cyber forencis
cyber forencis
cyber forencis
while following proper investigation rules to nab the culprit by presenting the evidence to the court.
Cyber forensics is also known as computer forensics. The main aim of cyber forensics is to
maintain the thread of evidence and documentation to find out who did the crime digitally. Cyber
forensics can do the following:
It can recover deleted files, chat logs, emails, etc
It can also get deleted SMS, Phone calls.
It can get recorded audio of phone conversations.
It can determine which user used which system and for how much time.
It can identify which user ran which program.
What is cybercrime?
Cybercrime is any criminal activity that involves a computer, network or networked device.While
most cybercriminals use cybercrimes to generate a profit, some cybercrimes are carried out against
computers or devices to directly damage or disable them. Others use computers or networks to
spread malware, illegal information, images or other materials. Some cybercrimes do both -- i.e.,
target computers to infect them with a computer virus, which is then spread to other machines and,
sometimes, entire networks.A primary effect of cybercrime is financial. Cybercrime can include many
different types of profit-driven criminal activity, including ransomware attacks, email and internet
fraud, and identity fraud, as well as attempts to steal financial account, credit card or other payment
card information.
As cybercriminals might target an individual's private information or corporate data for theft and
resale, it's especially important to protect backup data.
The U.S. Department of Justice (DOJ) divides cybercrime into the following three categories:
1. Crimes in which the computing device is the target -- for example, to gain network access.
2. Crimes in which the computer is used as a weapon -- for example, to launch a denial-of-service
(DoS) attack.
3. Crimes in which the computer is used as an accessory to a crime -- for example, using a computer
to store illegally obtained data.
Types of cybercrime
Cybercriminals have a plethora of cybercrime types to conduct malicious attacks. Most attackers carry
out cybercrimes with the expectation of financial gain, though the ways cybercriminals get paid can
vary. Specific types of cybercrimes include the following:
Cyberextortion. This crime involves an attack or threat of an attack coupled with a demand for
money to stop the attack. One form of cyberextortion is a ransomware attack. Here, the attacker
gains access to an organization's systems and encrypts its documents and files -- anything of
potential value -- making the data inaccessible until a ransom is paid. Usually, payment is in some
form of cryptocurrency, such as bitcoin.
Cryptojacking. This attack uses scripts to mine cryptocurrencies within browsers without the
user's consent. Cryptojacking attacks can involve loading cryptocurrency mining software to the
victim's system. Many attacks depend on JavaScript code that does in-browser mining if the user's
browser has a tab or window open on the malicious site. No malware needs to be installed as
loading the affected page executes the in-browser mining code.
Identity theft. This type of attack occurs when an individual accesses a computer to steal a user's
personal information, which is then used to steal that person's identity or access their valuable
accounts, such as banking and credit cards. Cybercriminals buy and sell identity information on
darknet markets, offering financial accounts and other types of accounts, such as video streaming
services, webmail, video and audio streaming, online auctions and more. Personal health
information is another frequent target for identity thieves.
Credit card fraud. This is an attack that occurs when malicious hackers infiltrate retailers'
systems to get their customers' credit card or banking information. Stolen payment cards can be
bought and sold in bulk on darknet markets, where hacking groups that have stolen mass
quantities of credit cards profit by selling to lower-level cybercriminals who profit through credit
card fraud against individual accounts.
Cyberespionage. This crime involves cybercriminals hacking into systems or networks to gain
access to confidential information held by a government or other organization. Attacks are
motivated by profit or ideology. Cyberespionage activities include cyberattacks that gather,
modify or destroy data, as well as using network-connected devices, such as webcams or closed-
circuit TV cameras, to spy on a targeted individual or groups and monitoring communications,
including emails, text messages and instant messages.
Software piracy. This attack involves the unlawful copying, distribution and use of software
programs with the intention of commercial or personal use. Trademark violations, copyright
infringements and patent violations are often associated with software piracy.
Exit scam. The dark web has given rise to the digital version of an old crime known as the exit
scam. In today's form, dark web administrators divert virtual currency held in marketplace escrow
accounts to their own accounts -- essentially, criminals stealing from other criminals.
