking, software piracy, and viruses but also with conventional crimes including fraud, embezzlement, organized crime and child pornography.
"How private is your privacy" is a descriptive travel from history into recent incidents that triggered an unbelievable ignorance towards the value of one's virtual privacy.
Companies are generally very good at protecting themselves against external attacks, but only rarely do they guard themselves against internal attacks. By using what’s known as ‘Social Engineering’, hackers exploit unsuspecting people who in good faith open up their doors to unwanted strangers.
Social engineering, or SE, is the art of manipulating people into performing actions or so they give up confidential information. Social Engineering can mean different things to different people.
Index
Top Cyber Crimes
What is OSINT
Resource For OSINT
Goal - OSINT
Information Gathering
Analysis
Career as a Digital Forensics Investigator
Case Study - Malaysian Airlines Flight MH17
OSINT Process
Confidential Data of GOV
Preventive Measures
www.fomada.com
Presented By Syed Amoz: CEO Fomada
Companies are generally very good at protecting themselves against external attacks, but only rarely do they guard themselves against internal attacks. By using what’s known as ‘Social Engineering’, hackers exploit unsuspecting people who in good faith open up their doors to unwanted strangers.
Social engineering, or SE, is the art of manipulating people into performing actions or so they give up confidential information. Social Engineering can mean different things to different people.
Index
Top Cyber Crimes
What is OSINT
Resource For OSINT
Goal - OSINT
Information Gathering
Analysis
Career as a Digital Forensics Investigator
Case Study - Malaysian Airlines Flight MH17
OSINT Process
Confidential Data of GOV
Preventive Measures
www.fomada.com
Presented By Syed Amoz: CEO Fomada
Kaspersky North American Virus Analyst SummitPR Americas
Kaspersky Lab analysts are seeing over 50,000 new malware threats per day in the lab. The best defense against these threats is knowledge. Our Global Research and Analysis Team provided succinct presentations and discussion about the latest Internet threats that exist today, and offered tips to protect attendees from cybercriminals. These presentations provided a greater understanding of the threat landscape and what to expect throughout the rest of 2010.
This presentation for discuss the various laws related to computer crime. That is important information that
technical people probably know little about, and of which even law-enforcement
officers may need more in-depth knowledge, but in which most attorneys would
already be well versed. If any aspect of your work brings you into contact with
computer crime, then this book is for you. It is also appropriate for college
courses on computer crime.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Cybercrime (1)
1. Cyber Crime – “Is theCyber Crime – “Is the
Internet the new “Internet the new “WWildild
WWildild WWest?”est?”
Prepared for the Southern MassachusettsPrepared for the Southern Massachusetts
E-Commerce NetworkE-Commerce Network
Nov 5 2004Nov 5 2004
byby
Suzanne MelloSuzanne Mello
www.suzannemello.comwww.suzannemello.com
2. E-Commerce Network - Suzanne Mello - Nov 5 2004
In the News…….In the News…….
