Cyber Security & Cryptography
Cyber Security & Cryptography
UNIT -1
1.1 INTRODUCTION:
Cybercrime is not an old sort of crime to the world. It is defined as any criminal
activity which takes place on or over the medium of computers or internet or other technology
recognised by the Information Technology Act. Cybercrime is the most prevalent crime playing a
devastating role in Modern India. Not only the criminals are causing enormous losses to the society
and the government but are also able to conceal their identity to a great extent. There are number of
illegal activities which are committed over the internet by technically skilled criminals.
1. Hackers: The term hacker may refer to anyone with technical skills, however, it typically refers
to an individual who uses his or her skills to achieve unauthorized access to systems or networks so
as to commit crimes. The intent of the burglary determines the classification of those attackers as
white, grey, or black hats.
• (a). White Hat Hackers – These hackers utilize their programming aptitudes for a good
and lawful reason. These hackers may perform network penetration tests in an attempt to
compromise networks to discover network vulnerabilities. Security vulnerabilities are
then reported to developers to fix them.
• (b). Gray Hat Hackers – These hackers carry out violations and do seemingly deceptive
things however not for individual addition or to cause harm. These hackers may disclose
a vulnerability to the affected organization after having compromised their network.
• (c). Black Hat Hackers – These hackers are unethical criminals who violate network
security for personal gain. They misuse vulnerabilities to bargain PC frameworks.
•
2. Organized Hackers: These criminals embody organizations of cyber criminals, hacktivists,
terrorists, and state-sponsored hackers. Cyber criminals are typically teams of skilled criminals
targeted on control, power, and wealth. These criminals are extremely subtle and organized, and
should even give crime as a service. These attackers are usually profoundly prepared and well-
funded.
3. Internet stalkers: Internet stalkers are people who maliciously monitor the web activity of their
victims to acquire personal data. This type of cyber crime is conducted through the use of social
networking platforms and malware, that are able to track an individual’s PC activity with little or no
detection.
4. Disgruntled Employees: Disgruntled employees become hackers with a particular motive and
also commit cyber crimes. It is hard to believe that dissatisfied employees can become such
malicious hackers.
1. Cyber Terrorism –
Cyber terrorism is the use of the computer and internet to perform violent acts that result
in loss of life. This may include different type of activities either by software or hardware
for threatening life of citizens.In general, Cyber terrorism can be defined as an act of
terrorism committed through the use of cyberspace or computer resources.
2. Cyber Extortion
Cyber extortion occurs when a website, e-mail server or computer system is subjected to
or threatened with repeated denial of service or other attacks by malicious hackers. These
hackers demand huge money in return for assurance to stop the attacks and to offer
protection.
u
n
3. Cyber Warfare –
Cyber warfare is the use or targeting in a battle space or warfare context of computers,
online control systems and networks. It involves both offensive and defensive operations
concerning to the threat of cyberattacks, espionage and sabotage.
4. Internet Fraud –
Internet fraud is a type of fraud or deceit which makes use of the Internet and could
include hiding of information or providing incorrect information for the purpose of
deceiving victims for money or property. Internet fraud is not considered a single,
distinctive crime but covers a range of illegal and illicit actions that are committed in
cyberspace.
5. Cyber Stalking –
This is a kind of online harassment wherein the victim is subjected to a barrage of online
messages and emails. In this case, these stalkers know their victims and instead of offline
stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not
having the desired effect, they begin offline stalking along with cyber stalking to make
the victims’ lives more miserable.
• Webcam Hijacking:
Internet stalkers would attempt to trick you into downloading and putting in a malware-
infected file that may grant them access to your webcam. the method is therefore sneaky
that it’s probably you wouldn’t suspect anything strange.
• Catfishing:
Catfishing happens via social media sites, for example, Facebook, when internet
stalkers make counterfeit user-profiles and approach their victims as a companion of a
companion.
Protective Measures:
• Develop the habit of logging out of the PC when not in use.
• Remove any future events you’re close to attending from the social networks if they’re
recorded on online approaching events and calendars.
• Set strong and distinctive passwords for your online accounts.
• Cyber Stalkers can exploit the low security of public Wi-Fi networks to snoop on your
online activity. Therefore, avoid sending personal emails or sharing your sensitive info
when connected to an unsecured public Wi-Fi.
• Make use of the privacy settings provided by the social networking sites and keep all
info restricted to the nearest of friends.
• Do a daily search on the internet to search out what information is accessible regarding
you for the public to check
A botnet (short for “robot network”) is a network of computers infected by malware that are under
the control of a single attacking party, known as the “bot-herder.” Each individual machine under the
control of the bot-herder is known as a bot. From one central point, the attacking party can command
every computer on its botnet to simultaneously carry out a coordinated criminal action. The scale of
a botnet (many comprised of millions of bots) enable the attacker to perform large-scale actions that
were previously impossible with malware.
Common botnet actions include:
• Email spam
• DDoS attacks
• Financial breach
• Targeted intrusions
1.10 Proliferation:
This means that the more devices that are connected, the more vulnerable your
network is to security threats, thus increasing your chances of malicious attacks from online
sources and malware threats.
1.11 Security Challenges in Mobile Devices:
Cellular devices are easy to carry and easy to use. Cyber criminals
often have more success on these smaller screens, where spoofs are harder to spot. Additionally, it is
more dangerous to log your company network using a mobile device. When an employee is out of the
office, the protective bubble of your on-site cybersecurity isn’t available.While there are many ways
to breach a mobile device,
Malicious Hotspots:
Here, a criminal can set up a “free” public hotspot. Sometimes, users are asked to
sign with passwords or personal information to get access. Then, thieves can monitor keystrokes until
an employee types in more sensitive information. It’s a terrible and terribly effective criminal
technique.
Man-in-the-Middle Attacks:
In this type of attack, cyber criminals interrupt the flow of data coming off your
mobile device, and use it to monitor your network or hack into your data.
Shadow IT:
What’s this, you ask? It’s when your employees use unapproved apps to
communicate with staff members, or store/create company files. When business is being conducted,
this opens your company up to risk. If the platforms they’re using get hacked, or the wrong person gets
their password, your data can be compromised.
Phishing/Spoofing:
These spam texts and emails are designed to look like they come from a co-worker
or trusted source. On a smaller screen, it can be easy to mistake these attacks are real messages.
Stolen Devices:
A missing device is the ultimate risk for your company. When a device is stolen
everything from an employee’s contacts, to their emails, to their documents could be sold to the highest
bidder.
So, as you can see, there are plenty of security challenges in mobile devices to worry about. But, with
security threats to mobile devices, countermeasures can be taken to address them directly. Let’s talk
about some of the most common ones.
➢ SMi Shing :
Smishing become common now as smartphones are widely used. SMiShing uses
Short Message Service (SMS) to send fraud text messages or links. The criminals cheat the
user by calling. Victims may provide sensitive information such as credit card information,
account information, etc. Accessing a website might result in the user unknowingly
downloading malware that infects the device.
➢ War driving:
War driving is a way used by attackers to find access points wherever they can be.
With the availability of free Wi-Fi connection, they can drive around and obtain a very
huge amount of information over a very short period of time.
➢ WEP attack:
Wired Equivalent Privacy (WEP) is a security protocol that attempted to provide a
wireless local area network with the same level of security as a wired LAN. Since physical
security steps help to protect a wired LAN, WEP attempts to provide similar protection for
data transmitted over WLAN with encryption.WEP uses a key for encryption. There is no
provision for key management with Wired Equivalent Privacy, so the number of people
sharing the key will continually grow. Since everyone is using the same key, the criminal has
access to a large amount of traffic for analytic attacks.
➢ WPA attack:
Wi-Fi Protected Access (WPA) and then WPA2 came out as improved protocols
to replace WEP. WPA2 does not have the same encryption problems because an attacker
cannot recover the key by noticing traffic. WPA2 is susceptible to attack because cyber
criminals can analyze the packets going between the access point and an authorized user.
➢ Blue jacking:
Bluejacking is used for sending unauthorized messages to another Bluetooth
device. Bluetooth is a high-speed but very short-range wireless technology for exchanging
data between desktop and mobile computers and other devices.
➢ Replay attacks :
In Replay attack an attacker spies on information being sent between a sender
and a receiver. Once the attacker has spied on the information, he or she can intercept it and
retransmit it again thus leading to some delay in data transmission. It is also known as
playback attack.
➢ Blue snarfing :
It occurs when the attacker copies the victim’s information from his device. An
attacker can access information such as the user’s calendar, contact list, e-mail and text
messages without leaving any evidence of the attack.
➢ RF Jamming :
Wireless signals are susceptible to electromagnetic interference and radio-
frequency interference. Radio frequency (RF) jamming distorts the transmission of a
satellite station so that the signal does not reach the receiving station.
DDoS :
DDoS (distributed denial of service) attacks involve deploying sprawling networks of
botnets — malware-compromised devices linked to the internet. These bombard and overwhelm
enterprise servers with high volumes of fraudulent traffic. Malicious attackers may target time-
sensitive data, such as that belonging to healthcare institutions, interrupting access to vital patient
database records.
Man-in-the-middle Attacks:
Man-in-the-middle (MITM) network attacks occur when malicious parties intercept traffic
conveyed between networks and external data sources or within a network. In most cases, hackers
achieve man-in-the-middle attacks via weak security protocols. These enable hackers to convey
themselves as a relay or proxy account and manipulate data in real-time transactions.
Unauthorized Access:
Unauthorized access refers to network attacks where malicious parties gain access to
enterprise assets without seeking permission. Such incidences may occur due to weak account
password protection, unencrypted networks, insider threats that abuse role privileges, and the
exploitation of inactive roles with administrator rights.
Organizations should prioritize and maintain the least privilege principle to avoid the risks of privilege
escalation and unauthorized access.
SQL Injection :
Unmoderated user data inputs could place organizational networks at risk of SQL
injection attacks. Under the network attack method, external parties manipulate forms by submitting
malicious codes in place of expected data values. They compromise the network and access sensitive
data such as user passwords.
There are various SQL injection types, such as examining databases to retrieve details on their version
and structure and subverting logic on the application layer, disrupting its logic sequences and function.
Network users can reduce the risks of SQL injection attacks by implementing parameterized
queries/prepared statements, which helps verify untrusted data inputs.
Ransomware :
In ransomware attacks, malicious parties encrypt data access channels while withholding
decryption keys, a model that enables hackers to extort affected organizations. Payment channels
usually include untraceable cryptocurrency accounts. While cybersecurity authorities discourage
paying off malicious parties, some organizations continue to do so as a quick solution in regaining data
access.
Protection from Network Attacks:
Evolving network attacks require a modern and proactive network security solution.
3. Use Antivirus
4. Firewall
TOPICS: Introduction, Cybercrime: Definition and Origins of the Word, Cybercrime and Information
Security, Cybercriminals, Classifications of Cybercrime, Cyberstalking, Cybercafe and Cybercrimes,
Botnets. Attack Vector,· Proliferation of Mobile and Wireless Devices, Security Challenges Posed by
Mobile Devices, Attacks on Mobile/Cell Phones, Network and Computer Attacks,
UNIT-2
Typically, a user accesses a website by sending a direct request to its web server from a web
browser via their IP address. The web server then sends a response containing the website data
directly back to the user.
There are many different types of proxy servers, categorized by traffic flow, anonymity level,
application, service, IPs, and accessibility.
2.2 Anonymizers:
An associate degreeonymizer is an intermediate server placed between you
because the user and also the website to accesses the web site on your behalf and build your web water
sport untraceable. Anonymizers enable you to bypass net censors. associate degree anonymizer
eliminates all the distinctive info (IP address) from your system whereas you’re surf riding the net,
thereby making certain privacy. Most anonymizers will anonymize the net (HTTP:), fireplace transfer
protocol (FTP :), and gopher
To visit a page anonymously, you’ll be able to visit your most well-liked anonymizer web site, and
enter the name of the target website within the Anonymization field. Alternately, you’ll set your
browser home page to purpose to an anonymizer, so as to anonymize sequent net access. with the
exception of this, you’ll be able to like better to anonymously give passwords and different info to
sites without revealing any extra information, like your IP address.
Types of Anonymizers: Anonymizers are of two basic types; Networked anonymizers and Single-
point anonymizers.
