1 / 15

Understanding Computer Crime and Digital Forensics: Key Concepts and Practices

This module introduces computer crime and the field of digital forensics, highlighting the various ways computers are involved in criminal activities. It categorizes computer crimes as external attacks, including malware types like viruses and worms, as well as the roles of different hackers—from thrill-seekers to black-hat cyber vandals. The digital forensics process encompasses the collection and analysis of electronic evidence, ensuring integrity and context for potential legal proceedings. Understanding these elements is crucial for securing systems against evolving threats.

Télécharger la présentation

Understanding Computer Crime and Digital Forensics: Key Concepts and Practices

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Extended Learning Module H Computer Crime and Digital Forensics

  2. INTRODUCTION • Computers are involved in crime in two ways • As the targets of misdeeds • As weapons or tools of misdeeds • Computer crimes can be committed • Inside the organization • Outside the organization

  3. Examples of Computer Crimes

  4. Outside the Organization • Malware – software designed to harm your computer or computer security • Virus – software that is written with malicious intent to cause annoyance or damage • Worm – a computer virus that spreads itself from computer to computer via e-mail and other Internet traffic

  5. Other Types of Malware • Spoofing • Trojan Horse • Keylogger (key trapper) software – a program that, when installed on your computer, records every keystroke and mouse click • Misleading e-mail • Denial-of-service attacks • Rootkit • Web defacing

  6. Distributed Denial-of-Service Attack

  7. Cyber War • Cyber war – actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption • Maybe the next major attack on the U.S. • Some intrusions into critical systems have already taken place

  8. Players • Hackers – knowledgeable computer users who use their knowledge to invade other people’s computers • Thrill-seeker hackers – break into computer systems for entertainment • White-hat (ethical) hackers – computer security professionals who are hired by a company to uncover vulnerabilities in a network

  9. Players • Black hat hackers – cyber vandals. They’re the people who exploit or destroy information • Crackers – hackers for hire, the people who engage in electronic corporate espionage • Social engineering – acquiring information that you have no right to by means of deception

  10. Players • Hacktivists – politically motivated hackers who use the Internet to send a political message • Cyberterrorists – those who seek to cause harm to people or destroy critical systems or information

  11. Players • Script kiddies (or bunnies) – people who would like to be hackers but don’t have much technical expertise • Are often used by experienced hackers as shields

  12. DIGITAL FORENSICS • Digital forensics – the collection, authentication, preservation, and examination of electronic information for presentation in court • Two phases • Collecting, authenticating, and preserving electronic evidence • Analyzing the findings

  13. Phase 1: Preservation • If possible, hard disk is removed without turning computer on • Special forensics computer is used to ensure that nothing is written to drive • Forensic image copy – an exact copy or snapshot of all stored information

  14. Phase 2: Analysis • Interpretation of information uncovered • Recovered information must be put into context • Digital forensic software pinpoints the file’s location on the disk, its creator, the date it was created and many other features of the file

  15. Modern Digital Forensics Has Many Components

More Related