Extended Learning Module H Computer Crime and Digital Forensics Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.

Slides:



Advertisements
Similar presentations
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Advertisements

McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
OC RIMS Cyber Safety & Security Incident Response.
Computer Forensics.
Extended Learning Module H Computer Crime and Digital Forensics Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
This presentation will take a look at to prevent your information from being discovered by and investigator.
2 Language of Computer Crime Investigation
CHAPTER OVERVIEW SECTION 4.1 – Ethics
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Chapter 9: Privacy, Crime, and Security
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
BUSINESS PLUG-IN B6 Information Security.
McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved Extended Learning Module H COMPUTER CRIME AND FORENSICS.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Chapter 10 Privacy and Security McGraw-Hill
Guide to Computer Forensics and Investigations Fourth Edition
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS SECTION 4.1.
4-1 Chapter Four Overview SECTION ETHICS –Ethics –Information Ethics –Developing Information Management Policies –Ethics in the Workplace SECTION.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.
H-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Extended Learning Module.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
COS/PSA 413 Day 15. Agenda Assignment 3 corrected –5 A’s, 4 B’s and 1 C Lab 5 corrected –4 A’s and 1 B Lab 6 corrected –A, 2 B’s, 1 C and 1 D Lab 7 write-up.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Capturing Computer Evidence Extracting Information.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Securing Information Systems
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Chapter 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control Accounting Information Systems, 9e Gelinas.
Computer Security and Risks. “If the law doesn't fit reality anymore, law has to be changed. That’s not a new thing. That’s civilization as usual” Gilberto.
Essential Computer Concepts
Issues Information Systems and Management. Issues Privacy Ethics Health Computer Crime Security.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Digital Crime Scene Investigative Process
Introduction to Computers
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Next Back MAP MAP B-1 Management Information Systems for the Information Age Second Canadian Edition Copyright 2004 The McGraw-Hill Companies, Inc. All.
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
Chapter 4 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Computer Forensics Principles and Practices
Your Interactive Guide to the Digital World Discovering Computers 2012.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA Search.
Privacy, Security and Ethics
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Computer Forensics and Cyber Crimes. Computer Forensics The systematic identification, preservation, extraction, documentation, and analysis of electronic.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Digital Forensics Anthony Lawrence. Overview Digital forensics is a branch of forensics focusing on investigating electronic devises. Important in for.
IT Security  .
Introduction to Computer Forensics
Presentation transcript:

Extended Learning Module H Computer Crime and Digital Forensics Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin

STUDENT LEARNING OUTCOMES 1. Define computer crime and list three types of computer crime that can be perpetrated from inside and three from outside the organization 2. Identify the seven types of hackers and explain what motivates each group 3. Define digital forensics and describe the two phases of a forensic investigation Mod H-2

STUDENT LEARNING OUTCOMES 4. Describe what is meant by anti-forensics, and give an example of each of the three types 5. Describe two ways in which corporations use digital forensics Mod H-3

INTRODUCTION  Computers are involved in crime in two ways  1.  2.  Computer crimes can be committed  1.  2. Mod H-4

MODULE ORGANIZATION 1. Computer Crime  Learning Outcomes #1 & #2 2. Digital Forensics  Learning Outcome #3 3. Recovery and Interpretation  Learning Outcome #4 4. Who Needs Digital Forensic Investigators?  Learning Outcome #5 Mod H-5

COMPUTER CRIME  Computer crime Mod H-6

Examples of Computer Crimes Mod H-7

Crimes in Which Computers Usually Play a Part Mod H-8

Outside the Organization  In 2006 the greatest financial loss stemmed from Mod H-9

Types of Malware  Malware – software designed to harm you computer or computer security  1.  2.  3.  Types of Malware  1.  2.  3. Mod H-10

Viruses  Computer virus (virus)  Worm Mod H-11

Recent Problems  The most common type of worm was a botnet in 2007 and 2008  Botnet  A botnet can  1.  2.  3. Mod H-12

The Love Bug Worm Mod H-13

Stand-Alone Viruses  Spoofing  Klez family of worms Mod H-14

Trojan Horse Viruses  Trojan horse virus  Examples:  Key logger (key trapper) software  Ping-of-Death DoS attack Mod H-15

Misleading Virus Hoax  Objective is to cause damage to your system  Virus hoax is an telling you of a non- existent virus  1.  2. Mod H-16

