Presentation is loading. Please wait.

Presentation is loading. Please wait.

McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.

Similar presentations


Presentation on theme: "McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics."— Presentation transcript:

1 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics

2 Mod H-2 INTRODUCTION  Computers are involved in crime in two ways  As the targets of misdeeds  As weapons or tools of misdeeds  Computer crimes can be committed  Inside the organization  Outside the organization

3 Mod H-3 Examples of Computer Crimes

4 Mod H-4 Outside the Organization  Malware – software designed to harm your computer or computer security  Virus – software that is written with malicious intent to cause annoyance or damage  Worm – a computer virus that spreads itself from computer to computer via e-mail and other Internet traffic

5 Mod H-5 Other Types of Malware  Spoofing  Trojan Horse  Keylogger (key trapper) software – a program that, when installed on your computer, records every keystroke and mouse click  Misleading e-mail  Denial-of-service attacks  Rootkit  Web defacing

6 Mod H-6 Distributed Denial-of-Service Attack

7 Mod H-7 Cyber War  Cyber war – actions by a nation- state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption  Maybe the next major attack on the U.S.  Some intrusions into critical systems have already taken place

8 Mod H-8 Players  Hackers – knowledgeable computer users who use their knowledge to invade other people’s computers  Thrill-seeker hackers – break into computer systems for entertainment  White-hat (ethical) hackers – computer security professionals who are hired by a company to uncover vulnerabilities in a network

9 Mod H-9 Players  Black hat hackers – cyber vandals. They’re the people who exploit or destroy information  Crackers – hackers for hire, the people who engage in electronic corporate espionage  Social engineering – acquiring information that you have no right to by means of deception

10 Mod H-10 Players  Hacktivists – politically motivated hackers who use the Internet to send a political message  Cyberterrorists – those who seek to cause harm to people or destroy critical systems or information

11 Mod H-11 Players  Script kiddies (or bunnies) – people who would like to be hackers but don’t have much technical expertise  Are often used by experienced hackers as shields

12 Mod H-12 DIGITAL FORENSICS  Digital forensics – the collection, authentication, preservation, and examination of electronic information for presentation in court  Two phases 1. Collecting, authenticating, and preserving electronic evidence 2. Analyzing the findings

13 Mod H-13 Phase 1: Preservation  If possible, hard disk is removed without turning computer on  Special forensics computer is used to ensure that nothing is written to drive  Forensic image copy – an exact copy or snapshot of all stored information

14 Mod H-14 Phase 2: Analysis  Interpretation of information uncovered  Recovered information must be put into context  Digital forensic software pinpoints the file’s location on the disk, its creator, the date it was created and many other features of the file

15 Mod H-15 Modern Digital Forensics Has Many Components


Download ppt "McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics."

Similar presentations


Ads by Google