Common examples of cybercrime
Commonly seen cybercrime attacks include distributed DoS (DDoS) attacks, which use a network's
own communications protocol against it by overwhelming its ability to respond to connection
requests. DDoS attacks are sometimes carried out for malicious reasons or as part of a cyberextortion
scheme, but they can also be used to distract the victim organization from some other attack or exploit
carried out at the same time.
Malware is another common cybercrime that can damage systems, software or data stored on a
system. Ransomware attacks are a type of malware that encrypts or shuts down victim systems until a
ransom is paid.
Phishing campaigns help attackers infiltrate corporate networks. Phishing includes sending fraudulent
emails to users in an organization, enticing them to download malicious attachments or click on
malicious links that then spread the malware across the network.
In credential attacks, a cybercriminal aims to steal or guess victims' usernames and passwords.
These attacks can use of brute-force -- for example, by keylogger software -- or by exploiting
software or hardware vulnerabilities that expose the victim's credentials. Cybercriminals can also
hijack websites to change or delete content or to access or modify databases without authorization.
For example, attackers use Structured Query Language injection exploits to insert malicious code into
a website, which can then be used to exploit vulnerabilities in the website's database, enabling a
malicious hacker to access and tamper with records or gain unauthorized access to sensitive
information and data, such as customer passwords, credit card numbers, personally identifiable
information, trade secrets and intellectual property. Other common examples of cybercrime include
illegal gambling, the sale of illegal items -- such as weapons, drugs or counterfeit goods -- and the
solicitation, production, possession or distribution of child pornography.
Categories of Cyber crimes can be classified into the following different categories:
i) Crimes Against Persons:
Harassment via E-Mails: Harassment through sending letters, attachments of files & folders i.e. via e-
mails. At present harassment is common as usage of social sites i.e. Orkut, hangout, zapak, Facebook,
Twitter etc. increasing day by day.
Cracking: It is amongst the gravest cyber crimes known till date. In this a cyber criminal broke into your
computer systems without your knowledge and consent and Tampere with your precious confidential
data and information.
Cyber-Stalking: It means expressed or implied a physical threat that creates fear through the use to
computer technology such as internet, e-mail, phones, text messages, webcam, websites or videos.
Dissemination of Obscene Material: It includes Indecent exposure/ Pornography (basically child
pornography), hosting of web site containing these prohibited materials. These obscene matters may
cause harm to the mind of the adolescent and tend to deprave or corrupt their mind. This can create a
huge blunder in the society.
SMS Spoofing: Spoofing is a blocking through spam which means the unwanted uninvited messages.
Here a offender steals identity of another in the form of mobile phone number and sending SMS via
internet and receiver gets the SMS from the mobile phone number of the victim.
Assault by Threat: it refers to threatening a person with fear for their lives or lives of their families
through the use of a computer network i.e. E-mail, videos or phones.
Page jacking: when a user, click on a certain link and an unexpected website gets opened through that
link then the ser is said to be ‘pagejacked’. This happens when someone steals part of a real website and
uses it in a fake site. If they use enough of the real site, Internet search engines can be tricked into listing
the fake site and people will visit it accidentally. Unfortunately one cannot prevent page jacking but only
can deal with it.
Advance fee scams: An advance fee scam is fairly easy to identify as you will be asked for money or
goods upfront in return for giving you credit or money later. These advance fee scams can seem
convincing and have taken in many people.
Defamation: It is an act of imputing any person with intent to lower down the dignity of the person by
hacking his mail account and sending some mails with using vulgar language to unknown persons mail
account.
E-Mail Spoofing: A spoofed e-mail may be said to be one, which misrepresents its origin. It shows it’s
origin to be different from which actually it originates.
Carding: It means false ATM cards i.e. Debit and Credit cards used by criminals for their monetary
benefits through withdrawing money from the victim’s bank account mala-fidely. There is always
unauthorized use of ATM cards in this type of cyber crimes.
Cheating & Fraud: It means the person who is doing the act of cybercrime i.e. stealing password and
data storage has done it with having guilty mind which leads to fraud and cheating.
ii) Crimes Against Persons Property:
As a result of rapid growth in the international trade where businesses and consumers are increasingly using
computers to create, transmit and to store information in the electronic form instead of traditional paper documents
there are some of the offenses which affect person’s property:
Intellectual Property Crimes: Any unlawful act by which the owner is deprived completely or partially
of his rights is an offense. The common form of IPR violation may be said to be software piracy,
infringement of copyright, trademark, patents, designs and service mark violation, theft of computer
source code, etc.
