SlideShare une entreprise Scribd logo
1  sur  44
IT for Forensic
-By Mitesh Katira,
APMH & Associates LLP,
Forensic on IT
Digital Forensics
Penetration of Digitization – From
Laptop to Smart Phone
Penetration of Digitization – From
Laptop to Smart Phone
Transformation from EDGE(1G) to (4G)
Importance of Social Media
Importance of Communication
Credit / Debit Card Details Compromised
• Recently 3.2 million Debit Card details were compromised, 2.6 million are said
to be on the Visa and Master-Card platform and 600,000 on the RuPay
platform. The worst-hit of the card-issuing banks are State Bank of India.
• The breach is said to have originated in malware introduced in systems of
Hitachi Payment Services, enabling fraudsters to steal information allowing
them to steal funds. Hitachi, which provides ATM, point of sale (PoS) and other
services, couldn't be reached.
• A forensic audit has now been ordered by Payments Council of India on Indian
bank servers and systems to detect the origin of frauds that might have hit
customer accounts.
• NPCI Managing Director AP Hota said: "We have received complaints from
banks about debit cards being used in China which aroused suspicion.“
• Several victims have reported unauthorised usage from locations in China.
Read more at:
http://economictimes.indiatimes.com/articleshow/54945561.cms?utm_source
=contentofinterest&utm_medium=text&utm_campaign=cppst
Kaspersky Lab Research
• 52 per cent of internet users who have lost their money to cyber
criminals have got only some, or none, of their stolen funds back.
• On an Average user Loses $476 Per Attack, Only 1/10th People
Surveyed who lost more than $5000.
• 81% of Internet Users Conduct Financial Operations Online, Just
under Half (44%) Store Financial Data on Connected Devices.
• 45% Assume that Bank shall Reimburse, but Actual Survey Says 52%
of them haven’t Received all their Stolen Money.
Read more at:
http://economictimes.indiatimes.com/articleshow/56807388.cms?utm_source=contentofinterest&
utm_medium=text&utm_campaign=cppst
Spoofing banks websites
• Identical Website as the same of Bank
• Customer Logins into his account with Credential assuming it as
Bank’s website, then initiates transaction, generates OTP.
• At the Same time, the Attacker enters the same details given by you
on the Original Bank Website, Initiates the Transaction, and also
gets the OTP which Customer enters on Fake Website.
• After OTP they Fake Website Shows Wrong Credential, But fact is
that the Attackers has transferred the Funds from your Account.
Modi App hacked by Javed Khatri, 22-year old
• Narendra Modi wanted the nation to use his app which offered a survey containing 10 questions. The review was to
determine if the citizens of India were likely to support demonetisation or not.
• Amidst the hustle-bustle of the payday, on December 1, a 22-year-old hacker cracked the Narendra Modi app.
According to a YourStory report, hacker Javed Khatri claimed that he was able to hack the app.
• He was able to access private data of any user on the app. The data includes phone number, email, name, location,
interests, last seen etc. He successfully managed to extract the personal phone numbers and email ids of ministers
like Smriti Irani.
• Not only that, he can make any user on the platform follow any other user on the platform. This is just the summary
of this huge security loophole which he wanted to report. The privacy of more than seven million users is at stake if
this gets ignored.
• He did not want to cause any harm but wanted to demonstrate how poor
the security of the app is. He even mentioned it was easy for him to hack
the app.
• http://indiatoday.intoday.in/story/security-22-year-old-hacks-modi-app-
private-data-7-million/1/825661.html
Screen shot – 1
Jubin Mehta
Screen Shots of Modi App Hacked
Screen shot – 2
Jintendra Singh
Screen shot – 3
Smriti Irani
Technology Risk
• Hard Disk
• A Hard Disk can be recovered even after it is formatted, In order to delete all the
data permanently, HDD should be formatted for minimum of 7 Times
• Data Security
• Data security is a very important Drawback due it Lack of Awareness of IT.
• Data is on Cloud and hence can be accessed from anywhere anytime just by knowing
a password, In that case password is the key to ones whole organization
• Password Selection and Management
• Password should not be name, mobile number, Dad’s name, etc
• Most commonly used passwords are : Name, Number, 123456789, password, admin,
name@123, etc.
• A strong Password is created with Alphabets(Both Capital and small), Numbers,
Special Characters and it should be at least 8 characters long.
Google Accounts Hacking
• Experts are also seeing a shift in the strategy of hackers, who are now targeting mobile devices in
order to obtain the sensitive information that is stored on them. Israeli cyber security firm
Checkpoint said that its security researchers have revealed a new variant of Android malware,
breaching the security of more than one million Google accounts.
• The new malware campaign, named Gooligan, roots Android devices and steals email addresses
and authentication tokens stored on them. With this information, attackers can access users’
sensitive data from Gmail, Google Photos, Google Docs, Google Play and Google Drive, according
to Check Point.
• “This theft of over a million Google account details is very alarming and represents the next stage
of cyber- attacks,” said Michael Shaulov, Check Point’s head of mobile products in a statement.
• Check Point’s Mobile Research Team first encountered Gooligan’s code in the malicious SnapPea
app last year.
• In August 2016, the malware reappeared with a new variant and has since infected at least 13,000
devices per day. About 40 per cent of these devices are located in Asia and about 12 per cent are
in Europe
Detection
Solution
Prevention
Tools for Forensics
• WIFIKEYVIEW
• WIFIKEYVIEW enables the view of all the WIFI connected to the Device currently and
also in past,
• It shows the Passwords and keys to all the WiFi connected to the device at any time.
• USB Deview
• USBDeview is a small utility that lists all USB devices that currently connected to your
computer, as well as all USB devices that you previously used.
• For each USB device, extended information is displayed: Device name/description,
device type, serial number (for mass storage devices), the date/time that device was
added, VendorID, ProductID, and more...
• USBDeview also allows you to uninstall USB devices that you previously used,
disconnect USB devices that are currently connected to your computer, as well as to
disable and enable USB devices.
• You can also use USBDeview on a remote computer, as long as you login to that
computer with admin user.
MYIP.IS
Who.is Domain
Crazycall.net
• Winhex
• Clone the disk for official forensic
• Virus Total
• Website for scanning a particular file for the virus
