0% found this document useful (0 votes)
59 views10 pages

Assdf Assgn2 Manas Patil Vu1f1819027

Digital forensics involves the collection, preservation, analysis and presentation of computer-related evidence. It determines the past actions that occurred on a computer system using forensic techniques. Evidence of criminal activity is sometimes placed on computers in a way that traditional crime methods cannot find it. Digital forensics follows steps of collection, examination and analysis to retrieve and validate digital evidence related to an incident being investigated.

Uploaded by

patil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views10 pages

Assdf Assgn2 Manas Patil Vu1f1819027

Digital forensics involves the collection, preservation, analysis and presentation of computer-related evidence. It determines the past actions that occurred on a computer system using forensic techniques. Evidence of criminal activity is sometimes placed on computers in a way that traditional crime methods cannot find it. Digital forensics follows steps of collection, examination and analysis to retrieve and validate digital evidence related to an incident being investigated.

Uploaded by

patil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

PRGE

OATE 77

Name-Manas Dattoatray Pati


TD-- VuLE181g022
SUb A ssDF

Dieference beueenAEP, NPA and WPA2.


\NEPS PAA NPA2.

The main Securi is provised mplementati.on of Compiete TEEEga


purpose- Ao conns o re mosor EEF 02.l standarás are
netuwares- -tonaards implemented.

Data RiesCipner á. lemporaI Key Iodegra Authetication_


Priracy
LEnessien}- RCA) Acatocoal(TKIe) providei throvgh
Cipner bio KS.

WEP-O Pen WPA - pSKK


wPA2 Perso na
Athenti cadion-
EP-snares WPA-EmerPri se WPA-2e*er erS

Ci p h e r b G c K c haine
eta Provised tbrovgh - Me ssoge Autnentiout
Erer Me saaae n i e a r s
Code

Keg Manogeme
ke no
The uayhardsrasee THe áwou hand
Mancugemert Proided mechonism, s use shocng mechanisn-
tS prorise For T5 Used Orovis
Keg anagemen

Compatabud Possibidy to. Dossibie *o doeoy on older Netucs


in e m s of depla on
bokincorrend gnd pioNs tertae CexaS
infro.siucrde. harduwore

Vulherabidy Vulinetcbie againgt Adnerable-agams Jinente ogaès


ChopchoRf ragmentatn Chopcbopobigashi 0S atacessdue-
ong DOS a t o t Moru NPA-SK un poecta)
2Moble DeviLe Secocity
he eemerds af msbiie device fall IDto 3class ficctions
I DOevice Searig

Vorious omanizotions Nil SupsY mobiie deyices for s


mpioye
devices o r emplayee use gad pre=designtnose
deyices
t o comply wth busiaess enterexise Becorng O0proach
Enatle auao=\oCK Nhich nm dkes h e sdeyiceLosk iathe
ven-
that nas pgt beon Utili2ej tor qiven a measime
oftme
Clien bag o ra-enter the foyr-digir pin
Enabie easswOrd oe PIN acsurance Tt iS dsgmei uith.
t h e Qoal Aart Smaul ans orher Intomodirh on the deyie
Avoid utii2Anq ctO- Comp lete feaures that memorizes
CLie nd names or pass uoard
Aow cemcleuipe
Maks svre h a SSL BecunmYis enableda if accessitaie
Mare sure tbat SAtaeinclsig oPeatico syASteg
ondapsicaiansisVE +odae
-Iosta antivitus SOiaE a s becomes avaiuatie
-Fther Sensitiueinfatmcrtion ouekt ta ba disauawes
fxon gBoogs ente pAabile deyceor then ago in i
Ovg to be encrYpte.
-Ts Manags ne risko uaalaes cobent
1securi+
responses conincororote rain persQnnelS-
+heinherent in untUste dcomem. ondsdisabinq Ehe
use-ef-aeameea-
21Traf-fic Security
-\aFEtcSecuYy îS based on Chomption and atetieatian,
AILtraf£ic should be encryptes and ravet by econe NeanG
For Sxample SSL Or PVK
VPNCon be seA u t ho goa hod all4ak£c psttuesn-
mabile device and the gganizations s9Stem-
To limit access com he deice2
Organiza in agtrOng cHnenmicctoy frotocol Shosid
b e uses.
Aprefera ble approa co i s ro baxe a uO=Jaya
CiuthenticotiOn methosi whch hyOlve_ auEhenriating ssvie
and hen a Senica inq the user Of hedeyuc