Networked Anonymizers: A networked anonymizer 1st transfers your data through a network of
Internet-connected computers before passing it on to the web site. as a result of the data passes through
many web computers, it becomes a lot of cumbersome for anyone making an attempt to trace your data
to determine the association between you and also the anonymizer.
Single-Point Anonymizers: Single-point anonymizers 1st transfer your data through a web site before
causation it to the target website, so pass back data gathered from the targeted web site, to you via the
web site to shield your identity.
Advantage: Arms-length communication protects information address and connected distinctive info.
Disadvantage: Effects less resistance to stylish traffic analysis.
2.3 PHISHING:
Phishing involves an attacker trying to trick someone into providing sensitive account or other login
information online.
Posing as a trusted source, cyber attackers use email, phone, or text messages to dangle the bait and
acquire things like credit card information, social security numbers, passwords, and other login
credentials. Once the victim clicks a link, they can be directed to what appears to be a legitimate site
where sensitive information can be compromised — or malware can be installed
Spear Phishing:
Spear phishing involves targeting a specific individual in an organization to try to steal
their login credentials. The attacker often first gathers information about the person before starting
the attack, such as their name, position, and contact details.
Vishing
Vishing, which is short for "voice phishing," is when someone uses the phone to try to steal
information. The attacker may pretend to be a trusted friend or relative or to represent them.
Email Phishing
an email phishing scam, the attacker sends an email that looks legitimate, designed to
trick the recipient into entering information in reply or on a site that the hacker can use to steal or sell
their data
HTTPS Phishing
An HTTPS phishing attack is carried out by sending the victim an email with a link to a
fake website. The site may then be used to fool the victim into entering their private information.
Pharming:
In a pharming attack, the victim gets malicious code installed on their computer. This code
then sends the victim to a fake website designed to gather their login credentials.
Pop-up Phishing:
Pop-up phishing often uses a pop-up about a problem with your computer’s security or
some other issue to trick you into clicking. You are then directed to download a file, which ends up
being malware, or to call what is supposed to be a support center.
Clone Phishing:
A clone phishing attack involves a hacker making an identical copy of a message the
recipient already received. They may include something like “resending this” and put a malicious
link in the email.
Deceptive Phishing:
Deceptive phishers use deceptive technology to pretend they are with a real company
to inform the targets they are already experiencing a cyberattack. The users then click on a malicious
link, infecting their computer.
Social Engineering:
Social engineering attacks pressure someone into revealing sensitive information by
manipulating them psychologically.
Angler Phishing;
Anglers use fake social media posts to get people to provide login info or download
malware.
Website Spoofing:
With website spoofing, a hacker creates a fake website that looks legitimate. When you
use the site to log in to an account, your info is collected by the attacker.
Domain Spoofing:
Domain spoofing, also referred to as DNS spoofing, is when a hacker imitates the
domain of a company—either using email or a fake website—to lure people into entering sensitive
information. To prevent domain spoofing, you should double-check the source of every link and
email.
Image Phishing:
Image phishing uses images with malicious files in them meant to help a hacker steal
your account info or infect your computer.
Phishing:
An email attachment or link containing malware is used in phishing to lure users into clicking
on it. This usually involves sending a letter in a form of an official-looking email that warns to act
before it is too late
Dictionary attack: The method involves comparing a wordlist with the passwords of users.
Malware:
Malware such as keyloggers, which track keystrokes, or screen scrapers, which take
screenshots, are a similar means to gain access to passwords without using a password cracking tool.
Instead, they use malware such as phishing and malware called malware.
Guess: A guessing method, as its name suggests, uses passwords such as qwerty, admin, password,
etc., that are commonly used or set as default passwords. If the user don't change these default
passwords or choose them carelessly, they are more likely to be compromised.
• Firewalls cannot detect the installations of keyloggers on the systems; hence, antikey loggers
can detect installations of keylogger.
• This software does not require regular updates of signature bases to work effectively such as
other antivirus and antispy programs if not updated, it does not serve the purpose, which makes
the users at risk.
• Prevents Internet banking frauds. Passwords can be easily gained with the help of installing
keyloggers.
• It prevents ID theft
• It secures E-Mail and instant messaging/chatting.
4. Spywares
Spyware is a type of malware, that is installed on computers which collects
information about users without their knowledge. The presence of Spyware is typically hidden, from
the user, it is secretly installed on the user's personal computer. Sometimes, however, Spywares such
as keyloggers are installed by the owner of a shared, corporate or public computer on purpose to
secretly monitor other users.
A simple way to answer the question "what is Trojan" is it is a type of malware that typically gets
hidden as an attachment in an email or a free-to-download file, then transfers onto the user’s device.
Once downloaded, the malicious code will execute the task the attacker designed it for, such as gain
backdoor access to corporate systems, spy on users’ online activity, or steal sensitive data.
There are many types of Trojan horse viruses that cyber criminals use to carry out different actions
and different attack methods. The most common types of Trojan used include:
• Backdoor Trojan
• Banker Trojan:
• Distributed denial-of-service (DDoS) Trojan
• Downloader Trojan
• Exploit Trojan
• Fake antivirus Trojan
• Game-thief Trojan.
• Instant messaging (IM) Trojan.
• Infostealer Trojan
• Mailfinder Trojan
• Ransom Trojan
• Remote access Trojan
• Rootkit Trojan
• Short message service (SMS) Trojan
• Spy Trojan
2.9 BACKDOORS:
In cybersecurity terms, a Backdoor Attack is an attempt to infiltrate a
system or a network by maliciously taking advantage of software's weak point.
Backdoors allow the attackers to quietly get into the system by deceiving the security protocols and
gain administrative access. It is similar to the real-life robbery in which burglars take advantage of the
loopholes in a house and get a 'backdoor' entry for conducting the theft.
After gaining high-level administrative privilege, the cyber attackers could perform various
horrendous tasks like injecting spyware, gaining remote access, hack the device, steal sensitive
information, encrypt the system through ransomware, and many more.
Backdoors are originally meant for helping software developers and testers, so they are not always
bad.
• Use a reliable antivirus to detect, isolate, and remove viruses from your device. If you discover
a virus known to install backdoors, thoroughly check the system for any unauthorized changes.
• Follow cybersecurity news for alerts about exposed backdoors. If you are worried that a
particular device is in danger, do not connect it to any network until it has been patched.
• Regularly update your operating system and apps. Security updates close known vulnerabilities
and can prevent malware from getting a hold of your device.
2.10 Steganography:
Steganography is a method to protect secret or sensitive data from malicious
attacks to hide secret data by embedding that data within an ordinary, non-secret video, audio, image
or text file. Steganography is done through various methods where some bit of image, video or other
multimedia is replaced with plain text to create the ciphertext or hide the plain in the image, video, and
audio.
In Steganography, the
useless bits are actually replaced by
the useful bits in order to hide the
required file into any of the files or
data mentioned above. It plays a vital
role in cybersecurity by allowing
legitimate users or peers to send the
data in a highly secured way so that
it could be protected from the hacker
or malicious users who are intended
to harm or abuse the system. It can be
done using software that is available
in the market for free or paid.
2.11 SNIFFERS:
sniffing may be defined as a method of capturing or monitoring data packets traveling
through a computer network. Generally, sniffing is done between two hosts who are exchanging data
between them. Packet sniffers reside in between them and monitor every packet traveling through the
network. These packets are analyzed and captured sensitive data like usernames, passwords, email
details, IP address, hardware address, routing information, etc.
Sniffing can be performed by network administrators to isolate and troubleshoot the problems on the
network. It can also be done by someone with malicious intent to eavesdrop on network
communication and capture sensitive data like user name, password, types of websites frequently
browsed by the victim and other valuable information.
Types of sniffing:
Active Sniffing:
Sniffing in the switch is active sniffing. A switch is a point to point network device. The
switch regulates the flow of data between its ports by actively monitoring the MAC address on each
port, which helps it pass data only to its intended target. In order to capture the traffic between target
sniffers has to actively inject traffic into the LAN to enable sniffing of the traffic. This can be done in
various ways.
Passive Sniffing:
This is the process of sniffing through the hub. Any traffic that is passing through the
non-switched or unbridged network segment can be seen by all machines on that segment. Sniffers
operate at the data link layer of the network. Any data sent across the LAN is actually sent to each and
every machine connected to the LAN. This is called passive since sniffers placed by the attackers
passively wait for the data to be sent and capture them. Various types:
2.12 Spoofing:
Spoofing is a sort of fraud in which someone or something forges the sender’s identity
and poses as a reputable source, business, colleague, or other trusted contact in order to obtain
personal information, acquire money, spread malware, or steal data.
Types of Spoofing:
• IP Spoofing
• ARP Spoofing - Address Resolution Protocol
• Email Spoofing
• Website Spoofing Attack
• DNS Spoofing
Key Spoofing Phishing
For Spoofing, someone has to download Phishing is done using social engineering.
Way
a malicious software in user's computer.
IP Spoofing, Email Spoofing, URL Phone Phishing like asking OTP or getting
Examples
Spoofing. bank account details, Clone phishing.
2.13 Session Hijacking: The Session Hijacking attack consists of the exploitation of the
web session control mechanism, which is normally managed for a session token.
The Session Hijacking attack compromises the session token by stealing or predicting a valid session
token to gain unauthorized access to the Web Server.
The session token could be compromised in different ways; the most common are:
In the example, as we can see, first the attacker uses a sniffer to capture a valid token session called
“Session ID”, then they use the valid token session to gain unauthorized access to the Web Server.
Figure 1. Manipulating the token session executing the session hijacking attack.
DOS Attack is a denial of service attack, in this attack a computer sends a massive amount of traffic
to a victim’s computer and shuts it down. Dos attack is an online attack that is used to make the
website unavailable for its users when done on a website. This attack makes the server of a website
that is connected to the internet by sending a large number of traffic to it.
DDOS Attack means distributed denial of service in this attack dos attacks are done from many
different locations using many systems.
2 In Dos attack single system targets the victim In DDoS multiple systems attacks the victims
system. system..
3 Victim PC is loaded from the packet of data Victim PC is loaded from the packet of data sent
sent from a single location. from Multiple location.
4 Dos attack is slower as compared to DDoS. DDoS attack is faster than Dos Attack.
6 In DOS Attack only single device is used In DDoS attack,The volumeBots are used to
with DOS Attack tools. attack at the same time.
7 DOS Attacks are Easy to trace. DDOS Attacks are Difficult to trace.
8 Volume of traffic in the Dos attack is less as DDoS attacks allow the attacker to send massive
compared to DDos. volumes of traffic to the victim network.
9 Types of DOS Attacks are: 1. Buffer Types of DDOS Attacks are: 1. Volumetric
overflow attacks 2. Ping of Death or ICMP Attacks 2. Fragmentation Attacks 3. Application
flood 3. Teardrop Attack 4. Flooding Attack Layer Attacks 4. Protocol Attack.
2.15 Buffer attack:
A buffer is a temporary area for data storage. When more gets placed by a program or system
process, the extra data overflows. It causes some of that data to leak out into other buffers, which
can corrupt or overwrite whatever data they were holding.
In a buffer-overflow attack, the extra data sometimes holds specific instructions for actions
intended by a hacker or malicious user; for example, the data could trigger a response that damages
files, changes data or unveils private information.
Attacker would use a buffer-overflow exploit to take advantage of a program
that is waiting on a user’s input. There are two types of buffer overflows: stack-based and heap-
based. Heap-based
Stack-based buffer overflows are more common, and leverage stack memory that only exists during
the execution time of a function.
Heap-based attacks are harder to carry out and involve flooding the memory space allocated for a
program beyond memory used for current runtime operations.
2. Spoofing: The primary objective of this attack is to successfully masquerade the identity by
falsifying data and thereby gaining an illegitimate advantage.
• MAC address Spoofing: It is a technique of changing an assigned media access control (MAC)
address of a networked device to a different one. This allows the attacker to bypass the access
control lists on servers or routers by either hiding a computer on a network or allowing it to
impersonate another network device.
• IP Spoofing: It is a process of creating IP packets with a forged source IP address, with the
purpose of concealing the identity of the sender or impersonating another computing system.
• Frame Spoofing: The attacker injects the frames whose content is carefully spoofed and which
are valid as per 802.11 specifications.
3. Denial of service (DoS)
4. Man-in-the-middle attack (MITM): It refers to the scenario wherein an attacker on host A inserts
A between all communications - between hosts X and Y without knowledge of X and Y.