Cybersquatting: It means where two persons claim for the same Domain Name either by claiming that
they had registered the name first on by right of using it before the other or using something similar to
that previously. For example two similar names i.e. www.yahoo.comand www.yaahoo.com.
Cyber Vandalism: Vandalism means deliberately destroying or damaging property of another. Hence
cyber vandalism means destroying or damaging the data when a network service is stopped or disrupted.
It may include within its purview any kind of physical harm done to the computer of any person. These
acts may take the form of the theft of a computer, some part of a computer or a peripheral attached to the
computer.
Hacking Computer System: Due to the hacking activity there will be loss of data as well as computer.
Also research especially indicates that those attacks were not mainly intended for financial gain too and
to diminish the reputation of particular person or company.
Transmitting Virus: Viruses are programs that attach themselves to a computer or a file and then
circulate themselves to other files and to other computers on a network. They usually affect the data on
a computer, either by altering or deleting it. Worm attacks plays major role in affecting the computerize
system of the individuals.
Cyber Trespass: It means to access someone’s computer without the right authorization of the owner
and does not disturb, alter, misuse, or damage data or system by using wireless internet connection.
Internet Time Thefts: Basically, Internet time theft comes under hacking. It is the use by an
unauthorized person, of the Internet hours paid for by another person. The person who gets access to
someone else’s IP user ID and password, either by hacking or by gaining access to it by illegal means,
uses it to access the Internet without the other person’s knowledge. You can identify time theft if your
Internet time has to be recharged often, despite infrequent usage.
iii) Cyber Crimes Against Government:
There are certain offenses done by group of persons intending to threaten the international governments by using
internet facilities:
Cyber Terrorism: Cyber terrorism is a major burning issue in the domestic as well as global concern.
The common form of these terrorist attacks on the Internet is by distributed denial of service attacks, hate
websites and hate e-mails, attacks on sensitive computer networks etc. Cyber terrorism activities
endanger the sovereignty and integrity of the nation.
Cyber Warfare: It refers to politically motivated hacking to conduct sabotage and espionage. It is a
form of information warfare sometimes seen as analogous to conventional warfare although this analogy
is controversial for both its accuracy and its political motivation.
Distribution of pirated software: It means distributing pirated software from one computer to another
intending to destroy the data and official records of the government.-25
Possession of Unauthorized Information: It is very easy to access any information by the terrorists with
the aid of internet and to possess that information for political, religious, social, ideological objectives.
iv) Cybercrimes Against Society at large:
An unlawful act done with the intention of causing harm to the cyberspace will affect large number of persons:
Cyber Trafficking: It may be trafficking in drugs, human beings, arms weapons etc. which affects large
number of persons. Trafficking in the cyberspace is also a gravest crime.
Online Gambling: Online fraud and cheating is one of the most lucrative businesses that are growing
today in the cyberspace. There are many cases that have come to light are those pertaining to credit card
crimes, contractual crimes, offering jobs, etc. [3]
Financial Crimes: This type of offence is common as there is rapid growth in the users of networking
sites and phone networking where culprit will try to attack by sending bogus mails or messages through
internet. Ex: Using credit cards by obtaining password illegally. [4]
Forgery: It means to deceive large number of persons by sending threatening mails as online business
transactions are becoming the habitual need of today’s life style. [5]
What is Hacking?
A commonly used hacking definition is the act of compromising digital devices and networks through
unauthorized access to an account or computer system. Hacking is not always a malicious act, but it is
most commonly associated with illegal activity and data theft by cyber criminals.
But what is hacking in a cyber security context?
Hacking in cyber security refers to the misuse of devices like computers, smartphones, tablets, and
networks to cause damage to or corrupt systems, gather information on users, steal data and
documents, or disrupt data-related activity.
A traditional view of hackers is a lone rogue programmer who is highly skilled in coding and
modifying computer software and hardware systems. But this narrow view does not cover the true
technical nature of hacking. Hackers are increasingly growing in sophistication, using stealthy attack
methods designed to go completely unnoticed by cybersecurity software and IT teams. They are also
highly skilled in creating attack vectors that trick users into opening malicious attachments or links
and freely giving up their sensitive personal data.
As a result, modern-day hacking involves far more than just an angry kid in their bedroom. It is a
multibillion-dollar industry with extremely sophisticated and successful techniques.
