SlideShare a Scribd company logo
1 of 40
N.Sai Kiran,
IIIT Allahabad.
 About  Hackers
 Business Response
 Introduction to Forensic science
 Basic Concepts
 Basic cyber crime investigation tool
 Firewalls
 Child pornography
 Precautions
 “Cyber   crime may be said to be those
    species, of which, genus is the conventional
    crime, and where either the computer is an
    object or subject of the conduct constituting
    crime”
Old WINE IN NEW BOTTLES.
o   Hackers
o   Crackers
o   Cyber terrorists
 The   challenge... „because it‟s there!‟
 Ego
 Espionage
 Ideology
 Mischief
 Money (extortion or theft)
 Revenge
 Predominantly  male
 Aged from mid-teens to mid-twenties
 Lacking in social skills
 Fascination or obsession with computers
 Underachiever in other areas who sees
  computing as a means of being important or
  powerful
                       Discontented
                       employees
Service                             %
Adult Content (XXX)                 50
Online Services                     19
Direct Marketing – Other            11
Direct Marketing – Catalogue        10
Gaming                               5
Books                                3
Other                                2
Total                              100


                               9
“If you have to teach ethics it’s too late”
 There   is no plan for review logs or scan
  for unusual activity.
 Physical access is not controlled in a
  consistent manner.
 If an intrusion detected or ever suspected
  there is no procedure designed to deal
  with it.
Why should you care?
Administrative precautions

Physical precautions

Information systems
 Forensic science is the application of a
  broad spectrum of sciences to answer
  questions of interest to a legal system.
 This may be in relation to a crime or a civil
  action.
   Computer forensics is a branch of digital
    forensic science pertaining to legal evidence
    found in computers and digital storage media.

   The goal of computer forensics is to examine
    digital media in a forensically sound manner with
    the aim of identifying, preserving, recovering,
    analyzing and presenting facts and opinions
    about the information.
 Protect
 Discover
 Recover
 Reveal
 Access
 Analyze
 Print
 Provide   Expert Consultation.
 In the mind of a normal computer user, once
  data is deleted, it is accepted that it is no
  longer in existence.
 On the other hand, the CFS should
  understand that the data could still exist in
  some other form or area on the storage
  medium
 Disk   Imaging
 Hashing
 Message Digest 5 (MD5)
 Secure Hash Algorithm (SHA)
PC        Encase Forensic   FTK imager
                      Inspector        tool kit
File data discovery   SE        SE     SNR        SE

File data recovery    SNR       SNR    NS         SNR

Reveal file contents SNR        SE     SNR        SNR

File access and       SNR       SE     SNR        SNR
analysis
Imaging               NS        SE     NS         SE

MD5                   NS        SE     SE         SE

SHA1                  NS        NS     SE         SE

Summary print out     NS        SE     SNR        SE
 PC   Inspector File Recovery

 Encase


 Forensic   Tool Kit

 FTK   Imager
   Window GUI Technology base Forensic Software for examination
    of File systems FAT12, FAT16, FAT32, NTFS, LINUX, UNIX,
    MACINTOSH, CDROM and DVD-R.
   It should able to examine and extracting slack space.
   It should be able to create image of the storage media e.g. hard
    disk, Floppy disk.
   It should show emails in developer‟s format. (With headers and
    attachments)
   It should open document in language other English spouted by
    Unicode e.g. Arabian language.
   It should show Internet history.
   Forensic Cell phone Seizure kit with write block facility and will
    all required cables and adapters.
   Forensic Hardware: One computer PIV 3.2 GHz with 1 GB DDR
    RAM and other required peripheral
   One hard disk write block device
Robust operating system software
 Other application software facilitating word
  processing, spread sheet, electronic mails,
  multimedia, imaging and for identifying various other
  kinds of file formats during the course of examination
 Case management software for keeping records of the
  cases being examined and for tracking case details at
  short notice
 Bootable disks to let the forensic specialist boot from
  such disks instead of the suspect‟s bootable disk
 Bit-stream back up of data
  The forensic procedure prohibits
  examination of the original media
  to prevent any accidental erasure
  or interference during examination
  of such media.
 Powerful password recovery tool
   Recovery of deleted data, image and
    multimedia among other kinds of files .