5. Encryption cracking: It is always advised that the first step to protect wireless networks is to use
WPA encryption. The attackers always devise new tools and techniques to deconstruct the older
encryption technology, which is quite easy for attackers due to continuous research in this field
2.17 Theft:
Identity theft is the crime of obtaining the personal or financial information of
another person to use their identity to commit fraud, such as making unauthorized transactions or
purchases. Identity theft is committed in many different ways and its victims are typically left with
damage to their credit, finances, and reputation.
• Criminal Identity Theft – This is a type of theft in which the victim is charged guilty
and has to bear the loss when the criminal or the thief backs up his position with the false
documents of the victim such as ID or other verification documents and his bluff is
successful.
• Senior Identity Theft – Seniors with age over 60 are often targets of identity thieves.
They are sent information that looks to be actual and then their personal information is
gathered for such use. Seniors must be aware of not being the victim.
• Driver’s license ID Identity Theft –All the information on one’s driver’s license
provides the name, address, and date of birth, as well as a State driver’s identity number.
The thieves use this information to apply for loans or credit cards or try to open bank
accounts to obtain checking accounts or buy cars, houses, vehicles, electronic equipment,
jewelry, anything valuable and all are charged to the owner’s name.
• Social Security Identity Theft – In this type of attack the thief intends to know your
Social Security Number (SSN). With this number, they are also aware of all your personal
information which is the biggest threat to an individual.
• Synthetic Identity Theft – This theft is uncommon to the other thefts, thief combines
all the gathered information of people and they create a new identity. When this identity
is being used than all the victims are affected.
• Financial Identity Theft – This type of attack is the most common type of attack. In
this, the stolen credentials are used to attain a financial benefit. The victim is identified
only when he checks his balances carefully as this is practiced in a very slow manner.
2.18 Footprinting:
Footprinting is an ethical hacking technique used to gather as much data as possible about
a specific targeted computer system, an infrastructure and networks to identify opportunities to
penetrate them. It is one of the best methods of finding vulnerabilities.
The process of cybersecurity footprinting involves profiling organizations and collecting data about
the network, host, employees and third-party partners. This information includes the OS used by the
organization, firewalls, network maps, IP addresses, domain name system information, security
configurations of the target machine, URLs, virtual private networks, staff IDs, email addresses and
phone numbers.
Social engineering is the term used for a broad range of malicious activities
accomplished through human interactions. It uses psychological manipulation to trick users into
making security mistakes or giving away sensitive information.
Social engineering attacks happen in one or more steps. A perpetrator first investigates the intended
victim to gather necessary background information, such as potential points of entry and weak security
protocols, needed to proceed with the attack. Then, the attacker moves to gain the victim’s trust and
provide stimuli for subsequent actions that break security practices, such as revealing sensitive
information or granting access to critical resources.
Social engineering attacks come in many different forms and can be performed anywhere where human
interaction is involved. The following are the five most common forms of digital social engineering
assaults.
BAITING:
As its name implies, baiting attacks use a false promise to pique a victim’s greed or curiosity. They
lure users into a trap that steals their personal information or inflicts their systems with malware.
The most reviled form of baiting uses physical media to disperse malware. For example, attackers
leave the bait—typically malware-infected flash drives—in conspicuous areas where potential victims
are certain to see them (e.g., bathrooms, elevators, the parking lot of a targeted company). The bait has
an authentic look to it, such as a label presenting it as the company’s payroll list.
Victims pick up the bait out of curiosity and insert it into a work or home computer, resulting in
automatic malware installation on the system.
Baiting scams don’t necessarily have to be carried out in the physical world. Online forms of baiting
consist of enticing ads that lead to malicious sites or that encourage users to download a malware-
infected application.
SCAREWARE:
Scareware involves victims being bombarded with false alarms and fictitious threats.
Users are deceived to think their system is infected with malware, prompting them to install software
that has no real benefit (other than for the perpetrator) or is malware itself. Scareware is also referred
to as deception software, rogue scanner software and fraudware..
Scareware is also distributed via spam email that doles out bogus warnings, or makes offers for users
to buy worthless/harmful services.
PRETEXTING:
Here an attacker obtains information through a series of cleverly crafted lies. The scam is
often initiated by a perpetrator pretending to need sensitive information from a victim so as to perform
a critical task. The attacker usually starts by establishing trust with their victim by impersonating co-
workers, police, bank and tax officials, or other persons who have right-to-know authority.
The pretexter asks questions that are ostensibly required to confirm the victim’s identity,
through which they gather important personal data.
All sorts of pertinent information and records is gathered using this scam, such as social security
numbers, personal addresses and phone numbers, phone records, staff vacation dates, bank records and
even security information related to a physical plant.
PHISHING:
As one of the most popular social engineering attack types, phishing scams are
email and text message campaigns aimed at creating a sense of urgency, curiosity or fear in victims. It
then prods them into revealing sensitive information, clicking on links to malicious websites, or
opening attachments that contain malware.
SPEAR PHISHING:
This is a more targeted version of the phishing scam whereby an attacker chooses
specific individuals or enterprises. They then tailor their messages based on characteristics, job
positions, and contacts belonging to their victims to make their attack less conspicuous. Spear
phishing requires much more effort on behalf of the perpetrator and may take weeks and months to
pull off. They’re much harder to detect and have better success rates if done skillfully.
Ports vary in their services offered. They are numbered from 0 to 65535, but certain ranges are more
frequently used. Ports 0 to 1023 are identified as the “well-known ports” or standard ports and have
been assigned services by the Internet Assigned Numbers Authority (IANA). Some of the most
prominent ports and their assigned services include:
A port scan sends a carefully prepared packet to each destination port number. The basic techniques
that port scanning software is capable of include:
Vanilla– the most basic scan; an attempt to connect to all 65,536 ports one at a time. A vanilla scan
is a full connect scan, meaning it sends a SYN flag (request to connect) and upon receiving a SYN -
ACK (acknowledgement of connection) response, sends back an ACK flag. This SYN, SYN-ACK,
ACK exchange comprises a TCP handshake. Full connect scans are accurate, but very easily detected
because full connections are always logged by firewalls.
SYN Scan– Also referred to as a half-open scan, it only sends a SYN, and waits for a SYN-ACK
response from the target. If a response is received, the scanner never responds. Since the TCP
connection was not completed, the system doesn’t log the interaction, but the sender has learned if
the port is open or not.
XMAS and FIN Scans– In a FIN scan, an unsolicited FIN flag (used normally to end an established
session) will be sent to a port. The system’s response to this random flag can reveal the state of the
port or insight about the firewall.
An XMAS scan simply sends a set of all the flags, creating a nonsensical interaction. The system’s
response by can be interpreted to better understand the system’s ports and firewall.
FTP Bounce Scan– allows for the sender’s location to be disguised by bouncing the packet through
an FTP server. This is also designed for the sender to go undetected.
Sweep scan– pings the same port across a number of computers to identify which computers on the
network are active. This does not reveal information about the port’s state, instead it tells the sender
which systems on a network are active. Thus, it can be used as a preliminary scan.
2.21 Enumeration:
Enumeration is utilized to gather usernames, hostname, IP addresses,
passwords, arrangements, and so on. At the point when a functioning connection with the objective
host is set up, hackers oversee the objective framework. They at that point take private data and
information. Now and again, aggressors have additionally been discovered changing the setup of the
objective frameworks. The manner in which the connection is set up to the host decides the
information or data the attacker will have the option to get to.
Process of Enumeration
Types of information enumerated by intruders:
1. Network Resource and shares
2. Users and Groups
3. Routing tables
4. Auditing and Service settings
5. Machine names
6. Applications and banners
7. SNMP and DNS details
3.2 INVESTIGATION TOOLS: While techniques may vary depending on the type of cybercrime
being investigated, as well as who is running the investigation, most digital crimes are subject to some
common techniques used during the investigation process.
• Background check: Creating and defining the background of the crime with known facts will
help investigators set a starting point to establish what they are facing, and how much
information they have when handling the initial cybercrime report.
• Information gathering: One of the most important things any cybersecurity researcher must
do is grab as much information as possible about the incident.
• Tracking and identifying the authors: This next step is sometimes performed during the
information-gathering process, depending on how much information is already in hand. In
order to identify the criminals behind the cyberattack,
o This is often the slowest phase, as it requires legal permission from prosecutors and a
court order to access the needed data.
• Digital forensics: Once researchers have collected enough data about the cybercrime, it's time
to examine the digital systems that were affected, or those supposed to be involved in the origin
of the attack. This process involves analyzing network connection raw data, hard drives, file
systems, caching devices, RAM memory and more. Once the forensic work starts, the involved
researcher will follow up on all the involved trails looking for fingerprints in system files,
network and service logs, emails, web-browsing history, etc.
EnCase:This software allows an investigator to image and examine data from hard disks and
removable disks.
SafeBack:SafeBack is mainly using for imaging the hard disks of Intel-based computer systems and
restoring these images to some other hard disks.
Data dumper:This is a command-line computer forensic tool. It is freely available for the UNIX
Operating system, which can make exact copies of disks suitable for digital forensic analysis.
Md5sum:A tool to check helps you to check data is copied to another storage successfully or not.
The process of discovery begins when a lawsuit appears imminent, up to when digital evidence is
presented in court. Attorneys from both sides will determine the scope of e-discovery. The following
is a simple description of the e-discovery process:
2. Preservation. Data that is identified as potentially relevant is placed under legal hold so it
cannot be destroyed. Failure to preserve data will lead to sanctions and fines if the lost data
puts the defense at a disadvantage.
3. Collection. Data is transferred from a company to legal counsel. The legal counsel
determines the data's relevance.
4. Processing. Files are loaded into a review platform. Data is usually converted into a PDF
(Portable Document Format) or TIFF (Tag Image File Format) for court.
5. Review. The review process assesses documents for privilege and responsiveness to
discovery requests.
• No. of PC and extensive use of internet access can increase the difficulty during the
investigation process.
• Tools and software to trace the hacking are not easily available.
• Lack of physical evidence can make the prosecution process difficult.
• Large storage space in Terabytes can make the examination process vast and difficult.
• Must be adaptive to the present situation. For instance, any changes in technology may lead to
the up-gradation of certain techniques.
Digital evidence management has become so critical to legal and corporate affairs that government
agencies now routinely provide guidance on the best ways to preserve digital evidence. Since most
companies do not have the resources to retain in-house evidence collection specialists
This is often overlooked during the identification phase. Make sure to take pictures of the device
holding the digital media you will be collecting. Document its physical condition and where it was
located.
Are there any dents or scratches? Is it wet? Are there tools nearby that could have been used to tamper
with it? Track this information in the same evidence management system as the physical device.
It is important to know when to stop working with evidence and let the experts take over. Following
the best practices detailed here will allow even regular security officers, IT technicians, and office
workers to help with the collection process. But the process of preserving and analyzing data still
usually requires forensic expertise.
Document the transfer of media and digital evidence between every person and agency that comes in
contact with it. Gaps in these records can prevent evidence from being admitted in court should legal
action need to be taken. While a chain of custody can be recorded on paper, an authoritative digital
record is often more reliable.
Leave the device in its current power state as long as possible during evidence identification and
collection. If the device is on, leave it on. If it is off, leave it off.
Leave battery-powered devices in their current state as long as possible. Obviously, for wired devices,
such as desktop PCs, you will eventually need to turn them off for transport. For highly sensitive
investigations, it is best to bring in forensic experts before you do whenever possible.
Ensure proper chain of custody for both hardware and data with strong physical security. Don’t store
the device in an open access area. Try not to leave it unattended when it is being worked on. Poor chain
of custody can reduce the value of evidence during proceedings.
6. Never Work on the Original Data
Sometimes data collection involves just copying readable files from media storage. But often other
metadata can be collected from devices by forensic experts. Metadata is data about the condition of
files on the device or about the device itself. Useful metadata can include how files were accessed,
whether a shutdown or delete command was issued, or whether the user tried to copy files to another
device.
Working directly on the original media will often delete valuable metadata. Professional data retrieval
and forensic services always perform their analyses and reporting on virtual copies of media whenever
possible.
Another way to preserve metadata is to keep the device isolated from other storage systems. Keep it
off Wi-Fi and wired network connections.
Sometimes well-intentioned staff can accidentally overwrite valuable metadata if they plug in a thumb
drive attempting to copy files via conventional means for analysis. Leave the data copying to
professional forensic experts.
