SlideShare une entreprise Scribd logo
1  sur  27
© FISE
Building A Cybercrime Case
Introduction
• The growing danger from crimes committed against
computers, or against information on computers, is beginning
to claim attention in national capitals. In most countries
around the world, however, existing laws are likely to be
unenforceable against such crimes. This lack of legal
protection means that businesses and governments must rely
solely on technical measures to protect themselves from
those who would steal, deny access to, or destroy valuable
information.
Types of Cyber Crimes:
Data crimes.
• Data Interception: Interception of data in
transmission.
• Data Modification: Alteration, destruction, or
erasing of data.
• Data Theft: Taking or copying data, regardless of
whether it is protected by other laws, e.g.,
copyright, privacy, etc.
Types of Cyber Crimes:
Network crimes
• Network Interference: Impeding or preventing access for others.
The most common example of this action is instigating
• a distributed denial of service (DDOS) attack, flooding Web sites or
Internet Service Providers. DDOS attacks are often launched from
numerous computers that have been hacked to obey commands of
the perpetrator.
• Network Sabotage: Modification or destruction of a network or
system.
Types of Cyber Crimes:
Related crimes.
• Aiding and Abetting: Enabling the commission of
a cyber crime.
• Computer-Related Forgery: Alteration of data
with intent to represent as authentic.
• Computer-Related Fraud: Alteration of data with
intent to derive economic benefit from its
misrepresentation.
Bodies Of Law
THREE bodies of law :
(1) Criminal law, or penal law
• Is the body of rules with the potential for severe
impositions as punishment for failure to comply.
Criminal punishment, depending on the offense and
jurisdiction, may include execution, loss of liberty,
government supervision (parole or probation), or
fines.
Bodies Of Law
• There are some archetypal (example) crimes, like
murder, but the acts that are forbidden are not
wholly consistent between different criminal codes,
and even within a particular code lines may be
blurred as civil infractions may give rise also to
criminal consequences. Criminal law typically is
enforced by the government, unlike the civil law,
which may be enforced by private parties.
Bodies Of Law
(2) Civil law
• As opposed to criminal law, is the branch of law
dealing with disputes between individuals and/or
organizations, in which compensation may be
awarded to the victim. For instance, if a car crash
victim claims damages against the driver for loss or
injury sustained in an accident, this will be a civil law
case.
Bodies Of Law
(3) Administrative law
• Is the body of law that governs the activities of
administrative agencies of government. Government
agency action can include rulemaking, adjudication,
or the enforcement of a specific regulatory agenda.
Administrative law is considered a branch of public
law.
Bodies Of Law
• As a body of law, administrative law deals with the decision-
making of administrative units of government (e.g., tribunals,
boards or commissions) that are part of a national regulatory
scheme in such areas as police law, international trade,
manufacturing, the environment, taxation, broadcasting,
immigration and transport. Administrative law expanded
greatly during the twentieth century, as legislative bodies
worldwide created more government agencies to regulate
the increasingly complex social, economic and political
spheres of human interaction.
Security Incident:
The attempted or successful
unauthorized access, use
disclosure, modification, or
destruction of information or
interference with system
operations in an information
system
Examples
• Bombings, explosions, fire,
flood, storm, power outage,
hardware/software failure
• Cyber-theft, identity-theft,
intellectual property theft,
regular theft (involving
information), virus, worm,
network intrusions,
unauthorized use, denial of
service, etc
} Contingency
Plan
} Incident
response
Goals
• Provide an effective and efficient means of dealing with the
situation
• in a manner that reduces the potential impact to the
organization.
• Provide management with sufficient information in order to
decide on
• an appropriate course of action.
• Maintain or restore business continuity.
• Defend against future attacks.
• Deter attacks through investigation and prosecution.
Incident Handling Steps
• Preparation
• Identification
• Containment
• Eradication
• Recovery
• Lessons learned
Incident Handling Steps
• Preparation - The organization educates users and IT staff of the
importance of updated security measures and trains them to respond
to computer and network security incidents quickly and correctly.
• Identification - The response team is activated to decide whether a
particular event is, in fact, a security incident. The team will tracks
Internet security activity and has the most current information on
viruses and worms.
• Containment - The team determines how far the problem has spread
and contains the problem by disconnecting all affected systems and
devices to prevent further damage.
Incident Handling Steps
• Eradication - The team investigates to discover the origin of
the incident. The root cause of the problem and all traces of
malicious code are removed.
• Recovery - Data and software are restored from clean backup
files, ensuring that no vulnerabilities remain. Systems are
monitored for any sign of weakness or recurrence.
• Lessons learned - The team analyzes the incident and how it
was handled, making recommendations for better future
response and for preventing a recurrence.
Why Need Structure Handling
• Structure/Organization
– Dealing with incidents can be chaotic
– Simultaneous incidents occur
– Having a predefined methodology lends structure to the chaos
• Efficiency
– Time is often of the essence when dealing with incidents
– Incidents can be costly both financially and organizationally
• Process oriented approach
– Breaks incidents into small manageable chunks
– Logical order of dealing with issues
– Includes methods for improving the overall process
Why Need Structure Handling
• Dealing with the unexpected
– Provides a mental framework for dealing with incidents in
general
– Promotes flexible thinking to deal with novel situations
• Legal Considerations
– Can demonstrate due care or due diligence
– May limit liability
– May reduce insurance premiums
Evidence Management
• During an incident, evidence may be collected during any of
the 6 steps.
• In early stages we may not know what the final outcome
might be (e.g., Job Termination, Civil or Criminal Litigation).
• Network/Computer Forensics may become an issue
• Must collect data in a “Forensically Friendly” manner
• Must maintain the chain of custody
• Important to understand the evidence lifecycle
Forensics
• Computer Forensics: The study of computer
technology as it relates to the law.
• Forensic Analysis: Examination of material and/or
data to determine its essential features and their
relationship in an effort to discover evidence in a
manner that is admissible in a court of law; post-
mortem examination.
Forensics
• Electronic Evidence:
Evidence relating to the
issue that consists of
computer files, or data, in
their electronic state.
• Electronic Media
Discovery: The
discoverability of electronic
data or files.
Forensics
• Chain of Custody: A means of
accountability, that shows who
obtained the evidence, where
and when the evidence was
obtained, who secured the
evidence, who had control or
possession of the evidence.
• Rules of Evidence: Evidence
must be competent, relevant,
and material to the issue.
Evidence Life Cycle
• Collection & identification
• Storage, preservation, and
• transportation
• Presentation in court
• Return to victim or court
Case Study:
MALAYSIAN CYBERLAWS AND THEIR IMPLE