   For generating reports based on the
    analysis of the information contained on
    the suspect storage media
 Searching tool for locating folders and
files on the suspect storage media.
 Firewall
         protection as well as intrusion
 detection

 Use   of spyware prevention

 Intrusion   detection systems
 Firewalls help protect the perimeter
  of your network (the hard candy
  shell).
 The “soft chewy centre” needs
  protection too.
 Firewalls can and are compromised.
   Identification

   Authentication

   The person can be identified and authenticated
    by
          what he knows
          by what he owns
          by his human characteristics (biometrics).
Biometric technologies are applied in the
  following sectors:
 Pubic Services,
 Law Enforcement,
 Banking,
 Physical Access Control and
 Computer & Networks.
 1. Signature Verification
 2. Iris Analysis
 3. Facial Analysis
 4. Fingerprint verification
 5. Hand Geometry
 6. Voice Verification
   Use false identity to trap
   contact children/teens in various chat rooms which are used by
    children/teen
   Befriend the child/teen.
   Extract personal information
   Gets the e-mail address of the child/teen and starts making
    contacts on the victimâ s e-mail address as well.
   Starts sending pornographic images/text

   Extract personal information from child/teen

   At the end of it, the pedophile set up a meeting with the
    child/teen out of the house
   Watch traffic to your site.

   Put & configure your firewall correctly.

   Develop your web content off line.

   Back up your web site after every update.

   Develop your web content off line.

   Protect your databases.

   Back up your web site after every update.
 Ensure physical security of equipment and
  storage devices
 Don't share identification numbers and passwords
 Monitor dial-up facilities
 Access to data
 virus protection software

             STAY UPDATED
 Avoid  disclosing
 Avoid sending any photograph online
  particularly to strangers
 Use latest and up dated anti virus software.
 Always keep back up volumes
 Never send your credit card number to any
  site that is not secured
 Always keep a watch on the sites that your
  children are accessing
 Use a security programme that gives control
  over the cookies
 It is not possible to eliminate cyber crime
  from the cyber space.
 It is quite possible to check them.
 History is the witness that no legislation has
  succeeded in totally eliminating crime from
  the globe
 The only possible step is to make people
  aware of their rights and duties
 Treatyour password like you treat
 your toothbrush. Never give it to
 anyone else to use, and change it
 every few months.
Unsafe to miss use
Quires?

More Related Content

What's hot

01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
Kranthi
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
Kranthi
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
Milap Oza
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
Kranthi
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
Kranthi
 

What's hot (20)

01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
computer forensics
computer forensics computer forensics
computer forensics
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domain
 
cyber Forensics
cyber Forensicscyber Forensics
cyber Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensics
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Cs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qbCs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qb
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
 

Viewers also liked (11)

Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Basic about cyber crime, computer crime
Basic about cyber crime, computer crimeBasic about cyber crime, computer crime
Basic about cyber crime, computer crime
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 

Similar to N.sai kiran IIITA AP

Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
Kolluru N Rao
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
Gnanavi2
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
forensicsnation
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
forensicsnation
 

Similar to N.sai kiran IIITA AP (20)

Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh t
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Codebits 2010
Codebits 2010Codebits 2010
Codebits 2010
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 

Recently uploaded

Models in Deira 0567006274 Deira Call girl Service
Models in Deira 0567006274 Deira Call girl ServiceModels in Deira 0567006274 Deira Call girl Service
Models in Deira 0567006274 Deira Call girl Service
Monica Sydney
 
Deira Call girl agency 0567006274 Call girls in Deira
Deira Call girl agency 0567006274 Call girls in DeiraDeira Call girl agency 0567006274 Call girls in Deira
Deira Call girl agency 0567006274 Call girls in Deira
Monica Sydney
 

Recently uploaded (20)

Call girls Service Khammam - 9332606886 Rs 3000 Free Pickup & Drop Services 2...
Call girls Service Khammam - 9332606886 Rs 3000 Free Pickup & Drop Services 2...Call girls Service Khammam - 9332606886 Rs 3000 Free Pickup & Drop Services 2...
Call girls Service Khammam - 9332606886 Rs 3000 Free Pickup & Drop Services 2...
 