Denial-of-Service Attacks  Denial-of-Service (DoS) attack Mod H-17

Distributed DoS  Distributed denial-of-service attack (DDoS) Mod H-18

Distributed Denial-of-Service Attack Mod H-19

Malware Bots  Bot  Malware bots  Zombies (or drones) Mod H-20

Rootkits  Rootkit Mod H-21

Web Defacing  Web defacing Mod H-22

Players  Hackers  Thrill-seeker hackers  White-hat (ethical) hackers Mod H-23

Players  Black hat hackers  Crackers Social engineering Mod H-24

Players  Hacktivists  Cyberterrorists Mod H-25

Players  Script kiddies (or bunnies) Mod H-26

DIGITAL FORENSICS  Digital forensics  Two phases  1.  2. Mod H-27

Phase 1: Collection – Places to look for Electronic Evidence Mod H-28

Phase 1: Preservation  If possible, hard disk is removed without turning computer on  Special forensics computer is used to ensure that nothing is written to drive  Forensic image copy Mod H-29

Phase 1: Authentication  Authentication process necessary for ensuring that no evidence was planted or destroyed  MD5 hash value Mod H-30

Forensic Hardware and Software Tools  Forensics computers usually have a lot of RAM and very fast processors  EnCase – software that finds all information on disks  Quick View Plus and Conversions Plus – read files in many formats  Mailbag Assistant – reads most Mod H-31

Forensics Hardware and Software Tools  Gargoyle – software that identifies encrypted files and may decrypt them  Irfan View – reads image files  Ingenium – semantic analysis software that searches for meaning rather than an exact match Mod H-32

Cell Phones  In countries with more than 1.5 billion users of GSM cell phones (Cingular and most of Europe)  Cell phones can be used for  Illegal drug deals  Storing stolen data  Fraudulently securing goods and services  Setting off explosives Mod H-33

Cell Phones and Other Handheld Devices Files Can Be Recovered from… Mod H-34

Phase 2: Analysis Mod H-35

Where Data is Hiding Mod H-36

History of Disk Activity Mod H-37

Live Analysis Mod H-38

RECOVERY AND INTERPRETATION Mod H-39

between engineers about the Spaceship Columbia Mod H-40

between Enron and Andersen Consulting Mod H-41

from Arresting Officer in the Rodney King Beating Mod H-42

Internal from Bill Gates to Microsoft Employee Mod H-43

Places to Look for Useful Information  Deleted files and slack space  Slack space  System and registry files Mod H-44

Places to Look for Useful Information  Unallocated space Mod H-45

Anti-Forensics  New branch of digital forensics  Set of tools and activities that make it hard or impossible to track user activity  Three categories  1.  2.  3. Mod H-46

Configuration Settings Examples:  Use Shift + Delete to bypass the recycle bin  Rename the file with a different extension  Clear out virtual memory  Use Defrag to rearrange data on the hard disk and overwrite deleted files  Use Disk Cleanup to delete ActiveX controls and Java applets Mod H-47

Configuration Settings Examples:  Delete temporary Internet files  Hide information by making it invisible with Hidden feature in Word or Excel  Redact – black out portions of a document  Protect your files with passwords Mod H-48

Configuration Settings Examples:  Make the information invisible  Use Windows to hide files  Protect file with password Mod H-49

Third-Party Tools to  Alter your registry  Hide Excel files inside Word documents and visa versa  Change the properties like creation date in Windows  Replace disk contents with 1’s and 0’s – called wiping programs Mod H-50

Third Party Tools  Encryption  Steganography  U3 Smart drive Mod H-51

Forensic Defeating Software  Software on the market specially designed to evade forensic examination  Such software would include programs to remove  data in slack space  data in cache memory  cookies, Internet files, Google search history, etc. Mod H-52

WHO NEEDS DIGITAL FORENSICS INVESTIGATORS?  Digital forensics is used in Mod H-53

Organizations Use Digital Forensics in Two Ways Mod H-54

Proactive Education to Educate Employees  Proactive Education for Problem Prevention  What to do and not to do with computer resources such as  1.  2.  3. Mod H-55

Reactive Digital forensics for Incident Response  What to do if wrong-doing is suspected and how to investigate it  Encouraged by the Sarbanes-Oxley Act, which expressly requires implementation of policies to prevent illegal activity and to investigate allegations promptly Mod H-56

A Day in the Life…  As a digital forensics expert you must  Know a lot about computers and how they work  Keep learning  Have infinite patience  Be detail-oriented  Be good at explaining how computers work  Be able to stay cool and think on your feet Mod H-57