1 / 64

Extended Learning Module H

Extended Learning Module H. Computer Crime and Digital Forensics. STUDENT LEARNING OUTCOMES. Define computer crime and list three types of computer crime that can be perpetrated from inside and three from outside the organization

lassie
Download Presentation

Extended Learning Module H

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Extended Learning Module H Computer Crime and Digital Forensics

  2. STUDENT LEARNING OUTCOMES • Define computer crime and list three types of computer crime that can be perpetrated from inside and three from outside the organization • Identify the seven types of hackers and explain what motivates each group • Define digital forensics and describe the two phases of a forensic investigation

  3. STUDENT LEARNING OUTCOMES • Describe what is meant by anti-forensics, and give an example of each of the three types • Describe two ways in which corporations use digital forensics

  4. INTRODUCTION • Computers are involved in crime in two ways • As the targets of misdeeds • As weapons or tools of misdeeds • Computer crimes can be committed • Inside the organization • Outside the organization

  5. COMPUTER CRIME • Computer crime – a crime in which a computer, or computers, play a significant part

  6. Examples of Computer Crimes

  7. Crimes in Which Computers Usually Play a Part

  8. Outside the Organization • Malware – software designed to harm your computer or computer security • Virus – software that is written with malicious intent to cause annoyance or damage • Worm – a computer virus that spreads itself from computer to computer via e-mail and other Internet traffic

  9. Outside the Organization • Recently the most common type of problem is worms that form malware botnets • Botnet – collection of computers that have been infected with blocks of code (called bots) that can run automatically by themselves

  10. Malware Bots • Malware bots – bots that are used for fraud, sabotage, denial-of-service attacks, or some other malicious purpose • Zombie – an infected computer

  11. Malware Botnets • A botnet can • Collect e-mail addresses from infected machines • Distribute vast amounts of e-mail • Lie dormant to be used at a later date by crooks

  12. Storm Botnet • Storm created zombies that were rented out to spammers • YouTube was a target • when you clicked on the video your computer became a zombie • Storm launched attacks against anti-virus researchers

  13. Conficker Worm • In 2009 the Conficker worm infected about 10 million PCs • In some versions your computer wouldn’t function unless you paid $50 for so-called “security” software • Then your computer was released back to you

  14. Stuxnet • In 2010 a new and more sophisticated worm was created • It was aimed at a specific combination of components, such as could be found in a nuclear plant in Iran • Stuxnet caused the centrifuges to spin out of control, causing the plant to shut down

  15. Stuxnet

  16. Anonymous and LulzSec • In 2011 Anonymous and LulzSec started hacking into large networks. • Loosely organized hacker groups • Attacked Sony’s Playstation site, shut it down for a month • Other targets were: • RSA Security • Department of Defense • European Space Agency • International Monetary Fund

  17. Hacking Examples • Social engineering – telephone • Hacking wireless demo • Another wireless hacking

  18. Other Types of Malware • Spoofing • Trojan Horse • Keylogger (key trapper) software – a program that, when installed on your computer, records every keystroke and mouse click • Misleading e-mail • Denial-of-service attacks • Rootkit • Web defacing

  19. Stand-Alone Viruses • Spoofing – forging of return address on e-mail so that it appears to come from someone other than sender of record • Much spam is distributed this way

  20. Trojan Horse Viruses • Trojan horse virus – hides inside other software, usually an attachment or download • Objective is to cause damage to your system or commandeer computer resources • Often in free downloadable games

  21. Misleading E-mail: Virus Hoax • Virus hoax is an e-mail telling you of a non-existent virus • Makes recipients believe that they already have a virus and gives instructions on removal which actually delete a Windows file • Often purports to come from Microsoft –Microsoft always sends you to a Web site to find the solution to such a problem

  22. Attacks • Symantec Denial of Service attack tutorial • Symantec Botnet tutorial

  23. Distributed DoS • Distributed denial-of-service attack (DDoS) – attacks from multiple computers that flood a Web site with so many requests for service that it slows down or crashes. • Ping-of-Death - DoS attack designed to crash Web sites

  24. Distributed Denial-of-Service Attack

  25. Rootkits • Rootkit – software that gives the attacker administrator rights to a computer or network • Its purpose is to allow the attacker to conceal processes, files, or system data from the operating system.

