6. JONATHAN JAMES
• First teenager who was sent to prison for hacking
• He accessed the computer system of US
Department of Defense and viewed sensitive e-
mails and captured employee usernames and
passwords.
• He also broke into NASA computers and stole
software worth approximately $1.7 million.
• NASA was forced to shut down its computer
systems, which caused the organization a loss of
$41.000.
7. MOD ( MASTERS OF DECEPTION )
• They stole the passwords and technical data from Pacific Bell,
Nynex and other telephone companies as well as several big
credit agencies and two major universities.
• One company, Southwestern Bell, suffered losses of $370.000.
• At the end of a major investigation by the FBI, five of MOD’s
members were sentenced to prison.
8. MAFIABOY
• In February 2000, he began a series of attacks
that paralyzed many of Internet’s major sites,
including Yahoo!, Amazon.com, E*TRADE,
eBay and CNN.
• Distributed denial-of-service (DDoS) attacks
• DDoS attack is an attempt to make a computer
resource unavailable to its users.
• It can destroy memory and network devices and
damage or shut down the operations of a
computer.
9. TWO BASIC TYPES OF DATA COLLECTED IN
COMPUTER FORENSICS
• Persistent data: the data
that is stored on a local
hard drive and is
preserved when the
computer is turned off
• Volatile data: the data that is
stored in memory and is lost
when the computer loses power
or is turned off
10. SPECIFIC GUIDELINES INDICATE
• When investigators are allowed to include
computers in a search,
• What kind of information is admissible in court,
• What steps to follow in searching for information
in a computer.
• If an investigator doesn’t
follow these guidelines, the
evidence will not be
accepted in court.
11. ANTI-FORENSICS
The most common technique is
hiding the data.
• Changing the information in files’
headers.
• Dividing files up into small sections
and hiding each section at the end
of other files.
• Hiding one file inside another.
• Encryption.
12. METADATA:
• Anti-forensic tools can also change the metadata attached to files.
• This is a widespread way of causing difficulty for investigators.
information such as the date when a file was created or last altered.