Information Security & Forensics
CICRA Pathway to Deakin Degree
Professional Diploma in Network and Systems Administration
Tharindu Weerasinghe
www.tharinduweerasinghe.com
Overview
* Computer Privacy
* Hacking and Ethical Hacking
* Computer Crimes and Forensic Investigations
Computer Privacy
* It is about your/ your computer's identity.
* It is about your private and confidential data.
* The security of your data is important when you
share your data over the network; hence you need
your privacy been protected [1].
* Data privacy: Basically you need to decide what
Computer Privacy
* It is about your/ your computer's identity.
* It is about your private and confidential data.
* The security of your data is important when you
share your data over the network; hence you need
your privacy been protected [1].
* Data privacy: Basically you need to decide what
data to be shared and what not! [2]
Hacking
*Accessing data/computer infrastructure without
the owner's concession.
*Hacking is illegal but it needs a lot of talent in
programming, scripting, networking knowledge
together with Information Security knowledge.
*Good hackers and good programmers and
analysts.
Ethical Hacking
* Hacking a computer system/ network/enterprise
solution with proper authority from the
management of the particular system/organization
* Follow the same steps of a hacker to identify the
security loop wholes.
Ethical Hacking (contd)
* Steps involved [3]:
1. Reconnaissance
2. Scanning
3. Access and Escalation
4. Ex-filtration
5. Sustainment
6. Assault
7. Obfuscation
BLACK, WHITE & GRAY HAT
Hacking?
* Black hat: What we know as hacking; an attacker illegally
accesses a system – a crime
* White hat: Ethical; has permission to do so; typically a
paid job
*Gray hat: Neither black nor white :) Has no permission but
no harm. Points out the issues after hacking!
Computer Crimes
* Same as hacking but it is more than hacking!
* Illegally access information of an organization or a person
and do harmful things.
Examples [4]:
* Cyber terror
* DoS
* Frauds
* Espionage
Forensic Investigations
* Investigating how a cyber crime happened
* Cyber Security Experts handling these
* Need to know all aspects of information and network
security.
Important Info
EC Council (for Cyber Security Professional Certifications)
https://www.eccouncil.org/
ISACA (related to IT governance)
https://www.isaca.org/pages/default.aspx
CISCO Security (for professional certifications)
http://www.cisco.com/security/
References – Mentioned with Thanks
[1] https://prezi.com/2o0va-8nbmce/what-is-computer-privacy/
[2] http://searchcio.techtarget.com/definition/data-privacy-information-privacy
[3] http://resources.infosecinstitute.com/the-seven-steps-of-a-successful-cyber-attack/#gref
[4] https://www.computerhope.com/jargon/c/compcrim.htm
Digital Information Literacy
CICRA Pathway to Deakin Degree
Professional Diploma in Network and Systems Administration
Tharindu Weerasinghe
www.tharinduweerasinghe.com
Information (Digital) Literacy
Know,
What are important information
When to apply
How to apply
Refer: [1]
Effective Search in Google
Quotated from one of my paper articles and also the initial
knowledge I got about these, from my CEH training with CICRA.
1. link:
Think that you want to find webpages that have link to a
particular web page then you can the keyword link:
Example: If I type link:www. tharinduweerasinghe.com in Google
Search Box then Google lists down all the web pages that have
links to the site mentioned in the search.
Effective Search (etc)
2. related:
If you need to list down all the web pages that are similar to
the one mentioned in the search box, then you can use the
above operator word.
3. info:
If you need to retrieve some information that Google has
regarding a particular web page then you can use this
keyword or the operator word.
Effective Search (etc)
4.site:
If you use site: syntax in your search query and specify a
site that should search your terms then it will list all
occurrences of the search term in that particular site.
Example Search: Tharindu Weerasinghe site:pdn.ac.lk
This will list all places that has my name in the Peradeniya University website
5.intitle:
This will list the documents containing the search term in
the title.
Example Search: Tharindu Weerasinghe
6.inurl:
This will list the documents containing the search term in
the URL (web address).
Academic Search
Engines/Databases
* Google Scholar
* WorldCat
* IEEE Xplore
* ACM Digital Library
Many more here....[3]
References – Mentioned with Thanks
[1] http://www.ala.org/acrl/standards/informationliteracycompetency
[2] https://www.pressreader.com/sri-lanka/daily-mirror-sri-lanka/20140519/282424167252171
[3] http://www.onlineuniversities.com/blog/2012/07/100-time-saving-search-engines-serious-scholars-revised/

Information Security and Forensics

  • 1.
