40
N.Sai Kiran, IIIT Allahabad.

N.sai kiran IIITA AP

Embed Size (px)

Citation preview

Page 1: N.sai kiran IIITA AP

N.Sai Kiran,

IIIT Allahabad.

Page 2: N.sai kiran IIITA AP
Page 3: N.sai kiran IIITA AP
Page 4: N.sai kiran IIITA AP
Page 5: N.sai kiran IIITA AP

About Hackers

Business Response

Introduction to Forensic science

Basic Concepts

Basic cyber crime investigation tool

Firewalls

Child pornography

Precautions

Page 6: N.sai kiran IIITA AP

“Cyber crime may be said to be those

species, of which, genus is the conventional

crime, and where either the computer is an

object or subject of the conduct constituting

crime”

Old WINE IN NEW BOTTLES.o Hackers

o Crackers

o Cyber terrorists

Page 7: N.sai kiran IIITA AP

The challenge... „because it‟s there!‟

Ego

Espionage

Ideology

Mischief

Money (extortion or theft)

Revenge

Page 8: N.sai kiran IIITA AP

Predominantly male

Aged from mid-teens to mid-twenties

Lacking in social skills

Fascination or obsession with computers

Underachiever in other areas who sees

computing as a means of being important or

powerful

Discontented

employees

Page 9: N.sai kiran IIITA AP

Service %

Adult Content (XXX) 50

Online Services 19

Direct Marketing – Other 11

Direct Marketing – Catalogue 10

Gaming 5

Books 3

Other 2

Total 100

9

Page 10: N.sai kiran IIITA AP

“If you have to teach ethics it’s too late”

Page 11: N.sai kiran IIITA AP

There is no plan for review logs or scan

for unusual activity.

Physical access is not controlled in a

consistent manner.

If an intrusion detected or ever suspected

there is no procedure designed to deal

with it.

Page 12: N.sai kiran IIITA AP

Why should you care?

Page 13: N.sai kiran IIITA AP
Page 14: N.sai kiran IIITA AP

Administrative precautions

Physical precautions

Information systems

Page 15: N.sai kiran IIITA AP

Forensic science is the application of a

broad spectrum of sciences to answer

questions of interest to a legal system.

This may be in relation to a crime or a civil

action.

Page 16: N.sai kiran IIITA AP

Computer forensics is a branch of digital

forensic science pertaining to legal evidence

found in computers and digital storage media.

The goal of computer forensics is to examine

digital media in a forensically sound manner with

the aim of identifying, preserving, recovering,

analyzing and presenting facts and opinions

about the information.

Page 17: N.sai kiran IIITA AP

Protect

Discover

Recover

Reveal

Access

Analyze

Print

Provide Expert Consultation.

Page 18: N.sai kiran IIITA AP

In the mind of a normal computer user, once

data is deleted, it is accepted that it is no

longer in existence.

On the other hand, the CFS should

understand that the data could still exist in

some other form or area on the storage

medium

Page 19: N.sai kiran IIITA AP

Disk Imaging

HashingMessage Digest 5 (MD5)

Secure Hash Algorithm (SHA)

Page 20: N.sai kiran IIITA AP

PC

Inspector

Encase Forensic

tool kit

FTK imager

File data discovery SE SE SNR SE

File data recovery SNR SNR NS SNR

Reveal file contents SNR SE SNR SNR

File access and

analysis

SNR SE SNR SNR

Imaging NS SE NS SE

MD5 NS SE SE SE

SHA1 NS NS SE SE

Summary print out NS SE SNR SE

Page 21: N.sai kiran IIITA AP

PC Inspector File Recovery

Encase

Forensic Tool Kit

FTK Imager

Page 22: N.sai kiran IIITA AP

Window GUI Technology base Forensic Software for examination of File systems FAT12, FAT16, FAT32, NTFS, LINUX, UNIX, MACINTOSH, CDROM and DVD-R.

It should able to examine and extracting slack space.