• Recuva
• Recover the data which is deleted
• Spice works
• Scan the complete systems
• Andriller Cellebrite
• Android Forensic Software name
Cloud Computing
• Storage at external location
• Processing from the external place (Devise agnostic)
• From anywhere (location agnostic)
• Pooling of resource
• At generally on “Pay as You Go” Model
• Building a niche for management of infrastructure
Concept of DDoss / BotNet Attacks
Bots can easily attack a website if the hosting is on
unsecure/less secure Hosting Server
Website
Bots Hosting
DDOS attacks ping the Web address multiple times in
second, data transmission increases between 10-100
times depending on no. of Bots
Case Study : On Botnets
As the BotNets are Blocked on CloudFlare the
connecton to the web will be more secure
Website
Bots Hosting
Cloud Flare
Bots can easily attack a website if the hosting is on
unsecure/less secure Hosting Server
CloudFlare is a tool with a high level of Security when
prevents the BotNet Attacks, an also warns if some
exceptions noticed
Case Study : On Botnets (Cont’d…)
Concept of Ransomeware Attack
An E-mail is Received with an attachment which is
deemed to be a Normal Mail
But the attachment may be
stegnographed which means an
attachment displays ‘X’ but contains
‘Y’
Incase of Ransome ware Virus, ‘Y’ is an
application which may run in Background and
Break all security of the computer, The
Attacker can now Control your system. Eg:
Auto Pilot Mode.
This Ransom ware attacks the files and changes the Extentions to un-openable
extentions, for which attacker would ask for Ransom in Bit Coins to Repair that
file back
Frequently used
Extentions are ‘.locky’
and ‘.zepto’
Case Study 2 : On Ransome ware
Remove the System from your server network. As the
Ransome virus may attack the server and damage the
files there too
Do not Panic and format the hard drive /
Computer
By fetching the Previous to the Last Version of Affected
files, We can get the data of the files with minimal data
loss
This can be done using Hiren Boot and some other
Softwares or Processes
Previous to Last version of Files may be recovered and
you may get your data by Recovery from below
softwares.
Formatting by clear the
cache from which we
wouldn’t be able to
Recover Previous
Versions
Gmail Access History
Gmail Access History (Cont’d…)
Some Analytics on BITCOIN
• Bitcoin dropped below $7,000 on Friday to trade more than 5 percent down on the day, having fallen by well
over $1,000 since hitting an all-time high.
• Bitcoin dropped to $6,800 on the Luxembourg-based Bitstamp exchange by 1200 GMT, before recovering a
little to $6,870 just over 20 minutes later.
• On Wednesday around 1800 GMT, it had touched $7,888 after a software upgrade planned for next week
that could have split the cryptocurrency in two was suspended.
• As bitcoin fell, Bitcoin Cash - a clone of the original that was generated from another split on Aug.1 - surged,
trading up as much as 35 percent on the day at around $850, according to industry website Coinmarketcap.
• Despite losing almost 7 percent this week, bitcoin is still up more than 600 percent so far this year.
Read more at:
//economictimes.indiatimes.com/articleshow/61596454.cms?utm_source=contentofinterest&utm_medium=t
ext&utm_campaign=cppst
Bitcoin (Cont’d…)
Has your bank account been debited for a transaction
you haven't done? Here's what to do
Banking fraud is becoming all too common in India. With Prime Minister Narendra Modi pushing for a less cash
economy, it becomes all the more important to fix the problem of digital frauds.
Keeping this in mind and seeing a rise in customer complaints regarding unauthorised electronic transactions,
the Reserve Bank of India (RBI), in July, released new rules which makes it safer for customers to transact electronically.
On July 6, 2017, the RBI issued a notification, Customer protection - limited liability of customers in
unauthorised electronic banking transactions. The good news is that the onus is on the banks to prove that a fraud has
taken place, but customers should inform the bank as soon as possible to avoid being penalised.
What Banks have to do?
No Facility of electronic transactions, if
Mobile Numbers Not Provided
Notify the bank as soon as Possible, of
unauthorised electronic transaction
Zero Liability of the Customer
when :
SMS & E-mail Alerts
Negligence from Bank’s End
Technical Glitch at Bank’s End where
Customer Details are Compromised
Fraudulent Activities where Customer Details
are given away
Third-Party Breach, where Neither Bank nor
Customer is at Fault
Liability of a Customer?
Now if the bank is at fault, you do not pay, but if the fraud or wrongful debit has happened because
of your negligence, then you will have to bear the brunt. This could happen if you mentioned your PIN number
or password in passing or left it lying around and someone used it without your knowledge. The good news is
that even though this transaction has happened due to your negligence, if you report it to the bank before
seven working days (and after three days) from receiving the debit message, the RBI notification says that the
per transaction liability of the customer will be limited to the transaction value or an amount set by the central
bank, whichever is lower.
And if you take more than seven days, "the customer liability shall be determined as per the
bank's Board approved policy," says the RBI notification.
How long will it take for the reversal?
Banks have to credit or reverse the unauthorised electronic transaction to the customer's account
within 10 working days from the date of notification by the customer. And once reported, in case of debit card
or bank account fraud, the bank should ensure that the customer does not suffer loss of interest. If the
transaction has happened on a credit card, the customer should not have to additional burden of interest. If
the transaction has happened on a credit card, the customer should not have to additional burden of interest.
Also, once reported, banks have to resolve the case within 90 days from the date of receipt of the
complaint.
What should you do?
Banking frauds are on the rise and RBI has released data in March of this year which corroborates this
fact. In total there were 3,870 cases of fraud worth Rs 17,750 crore. Our lives will only get more reliant on
technology and tricksters will only come up with more innovative ways to steal our hard earned money. So,
take the necessary precautions and do not give out your bank or credit card details to anyone who you do not
trust and - we cannot stress this fact enough - inform the bank as soon you get to know of a wrongful
transaction in your account.
Read more at:
//economictimes.indiatimes.com/articleshow/61577976.cms?utm_source=contentofinterest&utm_medium=t
ext&utm_campaign=cppst
For Further Details :
Contact No. : +91-9833777556
E-mail : mitesh@apmh.in