    Information Security &Forensics CICRA Pathway to Deakin Degree Professional Diploma in Network and Systems Administration Tharindu Weerasinghe www.tharinduweerasinghe.com
  • 2.
    Overview * Computer Privacy *Hacking and Ethical Hacking * Computer Crimes and Forensic Investigations
  • 3.
    Computer Privacy * Itis about your/ your computer's identity. * It is about your private and confidential data. * The security of your data is important when you share your data over the network; hence you need your privacy been protected [1]. * Data privacy: Basically you need to decide what
  • 4.
    Computer Privacy * Itis about your/ your computer's identity. * It is about your private and confidential data. * The security of your data is important when you share your data over the network; hence you need your privacy been protected [1]. * Data privacy: Basically you need to decide what data to be shared and what not! [2]
  • 5.
    Hacking *Accessing data/computer infrastructurewithout the owner's concession. *Hacking is illegal but it needs a lot of talent in programming, scripting, networking knowledge together with Information Security knowledge. *Good hackers and good programmers and analysts.
  • 6.
    Ethical Hacking * Hackinga computer system/ network/enterprise solution with proper authority from the management of the particular system/organization * Follow the same steps of a hacker to identify the security loop wholes.
  • 7.
    Ethical Hacking (contd) *Steps involved [3]: 1. Reconnaissance 2. Scanning 3. Access and Escalation 4. Ex-filtration 5. Sustainment 6. Assault 7. Obfuscation
  • 8.
    BLACK, WHITE &GRAY HAT Hacking? * Black hat: What we know as hacking; an attacker illegally accesses a system – a crime * White hat: Ethical; has permission to do so; typically a paid job *Gray hat: Neither black nor white :) Has no permission but no harm. Points out the issues after hacking!
  • 9.
    Computer Crimes * Sameas hacking but it is more than hacking! * Illegally access information of an organization or a person and do harmful things. Examples [4]: * Cyber terror * DoS * Frauds * Espionage
  • 10.
    Forensic Investigations * Investigatinghow a cyber crime happened * Cyber Security Experts handling these * Need to know all aspects of information and network security.
  • 11.
    Important Info EC Council(for Cyber Security Professional Certifications) https://www.eccouncil.org/ ISACA (related to IT governance) https://www.isaca.org/pages/default.aspx CISCO Security (for professional certifications) http://www.cisco.com/security/
  • 12.
    References – Mentionedwith Thanks [1] https://prezi.com/2o0va-8nbmce/what-is-computer-privacy/ [2] http://searchcio.techtarget.com/definition/data-privacy-information-privacy [3] http://resources.infosecinstitute.com/the-seven-steps-of-a-successful-cyber-attack/#gref [4] https://www.computerhope.com/jargon/c/compcrim.htm
  • 13.
    Digital Information Literacy CICRAPathway to Deakin Degree Professional Diploma in Network and Systems Administration Tharindu Weerasinghe www.tharinduweerasinghe.com
  • 14.
    Information (Digital) Literacy Know, Whatare important information When to apply How to apply Refer: [1]
  • 15.
    Effective Search inGoogle Quotated from one of my paper articles and also the initial knowledge I got about these, from my CEH training with CICRA. 1. link: Think that you want to find webpages that have link to a particular web page then you can the keyword link: Example: If I type link:www. tharinduweerasinghe.com in Google Search Box then Google lists down all the web pages that have links to the site mentioned in the search.
  • 16.
    Effective Search (etc) 2.related: If you need to list down all the web pages that are similar to the one mentioned in the search box, then you can use the above operator word. 3. info: If you need to retrieve some information that Google has regarding a particular web page then you can use this keyword or the operator word.
  • 17.
    Effective Search (etc) 4.site: Ifyou use site: syntax in your search query and specify a site that should search your terms then it will list all occurrences of the search term in that particular site. Example Search: Tharindu Weerasinghe site:pdn.ac.lk This will list all places that has my name in the Peradeniya University website 5.intitle: This will list the documents containing the search term in the title. Example Search: Tharindu Weerasinghe 6.inurl: This will list the documents containing the search term in the URL (web address).
  • 18.
    Academic Search Engines/Databases * GoogleScholar * WorldCat * IEEE Xplore * ACM Digital Library Many more here....[3]
  • 19.
    References – Mentionedwith Thanks [1] http://www.ala.org/acrl/standards/informationliteracycompetency [2] https://www.pressreader.com/sri-lanka/daily-mirror-sri-lanka/20140519/282424167252171 [3] http://www.onlineuniversities.com/blog/2012/07/100-time-saving-search-engines-serious-scholars-revised/