It should be able to create image of the storage media e.g. hard disk, Floppy disk.

It should show emails in developer‟s format. (With headers and attachments)

It should open document in language other English spouted by Unicode e.g. Arabian language.

It should show Internet history.

Forensic Cell phone Seizure kit with write block facility and will all required cables and adapters.

Forensic Hardware: One computer PIV 3.2 GHz with 1 GB DDR RAM and other required peripheral

One hard disk write block device

Page 23: N.sai kiran IIITA AP

Robust operating system software

Other application software facilitating word

processing, spread sheet, electronic mails,

multimedia, imaging and for identifying various other

kinds of file formats during the course of examination

Case management software for keeping records of the

cases being examined and for tracking case details at

short notice

Bootable disks to let the forensic specialist boot from

such disks instead of the suspect‟s bootable disk

Page 24: N.sai kiran IIITA AP

Bit-stream back up of data The forensic procedure prohibits examination of the original media to prevent any accidental erasure or interference during examination of such media.

Powerful password recovery tool

Page 25: N.sai kiran IIITA AP

Recovery of deleted data, image and

multimedia among other kinds of files .

For generating reports based on the

analysis of the information contained on

the suspect storage media

Searching tool for locating folders and

files on the suspect storage media.

Page 26: N.sai kiran IIITA AP

Firewall protection as well as intrusion

detection

Use of spyware prevention

Intrusion detection systems

Page 27: N.sai kiran IIITA AP

Firewalls help protect the perimeter

of your network (the hard candy

shell).

The “soft chewy centre” needs

protection too.

Firewalls can and are compromised.

Page 28: N.sai kiran IIITA AP

Identification

Authentication

The person can be identified and authenticated by

what he knows

by what he owns

by his human characteristics (biometrics).

Page 29: N.sai kiran IIITA AP

Biometric technologies are applied in the

following sectors:

Pubic Services,

Law Enforcement,

Banking,

Physical Access Control and

Computer & Networks.

Page 30: N.sai kiran IIITA AP

1. Signature Verification

2. Iris Analysis

3. Facial Analysis

4. Fingerprint verification

5. Hand Geometry

6. Voice Verification

Page 31: N.sai kiran IIITA AP

Use false identity to trap

contact children/teens in various chat rooms which are used by children/teen

Befriend the child/teen.

Extract personal information

Gets the e-mail address of the child/teen and starts making contacts on the victimâ s e-mail address as well.

Page 32: N.sai kiran IIITA AP

Starts sending pornographic images/text

Extract personal information from child/teen

At the end of it, the pedophile set up a meeting with the child/teen out of the house

Page 33: N.sai kiran IIITA AP
Page 34: N.sai kiran IIITA AP

Watch traffic to your site.

Put & configure your firewall correctly.

Develop your web content off line.

Back up your web site after every update.

Develop your web content off line.

Protect your databases.

Back up your web site after every update.

Page 35: N.sai kiran IIITA AP

Ensure physical security of equipment and

storage devices

Don't share identification numbers and passwords

Monitor dial-up facilities

Access to data

virus protection software

STAY UPDATED

Page 36: N.sai kiran IIITA AP

Avoid disclosing

Avoid sending any photograph online particularly to strangers

Use latest and up dated anti virus software.

Always keep back up volumes

Never send your credit card number to any site that is not secured

Always keep a watch on the sites that your children are accessing

Use a security programme that gives control over the cookies

Page 37: N.sai kiran IIITA AP

It is not possible to eliminate cyber crime from the cyber space.

It is quite possible to check them.

History is the witness that no legislation has succeeded in totally eliminating crime from the globe

The only possible step is to make people aware of their rights and duties

Page 38: N.sai kiran IIITA AP

Treat your password like you treat your toothbrush. Never give it to anyone else to use, and change it every few months.

Page 39: N.sai kiran IIITA AP

Unsafe to miss use

Page 40: N.sai kiran IIITA AP

Quires?