Contenu connexe

Tendances

Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...rahulmonikasharma
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilityPvrtechnologies Nellore
 
Hindering data theft attack through fog computing
Hindering data theft attack through fog computingHindering data theft attack through fog computing
Hindering data theft attack through fog computingeSAT Publishing House
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Jishnu Pradeep
 
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...1crore projects
 
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...Nexgen Technology
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditorijsrd.com
 
Secure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on CloudSecure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on CloudIJMTST Journal
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePvrtechnologies Nellore
 
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerSecure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerIRJET Journal
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 

Tendances (19)

Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
Fog doc
Fog doc Fog doc
Fog doc
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
 
Hindering data theft attack through fog computing
Hindering data theft attack through fog computingHindering data theft attack through fog computing
Hindering data theft attack through fog computing
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
 
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
 
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
 
Secure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on CloudSecure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on Cloud
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerSecure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
 
Oruta project report
Oruta project reportOruta project report
Oruta project report
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
L04302088092
L04302088092L04302088092
L04302088092
 

Similaire à Forensic And Cloud Computing

Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 
How to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law PracticeHow to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law PracticeRocket Matter, LLC
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed Great Bay Software
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five yearsSABBY GILL
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.Teri Radichel
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarDaniel Versola
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeRocket Matter, LLC
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectivePragati Rai
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareFelipe Prado
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsChristopher Frenz
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 