Contenu connexe

Tendances

Aprio cybersecurity and board information
Aprio cybersecurity and board informationAprio cybersecurity and board information
Aprio cybersecurity and board informationAprio
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Lisa Abe-Oldenburg, B.Comm., JD.
 
Otieno antony rethinking internet shutdown
Otieno antony   rethinking internet shutdownOtieno antony   rethinking internet shutdown
Otieno antony rethinking internet shutdownOtieno Antony
 
What Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure SectorWhat Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure SectorCBIZ, Inc.
 
cyber security notes
cyber security notescyber security notes
cyber security notesSHIKHAJAIN163
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesNapier University
 
Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?Napier University
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11mrmwood
 
One hour cyber july 2013
One hour cyber july 2013One hour cyber july 2013
One hour cyber july 2013Dan Michaluk
 

Tendances (19)

Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Aprio cybersecurity and board information
Aprio cybersecurity and board informationAprio cybersecurity and board information
Aprio cybersecurity and board information
 
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
 
Otieno antony rethinking internet shutdown
Otieno antony   rethinking internet shutdownOtieno antony   rethinking internet shutdown
Otieno antony rethinking internet shutdown
 
Lesson 4
Lesson 4Lesson 4
Lesson 4
 
Lesson 1 - Technical Controls
Lesson 1 - Technical ControlsLesson 1 - Technical Controls
Lesson 1 - Technical Controls
 
What Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure SectorWhat Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure Sector
 
cyber security notes
cyber security notescyber security notes
cyber security notes
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Mbs r35 b
Mbs r35 bMbs r35 b
Mbs r35 b
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The Challenges
 
Ch14
Ch14Ch14
Ch14
 
Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
Mis
MisMis
Mis
 
One hour cyber july 2013
One hour cyber july 2013One hour cyber july 2013
One hour cyber july 2013
 
Secuntialesse
SecuntialesseSecuntialesse
Secuntialesse
 

Similaire à Building a cybercrime case

Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodologyPiyush Jain
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)stevemeltzer
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitKevin Duffey
 
164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.pptharshbj1801
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickJacqueline Fick
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideBlack Duck by Synopsys
 
Thinking Ahead to Litigation While Developing Cybersecurity Plans
Thinking Ahead to Litigation While Developing Cybersecurity PlansThinking Ahead to Litigation While Developing Cybersecurity Plans
Thinking Ahead to Litigation While Developing Cybersecurity PlansJason Glass, CFA, CISSP
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Anpumathews
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf503SaranyaS
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
Lecture 8 privacy, security, ergonomics and the environment
Lecture 8   privacy, security, ergonomics and the environment Lecture 8   privacy, security, ergonomics and the environment
Lecture 8 privacy, security, ergonomics and the environment Jenny Coloma
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rulessaurnou
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20Marc S. Sokol
 
Computer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital WorldComputer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital Worldrahulmonikasharma
 

Similaire à Building a cybercrime case (20)

Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
 
164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
The general data protection act overview
The general data protection act overviewThe general data protection act overview
The general data protection act overview
 
Thinking Ahead to Litigation While Developing Cybersecurity Plans
Thinking Ahead to Litigation While Developing Cybersecurity PlansThinking Ahead to Litigation While Developing Cybersecurity Plans
Thinking Ahead to Litigation While Developing Cybersecurity Plans
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
File000168
File000168File000168
File000168
 
2. Defence Systems
2. Defence Systems2. Defence Systems
2. Defence Systems
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf
 
Flight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawFlight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the Law
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Lecture 8 privacy, security, ergonomics and the environment
Lecture 8   privacy, security, ergonomics and the environment Lecture 8   privacy, security, ergonomics and the environment
Lecture 8 privacy, security, ergonomics and the environment
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20
 
Computer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital WorldComputer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital World
 

Plus de Online

Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3Online
 
Philosophy of early childhood education 2
Philosophy of early childhood education 2Philosophy of early childhood education 2
Philosophy of early childhood education 2Online
 
Philosophy of early childhood education 1
Philosophy of early childhood education 1Philosophy of early childhood education 1
Philosophy of early childhood education 1Online
 
Philosophy of early childhood education 4
Philosophy of early childhood education 4Philosophy of early childhood education 4
Philosophy of early childhood education 4Online
 
Operation and expression in c++
Operation and expression in c++Operation and expression in c++
Operation and expression in c++Online
 
Functions
FunctionsFunctions
FunctionsOnline
 
Formatted input and output
Formatted input and outputFormatted input and output
Formatted input and outputOnline
 
Control structures selection
Control structures   selectionControl structures   selection
Control structures selectionOnline
 
Control structures repetition
Control structures   repetitionControl structures   repetition
Control structures repetitionOnline
 
Introduction to problem solving in c++
Introduction to problem solving in c++Introduction to problem solving in c++
Introduction to problem solving in c++Online
 
Optical transmission technique
Optical transmission techniqueOptical transmission technique
Optical transmission techniqueOnline
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Online
 
Lan technologies
Lan technologiesLan technologies
Lan technologiesOnline
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technologyOnline
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocolsOnline
 
Internet protocol
Internet protocolInternet protocol
Internet protocolOnline
 
Application protocols
Application protocolsApplication protocols
Application protocolsOnline
 
