0% found this document useful (0 votes)
77 views25 pages

Digital Forensics & Cyber Crime Intro

The document discusses introduction to computer forensics and cyber crime. It defines computer forensics and its goals which include investigating cybercrimes, preserving, analyzing and presenting digital evidence. It also discusses types of computer forensics like disk, network, memory and mobile device forensics.

Uploaded by

haile
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views25 pages

Digital Forensics & Cyber Crime Intro

The document discusses introduction to computer forensics and cyber crime. It defines computer forensics and its goals which include investigating cybercrimes, preserving, analyzing and presenting digital evidence. It also discusses types of computer forensics like disk, network, memory and mobile device forensics.

Uploaded by

haile
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 25

ARBA MINCH UNIVERSITY

FACULTY OF COMPUTING AND SOFTWARE ENGINEERING

Digital Forensic and Cyber Crime

Chapter- 1:
Introduction to computer forensic and cyber security

.
Outlines
o Introduction to computer forensic /digital forensic
o Introduction to cyber crime
o Kinds of cyber crime
o Malware and it types
What is Computer(Digital) Forensics?
 Digital forensics or computer forensics is a branch of forensic science that
involves collecting, analyzing, and preserving digital evidence to investigate and
prevent cybercrime
 Forensic Computing:- process of identifying, preserving, analyzing, and presenting
digital evidence in a manner that is acceptable in a legal proceeding
 It uses specialized tools and techniques to recover data, like deleted files, internet
history, and email communications from digital devices such as computers,
smartphones, and storage media
 This information can be used to investigate a wide range of crimes including:
 fraud, theft, and cyber attacks.
Cont’d…
 Computer forensic, electronic discovery, electronic evidence discovery, digital
discovery, data recovery, data discovery, computer analysis, and computer
examination
 Difference Between Cybersecurity and Computer Forensics?
 Cybersecurity:- protecting computer systems and networks from unauthorized
access, theft, and damage or prevent cyber attacks
 E.g. firewalls, antivirus software, and intrusion detection systems
 Computer forensics: investigating and analyzing digital evidence to uncover the
causality of a cyber attack or other computer-related attack
 collecting and maintaining data, analyzing it to identify the origin of attack,
and presenting results in court cases and other litigation
Why Computer Forensic?
 Investigating Cybercrimes
 Preserving
 Analyzing
 Presenting
 Ensuring Data Integrity
 Supporting Incident Response and Mitigation
 Goal Of Computer Forensics:
 The main goal computer forensic experts is not only to find criminal but also
find out (recover, analyze) the evidence and presentation of the evidence in a
manner that leads to legal action of the criminal.
Types of Computer Forensic
 Computer forensics always involves gathering and analyzing evidence from digital sources.
 Some common types include:
Types of Computer Forensic
 Disk Forensics: examination physical or logical storage media such as hard drives, solid-
state drives, and removable storage devices.
 Investigators analyze the storage media to recover deleted files, discover hidden data,
and gather evidence related to digital crimes.
 Network Forensics: monitoring and analyzing network traffic and log data to investigate
security incidents.
 Identifying source of cyberattacks, tracking communication between devices, and
understanding the extent of network breaches
 Memory Forensics: deals with analysis of a computer volatile memory (RAM) to uncover
information about running processes, network connections, and malicious
activities