Similaire à Forensic And Cloud Computing (20)

Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Private Date and PRYING Eyes - Talking Cybersecurity at After Work Network
Private Date and PRYING Eyes - Talking Cybersecurity at After Work NetworkPrivate Date and PRYING Eyes - Talking Cybersecurity at After Work Network
Private Date and PRYING Eyes - Talking Cybersecurity at After Work Network
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
cyber forensics
cyber forensicscyber forensics
cyber forensics
 
How to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law PracticeHow to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law Practice
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 

Plus de Mitesh Katira

Budget_Booklet_2022-23pdf
Budget_Booklet_2022-23pdfBudget_Booklet_2022-23pdf
Budget_Booklet_2022-23pdfMitesh Katira
 
CryptoPresentation - CTC (1).pdf
CryptoPresentation - CTC (1).pdfCryptoPresentation - CTC (1).pdf
CryptoPresentation - CTC (1).pdfMitesh Katira
 
Delegation Ideas for business owners
Delegation Ideas for business ownersDelegation Ideas for business owners
Delegation Ideas for business ownersMitesh Katira
 
E booklet Union Budget 2018-19
E booklet Union Budget 2018-19E booklet Union Budget 2018-19
E booklet Union Budget 2018-19Mitesh Katira
 
VAT Implementation in KSA (Kingdom of Saudi Arabia)
VAT Implementation in KSA (Kingdom of Saudi Arabia)VAT Implementation in KSA (Kingdom of Saudi Arabia)
VAT Implementation in KSA (Kingdom of Saudi Arabia)Mitesh Katira
 
VAT Implementation in UAE
VAT Implementation in UAEVAT Implementation in UAE
VAT Implementation in UAEMitesh Katira
 
How To Make A Startup Standup?
How To Make A Startup Standup?How To Make A Startup Standup?
How To Make A Startup Standup?Mitesh Katira
 
Tech Issues in GST return filing
Tech Issues in GST return filingTech Issues in GST return filing
Tech Issues in GST return filingMitesh Katira
 
GST Training Slide Deck APMH
GST Training Slide Deck APMHGST Training Slide Deck APMH
GST Training Slide Deck APMHMitesh Katira
 
GST Implementation Slide Deck
GST Implementation Slide DeckGST Implementation Slide Deck
GST Implementation Slide DeckMitesh Katira
 
Effects of Demonetisation
Effects of DemonetisationEffects of Demonetisation
Effects of DemonetisationMitesh Katira
 
GST Suvidha Provider (GSP) Model
GST Suvidha Provider (GSP) ModelGST Suvidha Provider (GSP) Model
GST Suvidha Provider (GSP) ModelMitesh Katira
 
Reverse charge mechanism
Reverse charge mechanismReverse charge mechanism
Reverse charge mechanismMitesh Katira
 
APMH & Associates - corporate profile
APMH & Associates - corporate profileAPMH & Associates - corporate profile
APMH & Associates - corporate profileMitesh Katira
 
Internal financial control
Internal financial controlInternal financial control
Internal financial controlMitesh Katira
 
Simple sanskrit class
Simple sanskrit classSimple sanskrit class
Simple sanskrit classMitesh Katira
 

Plus de Mitesh Katira (20)

Budget_Booklet_2022-23pdf
Budget_Booklet_2022-23pdfBudget_Booklet_2022-23pdf
Budget_Booklet_2022-23pdf
 
CryptoPresentation - CTC (1).pdf
CryptoPresentation - CTC (1).pdfCryptoPresentation - CTC (1).pdf
CryptoPresentation - CTC (1).pdf
 
Back to Nature Camp
Back to Nature CampBack to Nature Camp
Back to Nature Camp
 
Delegation Ideas for business owners
Delegation Ideas for business ownersDelegation Ideas for business owners
Delegation Ideas for business owners
 
E booklet Union Budget 2018-19
E booklet Union Budget 2018-19E booklet Union Budget 2018-19
E booklet Union Budget 2018-19
 
VAT Implementation in KSA (Kingdom of Saudi Arabia)
VAT Implementation in KSA (Kingdom of Saudi Arabia)VAT Implementation in KSA (Kingdom of Saudi Arabia)
VAT Implementation in KSA (Kingdom of Saudi Arabia)
 
VAT Implementation in UAE
VAT Implementation in UAEVAT Implementation in UAE
VAT Implementation in UAE
 
How To Make A Startup Standup?
How To Make A Startup Standup?How To Make A Startup Standup?
How To Make A Startup Standup?
 
