1 / 17

Computer Crimes & Forensics

Computer Crimes & Forensics. Group 17 Yuki, Nick. What is computer forensics?. Analytical and investigative techniques to identify, collect, examine and preserve evidence/information which is magnetically stored or encoded. What is Computer Crime?.

lilike
Download Presentation

Computer Crimes & Forensics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Crimes & Forensics Group 17 Yuki, Nick

  2. What is computer forensics? • Analytical and investigative techniques to identify, collect, examine and preserve evidence/information which is magnetically stored or encoded.

  3. What is Computer Crime? • “generally refers to criminal activity where a computer or network is the source, tool, target, or place of a crime. “ from Wikipedia

  4. Type of Computer Crimes • -Cyber Crime • Denial-Of-Service Attack • Malware/Malicious Code • Cyber Terrorism • Computing Virus

  5. Denial-Of-Service Attack • Sending huge amount of spam data to disturb someone’s web service (from IT Media) • Occupy the network resources • Down server

  6. Malware • “Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. “( from wikipedia) • Example: • Trojan horse • Adware

  7. Cyber Terrorism • In general, Cyber Terrorism is defined as an act of terror in, or using computer, networks. • Often it contain political intention. • Examples • Die Hard 4 • DoS attack to imaginary country

  8. Virus • A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user . (from Wikipedia)

  9. Example of Virus • http://jp.youtube.com/watch?v=ecb_dm5TRto • “Melissa” • Spread all over the world in 1999 • Using World Macro (VBA), infected PC will send 50 e-mail • Melissa created huge traffic, and many server were down • Damaged the trust of company

  10. How to prevent virus damage? • Use Anti-Virus Software • Norton • Avast! • Do not install more than one!

  11. Prevention of Virus Damage • Do not open un-reliable attachment file • Especially .doc, .vba, etc… • Use file scan before download/open it! • Online File Scanner • http://www.kaspersky.com/scanforvirus

  12. What is computer forensics? • Analytical and investigative techniques to identify, collect, examine and preserve evidence/information which is magnetically stored or encoded.

  13. Who uses computer forensics for evidence? • Criminal Prosecutors • Civil Litigations • Insurance Companies • Corporations • Law Enforcement Officials

  14. Steps of Computer Forensics • Protect computer system • Discover all files • Recover deleted files • Reveal contents of hidden files • Access protected files • Analyze relevant data

  15. Few common scenarios • Employee internet abuse • Criminal fraud • Industrial espionage • Unauthorized disclosure of corporate information

  16. Computer Forensics video • http://www.youtube.com/watch?v=W2Drw1qgsZA

  17. References • tula.bofh.ru/articles/539 • forum.utorrent.com/viewtopic.php?pid=179782 • www.foxinternational.com/diehard4/ • www.worldofstock.com/closeups/BTE1840.php An Explanation of Computer Forensics • http://computerforensics.net/forensics.htm Computer Forensics World • http://www.computerforensicsworld.com/ You Tube • http://www.youtube.com/watch?v=W2Drw1qgsZA

More Related