Types of Hacking/Hackers
There are typically four key drivers that lead to bad actors hacking websites or systems: (1) financial
gain through the theft of credit card details or by defrauding financial services, (2) corporate
espionage, (3) to gain notoriety or respect for their hacking talents, and (4) state-sponsored hacking
that aims to steal business information and national intelligence. On top of that, there are politically
motivated hackers—or hacktivists—who aim to raise public attention by leaking sensitive
information, such as Anonymous, LulzSec, and WikiLeaks.
An attack vector, or threat vector, is a way for attackers to enter a network or system. Common
attack vectors include social engineering attacks, credential theft, vulnerability exploits, and
insufficient protection against insider threats.
Hackers use multiple threat vectors to exploit vulnerable systems, attack devices and networks, and
steal data from individuals. There are two main types of hacker vector attacks: passive attacks and
active attacks.
Passive Attack
A passive attack occurs when an attacker monitors a system for open ports or vulnerabilities to gain or
gather information about their target. Passive attacks can be difficult to detect because they do not
involve altering data or system resources. Rather than cause damage to an organization’s systems, the
attacker threatens the confidentiality of their data.Passive attack vectors include passive
reconnaissance, which sees the attacker monitor an organization’s systems for vulnerabilities without
interacting with them through tools like session capture, and active reconnaissance, where the attacker
uses methods like port scans to engage with target systems.
Active Attack
An active attack vector is one that sets out to disrupt or cause damage to an organization’s system
resources or affect their regular operations. This includes attackers launching attacks against system
vulnerabilities, such as denial-of-service (DoS) attacks, targeting users’ weak passwords, or through
malware and phishing attacks.A common example of an active attack is a masquerade attack, in which
an intruder pretends to be a trusted user and steals login credentials to gain access privileges to system
resources. Active attack methods are often used by cyber criminals to gain the information they need
to launch a wider cyberattack against an organization.
Employees must use strong passwords and consider using a password manager to limit the chances of
an attacker stealing their credentials. To avoid the risk of compromised credentials, organizations
must move away from relying on passwords alone and deploy multi-factor authentication (MFA) to
verify users’ identities. Employee education is also vital to ensuring users understand the security
risks they face and the signs of a potential cyberattack.
Malware
Malware is a term that describes various strands of malicious software, which
include ransomware, spyware, Trojans, and viruses. Cyber criminals use malware as a threat vector to
help them gain access to corporate networks and devices, then steal data or damage systems.Avoiding
malware is reliant on understanding the signs of an attack, such as phishing schemes that urge users to
share valuable information. Protecting against malware requires technology like sandboxing,
firewalls, and antivirus and anti-malware software that detect and block potential attacks.
Phishing
Phishing is an email, Short Message Service (SMS), or telephone-based attack vector that sees the
attacker pose as a trusted sender to dupe the target into giving up sensitive data, such as login
credentials or banking details. Organizations can protect their employees and customers from phishing
attacks by using spam filters, deploying MFA, ensuring software is patched and updated, and blocking
malicious websites. However, the best way to defend against phishing is to assume that every email is
part of a phishing attack. This also comes down to employee education and relies on employees'
awareness of common security risks, such as never clicking any link within an email.
Insider Threats
Some security attacks come from inside the organization, through employees exposing confidential
information to attackers. While this can be accidental, malicious insiders expose corporate data or
vulnerabilities to third parties. These are often unhappy or disgruntled employees with access to
sensitive information and networks.It can be difficult for organizations to spot malicious insiders,
largely because they are authorized users with legitimate access to corporate networks and systems.
Therefore, businesses should monitor network access for unusual activity or users accessing files or
systems they would not normally, which could be an indicator of insider risk.
Ideally, an organization defines incident response processes and technologies in a formal incident
response plan (IRP) that specifies exactly how different types of cyberattacks should be identified,
contained, and resolved. An effective incident response plan can help cybersecurity teams detect and
contain cyberthreats and restore affected systems faster, and reduce the lost revenue, regulatory fines
and other costs associate with these threats. IBM’s Cost of a Data Breach 2022 Report found that
organizations with incident response teams and regularly tested incident response plans had an
average data breach cost USD 2.66 million lower than that of organizations without incident response
teams and IRPs.
