Cyber Security Level III Question Bank
Cyber Security Level III Question Bank
Cyber Security Level III Question Bank
attacker wants. Though varied in type and capabilities, malware usually has one
of the following objectives:
Q5)What types of questions you should ask to the client will make the
initial contact?
Q6) List the six investigative techniques in order, used by the FBI?
1) Check records, logs and documentation.
2) Interview Personnel.
3) Conduct Surveillance.
4) Prepare search warrant.
5) Search the suspect’s premises if necessary.
6) Seize evidence if necessary.
The term data protection is used to describe both the operational backup of
data and business continuity/disaster recovery (BC/DR). Data protection
strategies are evolving along two lines: data availability and data
management.
Phishing:
Spoofing:
Phone Phishing:
Internet Pharming:
Investment newsletter:
the payee or the dollar amount. The document is then printed on standard
check "safety" paper, also readily available.
The forger usually targets a corporate account that has a large volume of
checks and that has a large enough balance to let the forged check clear.
The odds are that a bogus check will not be discovered until the company
reconciles its bank statement, by which time the forger will be long gone.
And what if the person who reconciles the bank account is the forger? In a
closely held business the possibility must be recognized.
Under the Uniform Commercial Code, the bank that accepts the forged
check as a deposit must bear the loss.
Q14)Explain Cyberstalking?
only for communicating with people you trust and set up an anonymous e-
mail account, such as Yahoo or Hotmail, to use for all your other
communications. Set your e-mail program's filtering options to prevent
delivery of unwanted messages. When choosing an online name, make it
different from your name and gender-neutral. Don't put any identifying
details in online profiles.
Both approaches require significant storage and the need for occasional
erasing of old data to make room for new. The open
source programs tcpdump and windump as well as a number of
commercial programs can be used for data capture and analysis.
Q20)What are the important aspects for which mobile evidence is being
presently used?
Q23)Explain the steps invoked in finding out the lost or stolen mobile
phones?
Data recovery is the process of restoring data that has been lost,
accidentally deleted, corrupted or made inaccessible.
Most data loss is caused by human error, rather than malicious attacks,
according to U.K. statistics released in 2016. In fact, human error
accounted for almost two-thirds of the incidents reported to the U.K.
Information Commissioner's Office. The most common type of breach
occurred when someone sent data to the wrong person.
backup target media. For example, many desktop and laptop backup
software platforms allow users to restore lost files themselves, while
restoration of a corrupted database from a tape backup is a more
complicated process that requires IT intervention. Data recovery services
can also be used to retrieve files that were not backed up and accidentally
deleted from a computer's file system, but still remain on the hard disk in
fragments.
Data recovery is possible because a file and the information about that file
are stored in different places. For example, the Windows operating
system uses a file allocation table to track which files are on the hard drive
and where they are stored. The allocation table is like a book's table of
contents, while the actual files on the hard drive are like the pages in the
book.
There are two general methods of DoS attacks: flooding services or crashing
services. Flood attacks occur when the system receives too much traffic for the
server to buffer, causing them to slow down and eventually stop. Popular flood
attacks include:
Buffer overflow attacks – the most common DoS attack. The concept is
to send more traffic to a network address than the programmers have built
the system to handle. It includes the attacks listed below, in addition to
others that are designed to exploit bugs specific to certain applications or
networks
ICMP flood – leverages misconfigured network devices by sending
spoofed packets that ping every computer on the targeted network, instead
of just one specific machine. The network is then triggered to amplify the
traffic. This attack is also known as the smurf attack or ping of death.
SYN flood – sends a request to connect to a server, but never completes
the handshake. Continues until all open ports are saturated with requests
and none are available for legitimate users to connect to.
Other DoS attacks simply exploit vulnerabilities that cause the target system or
service to crash. In these attacks, input is sent that takes advantage of bugs in
the target that subsequently crash or severely destabilize the system, so that it
can’t be accessed or used.
An additional type of DoS attack is the Distributed Denial of Service (DDoS)
attack. A DDoS attack occurs when multiple systems orchestrate a synchronized
DoS attack to a single target. The essential difference is that instead of being
attacked from one location, the target is attacked from many locations at once.