Consider whether off-site storage is needed for long-term evidence management, or whether an on-
site modular evidence management system can accommodate your needs. Modular systems will be
able to scale if evidence retention needs or available space change.
Staff will need to periodically sign out evidence for reporting or attorney consultations. Recording all
of these transactions is essential for maintaining a proper chain of custody.
This can be difficult for most organizations that aren’t staffed with a full-time evidence manager. Even
those law enforcement agencies that do have evidence managers can’t have them on duty around the
clock. Consider whether automated evidence lockers can simplify transaction monitoring.
New electronic devices are constantly hitting the market. In particular, the advent of Internet of
Things (IoT) technology means many more types of devices now hold data. You should regularly
review your digital evidence management practices to ensure they accommodate all new types of
devices and forms of digital storage that might come into your possession.
Email headers contain essential information, including the name of the sender and receiver, the path
(servers and other devices) through which the message has traversed, etc.
The vital details in email headers help investigators and forensics experts in the email investigation.
For instance, the Delivered-To field contains the recipient’s email address, and the Received-By field
contains:
Similarly, the Received: from field provides necessary details like the sender’s IP address and
hostname. Again, such information can be instrumental in identifying the culprit and collecting
evidence.
Email servers are investigated to locate the source of an email. For example, if an email is deleted from
a client application, sender’s, or receiver’s, then related ISP or Proxy servers are scanned as they
usually save copies of emails after delivery. Servers also maintain logs that can be analyzed to identify
the computer’s address from which the email originated.
It is worth noting that HTTP and SMTPlogs are archived frequently by large ISPs. If a log is archived,
tracing relevant emails can take a lot of time and effort, requiring decompressing and extraction
techniques. Therefore, it is best to examine the logs as soon as possible.
In some cases, logs of servers are not available. This can happen for many reasons, such as when
servers are not configured to maintain logs or when an ISPs refuses to share the log files. In such an
event, investigators can refer to the logs maintained by network devices such as switches, firewalls,
and routers to trace the source of an email message.
X-headers are email headers that are added to messages along with standard headers,
like Subject and To. These are often added for spam filter information, authentication results, etc.,
and can be used to identify the software handling the email at the client, such as Outlook or Opera
Mail. In addition, the x-originating-IP header can be used to find the original sender, i.e., the IP address
of the sender’s computer.
5. Message-IDs
Message-ID is a unique identifier that helps forensic examination of emails across the globe. It
comprises a long string of characters that end with the Fully Qualified Domain Name (FQDN).
Message IDs are generated by client programs that send emails, such as Mail User Agents (MUA) or
Mail Transfer Agents (MTA). There are two parts of a Message-ID. One part is before @, and another
part is after @. The first part of the message-ID contains information, such as the message’s timestamp.
This information is the data regarding the time when the message was sent. The second part of
the Message-ID contains information related to FQDN.
Sometimes, the email software used by a sender can include additional information about the message
and attached files in the email. For example, it can be found in Multipurpose Internet Mail Extensions
(MIME) content as a Transport Neutral Encapsulation Format (TNEF) or custom header. An in-depth
analysis of these sections can reveal vital details related to the sender, like the MAC address, Windows
login username of the sender, PST file name, and much more.
7. Bait Tactics
The bait tactic is an email investigation technique used when the location of a suspect or cybercriminal
is unknown. In this, the investigators send the suspect an email containing an http: “<imgsrc>” tag.
The image source is on a computer that the investigators monitor. When the suspect opens the email,
the computer’s IP address is registered in a log entry on the HTTP server that hosts the image. The
investigators can use the IP address to track the suspect.
Sometimes, suspects take preventive measures like using a proxy server to protect their identity. In
that case, the IP address of the proxy server is recorded.
Large mailbox collections are often examined, analyzed, and used as evidence in legal cases.
Therefore, legal professionals have to work with large mailboxes in many cases. Most email service
applications, like Outlook and Gmail, offer a dashboard embedded with several valuable functions.
However, you may not get the desired results by only using keywords in the interface.
Date and time are two attributes of emails considered necessary when they are produced as evidence
related to a case. However, emails can be forged like physical documents, and hackers may tamper
with these attributes. In addition, since an email doesn’t directly reach from the receiver to the sender,
recording its actual route with accurate timings is a tricky aspect
MD5 and SHA1 are the two most crucial hashing algorithms used by digital forensics professionals.
It’s a standard practice to use MD5 and SHA1 hashing algorithms in email forensics investigations.
These algorithms allow forensic investigators to preserve digital evidence from the moment they
acquire it until it is produced in a court of law.
Email tracking is a method for monitoring whether the email messages is read by the intended
recipient. Most tracking technologies use some form of digitally time-stamped record to reveal the
exact time and date that an email was received or opened, as well as the IP address of the recipient.
Email tracking is useful for when the sender wants to know whether the
intended recipient actually received the email or clicked the links. However, due to the nature of the
technology, email tracking cannot be considered an absolutely accurate indicator that a message was
opened or read by the recipient.
3.8 IP TRACKING:
When you connect to the internet, your device uses an address to connect with called an IP address.
With IP tracking, every time you visit a website, the website knows what IP address you are accessing
the website from, which means your location, and in the case of businesses, company identities can be
determined. This information can be very powerful in determining the demand for your product and
services, especially for business-to-business companies.
Cookies, or behavioural targeting, allow the website you visit to place a cookie on your
browser to collect your web-browsing behaviour including time on page, clicks, and other websites
you visit. The technology is used primarily by publishers to create “audience profiles,” which are
basically a bunch of information about you.Cookies will live in your browser until you clear your
cache.
Another approach is to use cookie data to understand the individuals that visit your website, including
what department they work in or their job level. You can build an audience profile and market to more
people like them to drive relevant traffic to your website.
The best approach? Use both IP tracking and cookies simultaneously — this way, not only will you
know what companies are visiting your website, but you’ll also know what kinds of people are
visiting.
7 Best IP Address Trackers:
1. Emails are often a key source of evidence in cybercrime investigations, as they can provide
information on the perpetrators, victims, and the nature of the crime.
2. Deleted or lost emails can be recovered using a variety of methods, including server backups,
email recovery software, and forensic analysis.
3. Recovered emails can be analyzed for a range of information, including the sender, recipient,
date and time sent, and content of the email.
4. Email headers can provide valuable information in cybercrime investigations, such as the IP
address of the sender and the email client used.
5. Emails can also contain attachments, such as documents or images, that may provide additional
evidence of cybercrime.
6. Recovery of deleted or lost emails can be time-sensitive, as email servers may have retention
policies that automatically delete emails after a certain period of time.
7. Email recovery may require specialized technical knowledge and expertise, particularly in
cases where forensic analysis is necessary.
8. Chain of custody protocols must be followed when handling recovered emails to ensure that
the evidence is admissible in court.
9. Recovered emails must be analyzed in the context of other available evidence, such as
computer logs, network traffic data, and witness statements.
10. Email recovery can be a complex and time-consuming process, but it is an essential to identify
and prosecute cybercriminals.
1. Target Data Breach (2013): This attack compromised the payment information of 40 million
customers and personal information of 70 million customers. Investigators determined that
attackers gained access to the network through a third-party vendor.
2. Ashley Madison Data Breach (2015): Hackers accessed the website's user database and
exposed personal information of millions of users. Investigators discovered that the hackers
had used social engineering techniques to gain access to the network.
3. Yahoo Data Breaches (2013-2014): Yahoo suffered two data breaches that exposed personal
information of billions of users. Investigators found evidence that Russian state-sponsored
hackers were involved in the attacks.
4. WannaCry Ransomware Attack (2017): This ransomware attack infected hundreds of
thousands of computers worldwide. Investigators traced the attack to North Korea and
discovered that it was likely part of a broader cyber espionage campaign.
5. Equifax Data Breach (2017): Hackers accessed sensitive personal information of 147 million
customers. Investigators determined that the attack was due to a vulnerability in the company's
web application software.
6. NotPetya Ransomware Attack (2017): This ransomware attack caused significant disruption to
businesses worldwide. Investigators attributed the attack to Russian military hackers and found
that it was part of a broader cyberwarfare campaign.
7. Twitter Bitcoin Scam (2020): Hackers gained access to high-profile Twitter accounts and
posted tweets promoting a bitcoin scam. Investigators found evidence that the hackers used
social engineering techniques to gain access to the accounts.
8. SolarWinds Supply Chain Attack (2020): This sophisticated cyber espionage campaign
targeted several US government agencies and private companies. Investigators discovered that
Russian state-sponsored hackers were responsible for the attack.
9. Garmin Ransomware Attack (2020): This ransomware attack caused significant disruption to
Garmin's services. Investigators found that the attack was likely carried out by Russian
cybercriminals.
10. Colonial Pipeline Ransomware Attack (2021): This ransomware attack targeted one of the
largest fuel pipeline operators in the US, causing widespread fuel shortages. Investigators
traced the attack to a Russian cybercriminal group known as DarkSide.
3.11 What is Data Encryption?
Data encryption is a method of protecting data by encoding it in such a way that it can only be
decrypted or accessed by an individual who holds the correct encryption key. When a person or entity
accesses encrypted data without permission, it appears scrambled or unreadable.
Or
Data encryption is the process of converting data from a readable format to a scrambled piece of
information. This is done to prevent prying eyes from reading confidential data in transit. Encryption
can be applied to documents, files, messages, or any other form of communication over a network.
The data that needs to be encrypted is termed plaintext or cleartext. The plaintext needs to be passed
via some encryption algorithms, which are basically mathematical calculations to be done on raw
information. There are multiple encryption algorithms, each of which differs by application and
security index.
Apart from the algorithms, one also needs an encryption key. Using said key and a suitable encryption
algorithm, the plaintext is converted into the encrypted piece of data, also known as ciphertext. Instead
of sending the plaintext to the receiver, the ciphertext is sent through insecure channels of
communication.
Why Do We Need Data Encryption?
• Authentication: Public key encryption proves that a website's origin server owns the private
key and thus was legitimately assigned an SSL certificate.
• Privacy: Encryption guarantees that no one can read messages or access data except the
legitimate recipient or data owner.
• Regulatory Compliance: Many industries and government departments have rules in place that
require organizations that work with users’ personal information to keep that data encrypted.
• Security: Encryption helps protect information from data breaches, whether the data is at rest
or in transit.
TYPES OF ENCRYPTIONS :
Symmetric Encryption: Also called private-key cryptography or a secret key algorithm, this
method requires the sender and the receiver to have access to the same key. So, the recipient needs to
have the key before the message is decrypted. This method works best for closed systems, which have
less risk of a third-party intrusion.
Asymmetric Encryption: Also called public-key cryptography, this method uses two keys for the
encryption process, a public and a private key, which are mathematically linked. The user employs
one key for encryption and the other for decryption, though it doesn’t matter which you choose first.
As the name implies, the public key is freely available to anyone, whereas the private key remains with
the intended recipients only, who need it to decipher the messages. Both keys are simply large numbers
that aren’t identical but are paired with each other, which is where the “asymmetric” part comes in.
Hashing: Hashing generates a unique signature of fixed length for a data set or message. Each specific
message has its unique hash, making minor changes to the information easily trackable. Data encrypted
with hashing cannot be deciphered or reversed back into its original form. That’s why hashing is used
only as a method of verifying data.
Many internet security experts don’t even consider hashing an actual encryption method, but the line
is blurry enough to let the classification stand. The bottom line, it’s an effective way of showing that
no one has tampered with the information.
What is Decryption?
Decryption techniques is the process in which the encrypted code or data is
converted back to a form that is easily understandable and readable by a human or machine. This is
basically known as decoding encrypted data. It takes place at the receiver end. The message can be
decrypted either with the secret key or the private key.
The below diagram clearly shows the decryption technique and also the encrypted text i.e., the
ciphertext is converted back to the original message.
1. Physical search and seizure: This method involves physically seizing and searching computers
or other digital devices at the location where the crime was committed or where the evidence
is believed to be located. This method is often used in cases where there is a warrant or other
legal authority to search and seize the devices.
2. Remote search and seizure: This method involves accessing and searching computers or other
digital devices remotely, without physically seizing the devices. This method can be useful in
cases where the devices are located in another jurisdiction or country, or where the physical
seizure of the devices is not possible.
3. Consent search: This method involves obtaining the consent of the owner or user of the device
to search and seize the device. This method can be useful in cases where the owner or user is
cooperative and willing to allow access to the device.