What are security incidents?
A security incident, or security event, is any digital or physical breach that threatens the
confidentiality, integrity or availability or an organization’s information systems or sensitive data.
Security incidents can range from intentional cyberattacks by hackers or unauthorized users, to
unintentional violations of security policy by legitimate authorized users.
Some of the most common security incidents include:
Ransomware. Ransomware is a type of malicious software, or malware, that locks up a victim's data
or computing device and threatens to keep it locked—or worse—unless the victim pays the attacker a
ransom. According to IBM's Cost of a Data Breach 2022 report, ransomware attacks rose by 41
percent between 2021 and 2022.
Phishing and social engineering. Phishing attacks are digital or voice messages that try to
manipulate recipients into sharing sensitive information, downloading malicious software, transferring
money or assets to the wrong people, or taking some other damaging action. Scammers craft phishing
messages to look or sound like they come from a trusted or credible organization or individual—
sometimes even an individual the recipient knows personally.Phishing is the most costly and second
most common cause of data breaches, according to IBM's Cost of a Data Breach 2022 report. It’s also
the most common form of social engineering—a class of attack that hacks human nature, rather than
digital security vulnerabilities, to gain unauthorized access to sensitive personal or enterprise data or
assets.
DDoS attacks. In a distributed denial-of-service (DDoS) attack, hackers gain remote control of large
numbers of computers and use them to overwhelm a target organization’s network or servers with
traffic, making those resources unavailable to legitimate users.
Supply chain attacks. Supply chain attacks are cyberattacks that infiltrate a target organization by
attacking its vendors—e.g., by stealing sensitive data from a supplier’s systems, or by using a
vendor’s services to distribute malware. In July 2021, cybercriminals took advantage of a flaw in
Kaseya's VSA platform (link resides outside ibm.com) to spread ransomware to customers under the
guise of a legitimate software update. Even though supply chain attacks are increasing in frequency,
only 32 percent of organizations have incident response plans prepared for this particular cyber threat,
according to IBM's 2021 Cyber Resilient Organization Study.
Insider threats. There are two types of insider threats. Malicious insiders are employees, partners or
other authorized users who intentionally compromise an organization’s information
security. Negligent insiders are authorized user who unintentionally compromise security by failing to
follow security best practices—by, say, using weak passwords, or storing sensitive data in insecure
places.
The incident response process Most IRPs also follow the same general incident response
framework based on incident response models developed by the SANS Institute, the National
Institute of Standards and Technology (NIST), and the Cybersecurity and Infrastructure
Agency (CISA).
Preparation. This first phase of incident response is also a continuous one, to make sure that
the CSIRT always has best possible procedures and tools in place to respond to identify,
contain and recover from an incident as quickly as possible and within minimal business
disruption.
Detection and Analysis. During this phase, security team members monitor the network for
suspicious activity and potential threats. They analyze data, notifications and alerts gathered
from device logs and from various security tools (antivirus software, firewalls) installed on
the network, filtering out the false positives and triage the actual alerts in order of severity.
Containment. The incident response team takes steps to stop the breach from doing further damage
to the network. Containment activities can be split into two categories:
Short-term containment measures focus on preventing the current threat from spreading by
isolating the affected systems, such as by taking infected devices offline.
Long-term containment measures focus on protecting unaffected systems by placing stronger
security controls around them, such as segmenting sensitive databases from the rest of the
network.
Eradication. Once the threat has been contained, the team moves on to full remediation and
complete removal of the threat from the system. This involves actively eradicating the threat
itself—e.g., destroying malware, booting an unauthorized or rogue user from the network—
and reviewing both affected and unaffected systems to ensure no traces of the breach are left
behind.
Recovery. When the incident response team is confident the threat has been entirely
eradicated, they restore affected systems to normal operations. This may involve deploying
patches, rebuilding systems from backups, and bringing remediated systems and devices back
online.
Post-incident review. Throughout each phase of the incident response process, the CSIRT
collects evidence of the breach and documents the steps it takes to contain and eradicate the
threat. At this stage, the CSIRT reviews this information to better understand the incident.
The CSIRT seeks to determine the root cause of the attack, identify how it successfully
breached the network, and resolve vulnerabilities so that future incidents of this type don't
occur.