1 out of 5 children received a1 out of 5 children received a
sexual solicitation or approachsexual solicitation or approach
over the Internet in a one-yearover the Internet in a one-year
period of timeperiod of time
(www.missingchildren.com)(www.missingchildren.com)
California warns of massive IDCalifornia warns of massive ID
theft – personal data stolen fromtheft – personal data stolen from
computers at University ofcomputers at University of
California, Berkeley (Oct 21, 2004California, Berkeley (Oct 21, 2004
IDG news service)IDG news service)
Microsoft and Cisco announced aMicrosoft and Cisco announced a
new initiative to work together tonew initiative to work together to
increase internet securityincrease internet security
(Oct 18, 2004(Oct 18, 2004
www.cnetnews.com)www.cnetnews.com)
3. E-Commerce Network - Suzanne Mello - Nov 5 2004
The New Wild Wild WestThe New Wild Wild West
More cyber criminals thanMore cyber criminals than
cyber copscyber cops
Criminals feel “safe”Criminals feel “safe”
committing crimes fromcommitting crimes from
the privacy of their ownthe privacy of their own
homeshomes
Brand new challengesBrand new challenges
facing law enforcementfacing law enforcement
Most not trained in theMost not trained in the
technologiestechnologies
Internet crimes spanInternet crimes span
multiple jurisdictionsmultiple jurisdictions
Need to retrofit new crimesNeed to retrofit new crimes
to existing lawsto existing laws
4. E-Commerce Network - Suzanne Mello - Nov 5 2004
Computer CrimeComputer Crime
Computer used to commitComputer used to commit
a crimea crime
Child porn, threateningChild porn, threatening
email, assumingemail, assuming
someone’s identity, sexualsomeone’s identity, sexual
harassment, defamation,harassment, defamation,
spam, phishingspam, phishing
Computer as a target of aComputer as a target of a
crimecrime
Viruses, worms, industrialViruses, worms, industrial
espionage, software piracy,espionage, software piracy,
hackinghacking
5. E-Commerce Network - Suzanne Mello - Nov 5 2004
Computer ForensicsComputer Forensics
What is it?What is it?
an autopsy of a computer or network toan autopsy of a computer or network to
uncover digital evidence of a crimeuncover digital evidence of a crime
Evidence must be preserved and hold upEvidence must be preserved and hold up
in a court of lawin a court of law
Growing field – Many becomingGrowing field – Many becoming
computer forensic savvycomputer forensic savvy
FBI, State and Local Police, IRS,FBI, State and Local Police, IRS,
Homeland SecurityHomeland Security
Defense attorneys, judges andDefense attorneys, judges and
prosecutorsprosecutors
Independent security agenciesIndependent security agencies
White hat or Ethical HackersWhite hat or Ethical Hackers
Programs offered at major universitiesPrograms offered at major universities
such as URIsuch as URI
http://homepage.cs.uri.edu/faculty/wolfe/cfhttp://homepage.cs.uri.edu/faculty/wolfe/cf
6. E-Commerce Network - Suzanne Mello - Nov 5 2004
Uncovering Digital EvidenceUncovering Digital Evidence
Smart Criminals don’t use theirSmart Criminals don’t use their
own computersown computers
Floppy disksFloppy disks
Zip/Jazz disksZip/Jazz disks
TapesTapes
Digital camerasDigital cameras
Memory sticksMemory sticks
PrintersPrinters
CDsCDs
PDAsPDAs
Game boxesGame boxes
NetworksNetworks
Hard drivesHard drives
7. E-Commerce Network - Suzanne Mello - Nov 5 2004
Digital EvidenceDigital Evidence
Criminals Hide EvidenceCriminals Hide Evidence
Delete their files and emailsDelete their files and emails
Hide their files by encryption,Hide their files by encryption,
password protection, orpassword protection, or
embedding them in unrelatedembedding them in unrelated
files (dll, os etc)files (dll, os etc)
Use Wi-Fi networks and cyberUse Wi-Fi networks and cyber
cafes to cover their trackscafes to cover their tracks
Forensics Uncover EvidenceForensics Uncover Evidence
Restore deleted files and emails –Restore deleted files and emails –
they are still really there!they are still really there!
Find the hidden files throughFind the hidden files through
complex password, encryptioncomplex password, encryption
programs, and searchingprograms, and searching
techniquestechniques
Track them down through theTrack them down through the
digital trail - IP addresses to ISPsdigital trail - IP addresses to ISPs
to the offenderto the offender
Not obvious…….it’s most likely hidden on purpose
or needs to be unearthed by forensics experts
8. E-Commerce Network - Suzanne Mello - Nov 5 2004
The Crime SceneThe Crime Scene
(with Computer Forensics)(with Computer Forensics)
Similar to traditional crime scenesSimilar to traditional crime scenes
Must acquire the evidence whileMust acquire the evidence while
preserving the integrity of thepreserving the integrity of the
evidenceevidence
No damage during collection,No damage during collection,
transportation, or storagetransportation, or storage
Document everythingDocument everything
Collect everything the first timeCollect everything the first time
Establish a chain of custodyEstablish a chain of custody
But also different…….But also different…….
