0% found this document useful (0 votes)
2 views32 pages

CF Unit-1

The document outlines the course on Computer Forensics, focusing on cybercrime, its types, and the role of computers in criminal activities. It covers the objectives and outcomes of the course, emphasizing the importance of digital evidence and forensic techniques. Additionally, it details various types of cybercrime, including phishing, ransomware, malware, identity theft, and scams.

Uploaded by

Sanjana Sree
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views32 pages

CF Unit-1

The document outlines the course on Computer Forensics, focusing on cybercrime, its types, and the role of computers in criminal activities. It covers the objectives and outcomes of the course, emphasizing the importance of digital evidence and forensic techniques. Additionally, it details various types of cybercrime, including phishing, ransomware, malware, identity theft, and scams.

Uploaded by

Sanjana Sree
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 32

Computer Forensics

IV BTech II Semester CSE-A (R16)

By
M Vinod
Associate Professor, CSE,
BRECW, Hyderabad
UNIT-I

• Prerequisite: Networks Security


• Introduction of Cybercrime: Types, The Internet spawns
crime, Worms verses viruses, Computer’s role in crimes,
Introduction to digital forensics, Introduction to Incident-
Incident Response Methodology – Steps – Activities in
Initial Response, Phase of after detection of an incident
Professional Elective-VI
Course Code: CS863PE
Prerequisite: Network Security
Course Objectives:

• A brief explanation of the objective is to provide digital evidences


which are obtained from digital media.
• In order to understand the objectives of computer forensics, first of
all, people have to recognize the different roles computer plays in a
certain crime.
• According to a snippet from the United States Service, the functions
computer has in different kinds of crimes.
Course Outcomes:

• Students will understand the usage of computers in forensic, and how


to use various forensic tools for a wide variety of investigations.
• It gives an opportunity to students to continue their zeal in research
in computer forensics.
Unit-I

Introduction of Cybercrime:
Types, The Internet spawns crime, Worms versus viruses Computers’
roles in crimes, Introduction to digital forensics.
Introduction to Incident Response:
Incident response Methodology-Steps-Activities in Initial Response,
Phase after detection of an incident
What is Cybercrime?
Cybercrime is defined as a crime where a computer is the object of the
crime or is used as a tool to commit an offense.
A cybercriminal may use a device to access a user’s personal
information, confidential business information, government information,
or disable a device. It is also a cybercrime to sell or elicit the above
information online.

A cyber attack is an assault launched by cybercriminals using one or


more computers against a single or multiple computers or networks.
A cyber attack can maliciously disable computers, steal data, or use a
breached computer as a launch point for other attacks.
Forensics
Collection and analysis of evidence
- Using scientific test or techniques facts against crime
 To establish facts against crime
 For presenting in a legal proceeding
Therefore forensic science is a scientific method of gathering and
examining information of the past which is then used as a court of law

Cyber Forensics is simply application of computer investigation and.


analysis techniques in the interest of determining potential legal
evidence. Forensic computing is the process of identifying, preserving,
analysing and presenting the digital evidence in a manner that is legally
acceptable.
Types of Cyber Crime
1. Phishing
criminals send out fraudulent email messages that appear to come from
a legitimate source. The email is designed to trick the recipient into
entering confidential information (ex: account numbers, passwords, pin,
birthday) into a fake website by clicking on a link.
The email will include a link or attachment which once clicked, will steal
sensitive information or infect a computer with malware. The
cybercriminals will use this information to commit identity fraud or sell it
on to another criminal third party.
The aim was to trick as many people as possible into clicking a link or
downloading a malicious attachment.
Types of Phishing
Spear – Phishing is a more targeted attempt to steal sensitive
information and typically focuses on a specific individual or organisation.
The cybercriminals will often turn to social media and company websites
to research their victims. Once they have a better understanding of their
target, they will start to send personalised emails which include links
which once clicked, will infect a computer with malware.

Vishing refers to phishing scams that take place over the phone. It has
the most human interaction of all the phishing attacks but follows the
same pattern of deception. The fraudsters will often create a sense of
urgency to convince a victim to divulge sensitive information.
The call will often be made through a spoofed ID, so it looks like it's
coming from a trustworthy source.
Whaling this category of phishing from others is the high-level choice of
target. A whaling attack is an attempt to steal sensitive information and
is often targeted at senior management.

Smishing is a type of phishing which uses SMS messages as opposed to


emails to target individuals. It is another effective way of cybercriminals
tricking individuals into divulging personal information such as account
details, credit card details or usernames and passwords. This method
involves the fraudster sending a text message to an individual’s phone
number and usually includes a call to action that requires an immediate
response.
Clone Phishing is where a legitimate and previously delivered email is
used to create an identical email with malicious content. The cloned
email will appear to come from the original sender but will be an
updated version that contains malicious links or attachments.

2. Ransomware
Most cases infects a victim’s computer via phishing attacks or an exploit
kit campaign. Upon successful infection, the ransomware commonly
encrypts the victim’s data. It then demands a ransom payment in
exchange for the return of their data.
3. Malware comes in many different forms. Some specifically target
users’ financial information by installing keyloggers onto victims’
computers. Malware samples can also reach users via a number of
delivery methods, including phishing attacks and malicious software
packages that exploit unpatched software vulnerabilities. Once installed,
attackers can use the malware to spy on online activities, steal personal
and financial information or hack into other systems. Malware has
become one of the biggest online threats and it’s been used in some of
the world’s largest cyber-attacks including WannaCry, NotPetya and
Cryptolocker.
4. Identity Theft
Attackers can do all kinds of things with a person’s identity. They can
seize control of victims’ banking credentials, apply for new banking
accounts, steal users’ hard-earned savings, and more. All they need are
some key bits of information about you to convince a bank or a
customer service representative that they’re you.

5. Scams don’t come in one size. But many of them have something in
common: they convey an enticing offer that in many cases attempts to
trick users into sending over money. Of course, those offers are baseless,
and victims end up losing money in the process.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy