CYBER FORENSICS | Kiran Bettadapur S. | 5/8/2018.

Slides:



Advertisements
Similar presentations
OC RIMS Cyber Safety & Security Incident Response.
Advertisements

2 Language of Computer Crime Investigation
Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
CYBER CRIME AND SECURITY TRENDS
presentation topic : cyber crimes and security By ashwini awatare
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Discovering Computers 2010
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Securing Information Systems
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent.
Teaching Digital Forensics w/Virtuals By Amelia Phillips.
Cyber crime & Security Prepared by : Rughani Zarana.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Computer Forensics Principles and Practices
Introduction to Digital Forensics Florian Buchholz.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Computer Security Fundamentals by Chuck Easttom Chapter 14 Introduction to Forensics.
Cybercrime What is it, what does it cost, & how is it regulated?
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
Computer crimes.
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA Search.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Guide to Computer Forensics and Investigations Fifth Edition
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
By: Jeremy Henry. Road Map  What is a cybercrime?  Statistics.  Tools used by an investigator.  Techniques and procedures used.  Specific case.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Computer Forensics and Cyber Crimes. Computer Forensics The systematic identification, preservation, extraction, documentation, and analysis of electronic.
Cyber crime and security issues
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Seminar by: Guided By: Nidhi Anand Sandhya Rani Sahoo Regd No:
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Securing Information Systems
Computer Security Fundamentals
A Project on CYBER SECURITY
Computer Crime CJ 520 / CJ October 27, 2010.
Seminar On Cyber Crime Submitted To: Submitted By:
Computer Forensics 1 1.
Introduction to Computer Forensics
COMPUTER CRIME.
Securing Information Systems
Introduction to Computer Forensics
Network and Internet Security and Privacy
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer Security.
Presentation transcript:

CYBER FORENSICS | Kiran Bettadapur S. | 5/8/2018

DIGITAL ERA 5/8/2018

INTERNET TRAFFIC Over 100,000 Petabytes/Month in 2016 100,000,000,000 Gigabytes  STORE… ALL FILMS [HD]: 2000X ALL BOOKS [PDF]: 333X ALL YOUTUBE: 1,000X 5/8/2018

CYBERCRIME C Y B E R C R I M E T Y P E S COMPUTER AS OBJECT: ILLEGAL ACCESS UNLAWFUL DATA TRANSMISSION DATA DELETION WEBSITE DEFACING COMPUTER AS MEDIUM: ID THEFT FRAUD E-THEFT PHISHIING CONTENTS OF COMPUTER: CHILD PORNOGRAPHY STOLEN SENSITIVE INFO TERROR ATTACK DETAILS C Y B E R C R I M E T Y P E S AGAINST PERSONS: IDENTITY THEFT INFO THEFT DEFAMATION CYBER THREATS, BULLYING & STALKING FORGERY HARASSMENT E-MAIL SPOOFING & SPAM; PHISHING CHILD SOLICITING AGAINST GOVERNMENT: SALE OF ILLEGAL ITEMS: WEAPONS, WILDLIFE, DRUGS CYBER WAR & TERRORISM CHILD PORNOGRAPHY ONLINE GAMBLING SECURE SYSTEM HACKING ONLINE ESPIONAGE AGAINST PROPERTY DENIAL OF SERVICE MALWARE: Viruses, Trojans, Worms, Mail Bombs, Ransomware CYBER SQUATTING HACKING SALAMI SLICING (PENNY SHAVING) CREDIT CARD FRAUD IP CRIMES: Software Piracy; IP Violations (Copyright, TM, etc.) 5/8/2018

WHAT IS? CYBER FORENSICS Challenges of Cyber Crime: Emerging Field On the Increase Skillful Criminals No Barriers or Borders Evolving Laws Digital Evidence Sources Computers Storage Devices Mobile Devices: Phones, Tabs, etc. Electronic Gadgets: Cameras, etc. Emerging Field Digital Evidence Collection Analysis Results From: Incidents Result Of: Investigation Results In: Legal Evidence CYBER FORENSICS 5/8/2018