SIEM (security information and event management): SIEM aggregates and correlates
security event data from disparate internal security tools (e.g. firewalls, vulnerability
scanners, threat intelligence feeds) and from devices on the network. SIEM can help incident
response teams fight ‘alert fatigue’ by indicators of actual threats from the huge volume of
notifications these tools generate.
SOAR (security orchestration, automation and response): SOAR enables security teams
to define playbooks—formalized workflows that coordinate different security operations and
tools in response to security incidents—and to automate portions of these workflows where
possible.
EDR (endpoint detection and response): EDR is software designed to automatically protect
an organization's end users, endpoint devices and IT assets against cyberthreats that get past
antivirus software and other traditional endpoint security tools. EDR collects data
continuously from all endpoints on the network; it analyzes the data in real time for evidence
of known or suspected cyberthreats, and can respond automatically to prevent or minimize
damage from threats it identifies.
XDR (extended detection and response): XDR is cybersecurity technology that unifies
security tools, control points, data and telemetry sources, and analytics across the hybrid IT
environment (endpoints, networks, private and public clouds) to create a single, central
enterprise system for threat prevention, detection and response. A still-emerging technology,
XDR has the potential to help overextended security teams and security operations centers
(SOCs) do more with less by eliminating by eliminating silos between security tools and
automating response across the entire cyberthreat kill chain.
UEBA (user and entity behavior analytics): (UEBA) uses behavioral analytics, machine
learning algorithms, and automation to identify abnormal and potentially dangerous user and
device behavior. UEBA is particularly effective at identifying insider threats—malicious
insiders or hackers using compromised insider credentials—that can elude other security tools
because they mimic authorized network traffic. UEBA functionality is often included SIEM,
EDR, and XDR solutions.
ASM (attach surface management): ASM solutions automate the continuous discovery,
analysis, remediation, and monitoring of the vulnerabilities and potential attack vectors across
all the assets in an organization's attack surface. ASM can uncover previously unmonitored
network assets, map relationships between assets.
In the context of an enterprise IT organization, incident response tasks are usually conducted and
managed by a computer security incident response team (CSIRT). These groups may contain security
analysts, IT operators, IT managers and C-level executives that work together to establish an effective
incident response plan (IRP) and execute it when a security incident is detected.
Incident response planning helps IT organizations approach security incidents from a state of
readiness, with clear protocols for detecting, mitigating and eliminating security threats. IT
organizations should continually improve their incident response planning and processes to account
for new threat intelligence and enhance their security posture against future incidents.
Cyber security is an issue of significant importance for businesses and organizations that increasingly
deploy critical applications and IT infrastructure in hybrid cloud environments. While modern
methods of computing are both efficient and cost-effective, increasingly disparate cloud-based
infrastructure may expose security vulnerabilities that become attack vectors for cyber attacks. A
complete incident response strategy is necessary to respond effectively to the range of security
incidents that can be detected in these environments.From a cyber security perspective, the
proliferation of big data has made financially motivated cyber attackers keener on trying to steal data
from businesses.
With security incidents and data breaches on the rise, most enterprise organizations have invested
heavily in IT security to shore up its defenses. In turn, cyber attackers have started to go after small
and medium-sized businesses that may have weaker countermeasures and incident response processes
in place to deal with cyber attacks.
While some security incidents or cyber attacks can be prevented or mitigated outright, IT
organizations must have the proper incident response processes in place to deal with cyber security
threats in a timely way and prevent the massive financial and legal repercussions that can accompany
a data breach.
Incident response plans also typically contain a defined breach notification process that establishes
how the CSIRT will communicate to users, customers and other stakeholders about a breach. There
should also be provisions for testing the system, including running drills and simulations to ensure
that members of the CSIRT can function effectively in their roles when a genuine incident occurs.
An important part of digital forensics is the analysis of suspected cyberattacks, with the objective of
identifying, mitigating, and eradicating cyber threats. This makes digital forensics a critical part of the
incident response process. Digital forensics is also useful in the aftermath of an attack, to provide
information required by auditors, legal teams, or law enforcement.
Electronic evidence can be gathered from a variety of sources, including computers, mobile devices,
remote storage devices, internet of things (IoT) devices, and virtually any other computerized system.
Digital evidence can be used as evidence in investigation and legal proceedings for:
Data theft and network breaches—digital forensics is used to understand how a breach
happened and who were the attackers.