Can perform analysis of evidence onCan perform analysis of evidence on
exact copy!exact copy!
Make many copies and investigateMake many copies and investigate
them without touching originalthem without touching original
Can use time stamping/hash codeCan use time stamping/hash code
techniques to prove evidence hasn’ttechniques to prove evidence hasn’t
been compromisedbeen compromised
9. Top Cyber Crimes thatTop Cyber Crimes that
Attack BusinessAttack Business
SpamSpam
Viruses/WormsViruses/Worms
Industrial Espionage and HackersIndustrial Espionage and Hackers
Wi-Fi High JackingWi-Fi High Jacking
10. E-Commerce Network - Suzanne Mello - Nov 5 2004
SpamSpam
““Spam accounts for 9 out of every 10Spam accounts for 9 out of every 10
emails in the United States.”emails in the United States.”
MessageLabs, Inc., an email managementMessageLabs, Inc., an email management
and security company based in Newand security company based in New
York.York.
““We do not object to the use of this slangWe do not object to the use of this slang
term to describe UCE (unsolicitedterm to describe UCE (unsolicited
commercial email), although we docommercial email), although we do
object to the use of the word “spam” asobject to the use of the word “spam” as
a trademark and the use of our producta trademark and the use of our product
image in association with that term”image in association with that term”
www.hormel.comwww.hormel.com
11. E-Commerce Network - Suzanne Mello - Nov 5 2004
Can-Spam Act of 2003Can-Spam Act of 2003
Controlling the Assault of Non-Solicited Pornography and MarketingControlling the Assault of Non-Solicited Pornography and Marketing
Act (Can-Spam)Act (Can-Spam)
Signed into law by President Bush on Dec 16, 2003Signed into law by President Bush on Dec 16, 2003
Took effect Jan 1, 2004Took effect Jan 1, 2004
Unsolicited commercial email must:Unsolicited commercial email must:
Be labeledBe labeled
Include Opt-Out instructionsInclude Opt-Out instructions
No false headersNo false headers
FTC is authorized (but not required) to establish a “do-not-email”FTC is authorized (but not required) to establish a “do-not-email”
registryregistry
www.spamlaws.com –lists all the latest in federal, state, andwww.spamlaws.com –lists all the latest in federal, state, and
international lawsinternational laws
12. Suzanne Mello - Nov 5 2004
Spam is HostileSpam is Hostile
You pay for Spam, not SpammersYou pay for Spam, not Spammers
Email costs are paid by emailEmail costs are paid by email
recipientsrecipients
Spam can be dangerousSpam can be dangerous
Never click on the opt-out link!Never click on the opt-out link!
May take you to hostile web siteMay take you to hostile web site
where mouse-over downloadswhere mouse-over downloads
an .exean .exe
Tells spammers they found aTells spammers they found a
working addressworking address
They won’t take you off the listThey won’t take you off the list
anywayanyway
What should you do?What should you do?
