SlideShare a Scribd company logo
1. How Networking Works
2. Network Penetration
3. Cyber Forensics
4. Forensic Evidence
5. Cyber Criminals
6. What do Forensic Experts do?
How Networking Works
 Networking is a technique of converting data into
electronic packets before transmission over a network
 Data is packaged into an IP (internet protocol) packet
and signed with the sender’s IP address as well as the
intended recipient’s IP address
 Routers/switches are used to route the data based
upon the sender and recipient addresses in the packet.
How Networking Works II
Source PC
IP: 192.168.0.5
Router
IP: 192.168.0.1
Destination
PC 1
IP: 192.168.0.6
Destination
PC 2
IP: 192.168.0.12
2
1
Consider a network setup as above. Where
would the data packet shown below travel, and
why?
Data Packet
Source IP: 192.168.0.5:29381
Destination IP: 192.168.0.6:80
Data: (some data)
Network Penetration
 Data in an IP packet is filled in by the sender – i.e. the
sender can alter the Source IP as required, thereby
‘spoofing’ the IP.
 MAC addresses are embedded into every network
device, but usually can be changed by software as well.
 If a spoofed IP packet is sent to any PC, tracing the
origin of the packet can be difficult.
Network Penetration II
Source PC
IP: 192.168.0.5
Router
IP: 192.168.0.1
Destination
PC 1
IP: 192.168.0.6
Destination
PC 2
IP: 192.168.0.12
Source PC spoofs PC 2’s IP address using the
data packet below. PC 1 assumes PC 2 sent the
packet, and sends a reply packet to PC 2.
Data Packet
Source IP: 192.168.0.12:29381
Destination IP: 192.168.0.6:80
Data: (some data)
To restrict such network
penetration, routers need to verify
the source and destination of all
packets traversing the network.
The Meaning of Forensics
 Network/Data security awareness has only lately
become of value, with billions worth of electronic
transactions going through the wide-open world of the
internet – a system that has zero in-built security
facilities.
 Cyber forensics is the application of information
technology and the vast know how of internet security
best practices to reduce damage, repair affected
systems, restore access and restrict vandalism – the
four great ‘R’s.
Forensic Evidence
 Forensics is the application of various sciences to
explain evidence in a legal scenario.
 Various legal environment have vastly different
practices for collection and presentation of evidence.
 Since Forensics essentially applies to a legal scenario,
‘evidence’ is an aspect that comes along with it. The
proper presentation of forensic evidence can be the
difference between a win and a loss in a court battle.
Cyber Criminals
 Usually are either seasoned professionals bitter with
the industry, or amateurs trying to make a show.
 Can use various penetration methods to access your
network
 Could use the internet as a medium for
sending/receiving information (and thus provide
another communication medium for terrorism)
 Essentially violate various privacy laws, piracy laws and
otherwise compromise data security
What do forensic experts do?
 Locate, identify and evaluate threats to network and
data security
 Analyze current security practices, and offer
recommendations on security best practices
 Help implement the 4 ‘R’s – reduce damage, repair
affected systems, restore access and restrict
vandalism – in the event of an attack
 Prepare forensic evidence in accordance with legal
requirements

More Related Content

What's hot

Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).Debasis Chowdhury
 
Intranets and Extranets
Intranets and ExtranetsIntranets and Extranets
Cyber Security Seminar Day 1
Cyber Security Seminar Day 1Cyber Security Seminar Day 1
Cyber Security Seminar Day 1
Apurv Singh Gautam
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
Anthony Daniel
 
Communication devices
Communication devicesCommunication devices
Communication devices
FazailAhmad2
 
Ransomware
RansomwareRansomware
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblinsDEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
Felipe Prado
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
Shitiz Upreti
 
Internet and intranet
Internet and intranetInternet and intranet
Internet and intranetRohit Kumar
 
Smart Print Analytics
Smart Print AnalyticsSmart Print Analytics
Smart Print Analytics
Paul O'Hagan
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
Farah M. Altufaili
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
Jake K.
 
6 security
6 security6 security
6 security
valency paul
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
Gosia Fraser
 
Presentation vpn
Presentation vpnPresentation vpn
Presentation vpn
Areeba Gill
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
Abrish06
 

What's hot (17)

Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
Week13
Week13Week13
Week13
 
Intranets and Extranets
Intranets and ExtranetsIntranets and Extranets
Intranets and Extranets
 
Cyber Security Seminar Day 1
Cyber Security Seminar Day 1Cyber Security Seminar Day 1
Cyber Security Seminar Day 1
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
Communication devices
Communication devicesCommunication devices
Communication devices
 
Ransomware
RansomwareRansomware
Ransomware
 
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblinsDEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Internet and intranet
Internet and intranetInternet and intranet
Internet and intranet
 
Smart Print Analytics
Smart Print AnalyticsSmart Print Analytics
Smart Print Analytics
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
 
6 security
6 security6 security
6 security
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Presentation vpn
Presentation vpnPresentation vpn
Presentation vpn
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 

Similar to Prelude to cyber forensics

Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Editor IJCATR
 
Network security
Network securityNetwork security
Network security
Ravikumar Natarajan
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
Mayank Diwakar
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
CA.Kolluru Narayanarao
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
Kolluru N Rao
 