The distribution of hosts that defines a DDoS provide the attacker multiple
advantages:
Q35)Explain the five basic ways computer criminal use to get information
of the companies they attack?
Q37)What type of info you will gather when you will arrive at client site?
• Was it normal for these persons to have been on the system during the past 24 hours?
• Do any of your personnel have a habit of working on weekends, arriving very early,
or staying very late?
• Have any of these persons behaved in a strange manner? Do any have unusual habits
or an adverse relationship with other employees?
• Have there been any other unusual network occurrences during the past 30 days?
• Is there anything different about the area where the systems reside? Does anything
look out of place?
• What level of access (clearance) does each of the individuals have for the
compromised system and the area where it resides?
• Are any of the personnel associated with the systems not United States citizens?
• Are any cameras or microphones in the area that could track personnel movements at
or near the compromised system area?
• Does the organization have any financial problems or critical schedule slippages?
• Have any personnel taken extended vacations, had unexplained absences, or visited
foreign countries for business/pleasure during the past 90 days?
• Have any personnel been reprimanded in the past for system abuse or any other issues?
• Are any personnel having financial or marital hardships? Are any having intimate
relations with any fellow employee or contractor?
• What are the educational levels and computer expertise levels of each of the personnel
involved with the system?
• What type of work is this organization involved with (current and past)?
• Who first noticed the incident? Who first reported the incident? When?
• Did the person who noticed the incident touch anything besides the telephone?
• Based on records from Physical Security, what time did each of the personnel arrive
in the building today?
• Based on records from Physical Security, if any personnel arrived early, was anyone
else already in the building? Was this normal for them?
• For the past 30 days, provide me with a listing of everyone who was on the
compromised system, along with their dates/times of access.
• Has the employment of anyone in the organization been terminated during the past 90
days?
• Why do you think there was a break-in? (Try to get people to talk.)
• Obtain any records available for the compromised system, such as purchasing records
(see original configuration of box) and service records (modifications, problems the
box had, etc.).
• Obtain a diagram of the network architecture (if you have not already obtained one).
• Verify that any experts associated with the system are present. Obtain their names and
contact information.
• Briefly spell out the evidence collection procedure you will be following to those in
the pre-briefing.
• Have you received the backup tape requested for the compromised system? If not, are
backups done on a regularly scheduled basis?
• Were any patches or operating system upgrades recently done on the compromised
system?
• Were any suspicious personnel in the area of the compromised systems during the
past 30 days?
• Were any abnormal access rights given to any personnel in the past 90 days who are
not normally associated with the system?
• Were any new contractors, employees, etc. hired in the past month?
Q38)What are the six steps in order that a computer crime investigator will
normally follow?
• Secure the crime scene (if attacker still online, initiate backtrace). Note that
a backtrace (also called a traceback) is an attempt to obtain the
geographical location(s) of the attacker(s) using specialized software tools.
• Interview witnesses.
Phishing:
Spoofing:
Phone Phishing:
Internet Pharming:
Investment Newsletter:
• Do not pay attention to get rich quick schemes. If they seem too good to
be true, they absolutely are.
• Do not open emails from strangers. Install anti-viral software and spam
blocking programs on your computer and your email program.
Synchronized Passwords:
Firewalls:
Digital Signature:
• For these reasons, evidence should be carefully retrieved and preserved. Also consider
that for investigating offences involving the Internet, time, date, and time zone
information may prove to be very important.
In the first case, the information may be informed to the local police of your
jurisdiction or it may be informed to the Cyber Crime Cell in so that incident may be averted.
In the second case, most of the financial frauds are dealt in IPC only hence the
complaint may be given either in the Local police station or in the CCS.
• Communicated with competitors via email, Internet Relay Chat (IRC), or some other
mode of communication
Examination
Analysis
Reporting
The imaging process is verified by using the SHA-1 message digest algorithm
(with a program such as sha1sum) or other still viable algorithms such as MD5.
At critical points throughout the analysis, the media is verified again, known as
"hashing", to ensure that the evidence is still in its original state.
Step 1. Preparation:
Prepare working directory/directories on separate media to which evidentiary files and data can be
recovered and/or extracted. Step 2. Extraction Discussed below are two different types of extraction,
physical and logical. The physical extraction phase identifies and recovers data across the entire
physical drive without regard to file system. The logical extraction phase identifies and recovers files
and data based on the installed operating system(s), file system(s), and/or application(s).