3 BdrrierSecurity-
The organizaioneNught 0baLaC ecuray nethOJ
Dicokect t h e ner worK ErOmNhauhorizes_oCess_
he Sec urtyStatekg Sa cLAe *reuau_elicu
+8 mobile devie +toffic-
The ecope of seta SDJ aPpieadion a Ccess
&or all mobie
evice s can be \imte b Areuol policie.
Cgbercrime
SncompaSses a n Criminal aC hoding
sber Crme
OmpUtex.SStems-obdnetworKS orcrAmE add.t.iOndiy

hCIudes. CoALSNtiOinalCrsmes pe ormed i a e r et.


oro FG».
cbor crime S tO 6eAp\Oik
AMadO attocIs_vecttor
SOtJOxeThe crimes Oreeithen cybercrines
O yber.

eiares crimeS
EEs OfCabet-Crimes
ialenor potetialy violent Caber.crime categorses
hese cxinAes pose a phYsica risKtosome.Chaxoc
persoas.sinds OF Violen Obab|8Cybercrinne \ncdes
qberie orismItiscoamites and planned activity in.
Caherspa.ce yiocomate r NetworEs.
Assaute bv thrcati bo give ife *hreak to peope and their Frie
QChid Poraogonhy:Croating Pornogkapbic co.ndend qofMnOr C hildem

Non=yialet Cybercrimes
Non- yioleor (yberariMES are dvided intO
a l CHber-TheRt
CEmbezzlemer:ANhícnindiESMISASINg MOnEY o be
CUnlaufolopp topricmionCrimbal qans qet OCcess oneihas
to h e
informatio.n rom oAside of*0e aQaniecction
L ploaglarie.m:
is thS* OF SOMeonelEes origina)
wrinie
uththe inAerion g t tansEeting it oneS ewD
hame
CiN Piracy COPing ot CeP gAed AoHU0are ih illega ma nna.
(V T detity thelt: Ipthis ctacker aer.
colecis victim
personal nformotioa
C)Cyberfraud
gherFraud means selliag fake thitgs for the benefit Ttan e.
slso Damed as thet:Inthe cybe fraus the victim knowingy
-ondYOolunterty of£ers paoney o fhectMinal

d]Dastructive Cybarcrimad
h e sestructiue cyoercrire daaage h e Detcuork Servicebemuse
SF Ehis the dato is dam.age destroyed gndstolen for MiSue-

e )Other Don-yio lenm


inclwdes
s do the advertising/ aoltorng f PIOSttionsenice _Overitene
To do internet Qombiing-
To do cyber launderi ngwhere e Ccrro bic ronsEer
of Ends
redobe illeg a o Obtoided OGnAy-
EEbical issues in caopter Secur

AEEorence bettueen Laus and Fnics.


Lau- Esmics

Laus re desoribsi by forma Etbics ore sdeseribesby-


w r iten_doanment Uauritten prncipie.
aS Q e eStablis hesby EthicS Ore cepresemesfhy-

Jegisature epresenting al peopie eligion,phlosopher obE Gradp


Lesare inaerpretes by cauts Eitics areisterereteshy Persa.
Loms greEor everYone Eaics are gpplicoe on
pocsOnal chotcee
Cour is tne FiaaLJudga o There is no exseral Susge
ig enfoxcabie bs-policeans imiteáenorcamA0s

Cours

Studging9thics-

Sudsing ataics is difkerentos issues ore veryCompiSs


Some reiigion boxe Fnoic.u n futurs for Mosing g+AISa

hoice
S o ge* confuged ics wh resigion.

B ethicsCan be SAudiesapo Einm ony elisious

CoanacsiOn

Ethis ons reli im


e t s f pricip lees ornorms t0r Usdifing hat
-Etnics
i s r g a t ons t o b g ngicen Situation

Ehical principles oe si£esren feoareiaioussisis-


Beugian is basedob asrsoka ninanqabat ihe ereatio-
of he worlsond exStance ofcontroting fOrces
Ethical principles are hot umirerta
-Ethical vaues difEer Rys0cieiy and fum psraon o pes -

socieisPeonle associate privacYwitnnavig


Sameting io bide Othe peopie's atitud e ore aNectsd by.
Cultore oubacs ekosind

Etbics doCs no prOxid9 gnSrer.