Tech Issues in GST return filing
Tech Issues in GST return filingTech Issues in GST return filing
Tech Issues in GST return filing
 
GST Training Slide Deck APMH
GST Training Slide Deck APMHGST Training Slide Deck APMH
GST Training Slide Deck APMH
 
GST Implementation Slide Deck
GST Implementation Slide DeckGST Implementation Slide Deck
GST Implementation Slide Deck
 
Effects of Demonetisation
Effects of DemonetisationEffects of Demonetisation
Effects of Demonetisation
 
GST Suvidha Provider (GSP) Model
GST Suvidha Provider (GSP) ModelGST Suvidha Provider (GSP) Model
GST Suvidha Provider (GSP) Model
 
Forensic Auditing
Forensic AuditingForensic Auditing
Forensic Auditing
 
Reverse charge mechanism
Reverse charge mechanismReverse charge mechanism
Reverse charge mechanism
 
Overview of GST
Overview of GSTOverview of GST
Overview of GST
 
APMH & Associates - corporate profile
APMH & Associates - corporate profileAPMH & Associates - corporate profile
APMH & Associates - corporate profile
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
Internal financial control
Internal financial controlInternal financial control
Internal financial control
 
Simple sanskrit class
Simple sanskrit classSimple sanskrit class
Simple sanskrit class
 

Dernier

Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintSuomen Pankki
 
The AES Investment Code - the go-to counsel for the most well-informed, wise...
The AES Investment Code -  the go-to counsel for the most well-informed, wise...The AES Investment Code -  the go-to counsel for the most well-informed, wise...
The AES Investment Code - the go-to counsel for the most well-informed, wise...AES International
 
Tenets of Physiocracy History of Economic
Tenets of Physiocracy History of EconomicTenets of Physiocracy History of Economic
Tenets of Physiocracy History of Economiccinemoviesu
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companiesprashantbhati354
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasCherylouCamus
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证jdkhjh
 
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACTGOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACTharshitverma1762
 
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...Amil Baba Dawood bangali
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办fqiuho152
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHenry Tapper
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantagesjayjaymabutot13
 
2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGeckoCoinGecko
 
Stock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfStock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfMichael Silva
 
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一S SDS
 
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)ECTIJ
 
Stock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfStock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfMichael Silva
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...First NO1 World Amil baba in Faisalabad
 
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...yordanosyohannes2
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfMichael Silva
 

Dernier (20)

Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraint
 
The AES Investment Code - the go-to counsel for the most well-informed, wise...
The AES Investment Code -  the go-to counsel for the most well-informed, wise...The AES Investment Code -  the go-to counsel for the most well-informed, wise...
The AES Investment Code - the go-to counsel for the most well-informed, wise...
 
Tenets of Physiocracy History of Economic
Tenets of Physiocracy History of EconomicTenets of Physiocracy History of Economic
Tenets of Physiocracy History of Economic
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companies
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng Pilipinas
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
 
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACTGOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
 
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview document
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantages
 
2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko
 
Stock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfStock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdf
 
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
 
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
 
Stock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfStock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdf
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
 