4. Emergency search and seizure: This method involves seizing and searching the device without
a warrant or consent in cases where there is an immediate threat to public safety or where
evidence is in danger of being destroyed.
here are some common techniques for recovering deleted evidence in a cybercrime investigation:
• File carving: File carving involves using specialized software to identify and extract data
fragments from unallocated space on a storage device. This technique can be useful for
recovering deleted files or parts of files that have been partially overwritten.
• Forensic imaging: Forensic imaging involves creating a complete copy or image of a storage
device or system, including all deleted data. This technique can be useful for preserving and
analyzing the deleted data without modifying the original device.
• Data carving: Data carving involves searching for specific patterns or file types within the
storage device, such as email messages or image files. This technique can be useful for
recovering specific types of data that may have been deleted.
• Metadata analysis: Metadata analysis involves examining the metadata associated with a file,
such as creation and modification dates, to determine if the file was deleted or modified. This
technique can be useful for identifying when the file was deleted and by whom.
• Backup analysis: Backup analysis involves examining backup systems for any copies of the
deleted data. This technique can be useful if the deleted data was backed up prior to its deletion.
• Log analysis: Log analysis involves examining system logs, network logs, or application logs
for evidence of the deleted data being accessed or transmitted over the network. This technique
can be useful for identifying when and where the data was deleted.
• Password cracking: Password cracking involves attempting to guess or crack a password to
gain access to encrypted data that may contain the deleted evidence. This technique can be
useful in cases where the deleted data was encrypted.
• Journal analysis: Some file systems, such as the NTFS file system used by Windows, maintain
a journal or log of all changes made to the file system. Journal analysis involves examining this
journal to identify when and how files were deleted, modified, or created.
• Slack space analysis: Slack space refers to the unused portion of a file cluster that may contain
fragments of deleted files. Slack space analysis involves searching for and recovering these
fragments to reconstruct deleted files.
• Registry analysis: The registry is a database used by Windows to store system configuration
information. Registry analysis involves examining the registry for evidence of deleted or
modified keys or values related to the deleted data.
• RAM analysis: Random Access Memory (RAM) is volatile memory that stores data
temporarily while a computer is in use. RAM analysis involves examining the contents of RAM
to recover deleted or modified data that may not have been saved to disk.
• Social engineering: Social engineering involves using psychological tactics to trick individuals
into revealing information or performing actions that they normally would not. Social
engineering techniques can be used to recover deleted evidence by convincing the suspect to
reveal the location or password of the deleted data.
• Brute-Force Attack: This technique involves trying all possible combinations of characters to
guess the password. It is an effective method but can take a lot of time, depending on the length
and complexity of the password.
• Hybrid Attack: This method combines both the dictionary and brute-force attacks by using
variations of words and phrases from a dictionary to create different password combinations.
• Rainbow Table Attack: This technique uses pre-computed tables that contain encrypted
passwords and their corresponding plaintext values. Cybercriminals use these tables to quickly
reverse the hashed password to its original form.
• Social Engineering: This technique involves tricking users into revealing their passwords
through phishing scams, malicious websites, or other methods of deception.
• Keylogger: This technique involves installing malware on the user's device to record their
keystrokes, including their password, as they type.
• Shoulder Surfing: This technique involves observing the user as they enter their password,
either physically or remotely, to gain unauthorized access.
• Password Guessing: This technique involves guessing the password based on personal
information, such as the user's name, birthdate, or pet's name.
• Phishing: This technique involves creating a fake login page or website to steal the user's login
credentials.
Unit IV:
COMPUTER FORENSICS AND INVESTIGATIONS
There are various types of computer forensic examinations. Each deals with a specific aspect of
information technology. Some of the main types include the following:
• Database forensics. The examination of information contained in databases, both data and
related metadata.
• Email forensics. The recovery and analysis of emails and other information contained in email
platforms, such as schedules and contacts.
• Malware forensics. Sifting through code to identify possible malicious programs and
analyzing their payload. Such programs may include Trojan horses, ransomware or various
viruses.
• Memory forensics. Collecting information stored in a computer's random access memory
(RAM) and cache.
• Mobile forensics. The examination of mobile devices to retrieve and analyze the information
they contain, including contacts, incoming and outgoing text messages, pictures and video files.
• Network forensics. Looking for evidence by monitoring network traffic, using tools such as
a firewall or intrusion detection system.
4.2 Preparing For Computer Investigations:
Preparing for computer investigations involves a range of steps to ensure that you
are well-equipped to carry out an investigation into potential computer-related crimes or incidents.
Here are some of the key steps involved:
1. Understand the legal and regulatory framework: It is important to have a thorough understanding
of the laws and regulations governing computer investigations in your jurisdiction. This includes
knowledge of the relevant criminal and civil laws, as well as any regulatory requirements.
2. Develop investigation policies and procedures: Establish clear and well-defined policies and
procedures for conducting computer investigations. This should include details on how evidence will
be collected, analyzed, and preserved, as well as guidelines for dealing with suspects and witnesses.
3. Assemble a team: Building a team of experienced investigators and technical experts is essential.
Investigators should have a strong understanding of computer systems, networks, and forensic
techniques. Technical experts should be skilled in areas such as digital forensics, data analysis, and
cybersecurity.
4. Obtain necessary tools and resources: You will need a range of tools and resources to carry out a
computer investigation, including hardware and software for collecting and analyzing data, specialized
forensic equipment, and access to relevant databases and information sources.
5. Conduct training and awareness programs: It is important to ensure that all members of your
investigation team are properly trained and up-to-date on the latest techniques and tools. You should
also conduct awareness programs to educate employees and other stakeholders about the importance
of computer security and the risks of cybercrime.
6. Develop relationships with relevant parties: Building relationships with law enforcement agencies,
regulatory bodies, and other relevant parties can help to facilitate investigations and ensure that you
have access to necessary resources and expertise.
7. Identify potential risks and threats: It is important to identify potential risks and threats to your
organization's computer systems and data. This includes assessing vulnerabilities, such as weak
passwords or outdated software, and identifying potential attack vectors, such as phishing emails or
malware.
8. Establish a chain of custody: It is important to establish a clear chain of custody for all evidence
collected during an investigation. This means documenting the source of the evidence, who has had
custody of it, and any changes or alterations made to it. Maintaining a clear chain of custody is essential
for ensuring the admissibility of evidence in court.
9. Develop a response plan: Having a well-defined response plan in place can help ensure a timely and
effective response to computer-related incidents. This should include procedures for identifying and
containing incidents, as well as guidelines for notifying relevant parties, such as law enforcement and
regulatory bodies.
10. Conduct risk assessments: Regularly conducting risk assessments can help identify potential
vulnerabilities and threats, and enable proactive steps to be taken to mitigate them. This should include
assessments of both technical and non-technical risks, such as human error or insider threats.
11. Ensure compliance with legal and regulatory requirements: It is important to ensure that all
computer investigations are conducted in compliance with relevant laws and regulations. This includes
requirements for obtaining warrants, data privacy, and data retention policies.
12. Stay up-to-date on emerging threats and technologies: Cybersecurity threats and technologies are
constantly evolving, so it is important to stay up-to-date on the latest trends and developments. This
can involve attending conferences and training sessions, reading industry publications, and
participating in online communities.
Evaluating computer forensics tools can be a complex task, as there are a variety of factors to consider.
Here are some general steps to follow when evaluating computer forensics tools:
1. Determine your needs: First, identify what you need the tool for. Are you looking for a tool to
help you recover deleted files, analyze system logs, or conduct a full-scale forensic investigation?
Knowing your specific needs will help you narrow down your options.
2. Consider the features: Once you have a sense of your needs, consider the features of the tools
you are evaluating. Look for features such as data acquisition, analysis, and reporting capabilities.
Also, consider whether the tool supports the file systems and operating systems you are working
with.
3. Evaluate the user interface: A tool with a user-friendly interface can help you be more efficient
and productive. Look for a tool that is easy to navigate and provides clear, concise information.
4. Assess the accuracy and reliability of the tool: Accuracy and reliability are essential when it
comes to forensic investigations. Look for a tool that has a reputation for accuracy and reliability,
and read reviews from other users.
5. Consider support and training: Forensic tools can be complex, so it's essential to consider the
level of support and training that comes with the tool. Look for a tool with thorough documentation
and support resources, and consider whether training is available.
6. Evaluate the cost: Finally, consider the cost of the tool. Some tools may be more expensive than
others, but may offer more features or better support. Be sure to evaluate the value the tool offers
based on your specific needs.
1. Write Blockers: Write Blockers are devices that allow the forensic examiner to read data from a
storage device without modifying the data in any way. They are used to ensure the integrity of the
data during the acquisition process.
2. Forensic Imaging Devices: Forensic imaging devices are hardware tools used to create a bit-by-bit
copy of a storage device. These devices ensure that the copy is an exact replica of the original,
including deleted files and hidden data.
3. Digital Multimeters: Digital Multimeters are tools used to measure voltage, current, and resistance.
They can be used to check the integrity of electronic devices, such as hard drives or RAM, by
measuring the voltage output.
4. JTAG Debuggers: JTAG Debuggers are hardware tools used to access the JTAG interface on
devices such as mobile phones or game consoles. They allow forensic examiners to bypass the
operating system and access low-level system information.
5. USB Write Blockers: USB Write Blockers are similar to write blockers, but specifically designed
for USB devices. They allow forensic examiners to read data from a USB device without modifying
the data.
6. Logic Analyzers: Logic Analyzers are devices used to capture and analyze digital signals. They
are used to reverse engineer and understand how digital devices work.
7. Faraday Bags: Faraday Bags are specialized bags that shield electronic devices from
electromagnetic radiation. They are used to isolate and preserve electronic evidence by preventing
remote access or accidental data deletion.
8. Portable Forensic Workstations: Portable Forensic Workstations are laptops or desktop computers
that are pre-configured with forensic software and hardware. They allow forensic examiners to
conduct on-site investigations without the need for additional equipment.
9. Network Analyzers: Network Analyzers are devices used to capture and analyze network traffic.
They are used to investigate network-based attacks and to identify network anomalies.
10. Hardware Write Blockers: Hardware Write Blockers are devices used to prevent data from being
written to a storage device. They ensure that data is only read from the storage device, preventing
accidental or intentional modifications to the data.
1. EnCase: One of the most popular computer forensics tools, EnCase offers advanced data recovery,
analysis, and reporting capabilities.
2. FTK (Forensic Toolkit): FTK provides a wide range of forensic capabilities, including data
acquisition, analysis, and reporting. It is known for its powerful search capabilities and
compatibility with a wide range of file systems and operating systems.
3. Autopsy: Autopsy is an open-source digital forensic platform that provides a graphical user
interface for conducting forensic investigations. It supports a wide range of file systems and offers
data carving, keyword search, and timeline analysis capabilities.
4. X-Ways Forensics: X-Ways Forensics is a comprehensive forensic tool that offers advanced data
recovery, analysis, and reporting capabilities. It is known for its speed and ability to handle large
volumes of data.
6. Oxygen Forensic Detective: Oxygen Forensic Detective is a mobile and cloud forensics tool that
offers advanced data extraction, analysis, and reporting capabilities. It supports a wide range of
devices and cloud services.
7. Volatility: Volatility is an open-source memory forensics tool that allows investigators to analyze
system memory for evidence. It supports a wide range of operating systems and provides advanced
analysis capabilities.
8. Sleuth Kit: Sleuth Kit is an open-source forensic tool that provides command-line utilities for
analyzing file systems and volumes. It offers data carving, keyword search, and timeline analysis
capabilities.
9. BlackLight: BlackLight is a comprehensive forensic tool that offers advanced data acquisition,
analysis, and reporting capabilities. It is known for its ease of use and compatibility with a wide
range of devices and file systems.
10. Paladin Forensic Suite: Paladin Forensic Suite is a live Linux-based forensic tool that provides a
range of forensic capabilities, including data acquisition, analysis, and reporting.
11. Access Data Forensic Toolkit (FTK) Imager: FTK Imager is a free tool that allows investigators
to create forensic images of hard drives and other media. It supports a wide range of file systems
and provides advanced analysis capabilities.
12. Wireshark: Wireshark is an open-source network protocol analyzer that allows investigators to
capture and analyze network traffic for evidence. It supports a wide range of protocols and provides
advanced analysis capabilities.
