Download
computer crimes forensics n.
Skip this Video
Loading SlideShow in 5 Seconds..
Computer Crimes & Forensics PowerPoint Presentation
Download Presentation
Computer Crimes & Forensics

Computer Crimes & Forensics

122 Views Download Presentation
Download Presentation

Computer Crimes & Forensics

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Computer Crimes & Forensics Group 17 Yuki, Nick

  2. What is computer forensics? • Analytical and investigative techniques to identify, collect, examine and preserve evidence/information which is magnetically stored or encoded.

  3. What is Computer Crime? • “generally refers to criminal activity where a computer or network is the source, tool, target, or place of a crime. “ from Wikipedia

  4. Type of Computer Crimes • -Cyber Crime • Denial-Of-Service Attack • Malware/Malicious Code • Cyber Terrorism • Computing Virus

  5. Denial-Of-Service Attack • Sending huge amount of spam data to disturb someone’s web service (from IT Media) • Occupy the network resources • Down server

  6. Malware • “Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. “( from wikipedia) • Example: • Trojan horse • Adware

  7. Cyber Terrorism • In general, Cyber Terrorism is defined as an act of terror in, or using computer, networks. • Often it contain political intention. • Examples • Die Hard 4 • DoS attack to imaginary country

  8. Virus • A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user . (from Wikipedia)

  9. Example of Virus • http://jp.youtube.com/watch?v=ecb_dm5TRto • “Melissa” • Spread all over the world in 1999 • Using World Macro (VBA), infected PC will send 50 e-mail • Melissa created huge traffic, and many server were down • Damaged the trust of company

  10. How to prevent virus damage? • Use Anti-Virus Software • Norton • Avast! • Do not install more than one!

  11. Prevention of Virus Damage • Do not open un-reliable attachment file • Especially .doc, .vba, etc… • Use file scan before download/open it! • Online File Scanner • http://www.kaspersky.com/scanforvirus

  12. What is computer forensics? • Analytical and investigative techniques to identify, collect, examine and preserve evidence/information which is magnetically stored or encoded.

  13. Who uses computer forensics for evidence? • Criminal Prosecutors • Civil Litigations • Insurance Companies • Corporations • Law Enforcement Officials

  14. Steps of Computer Forensics • Protect computer system • Discover all files • Recover deleted files • Reveal contents of hidden files • Access protected files • Analyze relevant data

  15. Few common scenarios • Employee internet abuse • Criminal fraud • Industrial espionage • Unauthorized disclosure of corporate information

  16. Computer Forensics video • http://www.youtube.com/watch?v=W2Drw1qgsZA

  17. References • tula.bofh.ru/articles/539 • forum.utorrent.com/viewtopic.php?pid=179782 • www.foxinternational.com/diehard4/ • www.worldofstock.com/closeups/BTE1840.php An Explanation of Computer Forensics • http://computerforensics.net/forensics.htm Computer Forensics World • http://www.computerforensicsworld.com/ You Tube • http://www.youtube.com/watch?v=W2Drw1qgsZA