Cyber Forensics & Investigation: An Introduction
Cyber Forensics & Investigation: An Introduction
Cyber Forensics & Investigation: An Introduction
An Introduction
Dr. Aju D
Vellore Institute of Technology, Vellore
Course Objectives
To present the students with a comprehensive understanding of
digital forensic principles and the collection, preservation and
analysis of digital evidence.
CAT-1, CAT-2
Quiz
TEE
Constitution
of
India
Indian Laws
Law Types
Criminal Law
Civil Law
Common Law
Statutory Law
Cyber Law (IT Law) in India
Digital investigations
Manages investigations and conducts forensics analysis of
systems suspected of containing evidence.
Who are Intruders ?
Masquerader: An individual who is unauthorized to use the
computer and who penetrates a system’s access controls
to exploit a legitimate user’s account.
Misfeasor: A legitimate user who access data, programs or
resources for which such access is not authorized.
Clandestine User: A individual who seizes supervisory
control of the system and uses this control to avoid
auditing or access control.
Examples of Intrusion
Performing a remote root compromise of an email
server.
Guessing and cracking passwords.
Copying a database containing credit card numbers.
Viewing sensitive data, including payroll records and
medical information without authorization.
Running a packet sniffer on a workstation to capture
usernames and passwords.
Examples of Intrusion
Using a anonymous FTP server to distributed software
and music files.
information.
Examples of Computer Crimes
Child Pornography Harvesting
Copyright Violation Human Trafficking
Cyber Terrorism Identity Theft
Cyber bullying Illegal Sales
Denial of Service Intellectual Property Theft
Fraud
Phishing
Salami Slicing
Software Piracy
Scam
Cracking
Slander
Cyber Squatting
Typo Squatting
Creating Malwares Unauthorized Access
Spamming Wiretapping
Spoofing
Examples of Computer Crimes
Child Pornography
A study by UNICEF found that 1 out of 3 girls and 1 out of 5 boys
were likely to be sexually assaulted before they reach the age of 18,
and in a startling revelation, also found that 90% of these children
know their offenders.
According to market figures from the National Center for Sexual
Abuse (NCSA), child pornography is one of the fastest growing
online businesses and India is among its biggest consumers and
contributors.
Consumption of child pornography content in India has spiked by 95
per cent amid lockdown, according to a recent report by an NGO
India Child Protection Fund (ICPF).
In India, a pornographic video is captured every 40 seconds, about
38 percent of which are linked to child sexual abuse.
Examples of Computer Crimes
Child Pornography
Copyright Violation
Examples of Computer Crimes
Child Pornography
Copyright Violation
• Copyright Act 1958
• Patents Act 1970
• Trademark Act 2003
• Designs Act 2000
Examples of Computer Crimes
Child Pornography
Copyright Violation
Cracking
Cyber Terrorism
Cyber bullying
Cyber Squatting
Creating Malwares
Copyright Violation
Cracking
Cyber Terrorism
Cyber bullying
Cyber Squatting
Creating Malwares
Espionage
Fraud
Software Piracy
aka: Th3Dir3ctorY
Spamming
Spoofing
“we are in your emails and computer
systems, watching and recording your every
move, we have your names and addresses,
we are in your emails and social media
accounts, we are extracting confidential data
and passing on your personal information to
the soldiers of the khilafah, who soon with
the permission of Allah will strike at your
necks in your own lands!”
Examples of Computer Crimes
Child Pornography
Copyright Violation
Cracking
Cyber Terrorism
Cyber bullying
Cyber Squatting
Creating Malwares
Espionage
Fraud
Software Piracy
Information Technology Act (S/66F) - 2009
Spamming
Spoofing
Examples of Computer Crimes
Child Pornography
Copyright Violation
Cracking
Cyber Terrorism
Cyber bullying
Examples of Computer Crimes
Child Pornography
Copyright Violation
Cracking
Cyber Terrorism
Cyber bullying
Cyber Squatting
Creating Malwares
Copyright Violation
Cracking
Cyber Terrorism
Cyber bullying
Cyber Squatting
Creating Malwares
Espionage
Fraud
Software Piracy
Spamming
Spoofing
Examples of Computer Crimes
Child Pornography
Copyright Violation
Cracking
Cyber Terrorism
Cyber bullying
Cyber Squatting
Creating Malwares
Espionage
Fraud
Software Piracy
Spamming
Spoofing
Software Piracy Types
Software piracy is the illegal copying, distribution, or use of
software.
Fraud
Phishing
Salami Slicing
Software Piracy
Scam
Cracking
Slander
Cyber Squatting
Typo Squatting
Creating Malwares Unauthorized Access
Spamming Wiretapping
Spoofing