13. NetworkMiner: NetworkMiner is an open-source network forensics tool that allows investigators
to capture and analyze network traffic for evidence. It supports a wide range of protocols and
provides advanced analysis capabilities.
14. OSForensics: OSForensics is a comprehensive forensic tool that provides a range of capabilities,
including data acquisition, analysis, and reporting. It is known for its ease of use and compatibility
with a wide range of file systems and operating systems.
15. F-Response: F-Response is a remote forensic tool that allows investigators to access and analyze
remote computers and devices. It provides advanced data acquisition, analysis, and reporting
capabilities.
16. ProDiscover: ProDiscover is a comprehensive forensic tool that provides a range of capabilities,
including data acquisition, analysis, and reporting. It supports a wide range of file systems and
provides advanced analysis capabilities.
17. Magnet AXIOM: Magnet AXIOM is a comprehensive forensic tool that provides a range of
capabilities, including data acquisition, analysis, and reporting. It is known for its ease of use
and compatibility with a wide range of file systems and operating systems
4.6 Validating and Testing Forensics Software:
• Validating and testing forensics software is essential for ensuring the reliability and accuracy of
digital evidence collected during a cybercrime investigation.
• Validation involves assessing whether the software meets its intended purpose and specifications,
ensuring that it is fit for use, meets user requirements, and performs as expected.
• Testing involves evaluating the performance of the software under a variety of conditions,
identifying potential errors, weaknesses, and vulnerabilities that could affect its accuracy or
reliability.
• Testing can be done through various techniques, such as unit testing, integration testing, and system
testing.
• The validation and testing process of computer forensics software should be done in a controlled
and documented manner to ensure that the results are reliable and can withstand legal challenges.
• The software should be tested against a variety of test cases, including known data and edge cases,
to ensure that it can handle all types of data and scenarios that may be encountered during an
investigation.
• The validation and testing process of computer forensics software is an ongoing process that should
be regularly reviewed and updated to account for changes in technology, new threats, and emerging
techniques.
• It is important to ensure that the software is up-to-date and continues to provide reliable and
accurate results
Fingerprint recognition and iris scanning are the most well-known forms of biometric security.
However, facial recognition is also gaining in popularity.
Let us consider the pros and cons of all these different techniques for biometric security.
An identification system based on fingerprint recognition looks for specific characteristics in the line
pattern on the surface of the finger. The bifurcations, ridge endings and islands that make up this line
pattern are stored in the form of an image.
The disadvantage of capturing an image of an external characteristic is that this image can be replicated
– even if it is stored in encoded form. An image is still an image, after all, and can therefore be
compared. In principle, you can then generate the same code.[ Fingerprints can already be spoofed
]using relatively accessible technology. Another, by no means insignificant, point to consider is that a
finger presented for recognition does not necessarily still need to be attached to a body...
In addition, some line patterns are so similar that in practice this can result in a high false acceptance
rate.
** Fingerprints can also wear away as you get older, if you do a lot of DIY or a particular kind of
work, for example. As a result, some people may find that their fingerprints cannot be recognised (false
rejection**) or even recorded. There is even a hereditary disorder that results in people being born
without fingerprints!
On the other hand, fingerprint identification is already familiar to much of the public and is therefore
accepted by a large number of users to use as biometric security. The technology is also relatively
cheap and easy to use. It should be noted,
however, that quality can vary significantly from one fingerprint recognition system to another, with
considerable divergence between systems in terms of false acceptance and false rejection rates.
A facial recognition system analyses the shape and position of different parts of the face to determine
a match. Surface features, such as the skin, are also sometimes taken into account.
Facial recognition for biometric security purposes is an offshoot of face detection technology, which
is used to identify faces in complex images in which a number of faces may be present.
This technology has developed rapidly in recent years and is therefore an excellent candidate as
biometric security if a system is needed for remote recognition.
Another plus is that the technology allows ‘negative identification’, or the exclusion of faces,
making it a good deal easier to scan a crowd for suspicious individuals.
However, facial recognition also has a number of significant drawbacks. For example, the technology
focuses mainly on the face itself, i.e., from the hairline down. As a result, a person usually has to be
looking straight at the camera to make recognition possible. And even though the technology is still
developing at a rapid pace, the level of security it currently offers does not yet rival that of iris scanning
or vein pattern recognition.
Lastly, it is important to bear in mind that although iris scanning offers a high level of biometric
security, this may come at the expense of speed. Incidentally, systems have recently been developed
that can read a person’s iris from a (relatively short) distance.
4.8 Audio Video Analysis:
Audio Video Analysis is an essential aspect of cybercrime investigations,
especially those related to digital forensics. It involves analyzing multimedia content such as audio
and video files to gather evidence, identify suspects, and reconstruct events that may have occurred.
Here are some key points to understand the concept of Audio Video Analysis in Cybercrime:
1. Digital Evidence Collection: Audio Video Analysis is used to collect digital evidence from
various multimedia files, including audio and video recordings. These files can be obtained
from various sources such as cell phones, computers, and CCTV footage.
2. Audio Analysis: Audio analysis involves examining audio files to identify any anomalies, such
as splicing, editing, or tampering. This process can help determine if the audio is authentic or
has been manipulated.
3. Video Analysis: Video analysis involves analysing video footage to identify any
inconsistencies, such as jump cuts or missing frames, which may indicate tampering. It also
involves examining the metadata, which can provide valuable information such as the date and
time the video was recorded.
4. Voice Identification: Audio Video Analysis can be used to identify voices in recordings. This
can help in identifying suspects and determining whether they were present at the scene of the
crime.
5. Facial Recognition: Video analysis can also be used for facial recognition, which can help
identify suspects who appear in video footage. Facial recognition technology can compare the
faces captured in the video with a database of known faces to identify a match.
6. Reconstruction of Events: Audio Video Analysis can be used to reconstruct events that
occurred in a particular location. By analysing CCTV footage, investigators can determine who
was present, where they were located, and what they were doing at the time of the incident.
• Goals: The primary goals of Windows System Forensics are to identify and analyze digital
evidence related to a security incident, establish a timeline of events, identify potential suspects
or sources of the attack, and preserve the evidence in a forensically sound manner.
• Process: The process of Windows System Forensics involves several steps, including
identification of the incident, preservation of the system, collection of evidence, analysis of
evidence, and reporting of findings.
• Identification: The first step in Windows System Forensics is identifying the incident that
requires investigation. This could be anything from a suspected security breach to a system
malfunction.
• Preservation: Once an incident has been identified, the system needs to be preserved to
prevent any changes to the data or evidence. This involves creating a forensically sound image
of the system, which can then be used for analysis.
• Collection: With the system preserved, the next step is to collect digital evidence from the
system. This involves searching for and extracting data such as log files, registry entries, and
network activity logs.
• Analysis: Once the data has been collected, it needs to be analyzed to identify any signs of
malicious activity or security breaches. This can involve examining timestamps, file hashes,
and other metadata to establish a timeline of events.
• Reporting: Finally, the findings of the Windows System Forensics investigation need to be
reported to the appropriate stakeholders, such as management, law enforcement, or legal
counsel.
• Tools: Several tools are available to aid in the Windows System Forensics process, including
digital forensics software, network analysis tools, and data recovery software.
• Importance: Windows System Forensics is crucial for maintaining the security of a Windows
operating system and identifying potential security breaches or malicious activity. It can also
be used in legal proceedings as evidence of a cybercrime or security incident.
Overall, Windows System Forensics is a critical process for any organization looking to maintain the
security of their Windows systems and protect themselves from potential cyber threats.
There are several tools available for Windows System Forensics, including:
Encase: Widely used in the industry for Windows System Forensics. It allows for the creation of
forensically sound images of the system and can recover deleted files and recover data from
unallocated space.
FTK Imager: It can create images of physical and logical drives, and analyse data from various file
systems, including NTFS, FAT, and exFAT.
Autopsy: It includes a range of features, including file carving, keyword searching, and timeline
analysis.
Sysinternals Suite: The Sysinternals Suite is a set of advanced system utilities developed by
Microsoft. It includes tools for monitoring system activity, analyzing network connections, and
identifying malware.
Wireshark: Wireshark is a network protocol analyzer that can be used for Windows System Forensics
to analyze network traffic and identify potential security breaches or malicious activity.
RegRipper: RegRipper is a tool used for analysing Windows Registry files. It can identify changes to
the registry that may indicate a security breach or malicious activity.
Volatility: Volatility is an open-source memory forensics framework. It can analyze memory dumps
to identify running processes, network connections, and other system information.
These tools can be used to aid in the Windows System Forensics process, but they require specialized
knowledge and expertise to use effectively. It is important to use these tools in combination with best
practices in digital forensics to ensure the integrity of the evidence and the accuracy of the findings.
The investigators should also be aware of the Linux log files, their storage and location in the directory,
as they are the most important sources of information to trace down the attacker. This module will
walk you through the various shell commands, methods to collect volatile data, the different log files
and the information they provide.
Shall Commands:
Investigators use the shell commands in Linux for collecting information from the system. Some of
the frequently used commands include:
1. dmesg
The command dmesg is the short for display message or ‘Driver Message’. The command displays the
kernel ring buffers, which contains the information about the drivers loaded into kernel during boot
process and error messages produced at the time of loading the drivers into kernel. These messages
are helpful in resolving the restoring the device’s driver issues.
2. fsck
The command fsck, is meant for File System Consistency Check. It is a tool to check the consistency
of Linux file system and repair.
4. history
The command history checks and lists the Bash shell commands used. This command helps the users
for auditing purposes.
Syntax: mount -t type device dir (Requests kernel to attach the file system found on device of type
type at the directory dir)
Investigators should learn and understand about the contents of various log files, which will help them
during security incidents and help them understand the locations they might have to look for finding
potential evidences.
Below mentioned are some locations for Linux log files, which can help the investigators to find out
the required data and resolve the issues. Additional log locations include:
1. .bash_history:
The .bash history file stores the command history. These file helps the investigator to
analyze the commands used in the terminal by the malicious user.
2. /proc:
The /proc/ directory is also known as proc file system. The directory comprises of the
order of special files that represent the current state of a kernel. Investigators can find the information
of the systems hardware and the processes running them. The proc file system acts as interface for the
internal data structures within the kernel.
3. Ps:
The command ps is the short notation for “process status”. The command is used to view
the list of processes running in the system. It provides a snapshot of the current processes along with
detailed information of user Id, CPU usage, memory usage, command name, etc. Investigators can
check for the tree to determine any suspicious processes and dependencies.
4. Swap Space:
“Linux operating system allocates certain amount of storage space on a hard disk called
Swap Space.” OS uses as the virtual memory extension of a computer’s real memory (RAM). The OS
splits physical RAM into bits/chunks of memory called pages. Having a swap space allows your
computer’s operating system to pretend that you have more RAM than you actually do. The least
recently used pages in RAM can be “swapped out” to your hard disk until they are needed later, so that
new files can be “swapped ink’ to RAM. In larger operating systems (such as IBM’s OS/390) the
swapping is called paging.
One advantage of a swap space is, the ability to organize itself as a single contiguous space so that the
system can operate it using fewer I/O operations to read or write a complete file. In general, Windows
and UNIX-based operating systems provide a default swap space of a certain size that the user or a
system administrator can change.
Network forensics is a subcategory of digital forensics that essentially deals with the examination of
the network and its traffic going across a network that is suspected to be involved in malicious
activities, and its investigation for example a network that is spreading malware for stealing credentials
or for the purpose analyzing the cyber-attacks. As the internet grew cybercrimes also grew along with
it and so did the significance of network forensics, with the development and acceptance of network-
based services such as the World Wide Web, e-mails, and others.
With the help of network forensics, the entire data can be retrieved including messages, file transfers,
e-mails, and, web browsing history, and reconstructed to expose the original transaction. It is also
possible that the payload in the uppermost layer packet might wind up on the disc, but the envelopes
used for delivering it are only captured in network traffic. Hence, the network protocol data that enclose
each dialog is often very valuable.
For identifying the attacks investigators must understand the network protocols and applications such
as web protocols, Email protocols, Network protocols, file transfer protocols, etc.
Investigators use network forensics to examine network traffic data gathered from the networks that
are involved or suspected of being involved in cyber-crime or any type of cyber-attack. After that, the
experts will look for data that points in the direction of any file manipulation, human communication,
etc.
With the help of network forensics, generally, investigators and cybercrime experts
can track down all the communications and establish timelines based on network events logs logged
by the NCS.