Addressing
AddressingAddressing
AddressingOnline
 
Transport protocols
Transport protocolsTransport protocols
Transport protocolsOnline
 
Leadership
LeadershipLeadership
LeadershipOnline
 

Plus de Online (20)

Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3
 
Philosophy of early childhood education 2
Philosophy of early childhood education 2Philosophy of early childhood education 2
Philosophy of early childhood education 2
 
Philosophy of early childhood education 1
Philosophy of early childhood education 1Philosophy of early childhood education 1
Philosophy of early childhood education 1
 
Philosophy of early childhood education 4
Philosophy of early childhood education 4Philosophy of early childhood education 4
Philosophy of early childhood education 4
 
Operation and expression in c++
Operation and expression in c++Operation and expression in c++
Operation and expression in c++
 
Functions
FunctionsFunctions
Functions
 
Formatted input and output
Formatted input and outputFormatted input and output
Formatted input and output
 
Control structures selection
Control structures   selectionControl structures   selection
Control structures selection
 
Control structures repetition
Control structures   repetitionControl structures   repetition
Control structures repetition
 
Introduction to problem solving in c++
Introduction to problem solving in c++Introduction to problem solving in c++
Introduction to problem solving in c++
 
Optical transmission technique
Optical transmission techniqueOptical transmission technique
Optical transmission technique
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technology
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocols
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Application protocols
Application protocolsApplication protocols
Application protocols
 
Addressing
AddressingAddressing
Addressing
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Leadership
LeadershipLeadership
Leadership
 

Dernier

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Dernier (20)