Deira Call girls 0507330913 Call girls in Deira
Deira Call girls 0507330913 Call girls in DeiraDeira Call girls 0507330913 Call girls in Deira
Deira Call girls 0507330913 Call girls in Deira
 
Models in Deira 0567006274 Deira Call girl Service
Models in Deira 0567006274 Deira Call girl ServiceModels in Deira 0567006274 Deira Call girl Service
Models in Deira 0567006274 Deira Call girl Service
 
Hire 💕 8617370543 Kushinagar Call Girls Service Call Girls Agency
Hire 💕 8617370543 Kushinagar Call Girls Service Call Girls AgencyHire 💕 8617370543 Kushinagar Call Girls Service Call Girls Agency
Hire 💕 8617370543 Kushinagar Call Girls Service Call Girls Agency
 
Call girls Service Bellary - 9332606886 Rs 3000 Free Pickup & Drop Services 2...
Call girls Service Bellary - 9332606886 Rs 3000 Free Pickup & Drop Services 2...Call girls Service Bellary - 9332606886 Rs 3000 Free Pickup & Drop Services 2...
Call girls Service Bellary - 9332606886 Rs 3000 Free Pickup & Drop Services 2...
 
Call Girls In Gandhinagar 📞 8617370543 At Low Cost Cash Payment Booking
Call Girls In Gandhinagar 📞 8617370543  At Low Cost Cash Payment BookingCall Girls In Gandhinagar 📞 8617370543  At Low Cost Cash Payment Booking
Call Girls In Gandhinagar 📞 8617370543 At Low Cost Cash Payment Booking
 
Deira Call girl agency 0567006274 Call girls in Deira
Deira Call girl agency 0567006274 Call girls in DeiraDeira Call girl agency 0567006274 Call girls in Deira
Deira Call girl agency 0567006274 Call girls in Deira
 
Call Girls in Kollam - 9332606886 Our call girls are sure to provide you with...
Call Girls in Kollam - 9332606886 Our call girls are sure to provide you with...Call Girls in Kollam - 9332606886 Our call girls are sure to provide you with...
Call Girls in Kollam - 9332606886 Our call girls are sure to provide you with...
 
Genuine 8617370543 Hot and Beautiful 💕 Gomati Escorts call Girls
Genuine 8617370543 Hot and Beautiful 💕 Gomati Escorts call GirlsGenuine 8617370543 Hot and Beautiful 💕 Gomati Escorts call Girls
Genuine 8617370543 Hot and Beautiful 💕 Gomati Escorts call Girls
 
Badshah Nagar ] Call Girls Service Lucknow | Starting ₹,5K To @25k with A/C 9...
Badshah Nagar ] Call Girls Service Lucknow | Starting ₹,5K To @25k with A/C 9...Badshah Nagar ] Call Girls Service Lucknow | Starting ₹,5K To @25k with A/C 9...
Badshah Nagar ] Call Girls Service Lucknow | Starting ₹,5K To @25k with A/C 9...
 
Call Girls in Ernakulam - 9332606886 Our call girls are sure to provide you w...
Call Girls in Ernakulam - 9332606886 Our call girls are sure to provide you w...Call Girls in Ernakulam - 9332606886 Our call girls are sure to provide you w...
Call Girls in Ernakulam - 9332606886 Our call girls are sure to provide you w...
 
Call Girls in Perumbavoor / 9332606886 Genuine Call girls with real Photos an...
Call Girls in Perumbavoor / 9332606886 Genuine Call girls with real Photos an...Call Girls in Perumbavoor / 9332606886 Genuine Call girls with real Photos an...
Call Girls in Perumbavoor / 9332606886 Genuine Call girls with real Photos an...
 
🌹Bhubaneswar🌹Ravi Tailkes ❤CALL GIRL 9777949614 ❤CALL GIRLS IN bhubaneswar E...
🌹Bhubaneswar🌹Ravi Tailkes  ❤CALL GIRL 9777949614 ❤CALL GIRLS IN bhubaneswar E...🌹Bhubaneswar🌹Ravi Tailkes  ❤CALL GIRL 9777949614 ❤CALL GIRLS IN bhubaneswar E...
🌹Bhubaneswar🌹Ravi Tailkes ❤CALL GIRL 9777949614 ❤CALL GIRLS IN bhubaneswar E...
 
Call Girls In Amreli Escorts ☎️8617370543 🔝 💃 Enjoy 24/7 Escort Service Enjoy...
Call Girls In Amreli Escorts ☎️8617370543 🔝 💃 Enjoy 24/7 Escort Service Enjoy...Call Girls In Amreli Escorts ☎️8617370543 🔝 💃 Enjoy 24/7 Escort Service Enjoy...
Call Girls In Amreli Escorts ☎️8617370543 🔝 💃 Enjoy 24/7 Escort Service Enjoy...
 
Deira call girls 0507330913 Call girls in Deira
Deira call girls 0507330913  Call girls in DeiraDeira call girls 0507330913  Call girls in Deira
Deira call girls 0507330913 Call girls in Deira
 
Ambassa Escorts | 8617370543 call girls service for all Users
Ambassa Escorts | 8617370543 call girls service for all UsersAmbassa Escorts | 8617370543 call girls service for all Users
Ambassa Escorts | 8617370543 call girls service for all Users
 
Hire 💕 8617370543 Auraiya Call Girls Service Call Girls Agency
Hire 💕 8617370543 Auraiya Call Girls Service Call Girls AgencyHire 💕 8617370543 Auraiya Call Girls Service Call Girls Agency
Hire 💕 8617370543 Auraiya Call Girls Service Call Girls Agency
 
Hire 💕 8617370543 Mirzapur Call Girls Service Call Girls Agency
Hire 💕 8617370543 Mirzapur Call Girls Service Call Girls AgencyHire 💕 8617370543 Mirzapur Call Girls Service Call Girls Agency
Hire 💕 8617370543 Mirzapur Call Girls Service Call Girls Agency
 
Bhubaneswar🌹Patia ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswar ESCORT S...
Bhubaneswar🌹Patia ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswar ESCORT S...Bhubaneswar🌹Patia ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswar ESCORT S...
Bhubaneswar🌹Patia ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswar ESCORT S...
 
Unnao 💋 Call Girl 8617370543 Call Girls in unnao Escort service book now
Unnao 💋 Call Girl 8617370543 Call Girls in unnao Escort service book nowUnnao 💋 Call Girl 8617370543 Call Girls in unnao Escort service book now
Unnao 💋 Call Girl 8617370543 Call Girls in unnao Escort service book now
 