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdf
 
🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road
 

Forensic And Cloud Computing

  • 1. IT for Forensic -By Mitesh Katira, APMH & Associates LLP, Forensic on IT Digital Forensics
  • 2.
  • 3. Penetration of Digitization – From Laptop to Smart Phone Penetration of Digitization – From Laptop to Smart Phone
  • 7. Credit / Debit Card Details Compromised • Recently 3.2 million Debit Card details were compromised, 2.6 million are said to be on the Visa and Master-Card platform and 600,000 on the RuPay platform. The worst-hit of the card-issuing banks are State Bank of India. • The breach is said to have originated in malware introduced in systems of Hitachi Payment Services, enabling fraudsters to steal information allowing them to steal funds. Hitachi, which provides ATM, point of sale (PoS) and other services, couldn't be reached. • A forensic audit has now been ordered by Payments Council of India on Indian bank servers and systems to detect the origin of frauds that might have hit customer accounts. • NPCI Managing Director AP Hota said: "We have received complaints from banks about debit cards being used in China which aroused suspicion.“ • Several victims have reported unauthorised usage from locations in China. Read more at: http://economictimes.indiatimes.com/articleshow/54945561.cms?utm_source =contentofinterest&utm_medium=text&utm_campaign=cppst
  • 8. Kaspersky Lab Research • 52 per cent of internet users who have lost their money to cyber criminals have got only some, or none, of their stolen funds back. • On an Average user Loses $476 Per Attack, Only 1/10th People Surveyed who lost more than $5000. • 81% of Internet Users Conduct Financial Operations Online, Just under Half (44%) Store Financial Data on Connected Devices. • 45% Assume that Bank shall Reimburse, but Actual Survey Says 52% of them haven’t Received all their Stolen Money. Read more at: http://economictimes.indiatimes.com/articleshow/56807388.cms?utm_source=contentofinterest& utm_medium=text&utm_campaign=cppst
  • 9. Spoofing banks websites • Identical Website as the same of Bank • Customer Logins into his account with Credential assuming it as Bank’s website, then initiates transaction, generates OTP. • At the Same time, the Attacker enters the same details given by you on the Original Bank Website, Initiates the Transaction, and also gets the OTP which Customer enters on Fake Website. • After OTP they Fake Website Shows Wrong Credential, But fact is that the Attackers has transferred the Funds from your Account.
  • 10. Modi App hacked by Javed Khatri, 22-year old • Narendra Modi wanted the nation to use his app which offered a survey containing 10 questions. The review was to determine if the citizens of India were likely to support demonetisation or not. • Amidst the hustle-bustle of the payday, on December 1, a 22-year-old hacker cracked the Narendra Modi app. According to a YourStory report, hacker Javed Khatri claimed that he was able to hack the app. • He was able to access private data of any user on the app. The data includes phone number, email, name, location, interests, last seen etc. He successfully managed to extract the personal phone numbers and email ids of ministers like Smriti Irani. • Not only that, he can make any user on the platform follow any other user on the platform. This is just the summary of this huge security loophole which he wanted to report. The privacy of more than seven million users is at stake if this gets ignored. • He did not want to cause any harm but wanted to demonstrate how poor the security of the app is. He even mentioned it was easy for him to hack the app. • http://indiatoday.intoday.in/story/security-22-year-old-hacks-modi-app- private-data-7-million/1/825661.html
  • 11. Screen shot – 1 Jubin Mehta Screen Shots of Modi App Hacked
  • 12. Screen shot – 2 Jintendra Singh
  • 13. Screen shot – 3 Smriti Irani
  • 14. Technology Risk • Hard Disk • A Hard Disk can be recovered even after it is formatted, In order to delete all the data permanently, HDD should be formatted for minimum of 7 Times • Data Security • Data security is a very important Drawback due it Lack of Awareness of IT. • Data is on Cloud and hence can be accessed from anywhere anytime just by knowing a password, In that case password is the key to ones whole organization • Password Selection and Management • Password should not be name, mobile number, Dad’s name, etc • Most commonly used passwords are : Name, Number, 123456789, password, admin, name@123, etc. • A strong Password is created with Alphabets(Both Capital and small), Numbers, Special Characters and it should be at least 8 characters long.
  • 15. Google Accounts Hacking • Experts are also seeing a shift in the strategy of hackers, who are now targeting mobile devices in order to obtain the sensitive information that is stored on them. Israeli cyber security firm Checkpoint said that its security researchers have revealed a new variant of Android malware, breaching the security of more than one million Google accounts. • The new malware campaign, named Gooligan, roots Android devices and steals email addresses and authentication tokens stored on them. With this information, attackers can access users’ sensitive data from Gmail, Google Photos, Google Docs, Google Play and Google Drive, according to Check Point. • “This theft of over a million Google account details is very alarming and represents the next stage of cyber- attacks,” said Michael Shaulov, Check Point’s head of mobile products in a statement. • Check Point’s Mobile Research Team first encountered Gooligan’s code in the malicious SnapPea app last year. • In August 2016, the malware reappeared with a new variant and has since infected at least 13,000 devices per day. About 40 per cent of these devices are located in Asia and about 12 per cent are in Europe
  • 17. Tools for Forensics • WIFIKEYVIEW • WIFIKEYVIEW enables the view of all the WIFI connected to the Device currently and also in past, • It shows the Passwords and keys to all the WiFi connected to the device at any time. • USB Deview • USBDeview is a small utility that lists all USB devices that currently connected to your computer, as well as all USB devices that you previously used. • For each USB device, extended information is displayed: Device name/description, device type, serial number (for mass storage devices), the date/time that device was added, VendorID, ProductID, and more... • USBDeview also allows you to uninstall USB devices that you previously used, disconnect USB devices that are currently connected to your computer, as well as to disable and enable USB devices. • You can also use USBDeview on a remote computer, as long as you login to that computer with admin user.
  • 21. • Winhex • Clone the disk for official forensic
  • 22.
  • 23.
  • 24. • Virus Total • Website for scanning a particular file for the virus
