9. Computer Forensics:
Computer forensics is the
application of investigation and analysis
techniques to gather and preserve evidence from
a particular computing device in a way that is
suitable for presentation in a court of law.
11. Examples of Cyber Crime
1. Identity Theft
2. Transaction fraud
3. Fake calls
4. Piracy
5. Hacking social sites
12. 6. Hacking into personal accounts
7. Hacking into work databases
8. Schemes/scams based on fake
websites
9. Various credit-related thefts
10. Breaking into competitor
databases
13. Ransomeware Attack
Ransomware is a type of
malicious software that threatens
to publish the victim's data or
perpetually block access to it
unless a ransom is paid. While
some simple ransomware may
lock the system in a way which is
not difficult for a knowledgeable
person to reverse, more advanced
malware uses a technique called
cryptoviral extortion.
15. Malicious Code:
Malicious code is code causing
damage to a computer or system. It is
code not easily or solely controlled
through the use of anti-virus tools.
Malicious code can either activate itself
or be like a virus requiring a user to
perform an action, such as clicking on
something or opening an email
attachment.
17. Programming Bugs:
In computer technology, a bug is a
coding error in a computer program. The
process of finding bugs before program users
do is called debugging.
25. Security Procedures:
Handling copyright infringement notifications - The steps
Information Security will take if informed of a copyright
infringement that has happened via the LSE network.
Log duration - How long IMT will keep logs that have been
generated.
Non-standard user account expiries - The maximum duration
non-standard LSE user accounts will exist and at what point
extensions will need to be requested.
Virus outbreaks on campus public area workstations - What
we will do if we discover there is a virus outbreak on an LSE
machine in the library, or in a computer room.
26. Guidelines
Dropbox and other cloud-based services guidelines -
Information on when it might be appropriate to use Dropbox or other
cloud storage
Encryption guidelines - A guide on encrypting data and devices
Encryption guidelines for students - A guide on encrypting data
and devices for students
Remote access and mobile working guidelines - A guide on
how to protect your devices and data when working remotely
Using 7-Zip to encrypt and decrypt files - A guide on using 7-Zip
to encrypt files and make them more secure
Using USB storage devices - Issues to consider before putting data
on USB storage devices such as data sticks or external hard drives
27. Security Laws
• IT Act 2000
• IT (Amendment) Act 2008
• Notifications & Rules under section 6A,
43A & 79