Types of Computer Forensic
 Mobile Device Forensics: examination of smartphones, tablets, and other mobile devices
to retrieve data, messages, call logs, and application usage history.
 Investigators use specialized tools to access locked or encrypted mobile devices
 Database Forensics: investigating database systems to identify unauthorized access, data
breaches or data manipulation.
 analyze database logs and data structures to uncover evidence of wrongdoing
 Cloud Forensics: investigation of cloud-based services and data stored in the cloud
 It examining cloud logs, access controls, and metadata to trace activities and assess
security incidents
Types of Computer Forensic
 Malware Forensics: the analysis of malicious software (malware) to understand its
behavior, origins, and impact on systems
 Investigators study malware code and behavior to determine the scope of an attack
 Email Forensics: the investigation of email communications to gather evidence for legal
proceedings.
 It includes tracking email senders, receivers, timestamps, and content.
 Live Forensics: analyzing a running computer system to identify ongoing malicious
activities.
 Investigators use techniques to preserve system state and extract volatile data
without interrupting system operation
Computer Forensic priority
 It concerns primarily with forensic procedures, rules of evidence and legal
processes.
 It is only secondarily concerned with computers
 Therefore, in contrast to all other areas of computing, where speed is the main
concern, in computer forensics the absolute priority is accuracy
 It Needs completing work as efficiently as possible, that is, as fast as possible
without sacrificing accuracy
 the emphasis must be on evidential integrity and security
 Computer forensics specialist is the person responsible for doing computer
forensics with careful steps to identify and attempt to retrieve possible evidence
that may exist on a subject computer system
Computer Forensics Specialist
 Some of the computer forensic specialist tasks:
 Protect the subject computer system from alteration, damage, data corruption during the
forensic examination
 Discover all files on the subject system (normal, deleted, hidden, password protected and
encrypted files)
 Recover all deleted file as much as possible
 Reveal the contents of hidden files as well as temporary(swap) files used by both
application programs and operating system
 Accesses the protected or encrypted contents of files if possible or legally appropriate
 Analyze all possibly relevant data found in areas of a disk
 Print out an overall analysis of relevant and discovered file in computer
system
USE OF COMPUTER FORENSICS IN LAW ENFORCEMENT
 Computer forensics assists in Law Enforcement includes:
 providing investigators with the tools and strategies necessary to collect, analyze,
and preserve digital evidence
 allows Investigators to recover deleted files, trace Internet activity, and identify
the origin of cyber attacks
 helps identify suspects, prove guilt (or innocence), and present evidence in court
 helps prevent future crimes by identifying vulnerabilities in computer network
systems.
 Searching unallocated space on the hard drive, places where an abundance of data
often resides
Forensic Tools
 When deciding what equipment to use for forensic investigation, take into
consideration:
 type of investigation
 type of evidence
 operating system
 extensive training in the equipment
 financial resources of the cyber crime department
 APPLICATIONS OF COMPUTER FORENSICS
 some common applications of computer forensics:
 Financial fraud detection
 Criminal prosecution
 Civil litigation
Skills Required For Computer Forensics Application
 Programming or computer-related experience
 Broad understanding of operating systems and applications
 Strong analytical skills
 Strong computer science fundamentals
 Strong system administrative skills
 Knowledge of the latest intruder tools
 Knowledge of cryptography and steganography
 Strong understanding of the rules of evidence and evidence handling
 Ability to be an expert witness in a court of law
Computer Forensics as a Part of a Security Incident Response Program
 Security incident means the attempted or successful unauthorized access, use,
disclosure, modification, or destruction of information or interference with system
operations in an information system
 E.g. A healthcare organization discovers that the personal health information
(PHI) of patients has been compromised.
 Computer forensics would be essential to investigate the breach, determine how
the attackers gained access to the PHI, identify affected systems, and assess the
extent of the data exposure. This may involve analyzing electronic health records
(EHR) systems, database logs, and network traffic to understand how the breach
occurred and what data was accessed
What is Computer Crime?
 Alternatively referred to as cyber crime, electronic crime, or hi-tech crime.
 Computer crime describes a very broad category of offenses.
 Some of them are the same as non-computer offenses.
 Computer crime is an act performed by a knowledgeable computer user,
sometimes referred to as a hacker that illegally browses or steals a company's or
individual's private information.
 In some cases, this person or group of individuals may be malicious and destroy or
otherwise corrupt the computer or data files.
Types of Cyber Crime
 Computer integrity crimes: crimes that involve illegal access to data on a computer
or network
 E.g. Hacker unauthorized access of the system, credit card, personal Identification
 Computer-assisted crimes: ordinary crimes conducted with the help of a computer.
 E.g. Criminals manipulates online banking system, drug trafficking
 Computer content crimes: posting illegal content on the Internet
 Dissemination of illegal content violates both national and international
laws
 E.g. uploads and shares child pornography on various online forums
and social media platforms
Kinds of Computer Crimes
• Below is a listing of the different types of computer crimes today.
• Child pornography - Making or distributing child pornography.
• Cyber terrorism - Hacking, threats, and blackmailing towards a business or person.
• Cyberbully or Cyberstalking - Harassing others online.
• Malware - Writing, creating, or distributing malware(e.g. viruses and spyware.)
• Denial of Service attack - Overloading a system with so many requests it cannot
serve normal requests.
• Espionage - Spying on a person or business.
• Fraud - Manipulating data, e.g. changing banking records to transfer money to an
account.
• Harvesting - Collect account or other account related information on other people.
• Identity theft - Pretending to be someone you are not.
Kinds of Computer Crimes…
• Intellectual property theft - Stealing practical or conceptual information developed by
another person or company.