  • 25. • Recuva • Recover the data which is deleted
  • 26. • Spice works • Scan the complete systems
  • 27. • Andriller Cellebrite • Android Forensic Software name
  • 28. Cloud Computing • Storage at external location • Processing from the external place (Devise agnostic) • From anywhere (location agnostic) • Pooling of resource • At generally on “Pay as You Go” Model • Building a niche for management of infrastructure
  • 29. Concept of DDoss / BotNet Attacks
  • 30. Bots can easily attack a website if the hosting is on unsecure/less secure Hosting Server Website Bots Hosting DDOS attacks ping the Web address multiple times in second, data transmission increases between 10-100 times depending on no. of Bots Case Study : On Botnets
  • 31. As the BotNets are Blocked on CloudFlare the connecton to the web will be more secure Website Bots Hosting Cloud Flare Bots can easily attack a website if the hosting is on unsecure/less secure Hosting Server CloudFlare is a tool with a high level of Security when prevents the BotNet Attacks, an also warns if some exceptions noticed Case Study : On Botnets (Cont’d…)
  • 32. Concept of Ransomeware Attack An E-mail is Received with an attachment which is deemed to be a Normal Mail But the attachment may be stegnographed which means an attachment displays ‘X’ but contains ‘Y’ Incase of Ransome ware Virus, ‘Y’ is an application which may run in Background and Break all security of the computer, The Attacker can now Control your system. Eg: Auto Pilot Mode. This Ransom ware attacks the files and changes the Extentions to un-openable extentions, for which attacker would ask for Ransom in Bit Coins to Repair that file back Frequently used Extentions are ‘.locky’ and ‘.zepto’
  • 33. Case Study 2 : On Ransome ware Remove the System from your server network. As the Ransome virus may attack the server and damage the files there too Do not Panic and format the hard drive / Computer By fetching the Previous to the Last Version of Affected files, We can get the data of the files with minimal data loss This can be done using Hiren Boot and some other Softwares or Processes Previous to Last version of Files may be recovered and you may get your data by Recovery from below softwares. Formatting by clear the cache from which we wouldn’t be able to Recover Previous Versions
  • 35. Gmail Access History (Cont’d…)
  • 36.
  • 37. Some Analytics on BITCOIN • Bitcoin dropped below $7,000 on Friday to trade more than 5 percent down on the day, having fallen by well over $1,000 since hitting an all-time high. • Bitcoin dropped to $6,800 on the Luxembourg-based Bitstamp exchange by 1200 GMT, before recovering a little to $6,870 just over 20 minutes later. • On Wednesday around 1800 GMT, it had touched $7,888 after a software upgrade planned for next week that could have split the cryptocurrency in two was suspended. • As bitcoin fell, Bitcoin Cash - a clone of the original that was generated from another split on Aug.1 - surged, trading up as much as 35 percent on the day at around $850, according to industry website Coinmarketcap. • Despite losing almost 7 percent this week, bitcoin is still up more than 600 percent so far this year. Read more at: //economictimes.indiatimes.com/articleshow/61596454.cms?utm_source=contentofinterest&utm_medium=t ext&utm_campaign=cppst
  • 39. Has your bank account been debited for a transaction you haven't done? Here's what to do Banking fraud is becoming all too common in India. With Prime Minister Narendra Modi pushing for a less cash economy, it becomes all the more important to fix the problem of digital frauds. Keeping this in mind and seeing a rise in customer complaints regarding unauthorised electronic transactions, the Reserve Bank of India (RBI), in July, released new rules which makes it safer for customers to transact electronically. On July 6, 2017, the RBI issued a notification, Customer protection - limited liability of customers in unauthorised electronic banking transactions. The good news is that the onus is on the banks to prove that a fraud has taken place, but customers should inform the bank as soon as possible to avoid being penalised.
  • 40. What Banks have to do? No Facility of electronic transactions, if Mobile Numbers Not Provided Notify the bank as soon as Possible, of unauthorised electronic transaction Zero Liability of the Customer when : SMS & E-mail Alerts Negligence from Bank’s End Technical Glitch at Bank’s End where Customer Details are Compromised Fraudulent Activities where Customer Details are given away Third-Party Breach, where Neither Bank nor Customer is at Fault
  • 41. Liability of a Customer? Now if the bank is at fault, you do not pay, but if the fraud or wrongful debit has happened because of your negligence, then you will have to bear the brunt. This could happen if you mentioned your PIN number or password in passing or left it lying around and someone used it without your knowledge. The good news is that even though this transaction has happened due to your negligence, if you report it to the bank before seven working days (and after three days) from receiving the debit message, the RBI notification says that the per transaction liability of the customer will be limited to the transaction value or an amount set by the central bank, whichever is lower. And if you take more than seven days, "the customer liability shall be determined as per the bank's Board approved policy," says the RBI notification.
  • 42. How long will it take for the reversal? Banks have to credit or reverse the unauthorised electronic transaction to the customer's account within 10 working days from the date of notification by the customer. And once reported, in case of debit card or bank account fraud, the bank should ensure that the customer does not suffer loss of interest. If the transaction has happened on a credit card, the customer should not have to additional burden of interest. If the transaction has happened on a credit card, the customer should not have to additional burden of interest. Also, once reported, banks have to resolve the case within 90 days from the date of receipt of the complaint. What should you do? Banking frauds are on the rise and RBI has released data in March of this year which corroborates this fact. In total there were 3,870 cases of fraud worth Rs 17,750 crore. Our lives will only get more reliant on technology and tricksters will only come up with more innovative ways to steal our hard earned money. So, take the necessary precautions and do not give out your bank or credit card details to anyone who you do not trust and - we cannot stress this fact enough - inform the bank as soon you get to know of a wrongful transaction in your account. Read more at: //economictimes.indiatimes.com/articleshow/61577976.cms?utm_source=contentofinterest&utm_medium=t ext&utm_campaign=cppst
  • 43.
  • 44. For Further Details : Contact No. : +91-9833777556 E-mail : mitesh@apmh.in