• Identification: In this process, investigators identify and evaluate the incident based on the
network pointers.
• Safeguarding: In this process, the investigators preserve and secure the data so that the
tempering can be prevented.
• Accumulation: In this step, a detailed report of the crime scene is documented and all the
collected digital shreds of evidence are duplicated.
• Observation: In this process, all the visible data is tracked along with the metadata.
• Investigation: In this process, a final conclusion is drawn from the collected shreds of
evidence.
• Documentation: In this process, all the shreds of evidence, reports, conclusions are
documented and presented in court.
Advantages:
• Network forensics helps in identifying security threats and vulnerabilities.
• It analyzes and monitors network performance demands.
• Network forensics helps in reducing downtime.
• Network resources can be used in a better way by reporting and better planning.
• It helps in a detailed network search for any trace of evidence left on the network.
Disadvantage:
• The only disadvantage of network forensics is that It is difficult to implement.
4.11.2 What is Graphics Forensics:
Graphics forensic experts use specialized software tools and techniques to analyze digital images and
videos for any signs of manipulation or tampering, including:
• Pixel analysis: The analysis of individual pixels in the image or video to detect any changes
or inconsistencies.
• Metadata analysis: The examination of metadata embedded in the image or video file, such
as the creation date, author, and location data, to establish the authenticity of the image or
video.
• File format analysis: The examination of the file format and compression techniques used to
create the image or video, which can reveal signs of tampering or manipulation.
• Error level analysis: The analysis of compression artifacts in the image or video, which can
reveal areas of the image that have been edited or manipulated.
• Digital watermarking analysis: The examination of digital watermarks that may be present
in the image or video, which can help to identify the source of the image or video.
• Image recognition analysis: The use of facial recognition or object recognition technology to
identify individuals or objects in the image or video.
Graphics forensics can be used to identify a wide range of digital image and video manipulations,
including:
Photo editing: The manipulation of images to remove, add, or change objects or individuals in the
image.
Image compression: The use of compression techniques to reduce the size of an image or video, which
can sometimes result in loss of quality or alteration of the image.
Digital forgery: The creation of fake images or videos using digital editing techniques.
Tampering: The deliberate alteration of an image or video for fraudulent or malicious purposes.
Graphics forensics is a valuable tool in legal investigations, as it can provide
concrete evidence of tampering or manipulation of visual media. It can also be used to establish the
authenticity of an image or video, which can be important in cases where the image or video is being
used as evidence.
• Acquisition: The first step in graphics forensics is to acquire the digital image or media that is
being analyzed. This can be done using a variety of tools, including specialized software,
hardware, or even physical imaging devices.
• Analysis: Once the digital image has been acquired, the next step is to analyze it in order to
identify any potential evidence or information that may be relevant to the investigation or legal
proceeding. This may involve examining the image for signs of tampering, identifying the
source of the image, or extracting metadata such as time and date stamps or geolocation data.
• Interpretation: After the image has been analyzed, the graphics forensic examiner must
interpret the results and determine what they mean in the context of the investigation or legal
proceeding. This may involve using specialized software or tools to enhance the image or
extract specific features, such as facial recognition or license plate numbers.
• Reporting: Finally, the results of the analysis and interpretation are reported back to the
relevant parties, such as law enforcement officials or legal teams, in order to support their case.
• Ability to extract valuable information: Graphics forensics can often extract valuable
information from digital images that would otherwise be impossible to obtain through other
means.
• Provides valuable evidence: Graphics forensics can provide valuable evidence that can be
used in legal proceedings or criminal investigations.
• Can help to solve complex cases: Graphics forensics can help to solve complex cases by
providing a detailed analysis of digital images that can help investigators to piece together the
events surrounding a particular incident.
• Enables accurate identification: Graphics forensics can help to accurately identify
individuals, objects, or locations in digital images, which can be especially useful in cases
where the image is the only evidence available.
• Requires specialized expertise: Graphics forensics requires specialized expertise and training,
which can be expensive and time-consuming to acquire.
• Limited applicability: Graphics forensics is only applicable to cases where digital images or
visual media are involved, which may limit its usefulness in certain types of investigations or
legal proceedings.
• Possibility of false positives: Graphics forensics can sometimes produce false positives or
inaccurate results, which can lead to incorrect conclusions or wasted resources.
Email investigations are used in various contexts, including legal proceedings, corporate
investigations, and criminal investigations. In these cases, email investigations can be used to identify
potential wrongdoing, discover evidence of criminal activity, or uncover information that may be
relevant to a legal case.
There are various techniques and types of email investigation that can be employed in this process.
These include:
• Metadata analysis: Metadata is the information that is stored in the email header and includes
details such as the sender and recipient, time and date stamps, and other technical details.
Analyzing metadata can help investigators to identify potential leads, such as IP addresses or
email servers, that can be used to track down the source of an email.
• Content analysis: This involves examining the content of emails to identify relevant
information or evidence. Investigators may look for keywords, phrases, or other indicators that
suggest illegal activity or wrongdoing.
• Forensic analysis: This involves using specialized tools and techniques to extract and analyze
data from email servers or individual devices. This can include recovering deleted emails,
identifying the source of emails, or tracing the path of emails through various servers and
networks.
• Social network analysis: This involves using social network analysis tools to identify
relationships and connections between individuals or organizations. This can help investigators
to identify potential co-conspirators or other individuals who may be involved in illegal
activity.
• Data visualization: This involves using graphical tools and techniques to represent and
analyze email data. This can help investigators to identify patterns or anomalies in the data that
may be relevant to the investigation.
• Legal Investigation: In legal investigations, emails are often scrutinized to gather evidence
related to a legal dispute or criminal case. Investigators may analyze emails to identify patterns
of behavior, discover hidden motives, or confirm or refute witness statements.
• Email Header Analysis: Email header analysis involves examining the metadata contained in
the email header to identify key information, such as the sender and recipient, the email server
used to send the message, and the path the email took through the internet. This information
can help investigators trace the email back to its source.
• Email Content Analysis: Email content analysis involves examining the actual content of the
email to identify relevant information, such as keywords or phrases that may be related to the
investigation.
• Forensic Analysis: Forensic analysis involves the use of specialized tools and techniques to
extract and analyze data from email servers or individual devices. This can include recovering
deleted emails, identifying the source of emails, or tracing the path of emails through various
servers and networks.
• Social Network Analysis: Social network analysis involves using specialized tools to identify
connections and relationships between individuals or organizations. This can help investigators
to identify potential co-conspirators or other individuals who may be involved in illegal
activity.
• Data Visualization: Data visualization involves the use of graphical tools to represent and
analyze email data. This can help investigators to identify patterns or anomalies in the data that
may be relevant to the investigation.
Mobile devices may store a wide range of information, including phone records and text messages, as
well as online search history and location data. We frequently associate mobile forensics with law
enforcement, but they are not the only ones who may depend on evidence obtained from a mobile
device.
Cell Phone Forensics, also known as Mobile Device Forensics, refers to the process of extracting data
and information from mobile devices like smartphones, tablets, and other electronic devices with
cellular capabilities. It involves the application of scientific and technical methods to recover, analyze
and preserve digital evidence from mobile devices that can be used in legal or investigative
proceedings.
4.13.1 Techniques:
Cell Phone and Mobile Device Forensics use a wide range of techniques to extract and
analyze data from mobile devices. Some of the most common techniques include:
Physical Extraction: This technique involves making a bit-by-bit copy of the mobile device's storage
media. It includes extracting data from SIM cards, internal memory, and external storage like SD cards.
Logical Extraction: This technique involves extracting only the data that is relevant to the
investigation or analysis from the mobile device. This can be done using software tools that allow
investigators to select the specific data they need.
File Carving: This technique involves searching through the mobile device's storage media for deleted
or lost files. It involves using specialized software tools to recover data from areas of the storage media
that are not accessible through normal means.
There are two types of Cell Phone and Mobile Device Forensics, namely:
Physical Forensics: This type of forensics involves the extraction of data from the device's storage
media, including SIM cards, internal memory, and external storage devices.
Logical Forensics: This type of forensics involves the extraction of only the data that is relevant to
the investigation or analysis from the mobile device. Logical Forensics is used when the device is
locked or password-protected, and physical extraction is not possible.
Preservation:
Once the device is identified, the next step is to preserve its data. This involves creating a bit-by-bit
copy of the device's storage media, either through physical or logical extraction. This ensures that the
original data on the device is not modified or destroyed during the investigation.
Analysis:
The analysis stage involves examining the data that has been extracted from the device. This can
include examining call logs, text messages, emails, photos, videos, and other files. It may also involve
using specialized software tools to recover deleted or hidden data.
Interpretation:
The interpretation stage involves analyzing the data that has been extracted and making sense of it.
This can include identifying patterns, links, and relationships between different pieces of data. It may
also involve drawing conclusions or making inferences based on the data.
Reporting:
The final stage is to report the findings of the investigation. This involves preparing a written report
that summarizes the results of the investigation and provides an objective analysis of the data. The
report may be used as evidence in legal or investigative proceedings.
Advantages:
• It can help companies to investigate data breaches or incidents involving the theft or loss of
company-owned mobile devices.
Disadvantages:
• It can be difficult to extract data from newer or more secure mobile devices.
• It can be difficult to interpret the data that is extracted, and the results may not always be
conclusive.
Unit V
Cyber Crime Legal Perspectives
Topics : Introduction,· Cybercrime and the Legal Landscape around the World, The Indian IT Act,
Challenges to Indian Law and Cybercrime Scenario in India,· Consequences of Not Addressing the
Weakness in Information Technology Act,· Digital Signatures and the Indian IT Act,· Amendments to
the Indian IT Act,· Cybercrime and Punishment,· Cyberlaw, Technology and Students: Indian
Scenario.
• The legal landscape around cybercrime varies significantly around the world. Some countries
have strict laws and regulations that criminalize various types of cybercrime, while others have
weaker or no laws in place to combat these types of crimes.
In the United States, for example, cybercrime is punishable by law, and perpetrators can face
imprisonment, fines, and other penalties.
• The Computer Fraud and Abuse Act (CFAA) is one of the most critical pieces of legislation in
the U.S. that addresses cybercrime.
• The CFAA criminalizes various types of computer-related offenses, including hacking,
password theft, and the distribution of malware.
In the European Union, the General Data Protection Regulation (GDPR) governs the protection
and processing of personal data.
• The GDPR provides individuals with greater control over their personal data and imposes strict
penalties on companies that violate data protection regulations.
In China, the Cybersecurity Law regulates various types of cybercrime, including online fraud,
identity theft, and the spread of malicious software. The Chinese government has also established a
national cybersecurity strategy aimed at combating cybercrime and protecting national security.
• South Africa:
o Cybercrimes Act 2021 – South Africa (South Africa signed the Budapest Convention
in 2001)
o National Cybersecurity Policy Framework (‘NCPF’)
The Americas:
Canada:
• The Personal Information Protection and Electronic Documents Act, SC 2000 c 5 (‘PIPEDA‘)
is a privacy statute, but establishes two central cybersecurity obligations for private sector
organisations in Canada. The PIPEDA requires organisations to
o notify the regulator and affected individuals of certain cybersecurity incidents, and
o adopt appropriate security safeguards.
Asia-Pacific:
• Australia :
o Privacy Principles (‘APPs‘) under the Privacy Act 1988 contain information security
obligations.
o Criminal Code Act 1995 Australia
• China has two main laws governing cybercrimes:
o the Cybersecurity Law 2016, and
o the Data Security Law of the People’s Republic of China which came into effect in
September 2021.
• India : has two laws that recognise the importance of cybersecurity:
o The Information Technology Act, 2000, and
o specific rules, like the Information Technology (Reasonable Security Practices and
Procedures and Sensitive Personal Data or Information) Rules, 2011.
• Philippines has the Cybercrime Prevention Act of 2012
• Thailand has the Act on Computer Crimes
Europe
SECTION PUNISHMENT
This section of IT Act, 2000 states that any act of destroying, altering or stealing
computer system/network or deleting data with malicious intentions without
authorization from owner of the computer is liable for the payment to be made
Section 43 to owner as compensation for damages.
This section of IT Act, 2000 states that any corporate body dealing with
sensitive information that fails to implement reasonable security practices
causing loss of other person will also liable as convict for compensation to the
Section 43A affected party.
