SlideShare a Scribd company logo
1 of 40
N.Sai Kiran,
IIIT Allahabad.
 About  Hackers
 Business Response
 Introduction to Forensic science
 Basic Concepts
 Basic cyber crime investigation tool
 Firewalls
 Child pornography
 Precautions
 “Cyber   crime may be said to be those
    species, of which, genus is the conventional
    crime, and where either the computer is an
    object or subject of the conduct constituting
    crime”
Old WINE IN NEW BOTTLES.
o   Hackers
o   Crackers
o   Cyber terrorists
 The   challenge... „because it‟s there!‟
 Ego
 Espionage
 Ideology
 Mischief
 Money (extortion or theft)
 Revenge
 Predominantly  male
 Aged from mid-teens to mid-twenties
 Lacking in social skills
 Fascination or obsession with computers
 Underachiever in other areas who sees
  computing as a means of being important or
  powerful
                       Discontented
                       employees
Service                             %
Adult Content (XXX)                 50
Online Services                     19
Direct Marketing – Other            11
Direct Marketing – Catalogue        10
Gaming                               5
Books                                3
Other                                2
Total                              100


                               9
“If you have to teach ethics it’s too late”
 There   is no plan for review logs or scan
  for unusual activity.
 Physical access is not controlled in a
  consistent manner.
 If an intrusion detected or ever suspected
  there is no procedure designed to deal
  with it.
Why should you care?
Administrative precautions

Physical precautions

Information systems
 Forensic science is the application of a
  broad spectrum of sciences to answer
  questions of interest to a legal system.
 This may be in relation to a crime or a civil
  action.
   Computer forensics is a branch of digital
    forensic science pertaining to legal evidence
    found in computers and digital storage media.

   The goal of computer forensics is to examine
    digital media in a forensically sound manner with
    the aim of identifying, preserving, recovering,
    analyzing and presenting facts and opinions
    about the information.
 Protect
 Discover
 Recover
 Reveal
 Access
 Analyze
 Print
 Provide   Expert Consultation.
 In the mind of a normal computer user, once
  data is deleted, it is accepted that it is no
  longer in existence.
 On the other hand, the CFS should
  understand that the data could still exist in
  some other form or area on the storage
  medium
 Disk   Imaging
 Hashing
 Message Digest 5 (MD5)
 Secure Hash Algorithm (SHA)
PC        Encase Forensic   FTK imager
                      Inspector        tool kit
File data discovery   SE        SE     SNR        SE

File data recovery    SNR       SNR    NS         SNR

Reveal file contents SNR        SE     SNR        SNR

File access and       SNR       SE     SNR        SNR
analysis
Imaging               NS        SE     NS         SE

MD5                   NS        SE     SE         SE

SHA1                  NS        NS     SE         SE

Summary print out     NS        SE     SNR        SE
 PC   Inspector File Recovery

 Encase


 Forensic   Tool Kit

 FTK   Imager
   Window GUI Technology base Forensic Software for examination
    of File systems FAT12, FAT16, FAT32, NTFS, LINUX, UNIX,
    MACINTOSH, CDROM and DVD-R.
   It should able to examine and extracting slack space.
   It should be able to create image of the storage media e.g. hard
    disk, Floppy disk.
   It should show emails in developer‟s format. (With headers and
    attachments)
   It should open document in language other English spouted by
    Unicode e.g. Arabian language.
   It should show Internet history.
   Forensic Cell phone Seizure kit with write block facility and will
    all required cables and adapters.
   Forensic Hardware: One computer PIV 3.2 GHz with 1 GB DDR
    RAM and other required peripheral
   One hard disk write block device
Robust operating system software
 Other application software facilitating word
  processing, spread sheet, electronic mails,
  multimedia, imaging and for identifying various other
  kinds of file formats during the course of examination
 Case management software for keeping records of the
  cases being examined and for tracking case details at
  short notice
 Bootable disks to let the forensic specialist boot from
  such disks instead of the suspect‟s bootable disk
 Bit-stream back up of data
  The forensic procedure prohibits
  examination of the original media
  to prevent any accidental erasure
  or interference during examination
  of such media.
 Powerful password recovery tool
   Recovery of deleted data, image and
    multimedia among other kinds of files .