[part of digital forensics] BRANCHES B r a n c h e s o f C Y B E R F O R E N S I C S [part of digital forensics] CLOUD & NETWORK FORENSICS: SECURITY ATTACKS & PROBLEM INCIDENTS TWO SYSTEMS: ─ CATCH-IT-AS-YOU-CAN… Batch-mode Traffic Analysis …Needs Storage ─ STOP-LOOK-’N-LISTEN… Individual Packet Analysis …Needs processing power MOBILE DEVICE FORENSICS: CELL PHONES; DIGITAL CAMERAS; I-PODS; etc… ANY MEDIUM FOR STORAGE OF CONTENT DATA & DATABASE FORENSICS SERVER SIDE CLIENT SIDE MALWARE E-MAIL & SOCIAL MEDIA INCIDENT RESPONSE AUDITS 5/8/2018

WHAT IT ENTAILS CYBER FORENSICS Intrusion Detection & Access Control 2. Web History & Storage Analysis 1. Network Evidence 3. CYBER FORENSICS Image or Clone Creation 7. System Artifacts: Logs, users media, etc. 8. E-mail Tracing & Data Recovery 6. Traffic & Flow Analysis 4. Attack Pattern Analysis 5. 5/8/2018

DIGITAL EVIDENCE ASPECTS PRIMARY STORAGE OFFLINE STORAGE PHYSICAL : Chain of Custody Document Secure Storage Photos Original + Backup + Working LOGICAL : Work on Copy Minimal Access of Original Use Write-blocking Use Hash Functions SECONDARY STORAGE TERTIARY / NEARLINE / CLOUD STORAGE 5/8/2018

COLLECTION CHALLENGES DELETED / ERASED 2. PRESENT 1. HIDDEN 3. DIGITAL EVIDENCE CORRUPTED 6. ENCRYPTED 4. COMPRESSED 5. 5/8/2018

EVIDENCE TAMPERING LEVELS OF TAMPERING 2. 1. 3. 6. 4. 5. REMOVING [From Recycle Bin] 2. DELETING & TRAPPING 1. FORMATTING [Index, not actual data removed] 3. LEVELS OF TAMPERING DEVICE DESTRUCTION [Shredding & Melting] 6. WIPING [Changed to 0’s & 1’s] 4. PHYSICAL DAMAGING [Hammering] 5. 5/8/2018

ANALYSIS M E T H O D S & T E C H N I Q U E S CROSS-DRIVE ANALYSIS: CORRELATION…of info on multiple devices IDENTIFY SOCIAL NETWORKS ANOMALY DETECTION LIVE ANALYSIS: SYTEM EXAMINATION… from within the OS CUSTOM TOOLS SYSADMIN TOOLS DE-ENCRYPTION STOCHASTIC FORENSICS: PROBABILITY THEORY ACTIVITIES LACKING DIGITAL ARTIFACTS DATA THEFT M E T H O D S & T E C H N I Q U E S STEGANALYSIS: STEGANOGRAPHY Concealment of Data … in picture or digital image Encrypted Payload BARRAGE NOISE Random data; white noise, Misinformation, meaningless drivel DETECTING HASH VALUE CHANGES DELETED FILE RETRIEVAL: DISK RECONSTRUCTION Reconstruct from file sectors FILE CARVING Search for file-headers in disk image Reconstruct Deleted Material CRYPTANALYSIS: DECIPHERING ENCRPTED MESSAGES No access to key or encryption algorithm SYMMETRIC KEY Block Ciphers (Blocks of text) Stream Ciphers (Individual characters) HASH FUNCTIONS 5/8/2018

PROCESS TRIAL & TESTIMONY COLLECTION: PREPARATION EXAMINATION: Devices/Sources: RFID, Black-boxes (vehicle), etc. Due Care No Heat, X-Ray, etc. Imaging media Chain of custody Document PREPARATION Training of Investigators Tools & Planning Suspect Questioning Warrant EXAMINATION: Electronic Content Procedures & Techniques: Case by Case basis ANALYSIS; REPORTING Tools: Integrated / Special EnCase, FTK, Sleuth Kit, Scalpel, ProDiscover Logs, files, emails, registry, Browsing History, etc. Cracking PWD Extracting files Presenting Exhibits TRIAL & TESTIMONY 5/8/2018

5/8/2018

“Thank You!” 5/8/2018