CY.pptx
CY.pptxCY.pptx
CY.pptx
CATalyst9
 
Cyber security
Cyber securityCyber security
Cyber security
SAKSHIMAHADIK
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
RAVI RAJ
 
INT 1010 06-2.pdf
INT 1010 06-2.pdfINT 1010 06-2.pdf
INT 1010 06-2.pdf
Luis R Castellanos
 
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docxAssignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
carlibradley31429
 
Comparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic SystemsComparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic Systems
ijsrd.com
 
Lesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptxLesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptx
Jezer Arces
 
#1 What is Networking.pptx
#1 What is Networking.pptx#1 What is Networking.pptx
#1 What is Networking.pptx
Hacker Vlog
 
Internet an how it works
Internet an how it worksInternet an how it works
Internet an how it works
shahnaz10
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing Attacks
PECB
 
Cyber security
Cyber securityCyber security
Cyber security
Dr. Kishor Nikam
 
A017510102
A017510102A017510102
A017510102
IOSR Journals
 
COMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics studentsCOMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics students
Gorra Narsimhulu
 

Similar to Prelude to cyber forensics (20)

Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
 
Network security
Network securityNetwork security
Network security
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
CY.pptx
CY.pptxCY.pptx
CY.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
2
22
2
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
 
INT 1010 06-2.pdf
INT 1010 06-2.pdfINT 1010 06-2.pdf
INT 1010 06-2.pdf
 
M dgx mde0mdm=
M dgx mde0mdm=M dgx mde0mdm=
M dgx mde0mdm=
 
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docxAssignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
 
Comparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic SystemsComparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic Systems
 
Lesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptxLesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptx
 
#1 What is Networking.pptx
#1 What is Networking.pptx#1 What is Networking.pptx
#1 What is Networking.pptx
 
Internet an how it works
Internet an how it worksInternet an how it works
Internet an how it works
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing Attacks
 
Cyber security
Cyber securityCyber security
Cyber security
 
A017510102
A017510102A017510102
A017510102
 
COMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics studentsCOMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics students
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Prelude to cyber forensics

  • 1. 1. How Networking Works 2. Network Penetration 3. Cyber Forensics 4. Forensic Evidence 5. Cyber Criminals 6. What do Forensic Experts do?
  • 2. How Networking Works  Networking is a technique of converting data into electronic packets before transmission over a network  Data is packaged into an IP (internet protocol) packet and signed with the sender’s IP address as well as the intended recipient’s IP address  Routers/switches are used to route the data based upon the sender and recipient addresses in the packet.
  • 3. How Networking Works II Source PC IP: 192.168.0.5 Router IP: 192.168.0.1 Destination PC 1 IP: 192.168.0.6 Destination PC 2 IP: 192.168.0.12 2 1 Consider a network setup as above. Where would the data packet shown below travel, and why? Data Packet Source IP: 192.168.0.5:29381 Destination IP: 192.168.0.6:80 Data: (some data)
  • 4. Network Penetration  Data in an IP packet is filled in by the sender – i.e. the sender can alter the Source IP as required, thereby ‘spoofing’ the IP.  MAC addresses are embedded into every network device, but usually can be changed by software as well.  If a spoofed IP packet is sent to any PC, tracing the origin of the packet can be difficult.
  • 5. Network Penetration II Source PC IP: 192.168.0.5 Router IP: 192.168.0.1 Destination PC 1 IP: 192.168.0.6 Destination PC 2 IP: 192.168.0.12 Source PC spoofs PC 2’s IP address using the data packet below. PC 1 assumes PC 2 sent the packet, and sends a reply packet to PC 2. Data Packet Source IP: 192.168.0.12:29381 Destination IP: 192.168.0.6:80 Data: (some data) To restrict such network penetration, routers need to verify the source and destination of all packets traversing the network.
  • 6. The Meaning of Forensics  Network/Data security awareness has only lately become of value, with billions worth of electronic transactions going through the wide-open world of the internet – a system that has zero in-built security facilities.  Cyber forensics is the application of information technology and the vast know how of internet security best practices to reduce damage, repair affected systems, restore access and restrict vandalism – the four great ‘R’s.
  • 7. Forensic Evidence  Forensics is the application of various sciences to explain evidence in a legal scenario.  Various legal environment have vastly different practices for collection and presentation of evidence.  Since Forensics essentially applies to a legal scenario, ‘evidence’ is an aspect that comes along with it. The proper presentation of forensic evidence can be the difference between a win and a loss in a court battle.
  • 8. Cyber Criminals  Usually are either seasoned professionals bitter with the industry, or amateurs trying to make a show.  Can use various penetration methods to access your network  Could use the internet as a medium for sending/receiving information (and thus provide another communication medium for terrorism)  Essentially violate various privacy laws, piracy laws and otherwise compromise data security
  • 9. What do forensic experts do?  Locate, identify and evaluate threats to network and data security  Analyze current security practices, and offer recommendations on security best practices  Help implement the 4 ‘R’s – reduce damage, repair affected systems, restore access and restrict vandalism – in the event of an attack  Prepare forensic evidence in accordance with legal requirements