   For generating reports based on the
    analysis of the information contained on
    the suspect storage media
 Searching tool for locating folders and
files on the suspect storage media.
 Firewall
         protection as well as intrusion
 detection

 Use   of spyware prevention

 Intrusion   detection systems
 Firewalls help protect the perimeter
  of your network (the hard candy
  shell).
 The “soft chewy centre” needs
  protection too.
 Firewalls can and are compromised.
   Identification

   Authentication

   The person can be identified and authenticated
    by
          what he knows
          by what he owns
          by his human characteristics (biometrics).
Biometric technologies are applied in the
  following sectors:
 Pubic Services,
 Law Enforcement,
 Banking,
 Physical Access Control and
 Computer & Networks.
 1. Signature Verification
 2. Iris Analysis
 3. Facial Analysis
 4. Fingerprint verification
 5. Hand Geometry
 6. Voice Verification
   Use false identity to trap
   contact children/teens in various chat rooms which are used by
    children/teen
   Befriend the child/teen.
   Extract personal information
   Gets the e-mail address of the child/teen and starts making
    contacts on the victimâ s e-mail address as well.
   Starts sending pornographic images/text

   Extract personal information from child/teen

   At the end of it, the pedophile set up a meeting with the
    child/teen out of the house
   Watch traffic to your site.

   Put & configure your firewall correctly.

   Develop your web content off line.

   Back up your web site after every update.

   Develop your web content off line.

   Protect your databases.

   Back up your web site after every update.
 Ensure physical security of equipment and
  storage devices
 Don't share identification numbers and passwords
 Monitor dial-up facilities
 Access to data
 virus protection software

             STAY UPDATED
 Avoid  disclosing
 Avoid sending any photograph online
  particularly to strangers
 Use latest and up dated anti virus software.
 Always keep back up volumes
 Never send your credit card number to any
  site that is not secured
 Always keep a watch on the sites that your
  children are accessing
 Use a security programme that gives control
  over the cookies
 It is not possible to eliminate cyber crime
  from the cyber space.
 It is quite possible to check them.
 History is the witness that no legislation has
  succeeded in totally eliminating crime from
  the globe
 The only possible step is to make people
  aware of their rights and duties
 Treatyour password like you treat
 your toothbrush. Never give it to
 anyone else to use, and change it
 every few months.
Unsafe to miss use
Quires?

More Related Content

What's hot

01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domainppd1961
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensicsMarco Alamanni
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - NotesKranthi
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaNew Horizons Bulgaria
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - NotesKranthi
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareFelipe Prado
 

What's hot (20)

01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
computer forensics
computer forensics computer forensics
computer forensics
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domain
 
cyber Forensics
cyber Forensicscyber Forensics
cyber Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensics
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Cs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qbCs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qb
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
 

Viewers also liked

Viewers also liked (11)

Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Basic about cyber crime, computer crime
Basic about cyber crime, computer crimeBasic about cyber crime, computer crime
Basic about cyber crime, computer crime
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 

Similar to N.sai kiran IIITA AP

Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh tManesh T
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsZyxware Technologies
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic InvestigatorAgape Inc
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)JIEMS Akkalkuwa
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)CA.Kolluru Narayanarao
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsdeaneal
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfGnanavi2
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop newforensicsnation
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshopforensicsnation
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics SlidesVarun Sehgal
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 

Similar to N.sai kiran IIITA AP (20)

Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh t
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Codebits 2010
Codebits 2010Codebits 2010
Codebits 2010
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 

Recently uploaded

Kolkata Call Girl Bara Bazar 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Bara Bazar 👉 8250192130 ❣️💯 Available With Room 24×7Kolkata Call Girl Bara Bazar 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Bara Bazar 👉 8250192130 ❣️💯 Available With Room 24×7Riya Pathan
 
Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...
Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...
Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...Apsara Of India
 
VIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service Gulbarga
VIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service GulbargaVIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service Gulbarga
VIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service GulbargaRiya Pathan
 
Call Girls In Karnal O8860008073 Sector 6 7 8 9 Karnal Escorts
Call Girls In Karnal O8860008073 Sector 6 7 8 9 Karnal EscortsCall Girls In Karnal O8860008073 Sector 6 7 8 9 Karnal Escorts
Call Girls In Karnal O8860008073 Sector 6 7 8 9 Karnal EscortsApsara Of India
 
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7Riya Pathan
 
↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...noor ahmed
 
Independent Hatiara Escorts ✔ 8250192130 ✔ Full Night With Room Online Bookin...
Independent Hatiara Escorts ✔ 8250192130 ✔ Full Night With Room Online Bookin...Independent Hatiara Escorts ✔ 8250192130 ✔ Full Night With Room Online Bookin...
Independent Hatiara Escorts ✔ 8250192130 ✔ Full Night With Room Online Bookin...Riya Pathan
 
Beyond Bar & Club Udaipur CaLL GiRLS 09602870969
Beyond Bar & Club Udaipur CaLL GiRLS 09602870969Beyond Bar & Club Udaipur CaLL GiRLS 09602870969
Beyond Bar & Club Udaipur CaLL GiRLS 09602870969Apsara Of India
 
Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...
Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...
Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...anamikaraghav4
 