  26. Web Defacing • Web defacing – maliciously changing another’s Web site • Electronic equivalent of graffiti

  27. Cyber War • Cyber war – actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption • Maybe the next major attack on the U.S. • Some intrusions into critical systems have already taken place

  28. Players • Hackers – knowledgeable computer users who use their knowledge to invade other people’s computers • Thrill-seeker hackers – break into computer systems for entertainment • White-hat (ethical) hackers – computer security professionals hired by a company to uncover vulnerabilities in a network

  29. Players • Black hat hackers – cyber vandals who exploit or destroy information • Crackers – hackers for hire, the people who engage in electronic corporate espionage • Social engineering – acquiring information that you have no right to by means of deception

  30. Players • Hacktivists – politically motivated hackers who use the Internet to send a political message • Cyberterrorists – those who seek to cause harm to people or destroy critical systems or information

  31. Players • Script kiddies (or bunnies) – people who would like to be hackers but don’t have much technical expertise • Are often used by experienced hackers as shields

  32. DIGITAL FORENSICS • Digital forensics – the collection, authentication, preservation, and examination of electronic information for presentation in court • Two phases • Collecting, authenticating, and preserving electronic evidence • Analyzing the findings

  33. Phase 1: Collection – Places to look for Electronic Evidence

  34. Phase 1: Preservation • If possible, hard disk is removed without turning computer on • Special forensics computer is used to ensure that nothing is written to drive • Forensic image copy – an exact copy or snapshot of all stored information • Tutorial on data preservation / acquisition analysis

  35. Phase 1: Authentication • Authentication process necessary for ensuring that no evidence was planted or destroyed • MD5 hash value – mathematically generated string of 32 letters and is unique for an individual storage medium at a specific point in time • Probability of two storage media having same MD5 hash value is 1 in 1038 • SHA-1 and SHA-2 are also widely used as authentication coding systems

  36. MD5 and SHA-1 Hash Values MD5 hash value SHA-1 hash value

  37. Phase 2: Analysis • Interpretation of information uncovered • Recovered information must be put into context • Digital forensic software pinpoints the file’s location on the disk, its creator, the date it was created and many other features of the file

  38. Forensic Hardware and Software Tools • Forensics computers usually have a lot of RAM and very fast processors • Forensic Tool Kit (FTK) and EnCase – examples of software that forensic investigators use • Software finds all information on disks

  39. FTK and EnCase • Can find information in unallocated space • Unallocated space – space that is marked as being available for storage • Can find all the images on a hard disk • EnCase Fragment Recovery Demo • Used in court: Casey Anthony trial

  40. File Fragment in Unallocated Space Hex view of unallocated space File fragment left over after a file has been deleted and the space rewritten

  41. All Images on the Hard Disk Collection of images on the hard disk

  42. Other Programs Used by Forensic Experts • Many other programs are used by forensic investigators • Internet Evidence Finder (IEF) and NetAnalysis - find Internet-related artifacts. • Transend and Aid4Mail - find e-mail in many formats and convert them to a single format • VLC media player – will play almost all multimedia files

  43. Live Analysis • Live Analysis – the examination of a system while it is still running. • May be necessary if • Web site cannot be shut down • needed information is in RAM • whole disk encryption is being used • it’s to wasteful to copy all the data

  44. Cell Phones • In 2010 – 303 million cell phones in the U.S. , many of which are smartphones • Problem is that cell phones have many different types of operating systems • Many programs exist to synchronize cell phone information. Are used by forensic investigators, but they don’t have safeguards like hash values

  45. Cell Phones and Other Handheld Devices Files Can Be Recovered from…

  46. Places to Look for Useful Information • Deleted files and slack space • Slack space – the space between the end of the file and the end of the cluster • System and registry files • control virtual memory on hard disk • have records on installs and uninstalls • have MAC address (unique address of computer on the network) • have list of USB devices that were connected to computer

  47. Places to Look for Useful Information • Unallocated space – set of clusters that has been marked as available to store information but has not yet received any • Unused disk space • Deleted information that has not been overwritten

  48. Analytics in Forensics • Analytics is used in forensics to detect or predict fraud by reviewing unstructured data such as e-mail • Fraud Triangle has 3 scores • O-Score – opportunity available to employee • P-Score – pressure or incentive to commit fraud • R-Score – employee’s level of rationalization • High scores indicates possibility of past or future fraud

  49. Fraud Triangle

  50. Analytics in Forensics • Using key words examines • E-mails • Text messages • Chat • Instant Messaging • Uses semantic analysis • E.g. when using “house” as a search term, software will look for • Cottage, hut, domicile home, property, estate, etc.

More Related