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 

Building a cybercrime case

  • 1. © FISE Building A Cybercrime Case
  • 2. Introduction • The growing danger from crimes committed against computers, or against information on computers, is beginning to claim attention in national capitals. In most countries around the world, however, existing laws are likely to be unenforceable against such crimes. This lack of legal protection means that businesses and governments must rely solely on technical measures to protect themselves from those who would steal, deny access to, or destroy valuable information.
  • 3. Types of Cyber Crimes: Data crimes. • Data Interception: Interception of data in transmission. • Data Modification: Alteration, destruction, or erasing of data. • Data Theft: Taking or copying data, regardless of whether it is protected by other laws, e.g., copyright, privacy, etc.
  • 4. Types of Cyber Crimes: Network crimes • Network Interference: Impeding or preventing access for others. The most common example of this action is instigating • a distributed denial of service (DDOS) attack, flooding Web sites or Internet Service Providers. DDOS attacks are often launched from numerous computers that have been hacked to obey commands of the perpetrator. • Network Sabotage: Modification or destruction of a network or system.
  • 5. Types of Cyber Crimes: Related crimes. • Aiding and Abetting: Enabling the commission of a cyber crime. • Computer-Related Forgery: Alteration of data with intent to represent as authentic. • Computer-Related Fraud: Alteration of data with intent to derive economic benefit from its misrepresentation.
  • 6. Bodies Of Law THREE bodies of law : (1) Criminal law, or penal law • Is the body of rules with the potential for severe impositions as punishment for failure to comply. Criminal punishment, depending on the offense and jurisdiction, may include execution, loss of liberty, government supervision (parole or probation), or fines.
  • 7. Bodies Of Law • There are some archetypal (example) crimes, like murder, but the acts that are forbidden are not wholly consistent between different criminal codes, and even within a particular code lines may be blurred as civil infractions may give rise also to criminal consequences. Criminal law typically is enforced by the government, unlike the civil law, which may be enforced by private parties.
  • 8. Bodies Of Law (2) Civil law • As opposed to criminal law, is the branch of law dealing with disputes between individuals and/or organizations, in which compensation may be awarded to the victim. For instance, if a car crash victim claims damages against the driver for loss or injury sustained in an accident, this will be a civil law case.
  • 9. Bodies Of Law (3) Administrative law • Is the body of law that governs the activities of administrative agencies of government. Government agency action can include rulemaking, adjudication, or the enforcement of a specific regulatory agenda. Administrative law is considered a branch of public law.
  • 10. Bodies Of Law • As a body of law, administrative law deals with the decision- making of administrative units of government (e.g., tribunals, boards or commissions) that are part of a national regulatory scheme in such areas as police law, international trade, manufacturing, the environment, taxation, broadcasting, immigration and transport. Administrative law expanded greatly during the twentieth century, as legislative bodies worldwide created more government agencies to regulate the increasingly complex social, economic and political spheres of human interaction.
  • 11. Security Incident: The attempted or successful unauthorized access, use disclosure, modification, or destruction of information or interference with system operations in an information system
  • 12. Examples • Bombings, explosions, fire, flood, storm, power outage, hardware/software failure • Cyber-theft, identity-theft, intellectual property theft, regular theft (involving information), virus, worm, network intrusions, unauthorized use, denial of service, etc } Contingency Plan } Incident response
  • 13.
  • 14.
  • 15.
  • 16. Goals • Provide an effective and efficient means of dealing with the situation • in a manner that reduces the potential impact to the organization. • Provide management with sufficient information in order to decide on • an appropriate course of action. • Maintain or restore business continuity. • Defend against future attacks. • Deter attacks through investigation and prosecution.
  • 17. Incident Handling Steps • Preparation • Identification • Containment • Eradication • Recovery • Lessons learned
  • 18. Incident Handling Steps • Preparation - The organization educates users and IT staff of the importance of updated security measures and trains them to respond to computer and network security incidents quickly and correctly. • Identification - The response team is activated to decide whether a particular event is, in fact, a security incident. The team will tracks Internet security activity and has the most current information on viruses and worms. • Containment - The team determines how far the problem has spread and contains the problem by disconnecting all affected systems and devices to prevent further damage.
  • 19. Incident Handling Steps • Eradication - The team investigates to discover the origin of the incident. The root cause of the problem and all traces of malicious code are removed. • Recovery - Data and software are restored from clean backup files, ensuring that no vulnerabilities remain. Systems are monitored for any sign of weakness or recurrence. • Lessons learned - The team analyzes the incident and how it was handled, making recommendations for better future response and for preventing a recurrence.
  • 20. Why Need Structure Handling • Structure/Organization – Dealing with incidents can be chaotic – Simultaneous incidents occur – Having a predefined methodology lends structure to the chaos • Efficiency – Time is often of the essence when dealing with incidents – Incidents can be costly both financially and organizationally • Process oriented approach – Breaks incidents into small manageable chunks – Logical order of dealing with issues – Includes methods for improving the overall process
  • 21. Why Need Structure Handling • Dealing with the unexpected – Provides a mental framework for dealing with incidents in general – Promotes flexible thinking to deal with novel situations • Legal Considerations – Can demonstrate due care or due diligence – May limit liability – May reduce insurance premiums
  • 22. Evidence Management • During an incident, evidence may be collected during any of the 6 steps. • In early stages we may not know what the final outcome might be (e.g., Job Termination, Civil or Criminal Litigation). • Network/Computer Forensics may become an issue • Must collect data in a “Forensically Friendly” manner • Must maintain the chain of custody • Important to understand the evidence lifecycle
  • 23. Forensics • Computer Forensics: The study of computer technology as it relates to the law. • Forensic Analysis: Examination of material and/or data to determine its essential features and their relationship in an effort to discover evidence in a manner that is admissible in a court of law; post- mortem examination.
  • 24. Forensics • Electronic Evidence: Evidence relating to the issue that consists of computer files, or data, in their electronic state. • Electronic Media Discovery: The discoverability of electronic data or files.
  • 25. Forensics • Chain of Custody: A means of accountability, that shows who obtained the evidence, where and when the evidence was obtained, who secured the evidence, who had control or possession of the evidence. • Rules of Evidence: Evidence must be competent, relevant, and material to the issue.
  • 26. Evidence Life Cycle • Collection & identification • Storage, preservation, and • transportation • Presentation in court • Return to victim or court