• Phishing - Deceiving individuals to gain private or personal information about that


person.

• Salami slicing - Stealing tiny amounts of money from each transaction.

• Scam - Tricking people into believing something that is not true.

• Spamming - Distributed unsolicited e-mail to dozens or hundreds of different addresses.

• Spoofing - Deceiving a system into thinking you are someone you really are not.

• Unauthorized access - Gaining access to systems you have no permission to access.

• Wiretapping - Connecting a device to a phone line to listen to conversations


What is Malware
• It is a program or code created to harm a computer, network, or server

• Cybercriminals develop malware to infiltrate a computer system discreetly to breach or


destroy sensitive data and computer systems

• Some of the most common goals of a malware attack include:

→ Make a profit off targets

→ Damage

→ Steal confidential data

→ Bragging(proudly) rights
Types of Malware
• The most common types of malware today are:

 Ransomware :- an adversary encrypts a victim’s data and offers to provide a decryption


key in exchange for a payment

 Fileless Malware:- is a type of malicious activity that uses native, legitimate tools built into a
system to execute a cyber attack.

 It does not require an attacker to install any code on a target’s system, making it hard to
detect

 Spyware:- collects information about a user’s web activity without the knowledge of the
user

 Adware:- type of spyware that watches a user’s online activity to determine which ads to
show them.
Types of Malware …
 Trojan:- appears to be legitimate software disguised as native operating system
programs or harmless files like free downloads

 are installed through social engineering techniques such as phishing

 Worms:- is a self-contained program that replicates and spread automatically without


user intervention.

 replicates itself and spreads across networks or internet without requiring a host
program

 Can modify and delete files, inject more malicious software or replicate until the
targeted system runs out of resources

 Rootkits:- designed to gain unauthorized access to a computer system or network while hiding
its presence from users and security tools
Types of Malware …
 Keylogger: tools that record what a person types on a device

 keylogger software records every keystroke on the victim’s device and sends to
the attacker

 Botnet: a network of computers infected with malware that are controlled by a


botmaster

 The botmaster is the person who operates the botnet infrastructure and uses the
compromised computers to launch attacks designed to crash a target’s network,
inject malware, harvest credentials or execute CPU-intensive task

 E.g. DDOS , Credential theft


Prevention of Malware Attack
 Some the malware protection mechanisms are:

 Do not download software from unknown sources.

 Do not click on pop-ups.

 Follow strong password best practices

 Implement identity and access management capabilities such as multi-factor


authentication (MFA)

 Use VPN to go online safely and securely

 Do not lend your devices to anyone else, even if it is someone you know

 Do not open emails and/or attachments from unknown senders


End of chapter -1
thank you
questions ?????

You might also like