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...aamir
 
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICEGV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICEApsara Of India
 
VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...
VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...
VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...Neha Kaur
 
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment Booking
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment BookingCall Girls in Barasat | 7001035870 At Low Cost Cash Payment Booking
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment Bookingnoor ahmed
 
(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escorts
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur EscortsVIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escorts
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...Riya Pathan
 
(KRITI) Pimpri Chinchwad Call Girls Just Call 7001035870 [ Cash on Delivery ]...
(KRITI) Pimpri Chinchwad Call Girls Just Call 7001035870 [ Cash on Delivery ]...(KRITI) Pimpri Chinchwad Call Girls Just Call 7001035870 [ Cash on Delivery ]...
(KRITI) Pimpri Chinchwad Call Girls Just Call 7001035870 [ Cash on Delivery ]...ranjana rawat
 
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...noor ahmed
 
College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...
College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...
College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...perfect solution
 

Recently uploaded (20)

Kolkata Call Girl Bara Bazar 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Bara Bazar 👉 8250192130 ❣️💯 Available With Room 24×7Kolkata Call Girl Bara Bazar 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Bara Bazar 👉 8250192130 ❣️💯 Available With Room 24×7
 
Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...
Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...
Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...
 
VIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service Gulbarga
VIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service GulbargaVIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service Gulbarga
VIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service Gulbarga
 
Call Girls In Karnal O8860008073 Sector 6 7 8 9 Karnal Escorts
Call Girls In Karnal O8860008073 Sector 6 7 8 9 Karnal EscortsCall Girls In Karnal O8860008073 Sector 6 7 8 9 Karnal Escorts
Call Girls In Karnal O8860008073 Sector 6 7 8 9 Karnal Escorts
 
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7
 
↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...
 
Call Girls Chirag Delhi Delhi WhatsApp Number 9711199171
Call Girls Chirag Delhi Delhi WhatsApp Number 9711199171Call Girls Chirag Delhi Delhi WhatsApp Number 9711199171
Call Girls Chirag Delhi Delhi WhatsApp Number 9711199171
 
Independent Hatiara Escorts ✔ 8250192130 ✔ Full Night With Room Online Bookin...
Independent Hatiara Escorts ✔ 8250192130 ✔ Full Night With Room Online Bookin...Independent Hatiara Escorts ✔ 8250192130 ✔ Full Night With Room Online Bookin...
Independent Hatiara Escorts ✔ 8250192130 ✔ Full Night With Room Online Bookin...
 
Beyond Bar & Club Udaipur CaLL GiRLS 09602870969
Beyond Bar & Club Udaipur CaLL GiRLS 09602870969Beyond Bar & Club Udaipur CaLL GiRLS 09602870969
Beyond Bar & Club Udaipur CaLL GiRLS 09602870969
 
Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...
Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...
Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...
 
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...
 
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICEGV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
 
VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...
VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...
VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...
 
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment Booking
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment BookingCall Girls in Barasat | 7001035870 At Low Cost Cash Payment Booking
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment Booking
 
(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escorts
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur EscortsVIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escorts
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escorts
 
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...
 
(KRITI) Pimpri Chinchwad Call Girls Just Call 7001035870 [ Cash on Delivery ]...
(KRITI) Pimpri Chinchwad Call Girls Just Call 7001035870 [ Cash on Delivery ]...(KRITI) Pimpri Chinchwad Call Girls Just Call 7001035870 [ Cash on Delivery ]...
(KRITI) Pimpri Chinchwad Call Girls Just Call 7001035870 [ Cash on Delivery ]...
 
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
 
College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...
College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...
College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...
 