1. Lack of uniformity in devices used for internet access – With varying income groups in India,
not everyone can afford expensive phones. In the US, Apple has over 44% market share. However, in
India the iPhones with their higher security norms are used by less than 1% of mobile users. The
widening gap between the security offered by the high-end iPhone and lower cost mobiles make it
almost impossible for legal and technical standards to be set for data protection by the regulators.
2. Lack of national level architecture for Cybersecurity – Critical infrastructure is owned by private
sector, and the armed forces have their own firefighting agencies. However there is no national security
architecture that unifies the efforts of all these agencies to be able to assess the nature of any threat and
tackle them effectively. The Prime Minister’s Office has created a position towards this cause but there
is a long way to go before India has the necessary structure in place.
3. Lack of separation – Unlike countries or states, in cyberspace there are no boundaries, thus making
the armed forces, digital assets of ONGC, banking functions, etc. vulnerable to cyber attacks from
anywhere. This could result in security breaches at a national level, causing loss of money, property
or lives. To respond to possible threats on the country’s most precious resources, there is a need for a
technically equipped multi-agency organization that can base its decisions on policy inputs and a sound
strategy.\
4. Lack of awareness – As there is no National regulatory policy in place for cybersecurity there is a
lack of awareness at both company level as well as individual level. Domestic netizens can protect and
be protected from the cyber-attacks only if there is a guided and supervised legal framework.
• Increased Cybercrime: One of the most significant consequences of not addressing weaknesses
in the Information Technology Act is the increased risk of cybercrime. When there are
vulnerabilities in the law, it becomes easier for hackers and other cybercriminals to exploit them
and launch attacks. This could lead to everything from data breaches to identity theft to financial
fraud.
• Reduced Trust in Technology: When people don't feel confident that their personal information
is being protected, they are less likely to trust technology and the companies that use it. This could
lead to reduced adoption of new technologies and a reluctance to share personal information online.
It could also have a negative impact on the digital economy and innovation.
• Loss of Business Opportunities: Companies that don't take cybersecurity seriously are likely to
lose business opportunities. This is because customers and partners will be less likely to work with
them if they don't feel their information is being properly protected. Additionally, companies may
be less likely to invest in new technology if they don't feel it will be secure.
• Financial Loss: Cyberattacks can be costly for individuals and companies alike. For individuals,
it could mean losing access to bank accounts, credit cards, and other financial resources. For
companies, it could mean lost revenue, damage to their brand reputation, and legal liabilities.
• Legal Consequences: Finally, not addressing weaknesses in the Information Technology Act
could have legal consequences. Companies that fail to properly protect customer data could be
subject to fines, lawsuits, and other legal penalties. Individuals who engage in cybercrime could
also face legal consequences, including fines and even imprisonment.
• Damage to National Security: The failure to address weaknesses in the Information Technology
Act could also have implications for national security. Cyberattacks could be used to steal sensitive
government information, disrupt critical infrastructure, or even launch coordinated attacks against
the country.
• Reputation Damage: Companies that suffer from cyber attacks may also suffer damage to their
reputation. If news of a cyber-attack becomes public, customers may lose trust in the company's
ability to protect their information. This could result in a loss of customers and damage to the
company's brand reputation.
• Lack of Cybersecurity Awareness: If weaknesses in the Information Technology Act are not
addressed, it could lead to a lack of awareness about the importance of cybersecurity. Individuals
and companies may not take necessary precautions to protect their information, leaving them
vulnerable to cyber-attacks.
• Increase in Cybersecurity Costs: When cybersecurity is not taken seriously, it can lead to an
increase in cybersecurity costs. Companies may need to invest more in security measures such as
firewalls, intrusion detection systems, and encryption to protect their information.
• Lost Productivity: Cyber attacks can also lead to lost productivity for individuals and companies.
For individuals, it could mean lost work hours due to dealing with the aftermath of a cyber attack.
For companies, it could mean downtime for their systems, which could result in lost revenue and
productivity.
Cybersecurity deals with the danger Information security deals with the
Threat in cyberspace. protection of data from any form of threat.
Defense Acts as first line of defense. Comes into play when security is breached.
Examples and Inclusion of Cyber Security are as follows:
• Network Security
• Application Security
• Cloud Security
• Critical Infrastructure
• Procedural Controls
• Access Controls
• Technical Controls
• Compliance Controls
In India, electronic and certificate-based digital signatures are regulated by the Information
Technology Act, 2000 (IT Act) and the following rules made under this Act:
Valid electronic signatures must include an electronic authentication technique or procedure specified
in the Second Schedule of the IT Act. The Second Schedule currently specifies the following e-KYC
(Know Your Customer) authentication techniques and procedures:
Under Indian law, reliable electronic and digital signatures carry a presumption of validity compared
to other “non-recognized” electronic signatures. However, in common with other jurisdictions, Indian
law will not consider an agreement invalid solely on the grounds that it was formed with such non-
recognised electronic signatures.
For an electronic signature to be considered reliable and presumptively valid under the IT Act:
2. at the time of signing, the signatory must have control over the data used to generate the electronic
signature;
3. any alteration to the affixed electronic signature, or to the document to which the signature is
affixed, must be detectable;
4. there should be an audit trail of steps taken during the signing process; and
5. The signer certificates must be issued by a certifying authority (CA) recognized by the
Note:
For e-signing processes initiated in India, Adobe applies an electronic seal using digital certificates
from eMudhra, which are recognized under the IT Act and thus carry the presumption of validity for
the completed agreement.
Judges and magistrates are familiar with the law concerning e-signatures and e-contracts, although
some local authorities insist on physical documents for keeping registers and records under statutes,
and on the use of traditional “wet signatures” for authentication.
Special considerations:
Aadhaar e-KYC
• compliant with such standards of privacy and security as may be specified by regulations; and
• permitted to offer authentication services under the provisions of any other law made by
Parliament.
Accordingly, authentication using Aadhaar e-KYC services is currently only being offered to private
application service providers (ASPs) by the following two government entities:
Note:
Adobe has partnered with NDSL to provide Aadhaar e-KYC services to our customers worldwide. For
more information, please see https://helpx.adobe.com/sign/using/adobesign-idp-aadhaar.html
Indian Stamp Act:
The Indian Stamp Act, 1899, requires that certain documents be stamped at or before the
time of execution. Currently no laws in India prescribe a method for stamping electronic documents.
Some states such as Maharashtra, Karnataka and Delhi specifically extend the requirement for
stamping to electronic records. When stamps are accepted electronically. Adobe Acrobat Sign can be
tailored to meet those requirements.
Companies should always confirm with their internal legal team whether a document needs to be
stamped before signing and executing the document electronically. If a document is signed and
executed electronically and is required to be stamped, then the company should ensure that a physical
copy of the document is prepared and stamped. If a document is not properly stamped, then penalties
may be imposed.
The IT Act allows the use of an electronic or digital signature for (i)
filing any form, application or document with any government authority; (ii) issue of any license,
permit or approval by the government authority; and (iii) receipt or payment of money in a particular
manner, in electronic form. The government authority may create rules prescribing the manner in
which electronic records and electronic signatures are accepted for these purposes. For instance, Rule
7 of the Companies (Registration Offices and Fees) Rules, 2014 specifies that every application,
financial statement, prospectus, return, declaration, memorandum, articles, particulars of charges, or
any other particulars or document or any notice, shall be filed in computer readable electronic form in
pdf. Further, Rule 8 stipulates that an e-form must be authenticated using Digital Signature; and the
Central Board of Direct Taxes have notified procedure for filing e-TDS/ e-TCS and other forms using
digital signatures.
In addition, certain government authorities have initiated e-filing regimes and permit electronic
signatures for the following purposes:
Under Indian law, the following documents must be signed with a traditional wet signature:
In addition, notarization is carried out by a registered notary under his or her signature and seal. As a
matter of practice, this has always been carried out through a physical seal and wet signature and
requires verification of physical copies of documents.
• Expanded the definition of cybercrime to include offences such as identity theft, cyberstalking, and
phishing.
• Introduced new penalties for cybercrime, including imprisonment and fines.
• Established the framework for the investigation and prosecution of cybercrime in India.
• Provided for the appointment of an adjudicating officer to handle disputes related to cybercrime.
• Introduced new provisions related to the preservation and retention of electronic records.
• Mandated the use of digital signatures for online transactions.
• Made cybercrime a non-bailable offence in certain cases.
• Significance: This amendment was significant as it was the first major update to the IT Act since
its inception in 2000. It reflected the government's growing recognition of the need to address the
challenges posed by cybercrime and establish a legal framework to regulate it.
• Established a framework for the protection of personal data, including sensitive personal data.
• Included provisions related to the storage and transfer of personal data.
• Introduced penalties for non-compliance, including imprisonment and fines.
• Established the office of the Data Protection Officer to oversee compliance with data protection
regulations.
• Introduced new provisions related to the handling of data breaches.
• Provided for the establishment of a Data Protection Authority to oversee data protection issues in
India.
• Defined the concept of "consent" and regulated its use in data processing activities.
• Significance: This amendment was significant as it reflected the government's growing recognition
of the need to protect personal data and privacy in the digital age. It also reflected the growing
importance of data as a valuable commodity and the need to regulate its use.
The Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules,
2021:
• Established guidelines for intermediaries, including requirements related to content takedown and
the identification of the originator of problematic content.
• Introduced a code of ethics for digital media, including provisions related to fake news and the
promotion of violence.
• Required social media platforms to appoint a grievance officer to handle complaints related to
content.
• Mandated the use of automated tools to identify and remove problematic content.
• Required digital news platforms to adhere to the Press Council of India's code of ethics.
• Provided for the establishment of a three-tiered regulatory framework to oversee digital media and
social media platforms.
• Significance: This amendment was significant as it reflected the government's growing concern
over the role of social media and other digital platforms in spreading misinformation and
promoting violence. It also reflected the government's desire to regulate these platforms more
closely to ensure their responsible use.
The law defines the offenses in a detailed manner along with the penalties for each category of offence.
• Cybercrime is a serious problem in India, and students are increasingly engaging in cybercrime.
• Common cybercrimes committed by students include hacking, phishing, cyberbullying, and
online harassment.
• Cybercrime can have serious consequences for students, including legal penalties, suspension
or expulsion from school, and damage to their reputation.
• Students who engage in cybercrime may also be at risk of becoming victims of cybercrime
themselves, such as identity theft or online fraud.
2. Schools and universities have a responsibility to educate students about cyberlaw and
cybersecurity:
• Educational institutions have a responsibility to educate students about the risks and
consequences of cybercrime.
• Schools and universities can offer courses and workshops on cyberlaw and cybersecurity to
teach students about the importance of online safety.
• Educational institutions can also implement policies and procedures to prevent cybercrime and
protect students from cyber threats.
• This includes developing guidelines for safe internet use, monitoring online activity, and
reporting any suspicious behavior to the appropriate authorities.
• The Information Technology (IT) Act, 2000, is the primary legislation governing cyberlaw in
India.
• The Act defines cybercrime and provides penalties for various cyber offences.
• The Act also establishes the framework for the investigation and prosecution of cybercrime in
India.
• The Act has been amended several times to keep up with the evolving nature of cybercrime.
4. social media and online platforms pose unique challenges for students and cyberlaw:
• Social media and online platforms are increasingly popular among students, but they also pose
unique risks.
• Cyberbullying and online harassment are common on social media, and can have serious
consequences for students.
• Social media platforms may also collect and use student data in ways that violate privacy laws.
• Educational institutions must ensure that students are aware of these risks and provide guidance
on how to use social media safely.
• The use of technology in education has increased dramatically in recent years, raising concerns
about data privacy.
• Students' personal data, including grades, test scores, and attendance records, are often stored
on school and university servers.
• Educational institutions must take steps to protect student data and ensure compliance with
data protection laws, such as the Information Technology (Reasonable Security Practices and
Procedures and Sensitive Personal Data or Information) Rules, 2011.
• Educational institutions must also ensure that students' personal data is not misused by third
parties, such as advertisers or data brokers.
• As technology and cybercrime evolve, schools and universities must stay up to date on the
latest trends and threats.
• Educational institutions can partner with cybersecurity experts and organizations to develop
best practices and implement effective policies.
• Educational institutions should also encourage students to be responsible digital citizens and
promote ethical and responsible use of technology.
• This includes teaching students about online privacy, security, and the responsible use of social
media and other online platforms.