extended learning module h

15
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics

Upload: joelle-carson

Post on 02-Jan-2016

39 views

Category:

Documents


2 download

DESCRIPTION

Extended Learning Module H. Computer Crime and Digital Forensics. INTRODUCTION. Computers are involved in crime in two ways As the targets of misdeeds As weapons or tools of misdeeds Computer crimes can be committed Inside the organization Outside the organization. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Extended Learning Module H

McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.

Extended Learning Module H

Computer Crime and Digital Forensics

Page 2: Extended Learning Module H

Mod H-2

INTRODUCTION

Computers are involved in crime in two ways As the targets of misdeeds As weapons or tools of misdeeds

Computer crimes can be committed Inside the organization Outside the organization

Page 3: Extended Learning Module H

Mod H-3

Examples of Computer Crimes

Page 4: Extended Learning Module H

Mod H-4

Outside the Organization

Malware – software designed to harm your computer or computer security

Virus – software that is written with malicious intent to cause annoyance or damage

Worm – a computer virus that spreads itself from computer to computer via e-mail and other Internet traffic

Page 5: Extended Learning Module H

Mod H-5

Other Types of Malware Spoofing Trojan Horse Keylogger (key trapper) software – a

program that, when installed on your computer, records every keystroke and mouse click

Misleading e-mail Denial-of-service attacks Rootkit Web defacing

Page 6: Extended Learning Module H

Mod H-6

Distributed Denial-of-Service Attack

Page 7: Extended Learning Module H

Mod H-7

Cyber War

Cyber war – actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption

Maybe the next major attack on the U.S.

Some intrusions into critical systems have already taken place

Page 8: Extended Learning Module H

Mod H-8

Players

Hackers – knowledgeable computer users who use their knowledge to invade other people’s computers

Thrill-seeker hackers – break into computer systems for entertainment

White-hat (ethical) hackers – computer security professionals who are hired by a company to uncover vulnerabilities in a network

Page 9: Extended Learning Module H

Mod H-9

Players

Black hat hackers – cyber vandals. They’re the people who exploit or destroy information

Crackers – hackers for hire, the people who engage in electronic corporate espionage Social engineering – acquiring

information that you have no right to by means of deception

Page 10: Extended Learning Module H

Mod H-10

Players

Hacktivists – politically motivated hackers who use the Internet to send a political message

Cyberterrorists – those who seek to cause harm to people or destroy critical systems or information

Page 11: Extended Learning Module H

Mod H-11

Players

Script kiddies (or bunnies) – people who would like to be hackers but don’t have much technical expertise Are often used by experienced

hackers as shields

Page 12: Extended Learning Module H

Mod H-12

DIGITAL FORENSICS

Digital forensics – the collection, authentication, preservation, and examination of electronic information for presentation in court

Two phases1. Collecting, authenticating, and

preserving electronic evidence2. Analyzing the findings

Page 13: Extended Learning Module H

Mod H-13

Phase 1: Preservation

If possible, hard disk is removed without turning computer on

Special forensics computer is used to ensure that nothing is written to drive

Forensic image copy – an exact copy or snapshot of all stored information

Page 14: Extended Learning Module H

Mod H-14

Phase 2: Analysis

Interpretation of information uncovered

Recovered information must be put into context

Digital forensic software pinpoints the file’s location on the disk, its creator, the date it was created and many other features of the file

Page 15: Extended Learning Module H

Mod H-15

Modern Digital Forensics Has Many Components