Physical extraction:
During this stage the extraction of the data from the drive occurs at the physical level regardless of
file systems present on the drive. This may include the following methods: keyword searching, file
carving, and extraction of the partition table and unused space on the physical drive.
Logical extraction:
During this stage the extraction of the data from the drive is based on the file system(s) present on
the drive and may include data from such areas as active files, deleted files, file slack, and
unallocated file space.
Analysis is the process of interpreting the extracted data to determine their significance to the case.
Some examples of analysis that may be performed include timeframe, data hiding, application and
file, and ownership and possession. Analysis may require a review of the request for service, legal
authority for the search of the digital evidence, investigative leads, and/or analytical leads.
Step 4. Conclusion:
In and of themselves, results obtained from any one of these steps may not be sufficient to draw a
conclusion. When viewed as a whole, however, associations between individual results may provide
a more complete picture. As a final step in the examination process, be sure to consider the results
of the extraction and analysis in their entirety.
Mail relay is often referred to as an e-mail server, a device and/or program that routes an e-mail to the correct
destination. Mail relays are typically used within local networks to transmit e-mails among local users, for
Mail relays are particularly useful in e-mail aliasing where multiple e-mail addresses are used but the mail relay
forwards all messages to the specified e-mail addresses to one single address. A mail relay is different than
an open relay, where an e-mail server processes a mail message that that neither originates or ends with a user
results in the need to collect volatile data from the computer at the onset of the
response.
• The first successful step in searching and seizing the digital evidence is to
know and understand that what should be searched and seized. Secondly,
Cyber Crime Investigators and the Law Enforcement officers must have a
warrant to search, which covers the location and description of the system.
Thirdly, the digital evidence shall be well seized when it is located.
• Thus, searching and seizing the Digital Evidence in computers will often
refer to the hardware, software, and data contained in the main unit.
Printers, external modems (attached by cable to the main unit), monitors,
and other external attachments will be referred to collectively as
"peripherals" and discussed individually where appropriate. When we are
referring to both the computer and all attached peripherals as one huge
package, we will use the term "computer system." "Information" refers to
all the information on a computer system, including both software
applications and data.
• Software is the term used to describe all of the programs we use when we
employ the computer for some task; it is usually delivered to us on either
one or more small magnetic disks or CD-ROMs. There are two basic
categories of software: system software and application software. System
software consists of the programs that manage our operation of the
computer; while application software consists of the programs that allow
us to work on higher-level tasks. They all compose the evidence searched.
• Access control
• Auditing
• Authentication
• Encryption
• Integrity controls
• Mobile phone tracking tracks the current position of a mobile phone even
on the move. To locate the phone, it must emit at least the roaming signal
to contact the next nearby antenna tower, but the process does not require
an active call. GSM localization is then done by multilateration based on
the signal strength to nearby antenna masts.
• Mobile positioning, i.e. location based service that discloses the actual
coordinates of a mobile phone bearer, is a technology used by
telecommunication companies to approximate where a mobile phone, and
thereby also its user (bearer), temporarily resides. The more properly
applied term locating refers to the purpose rather than a positioning
process. Such service is offered as an option of the class of location-based
services (LBS).
Your cell phone operator or the police can help you to find it if only you
provide them the IMEI number of your Mobile Phone. The IMEI (international
mobile equipment identity) is your handset's fingerprint that helps track down
your lost phone. Here's how you can find the IMEI number of your cell phone:
Just punch in *#06#, and the phone will display a 15-digit number. Note this
number.
The IMEI number gets logged on to the SIM card and a cellular operator
can locate the area from where a call is made, says Jagdish Kini, CEO, Bharati
Mobile Services.
Q72)Explain the steps involved in finding out the lost or stolen mobile
phone?
• Call the number of the phone. If the person who has the phone answers it,
explain to them that you know the phone was stolen and that you know
their name and address and will report them to the police if the cell phone
is not returned. (Do this even if you do not know the crook's name and
address).
• Call your cell phone company and let them know your cell phone has
been stolen. They will be able to cut off service and will be able to track
calls and other actions performed on the phone.
• Contact the police and report the cell phone has been stolen.
• Program your email to receive messages when the SIM card has been
changed or when any other changes have been made to the phone. You
can do this when you first buy the cell phone. Therefore, when the crook
tries to make changes to your phone, you will be identified via email.
Q73) Write a short note on dos and donts for mobile no?
• Don’ts:
• Don’ts:
• Do not call to any unknown phone/mobile numbers that you get while
chatting or exhibited on various profiles on Internet. If you do you may
be causing harassment on behalf of other person.
• DO not Sell and Buy your mobile phone from any unauthorized dealer.
• Do’s
• Put some Security pin code in your Mobile Handset to avoid misuse of
your mobile phones by anybody.
• These are the steps mentioned below which are involved in taking the
complaint from a victim in any Police station in case of Lost or Stolen
Mobile Phone ;
• Should take the address or the location from where the Mobile was lost or
Stolen.
• Should take the Name & Phone Number of the Lost or Stolen Mobile
phone service Provider like, Airtel, Vodafone, Idea, Aircel, etc.
By: Redhwan Faez Baghawitah Page 37
Cyber Security Level III Notes
• Should note the Handset Model along with the last specifications like
color, any mark or anything of the Mobile that helps in investigation.
• Should send the request to take support from Service Provider in order
track or Block the Mobile or its services.
• Should send the request to take support from Mobile Phone Manufactures
of that country by dialing their Customer Service Numbers in order to
block and track the Handset.
Q75)Explain in detail the four general areas of the disk where evidence
might hide?
• Slack space
• Swap files
• Cache files
Additionally, there are some specific criteria for the selection of your
forensic tool kit:
• They must not alter the data as a side effect of the collection process.
• They must collect all of the data we want, and only the data we want.
The swap files, which harbor information that was recently located
in system RAM (named pagefile.sys on the active partition)
Sent or received email, such as the .pst files for Outlook mail
• The default Security event log settings for Windows are to log nothing at
all. This means that, by default, Windows systems do not log successful
logons, files accesses, shutdowns, and many other important events. This
can make investigating Windows systems a challenge. One of the
difficulties with Windows logging is that Event Viewer allows you to
view only a single record at a time. This often makes reviewing Windows
system logs rather time-consuming and difficult.
• Another more perplexing and serious drawback is that these logs only
record the source NetBIOS name, rather than the IP address of the remote
system. This makes conclusive identification of remote connections to
Windows systems impossible using only event logs!
• The default settings for Windows event logs restrict each log file to a
maximum size of 512KB and a time length of seven days. When the fixed
size is reached, the log file is closed, and it must be cleared before you
are able to begin logging to that log file again. You can change these
options in the Log Settings menu, but remember that the size and time
length of each log (Security, Application, and System) need to be set
individually.
• One of the drawbacks of reviewing system logs offline is that the logs
populate the Description field by using values from various dynamically
linked library (DLL) files. This should not affect offline review of the
Security log, since its messages are standard, but the Application log may
contain entries that do not have the proper description text messages that
correspond to the event ID an application generated. Unless the forensic
workstation you use has the exact applications installed as the evidence
system, you will be missing much of the explanatory data in the
Application log, as shown Below.
• Windows uses the term share to refer to any file or folder that is
accessible over a network through Windows networking. A user can
share a directory with any other user who has the authority to connect to
that user’s system. Choosing to share a folder with remote systems is
simple: just select a directory you wish to share, right-click it, and choose
Sharing from the pop-up menu. If you see an icon of a hand underneath a
folder that means that the directory is shared with remote users who have
the proper credentials to log on to that share.
• It would seem a user who decides not to share a folder is not creating an
access point for attackers. However, this is not the case. Windows
systems have administrative shares, which are shares that are
automatically offered to remote users after each boot process. These
administrative shares are considered hidden shares, and they all have the
$ character appended to their names. The idea that they are hidden
provides a false sense of security; realistically, attackers know what the
hidden shares are. The most exploited share seems to be IPC$, but each
logical drive also becomes an administrative share.
• Unless the user has installed the NTFS file system and selected to audit
File and Object Access events for the particular share, Windows will not
log when files are accessed by a remote user.