Filter it out whenever possibleFilter it out whenever possible
Keep filters up to dateKeep filters up to date
If you get it, just delete the emailIf you get it, just delete the email
13. E-Commerce Network - Suzanne Mello - Nov 5 2004
Viruses and WormsViruses and Worms
Different types of “ailments”Different types of “ailments”
VirusesViruses
software that piggybacks onsoftware that piggybacks on
other software and runs whenother software and runs when
you run something elseyou run something else
Macro in excel, wordMacro in excel, word
Transmitted through sharingTransmitted through sharing
programs on bulletin boardsprograms on bulletin boards
Passing around floppy disksPassing around floppy disks
An .exe, .com file in your emailAn .exe, .com file in your email
WormsWorms
software that uses computersoftware that uses computer
networks to find security holesnetworks to find security holes
to get in to your computer –to get in to your computer –
usually in Microsoft OS!! Butusually in Microsoft OS!! But
worm for MAC was recentlyworm for MAC was recently
writtenwritten
14. E-Commerce Network - Suzanne Mello - Nov 5 2004
Hackers are EverywhereHackers are Everywhere
Stealing dataStealing data
Industrial EspionageIndustrial Espionage
Identity theftIdentity theft
DefamationDefamation
Deleting data for funDeleting data for fun
A lot of bored 16 year olds late atA lot of bored 16 year olds late at
nightnight
Turning computers into zombiesTurning computers into zombies
To commit crimesTo commit crimes
Take down networksTake down networks
Distribute pornDistribute porn
Harass someoneHarass someone
Ethical/white hat hackers exist tooEthical/white hat hackers exist too
Help break into networks toHelp break into networks to
prevent crimesprevent crimes
Mafia Boy
15. E-Commerce Network - Suzanne Mello - Nov 5 2004
Wireless Fidelity (Wi-Fi)Wireless Fidelity (Wi-Fi)
Using antennas to create “hot spots”Using antennas to create “hot spots”
Hotspots – Internet Access (sometimes free)Hotspots – Internet Access (sometimes free)
Newport Harbor - All the boats in Harbor have internet accessNewport Harbor - All the boats in Harbor have internet access
San Francisco Giants Stadium – Surf the web while catching aSan Francisco Giants Stadium – Surf the web while catching a
gamegame
UMass (need to register, but it’s free)UMass (need to register, but it’s free)
Cambridge, MACambridge, MA
Philadelphia, PA – just announced – entire city by 2006Philadelphia, PA – just announced – entire city by 2006
16. E-Commerce Network - Suzanne Mello - Nov 5 2004
Wi-Fi High JackingWi-Fi High Jacking
60-70% wireless networks are wide open60-70% wireless networks are wide open
Why are the Wi-Fi networks unprotected?Why are the Wi-Fi networks unprotected?
Most people say “Our data is boring”Most people say “Our data is boring”
But… criminals look for wireless networks to commitBut… criminals look for wireless networks to commit
their crimestheir crimes
And… the authorities will come knocking on yourAnd… the authorities will come knocking on your
door…..door…..
17. E-Commerce Network - Suzanne Mello - Nov 5 2004
Protect your Computers!Protect your Computers!
Use anti-virus software andUse anti-virus software and
firewalls - keep them up to datefirewalls - keep them up to date
Keep your operating system up toKeep your operating system up to
date with critical security updatesdate with critical security updates
and patchesand patches
Don't open emails or attachmentsDon't open emails or attachments
from unknown sourcesfrom unknown sources
Use hard-to-guess passwords.Use hard-to-guess passwords.
Don’t use words found in aDon’t use words found in a
dictionary. Remember thatdictionary. Remember that
password cracking tools existpassword cracking tools exist
Back-up your computer data onBack-up your computer data on
disks or CDs oftendisks or CDs often
Don't share access to yourDon't share access to your
computers with strangerscomputers with strangers
IfIf you have a wi-fi network,you have a wi-fi network,
password protect itpassword protect it
Disconnect from the InternetDisconnect from the Internet
when not in usewhen not in use
Reevaluate your security on aReevaluate your security on a
regular basisregular basis
Make sure your employees andMake sure your employees and
family members know this infofamily members know this info
too!too!
19. E-Commerce Network - Suzanne Mello - Nov 5 2004
Web sites of InterestWeb sites of Interest
http://homepage.cs.uri.edu/faculty/wolfe/cfhttp://homepage.cs.uri.edu/faculty/wolfe/cf
www.missingchildren.comwww.missingchildren.com
www.spamlaws.comwww.spamlaws.com
www.netsmartz.orgwww.netsmartz.org
http://www.ifccfbi.gov - operation web snare – latesthttp://www.ifccfbi.gov - operation web snare – latest
cyber crimes to be aware ofcyber crimes to be aware of
http://www.dcfl.gov/dc3/home.htmhttp://www.dcfl.gov/dc3/home.htm
http://www.cops.org/http://www.cops.org/