Online fraud and identity theft—digital forensics is used to understand the impact of a
breach on organizations and their customers.
Violent crimes like burglary, assault, and murder—digital forensics is used to capture
digital evidence from mobile phones, cars, or other devices in the vicinity of the crime.
White collar crimes—digital forensics is used to collect evidence that can help identify and
prosecute crimes like corporate fraud, embezzlement, and extortion.
Cybersecurity risk—an attack that aims to access sensitive information or systems and use
them for malicious purposes, such as extortion or sabotage.
Compliance risk—a risk posed to an organization by the use of a technology in a regulated
environment. For example, technologies can violate data privacy requirements, or might not
have security controls required by a security standard.
Third party risks—these are risks associated with outsourcing to third-party vendors or
service providers. For example, vulnerabilities involving intellectual property, data,
operational, financial, customer information, or other sensitive information shared with third
parties.
Identity risk—attacks aimed at stealing credentials or taking over accounts. These types of
risks can face an organization’s own user accounts, or those it manages on behalf of its
customers.
Reverse Steganography
Cybercriminals use steganography to hide data inside digital files, messages, or data streams.
Reverse steganography involves analyzing the data hashing found in a specific file. When
inspected in a digital file or image, hidden information may not look suspicious. However,
hidden information does change the underlying has or string of data representing the image.
Stochastic Forensics
Stochastic forensics helps analyze and reconstruct digital activity that does not generate
digital artifacts. A digital artifact is an unintended alteration of data that occurs due to digital
processes. Text files, for example, are digital artifacts that can content clues related to a
digital crime like a data theft that changes file attributes. Stochastic forensics helps investigate
data breaches resulting from insider threats, which may not leave behind digital artifacts.
Cross-drive Analysis
Cross-drive analysis, also known as anomaly detection, helps find similarities to provide
context for the investigation. These similarities serve as baselines to detect suspicious events.
It typically involves correlating and cross-referencing information across multiple computer
drives to find, analyze, and preserve any information relevant to the investigation.
Live Analysis
Live analysis occurs in the operating system while the device or computer is running. It
involves using system tools that find, analyze, and extract volatile data, typically stored in
RAM or cache. Live analysis typically requires keeping the inspected computer in a forensic
lab to maintain the chain of evidence properly.
In 1989, the Federal Law Enforcement Training Center recognized the need and created SafeBack and
IMDUMP. In 1991, a combined hardware/software solution called DIBS became commercially
available. These tools work by creating exact copies of digital media for testing and investigation
while retaining intact original disks for verification purposes.
By the late 1990s, growing demand for reliable digital evidence spurred the release of more
sophisticated tools like FTK and EnCase, which allow analysts to investigate media copies without
live analysis.
Today, the trend is for live memory forensics tools like WindowsSCOPE or specific tools supporting
mobile operating systems. Commercial forensics platforms like CAINE and Encase offer multiple
capabilities, and there is a dedicated Linux distribution for forensic analysis. Open source tools are
also available, including Wireshark for packet sniffing and HashKeeper for accelerating database file
investigation.The main types of digital forensics tools include disk/data capture tools, file viewing
tools, network and database forensics tools, and specialized analysis tools for file, registry, web,
Email, and mobile device analysis.
When evaluating various digital forensics solutions, consider aspects such as:
1. Python: Python is a versatile and widely used programming language in the field of computer
forensics. It offers numerous libraries and frameworks that aid in tasks such as data parsing, file
analysis, cryptography, network forensics, and automation of repetitive tasks.
2. PowerShell: PowerShell is a scripting language commonly used in Windows environments. It is
useful for automating tasks, conducting system-level analysis, and extracting information from
Windows systems during forensic investigations.
3. SQL: Structured Query Language (SQL) is crucial for working with relational databases. Many
forensic tools and platforms rely on databases for storing and analyzing large volumes of digital
evidence. Understanding SQL allows professionals to write queries to extract and manipulate data
effectively.
5. C/C++: Knowledge of C/C++ can be valuable for low-level programming and developing tools or
plugins specific to computer forensics. It may be helpful for tasks that require memory analysis, file
system analysis, or interaction with hardware components.
6. Perl: Perl is often utilized for text parsing, regular expressions, and log file analysis in computer
forensics. It provides powerful string manipulation capabilities and is efficient for processing large
volumes of textual data.