Notes de l'éditeur

  1. New research from cyber security firm Kaspersky Labs reveals that over half the victims of financial cyber crime struggle to recover the lost money. The study showed that 52 per cent of internet users who have lost their money to cyber criminals have got only some, or none, of their stolen funds back. On average, Internet users lose $476 per attack and one-in-ten people surveyed said they lost more than $5,000. With the variety and sophistication of online financial threats against consumers growing, losses from online fraud, identity theft and hacking are now running at billions a year. A large majority (81 per cent) of Internet users say they conduct financial operations online and just under half (44 per cent) store financial data on their connected devices. Almost half (45 per cent) say that they assume they will be reimbursed by banks for financial cybercrime without any problems, but as the survey shows, over half (52 per cent) of people affected haven’t had all their stolen money returned.
  2. Researchers in India at cybersecurity company FireEye discovered phishing websites created by cybercriminals that spoof 26 Indian banks in order to steal personal information from customers. FireEye said that it has notified the Indian Computer Emergency Response Team. “Criminals follow the money, and as more Indians embrace online banking, criminals followed them online,” said Vishak Raman, Senior Director for India and SAARC at FireEye in a statement. He said as the digital economy grows, consumers should be aware of the risks that accompany the convenience. He said the ease of online payments opens new avenues for criminals to trick consumers into divulging their own sensitive banking information. For instance, FireEye said that it has identified a new domain (csecurepay.com) registered in October this year, that appears to be an online payment gateway. But it is actually a phishing website that leads to the capturing of customer information from 26 banks operating in India. The company said that in this phishing attack, victims are asked to enter their account number, mobile number, email address, one-time password and other details. Once the information is collected, the website displays a fake failed login message to the victim. The phishing site served fake logins from 26 banks, including large banks such as ICICI, HDFC and State Bank of India, according to FireEye. Using the registration details of this domain, FireEye security researchers identified a second domain (nsecurepay.com) registered by the same attacker in August. This domain appears to be created to steal credit and debit card information including ICICI, Citibank, Visa and MasterCard and SBI debit card details. But it was observed to be producing errors at the time of discovery, according to FireEye.
  3. Who is a third-party you may ask. Well, scammers and fraudsters are getting more creative by the day. It can happen at an ATM (skimming, card trapping etc.), by using public Wi-Fi, malware in ATMs or bank servers, at merchant outlets where you swipe your credit or debit card, or even on your own computer (using ways like pharming and so on) So, to protect yourself and your money, the first step is make sure you apply for the SMS and email alerts service of your bank. The second step would be to intimate the bank as soon as you get the alert that money has been debited from your account. Do it within three days. If you do not, then depending on how long you take, your liability increases.
  4. Who is a third-party you may ask. Well, scammers and fraudsters are getting more creative by the day. It can happen at an ATM (skimming, card trapping etc.), by using public Wi-Fi, malware in ATMs or bank servers, at merchant outlets where you swipe your credit or debit card, or even on your own computer (using ways like pharming and so on) So, to protect yourself and your money, the first step is make sure you apply for the SMS and email alerts service of your bank. The second step would be to intimate the bank as soon as you get the alert that money has been debited from your account. Do it within three days. If you do not, then depending on how long you take, your liability increases.