N.sai kiran IIITA AP

  • 2.
  • 3.
  • 4.
  • 5.  About Hackers  Business Response  Introduction to Forensic science  Basic Concepts  Basic cyber crime investigation tool  Firewalls  Child pornography  Precautions
  • 6.  “Cyber crime may be said to be those species, of which, genus is the conventional crime, and where either the computer is an object or subject of the conduct constituting crime” Old WINE IN NEW BOTTLES. o Hackers o Crackers o Cyber terrorists
  • 7.  The challenge... „because it‟s there!‟  Ego  Espionage  Ideology  Mischief  Money (extortion or theft)  Revenge
  • 8.  Predominantly male  Aged from mid-teens to mid-twenties  Lacking in social skills  Fascination or obsession with computers  Underachiever in other areas who sees computing as a means of being important or powerful Discontented employees
  • 9. Service % Adult Content (XXX) 50 Online Services 19 Direct Marketing – Other 11 Direct Marketing – Catalogue 10 Gaming 5 Books 3 Other 2 Total 100 9
  • 10. “If you have to teach ethics it’s too late”
  • 11.  There is no plan for review logs or scan for unusual activity.  Physical access is not controlled in a consistent manner.  If an intrusion detected or ever suspected there is no procedure designed to deal with it.
  • 12. Why should you care?
  • 13.
  • 15.  Forensic science is the application of a broad spectrum of sciences to answer questions of interest to a legal system.  This may be in relation to a crime or a civil action.
  • 16. Computer forensics is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media.  The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information.
  • 17.  Protect  Discover  Recover  Reveal  Access  Analyze  Print  Provide Expert Consultation.
  • 18.  In the mind of a normal computer user, once data is deleted, it is accepted that it is no longer in existence.  On the other hand, the CFS should understand that the data could still exist in some other form or area on the storage medium
  • 19.  Disk Imaging  Hashing  Message Digest 5 (MD5)  Secure Hash Algorithm (SHA)
  • 20. PC Encase Forensic FTK imager Inspector tool kit File data discovery SE SE SNR SE File data recovery SNR SNR NS SNR Reveal file contents SNR SE SNR SNR File access and SNR SE SNR SNR analysis Imaging NS SE NS SE MD5 NS SE SE SE SHA1 NS NS SE SE Summary print out NS SE SNR SE
  • 21.  PC Inspector File Recovery  Encase  Forensic Tool Kit  FTK Imager
  • 22. Window GUI Technology base Forensic Software for examination of File systems FAT12, FAT16, FAT32, NTFS, LINUX, UNIX, MACINTOSH, CDROM and DVD-R.  It should able to examine and extracting slack space.  It should be able to create image of the storage media e.g. hard disk, Floppy disk.  It should show emails in developer‟s format. (With headers and attachments)  It should open document in language other English spouted by Unicode e.g. Arabian language.  It should show Internet history.  Forensic Cell phone Seizure kit with write block facility and will all required cables and adapters.  Forensic Hardware: One computer PIV 3.2 GHz with 1 GB DDR RAM and other required peripheral  One hard disk write block device
  • 23. Robust operating system software  Other application software facilitating word processing, spread sheet, electronic mails, multimedia, imaging and for identifying various other kinds of file formats during the course of examination  Case management software for keeping records of the cases being examined and for tracking case details at short notice  Bootable disks to let the forensic specialist boot from such disks instead of the suspect‟s bootable disk
  • 24.  Bit-stream back up of data The forensic procedure prohibits examination of the original media to prevent any accidental erasure or interference during examination of such media.  Powerful password recovery tool
  • 25. Recovery of deleted data, image and multimedia among other kinds of files .  For generating reports based on the analysis of the information contained on the suspect storage media Searching tool for locating folders and files on the suspect storage media.
  • 26.  Firewall protection as well as intrusion detection  Use of spyware prevention  Intrusion detection systems
  • 27.  Firewalls help protect the perimeter of your network (the hard candy shell).  The “soft chewy centre” needs protection too.  Firewalls can and are compromised.
  • 28. Identification  Authentication  The person can be identified and authenticated by  what he knows  by what he owns  by his human characteristics (biometrics).
  • 29. Biometric technologies are applied in the following sectors:  Pubic Services,  Law Enforcement,  Banking,  Physical Access Control and  Computer & Networks.
  • 30.  1. Signature Verification  2. Iris Analysis  3. Facial Analysis  4. Fingerprint verification  5. Hand Geometry  6. Voice Verification
  • 31. Use false identity to trap  contact children/teens in various chat rooms which are used by children/teen  Befriend the child/teen.  Extract personal information  Gets the e-mail address of the child/teen and starts making contacts on the victimâ s e-mail address as well.
  • 32. Starts sending pornographic images/text  Extract personal information from child/teen  At the end of it, the pedophile set up a meeting with the child/teen out of the house
  • 33.
  • 34. Watch traffic to your site.  Put & configure your firewall correctly.  Develop your web content off line.  Back up your web site after every update.  Develop your web content off line.  Protect your databases.  Back up your web site after every update.
  • 35.  Ensure physical security of equipment and storage devices  Don't share identification numbers and passwords  Monitor dial-up facilities  Access to data  virus protection software STAY UPDATED
  • 36.  Avoid disclosing  Avoid sending any photograph online particularly to strangers  Use latest and up dated anti virus software.  Always keep back up volumes  Never send your credit card number to any site that is not secured  Always keep a watch on the sites that your children are accessing  Use a security programme that gives control over the cookies
  • 37.  It is not possible to eliminate cyber crime from the cyber space.  It is quite possible to check them.  History is the witness that no legislation has succeeded in totally eliminating crime from the globe  The only possible step is to make people aware of their rights and duties
  • 38.  Treatyour password like you treat your toothbrush. Never give it to anyone else to use, and change it every few months.