While proficiency in these programming languages can enhance a computer forensics professional's
skill set, it's important to note that practical knowledge of forensic tools, methodologies, and
investigative techniques is also crucial for effective computer forensics work.
A Network of Networks
The simplest way of explaining the Internet is to call it "the network of networks." It's the connection
of computer networks around the world into one entity, so to speak. It's not one big computer, but
rather numerous networked computers connected together.
When you dial into your Internet service provider (AOL, Earthlink, etc) from home, you are
essentially connecting your computer to a network. If you are on campus you connect to the Internet
through your school's network, which is connected to the larger Internet network through Peachnet,
which is the electronic highway for all educational institutions and libraries throughout the state of
Georgia. The "backbone" of all these connections is what you might hear referred to as the
"information superhighway."
The Internet started in the 1960s as a way for government researchers to share information.
Computers in the '60s were large and immobile and in order to make use of information stored in any
one computer, one had to either travel to the site of the computer or have magnetic computer tapes
sent through the conventional postal system.
Another catalyst in the formation of the Internet was the heating up of the Cold War. The Soviet
Union's launch of the Sputnik satellite spurred the U.S. Defense Department to consider ways
information could still be disseminated even after a nuclear attack. This eventually led to the
formation of the ARPANET (Advanced Research Projects Agency Network), the network that
ultimately evolved into what we now know as the Internet. ARPANET was a great success but
membership was limited to certain academic and research organizations who had contracts with the
Defense Department.
In response to this, other networks were created to provide information sharing.
January 1, 1983 is considered the official birthday of the Internet. Prior to this, the various computer
networks did not have a standard way to communicate with each other. A new communications
protocol was established called Transfer Control Protocol/Internetwork Protocol (TCP/IP). This
allowed different kinds of computers on different networks to "talk" to each other. ARPANET and the
Defense Data Network officially changed to the TCP/IP standard on January 1, 1983, hence the birth
of the Internet. All networks could now be connected by a universal language.
Contemporary crime: meaning
In criminology or criminal sociology, the word 'contemporary' is used to refer to the state and
occurrences of the modern world. Studies from previous decades and centuries can help us identify
trends in crime over time, as well as distinguish how patterns in crime have changed in tandem with
new developments.
Computer as a target
In simple words, cybercrime can be divided into two big categories: Computer as a target and
computer as a tool.
Computer as a target crimes require much higher expertise from the perpetrators and are usually
committed as a group of individuals rather than loners. Given the technical expertise required to
execute and the novelty of these types of crimes, these are the crimes that society is more unprepared
to face. Fortunately, this type of cybercrime is the least common, due to the expertise and
coordination that they require. These crimes usually depend on computer viruses, malware, and denial
of service attacks.
Crimes in which the computer is the target include the theft of intellectual property or marketing
information, blackmail, or sabotage of operating systems and programs. In all of these crimes, the
offender uses the computer to obtain information or to damage operating programs.
1. By accident
2. By transmission of insecure data
3. Because the information was changed to a different classification rating
4. Because users did not follow protocol and transferred information through insecure methods
such as floppy disks or thumb drives
Contamination can also occur through a computer virus or other form of malware. An anti-virus tool
should be enabled to remove an active virus from a system.
Thumb drives
Credit card swipe devices
Salient Features of the Information Technology Act, 2000
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of
the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law
in India dealing with cybercrime and electronic commerce. The Information Technology Act, 2000
provides legal recognition for transactions carried out by means of electronic data interchange and
other means of electronic communication, commonly referred to as "electronic commerce” The main
objective of this act is to carry lawful and trustworthy electronic, digital and online transactions and
alleviate or reduce cybercrimes. The IT Act has 13 chapters and 94 sections. The original Act
4 schedules, out of which the third and fourth schedule were omitted later. The law applies to the
whole of India.
A major amendment was made in 2008. It introduced Section 66A which penalized sending
"offensive messages". It also introduced Section 69, which gave authorities the power of "interception
or monitoring or decryption of any information through any computer resource". Additionally, it
introduced provisions addressing: pornography, child porn, cyber terrorism, publishing private images
without consent, cheating by impersonation, and sending offensive messages or those containing
sexually explicit acts through electronic means.and voyeurism. The amendment was passed on 22
December 2008 without any debate in Lok Sabha.