N.sai kiran IIITA AP

  • 2.
  • 3.
  • 4.
  • 5.  About Hackers  Business Response  Introduction to Forensic science  Basic Concepts  Basic cyber crime investigation tool  Firewalls  Child pornography  Precautions
  • 6.  “Cyber crime may be said to be those species, of which, genus is the conventional crime, and where either the computer is an object or subject of the conduct constituting crime” Old WINE IN NEW BOTTLES. o Hackers o Crackers o Cyber terrorists
  • 7.  The challenge... „because it‟s there!‟  Ego  Espionage  Ideology  Mischief  Money (extortion or theft)  Revenge
  • 8.  Predominantly male  Aged from mid-teens to mid-twenties  Lacking in social skills  Fascination or obsession with computers  Underachiever in other areas who sees computing as a means of being important or powerful Discontented employees
  • 9. Service % Adult Content (XXX) 50 Online Services 19 Direct Marketing – Other 11 Direct Marketing – Catalogue 10 Gaming 5 Books 3 Other 2 Total 100 9
  • 10. “If you have to teach ethics it’s too late”
  • 11.  There is no plan for review logs or scan for unusual activity.  Physical access is not controlled in a consistent manner.  If an intrusion detected or ever suspected there is no procedure designed to deal with it.
  • 12. Why should you care?
  • 13.
  • 15.  Forensic science is the application of a broad spectrum of sciences to answer questions of interest to a legal system.  This may be in relation to a crime or a civil action.
  • 16. Computer forensics is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media.  The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information.
  • 17.  Protect  Discover  Recover  Reveal  Access  Analyze  Print  Provide Expert Consultation.
  • 18.  In the mind of a normal computer user, once data is deleted, it is accepted that it is no longer in existence.  On the other hand, the CFS should understand that the data could still exist in some other form or area on the storage medium
  • 19.  Disk Imaging  Hashing  Message Digest 5 (MD5)  Secure Hash Algorithm (SHA)
  • 20. PC Encase Forensic FTK imager Inspector tool kit File data discovery SE SE SNR SE File data recovery SNR SNR NS SNR Reveal file contents SNR SE SNR SNR File access and SNR SE SNR SNR analysis Imaging NS SE NS SE MD5 NS SE SE SE SHA1 NS NS SE SE Summary print out NS SE SNR SE
  • 21.  PC Inspector File Recovery  Encase  Forensic Tool Kit  FTK Imager
  • 22. Window GUI Technology base Forensic Software for examination of File systems FAT12, FAT16, FAT32, NTFS, LINUX, UNIX, MACINTOSH, CDROM and DVD-R.  It should able to examine and extracting slack space.  It should be able to create image of the storage media e.g. hard disk, Floppy disk.  It should show emails in developer‟s format. (With headers and attachments)  It should open document in language other English spouted by Unicode e.g. Arabian language.  It should show Internet history.  Forensic Cell phone Seizure kit with write block facility and will all required cables and adapters.  Forensic Hardware: One computer PIV 3.2 GHz with 1 GB DDR RAM and other required peripheral  One hard disk write block device
  • 23. Robust operating system software  Other application software facilitating word processing, spread sheet, electronic mails, multimedia, imaging and for identifying various other kinds of file formats during the course of examination  Case management software for keeping records of the cases being examined and for tracking case details at short notice  Bootable disks to let the forensic specialist boot from such disks instead of the suspect‟s bootable disk
  • 24.  Bit-stream back up of data The forensic procedure prohibits examination of the original media to prevent any accidental erasure or interference during examination of such media.  Powerful password recovery tool
  • 25. Recovery of deleted data, image and multimedia among other kinds of files .  For generating reports based on the analysis of the information contained on the suspect storage media Searching tool for locating folders and files on the suspect storage media.
  • 26.  Firewall protection as well as intrusion detection  Use of spyware prevention  Intrusion detection systems
  • 27.  Firewalls help protect the perimeter of your network (the hard candy shell).  The “soft chewy centre” needs protection too.  Firewalls can and are compromised.
  • 28. Identification  Authentication  The person can be identified and authenticated by  what he knows  by what he owns  by his human characteristics (biometrics).
  • 29. Biometric technologies are applied in the following sectors:  Pubic Services,  Law Enforcement,  Banking,  Physical Access Control and  Computer & Networks.
  • 30.  1. Signature Verification  2. Iris Analysis  3. Facial Analysis  4. Fingerprint verification  5. Hand Geometry  6. Voice Verification
  • 31. Use false identity to trap  contact children/teens in various chat rooms which are used by children/teen  Befriend the child/teen.  Extract personal information  Gets the e-mail address of the child/teen and starts making contacts on the victimâ s e-mail address as well.
  • 32. Starts sending pornographic images/text  Extract personal information from child/teen  At the end of it, the pedophile set up a meeting with the child/teen out of the house
  • 33.
  • 34. Watch traffic to your site.  Put & configure your firewall correctly.  Develop your web content off line.  Back up your web site after every update.  Develop your web content off line.  Protect your databases.  Back up your web site after every update.
  • 35.  Ensure physical security of equipment and storage devices  Don't share identification numbers and passwords  Monitor dial-up facilities  Access to data  virus protection software STAY UPDATED
  • 36.  Avoid disclosing  Avoid sending any photograph online particularly to strangers  Use latest and up dated anti virus software.  Always keep back up volumes  Never send your credit card number to any site that is not secured  Always keep a watch on the sites that your children are accessing  Use a security programme that gives control over the cookies
  • 37.  It is not possible to eliminate cyber crime from the cyber space.  It is quite possible to check them.  History is the witness that no legislation has succeeded in totally eliminating crime from the globe  The only possible step is to make people aware of their rights and duties
  • 38.  Treatyour password like you treat your toothbrush. Never give it to anyone else to use, and change it every few months.