Fbical plumism iS iderAFKinothot more han ans
pasiion mGY beethiCaly JUSTfiahle eNed eouay So IA
ven situCtiab
Pura\ism_is one adIE UDayoF naiciag hat wo DeaAe.
Maylegail diS 0gtee anJesue of E+ncS

Ethica Reasaning- the mQuaritN of eople


make etica
Judgenment reaVentld mag be daily. Eot eXomple
is uberi
t o buy £nam SVPer mareet or rOm Shop
Describe digital orensics.
Diqtal Foreasics
igtal Foransics is oMectton Rrerentionzanalysis.and.eeseniaan
teompItet related eLidence.
IEdetermines he Rast actton h a t baNetsen. lace.ob.a
compotecSUst musinq campter forenslss ecnniques.
The esidsacs OE criminal ativid splacesinsuch.auay-
ubere tttasirional saocc pAethod cann0A be able.tofindH
OEhnationiSeablirg saia.
stagnogaphy Eis nathing btbiding a messageinto
GLoger f iip_

Diaitas Forensics Steas


COLeCtton: Ddtats TisatifedlabeLeans ieSorAe abd gadnerits.
ato and pnysisal evidence Telatei ta inciaentbeing inveaies
do ei

2 ExaminationInRSphase om eoectei sata idendifa anu-


etract h e Perien inoaokiOb Using-pkoor forsnsis tcals
andL9Chntques

2) Analysls Iothis pase eSyt oE ekominctica phGSA OCe.


anatyzes From thee onaSSiS USefit OnsUue.rS to be anestions
Cire9 9nerated nicbge Oresenred Ln preyious stot-e

A) Repokting TbTne epoingiPbase tne cesUlH: OE he-


analusis are doneuhichContoinS_
The information pesng Fo
toe case
Movee Iett to lbe Porarmed
Ad NOated
EbohcmentsS oPaaess ans taalS-
6J
Autopsu=
Autopsy ig digital foens ics ploformthat efficientY.
gnalzes gmartpnone ond b a s i sK T* RSus ed sNoridwide
byioxgor nomberof users inCwding Law agenciesthe.
miroyons CO=gpert ia O CorrotinvestiQatlonS

STET-
Basedon Ubuntu, sxFT
h a s a u theimportqnd oos
e e i s ocorry oyt detailes forensios anaysis orinciseA
responsseusu SUpor anaiysis lnadvance forensias.
tormaAEE)Esea witness farmat CAFES

AmElemeptotion ÈAUOPSy-
O Start ctopsy forensics rouusen=tis
uuset-hosed Tot eg
o Fsk B defavlt yOU uoilLCOnOect ta theohopYS E-
Using uru LttpILAcalbosti9g99

S t art Neug Caso Clieis beuase ihis UU dig DOw c ase


tolder teThe 6Ystemand G{ouyo to begin adding
evideace

Enter the cose detals:


Beqin b eteringthe etads abou case This will incude
et thecossitsef ond desEiptlon_-ofthe case.

te where the evidene dicoctySLacated.


ae to nate where evidence is locakes on t e Syst.em,
SAddbost to the cace-clcK CAds boss and yeuwiu be oeserae
wthasaresn that allous youio odi the bost ad doscaA
AsiEates she timezone ans seewcan ne cendigres

6 okeuhere theboss is located Neu ass this Ar oge


b y RTeLsing add mage buton. Aukopay alOus OUA vse
nage tha Ou_have clread captures

AdA on image t a analyze=TIhegdd image Ssresn alirus


u s ts import the Imaee thak ule sre going to sanaizs
-euopSy

B1 gLet h e locotiono t the imoge Ao onai ye-This otc


uS o imOrton animogeipdg Our eviAeace loteer 3
MOre oprian da cogy iMgge tO h e OnglNSiSbOS

g The Cose allery= Asyou bost t o tbe casA, these win


dieplayes in *ne (case gollers.

o NQw other apstions

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy