CyberSec - MID II Notes
CyberSec - MID II Notes
Cryptography
Open Elective (OE2)
For B. Tech IV-II
As per JNTUK R-19 Syllabus
MID II Notes
Compiled by:
Dr. A. B. Siddique
Department of ECE
• In digital forensics, to tackle such kind of situations, there comes a need of investigators
to recover lost or deleted email data. This is because it is the only way that may help
the investigators to get the evidential leads of the case. Nowadays, emails play a
significant role in everyone’s life as it is crucial for business or personal
communication, sharing confidential documents which may be crucial, etc. It could be
a nightmare for users to lose such important data in any situation.
• In most of the illegal cases, criminals usually delete such suspected emails intentionally
to remove the leads of evidence. Because of this, we’re going be disclose the finest
solution to recover deleted/lost emails manually. Moreover, an instant email recovery
solution that is exclusively important in cyber forensics is also here 3.10 Hands on Case
Studies.
➢
➢ These data recovery experts use both hardware and software solutions to extract the
digital data and revive it from the recycle bin.
➢ The first thing they will do is make a bit-accurate replica of the hard drive. Specialists
either use hardware solutions like a write blocking device or use a software solution to
recover data.
➢ Sometimes the data recovery process involves using a pre-packaged suite of software
tools. Other specialists prefer to create their own tool kit by piecing together key pieces
of software to tackle certain problems.
➢ Options are plentiful at almost every stage of the forensic data recovery process.
Sometimes a forensic specialist will need to use software to perform a data capture of
the drive. Specialists use other software to analyse emails.
➢ Forensic software can cater to specific operating systems too. This includes different
operating systems, like open source and secure Linux builds. Forensics data recovery
services use a whole arsenal of software and hardware tools for criminal investigations.
➢
➢ To mention very briefly, the process involves the following activities: Prepare >
Record > Investigate > Report > Testify.
Prepare: Case briefings, engagement terms, interrogatories, spoliation prevention, disclosure
and discovery planning, discovery requests.
Case briefing: In case briefings, consider the following:
1. Ensure that you know both your client’s and the adverse party’s position and have
seen all relevant paperwork.
2. Try not to project a bias in the case description; the intent should be to consider the
case objectively and provide you with the good news and the bad news (bad news early
can be good news).
3. Be upfront in discussing any limitations or restrictions on the forensics investigation,
including budgetary constraints, time deadlines, cooperation levels to be expected from
the adverse party, required travel, onsite or after-hours forensics imaging requirements,
etc.
Preparing for the Evidence and Identifying the Evidence:
➢ In order to be processed and applied, evidence must first be identified as evidence.
➢ It can happen that there is an enormous amount of potential evidence available for a
legal matter, and it is also possible that the vast majority of the potential evidence may
never get identified.
2. Iris Recognition:
• Iris recognition is an automated method of biometric identification that uses
mathematical pattern-recognition techniques on video images of one or both of the
irises of an individual's eyes, whose complex patterns are unique, stable, and can be
seen from some distance. Iris recognition enables the avoidance of "collisions" (False
Matches) even in cross-comparisons across massive populations.
• Its major limitation is that image acquisition from distances greater than a meter or two,
or without cooperation, can be very difficult.
• Iris recognition uses video camera technology with subtle near infrared illumination to
acquire images of the detail-rich, intricate structures of the iris which are visible
externally.
• Digital templates encoded from these patterns by mathematical and statistical
algorithms allow the identification of an individual or someone pretending to be that
individual.
• First the system has to localize the inner and outer boundaries of the iris (pupil and
limbus) in an image of an eye. Further subroutines detect and exclude eyelids,
eyelashes, and specular reflections that often occlude parts of the iris. The set of pixels
containing only the iris, normalized by a rubber-sheet model to compensate for pupil
3. Fingerprint Recognition:
• A fingerprint is an impression left by the friction ridges of a human finger.
• The recovery of partial fingerprints from a crime scene is an important method of
forensic science.
• Moisture and grease on a finger result in fingerprints on surfaces such as glass or metal.
Deliberate impressions of entire fingerprints can be obtained by ink or other substances
transferred from the peaks of friction ridges on the skin to a smooth surface such as
paper.
• Fingerprint records normally contain impressions from the pad on the last joint of
fingers and thumbs, though fingerprint cards also typically record portions of lower
joint areas of the fingers.
• Human fingerprints are detailed, nearly unique, difficult to alter, and durable over the
life of an individual, making them suitable as long-term markers of human identity.
• They may be employed by police or other authorities to identify individuals who wish
to conceal their identity, or to identify people who are incapacitated or deceased and
thus unable to identify themselves, as in the aftermath of a natural disaster.
• Fingerprint identification, known as dactyloscopy, or hand print identification, is the
process of comparing two instances of friction ridge skin impressions (see Minutiae),
from human fingers or toes, or even the palm of the hand or sole of the foot, to determine
whether these impressions could have come from the same individual.
• The flexibility of friction ridge skin means that no two finger or palm prints are ever
exactly alike in every detail; even two impressions recorded immediately after each
other from the same hand may be slightly different.[citation needed]
• Fingerprint identification, also referred to as individualization, involves an expert, or
an expert computer system operating under threshold scoring rules, determining
whether two friction ridge impressions are likely to have originated from the same
finger or palm.
Pre 4.9 Operating system forensics: Operating System Forensics is the process of retrieving
useful information from the Operating System (OS) of the computer or mobile device in
question. The aim of collecting this information is to acquire empirical evidence against the
perpetrator.
• Forensic investigation on an OS can be performed because it is responsible for file
management, memory management, logging, user management, and many other
relevant details.
• The understanding of an OS and its file system is necessary to recover data for computer
investigations. The file system provides an operating system with a roadmap to data on
the hard disk. The file system also identifies how hard drive stores data. There are many
file systems introduced for different operating systems, such as FAT, exFAT, and NTFS
for Windows Operating Systems (OSs), and Ext2fs, or Ext3fs for Linux OSs.
• Data and file recovery techniques for these file systems include data carving, slack
space, and data hiding. Another important aspect of OS forensics is memory forensics,
which incorporates virtual memory, Windows memory, Linux memory, Mac OS
memory, memory extraction, and swap spaces.
• OS forensics also involves web browsing artifacts, such as messaging and email
artifacts. Some indispensable aspects of OS forensics are discussed in subsequent
sections.
• The examination steps in operating system forensics: There are five basic steps
necessary for the study of Operating System forensics. These five steps are listed below:
1. Policies and Procedure Development
2. Evidence Assessment
3. Evidence Acquisition
4. Evidence Examination
5. Documenting and Reporting
➢ In this case, forensic investigators should analyze the following folders and
directories.
➢ /etc[%SystemRoot%/System32/config] This contains system configurations
directory that holds separate configuration files for each application.
➢ /var/log This directory contains application logs and security logs. They are kept for 4-
5 weeks.
➢ /home/$USER This directory holds user data and configuration information.
➢ /etc/passwd This directory has user account information.
➢ Some tools used for Linus OS
➢ Forensic toolkit for Linux: Forensic specialists uses a forensic toolkit to collect
evidence from a Linux Operating System. The toolkit comprises many tools such as
Dmesg, Insmod, NetstatArproute, Hunter.O, DateCat, P-cat, and NC.
➢ Helix: Helix is the distributor of the Knoppix Live Linux CD. It provides access to a
Linux kernel, hardware detections, and many other applications.
• You can retrieve quite a bit of data from a SIM card. The information that can be
retrieved falls into four categories:
✓ Service-related data, such as identifiers for the SIM card and subscriber
✓ Call data, such as numbers dialed
✓ Message information
✓ Location information
• If power has been lost, you might need PINs or other access codes to view files.
Typically, users keep the original PIN assigned to the SIM card, so when you’re
collecting evidence at, he scene, look for users’ manuals and other documentation that
can help you access the SIM card.
• With most SIM cards, you have three attempts at entering an access code before the
device is locked, which then requires calling the service provider or waiting a certain
amount of time before trying again. Common codes to try are 1-1-1-1 or 1-2-3-4.
• SIM Card Readers with GSM phones and many newer models of mobile devices, the
next step is accessing the SIM card, which you can do by using a combination hardware/
software device called a SIM card reader.
• To use this device, you should be in a forensics lab equipped with antistatic devices. In
addition, biological agents, such as fingerprints, might be present on the inside of the
case, so you should consult the lead investigator when you’re ready to proceed to this
step. The general procedure is as follows:
✓ Remove the back panel of the device.
✓ Remove the battery.
✓ Under the battery, remove the SIM card from its holder.
✓ Insert the SIM card into the card reader, which you insert into your forensic
workstation’s USB port.
• A variety of SIM card readers are on the market. Some are forensically sound and some
are not; make sure you note this feature of the device in your investigation log.
• Another problem with SIM card readers is dealing with text and SMS messages that
haven’t been read yet.
• After you view a message, the device shows the message as opened or read. For this
reason, documenting messages that haven’t been read is critical.
• Using a tool that takes pictures of each screen can be valuable in this situation. These
screen captures can provide additional documentation.
5.1 Introduction, ·
• It is said that cybercrime is the largest illegal industry. Cybercrime involves massive,
coordinated attacks against the information infrastructure of a country.
• So, the knowledge of cyberlaws is essential for people who may directly or indirectly
interact with networked services either over the Internet or other proprietary networks
of businesses and enterprises of any other types – banks, stock brokers, intra-company
and inter-company information exchange systems, etc.
• In legal perspective Computer-related crime was defined in the broader meaning as:
any illegal act for which knowledge of computer technology is essential for a successful
prosecution.
• International legal aspects of computer crimes were studied in 1983. In that study,
computer crime was consequently defined as: encompasses any illegal act for which
knowledge of computer technology is essential for its perpetration.
• Cybercrime, in a way, is the outcome of “globalization.”Globalized information
systems accommodate an increasing number of transnationals offenses.
• The network context of cybercrime makes it one of the most globalized offenses of the
present and the most modernized threats of the future. This problem can be resolved in
two ways.
• One is to divide information systems into segments bordered by state boundaries (cross-
border flow of information).
• The other is to incorporate the legal system into an integrated entity obliterating these
state boundaries.
• Apparently, the first way is unrealistic. Although all ancient empires including Rome,
Greece and Mongolia became historical remnants, and giant empires are not prevalent
in current world, the partition of information systems cannot be an imagined practice.
• In a globally connected world, information systems become the unique empire without
tangible territory.
The Americas
• Brazil’s Internet Act stipulates that connection and application providers must
comply with certain security standards when storing personal data and private
communications.
Canada
Asia-Pacific
• Australia
o Privacy Principles (‘APPs‘) under the Privacy Act 1988 contain information
security obligations.
o Criminal Code Act 1995 Australia
o Cybercrime Act 2001 Australia
• Brunei Darussalam has the Computer Misuse Act, 2007
• China has two main laws governing cybercrimes:
o the Cybersecurity Law 2016, and
o the Data Security Law of the People’s Republic of China which came into
effect in September 2021.
• India has two laws that recognise the importance of cybersecurity:
o The Information Technology Act, 2000, and
o specific rules, like the Information Technology (Reasonable Security Practices
and Procedures and Sensitive Personal Data or Information) Rules, 2011.
• Japan’s Basic Act on Cybersecurity is the central law governing cybersecurity.
• Malaysia has the Computer Crimes Act
• Philippines has the Cybercrime Prevention Act of 2012
• Thailand has the Act on Computer Crimes
• New Zealand’s main information cybersecurity obligations are contained in
Information Privacy Principle 5 under the Privacy Act 2020. The Crimes
Act,1961 also contains provisions relating to cybercrimes.
Europe
• Israel has several laws and regulations covering various aspects of cybersecurity such
as:
o the Protection of Privacy Law
o The Protection of Privacy Regulations (Data Security) (translated version)
• Jordan’s laws are available in Arabic only:
o The Cybersecurity Law No. 16 of 2019
o The Cybercrime Law No. 27 of 2015
• Saudi Arabia has the Law on the Use of Information Communications Technology in
Government Agencies (in Arabic only)
IT Act, 2000
The Information Technology Act, 2000 was enacted by the Indian Parliament in 2000. It is the
primary law in India for matters related to cybercrime and e-commerce.
• The act was enacted to give legal sanction to electronic commerce and electronic
transactions, to enable e-governance, and also to prevent cybercrime.
• Under this law, for any crime involving a computer or a network located in India,
foreign nationals can also be charged.
• The law prescribes penalties for various cybercrimes and fraud through
digital/electronic format.
• It also gives legal recognition to digital signatures.
• The IT Act also amended certain provisions of the Indian Penal Code (IPC), the
Banker’s Book Evidence Act, 1891, the Indian Evidence Act, 1872 and the Reserve
Bank of India Act, 1934 to modify these laws to make them compliant with new digital
technologies.
• In the wake of the recent Indo-China border clash, the Government of India banned
various Chinese apps under the Information Technology Act. Read more about this in
an RSTV titled, ‘TikTok, Other Chinese Apps Banned’.
2. Section 66: Computer-related offences (1) Whoever with the intent to cause or knowing
that he is likely to cause wrongful loss or damage to the public or any person destroys or
deletes or alters any information residing in a computer resource or diminishes its value or
utility or affects it injuriously by any means, commits hack. (2) Whoever commits hacking
shall be punished with imprisonment up to 3 years, or with fine which may extend up to 5 lakh
rupees (` 5,00,000), or with both.
4. Section 71: Penalty for misrepresentation Whoever makes any misrepresentation to, or
suppresses any material fact from, the Controller or the Certifying Authority for obtaining any
license or Digital Signature Certificate, as the case may be, shall be punished with
imprisonment for a term which may extend to 2 years, or with fine which may extend to 1 lakh
rupees (` 1,00,000), or with both.
5. Section 72: Penalty for breach of confidentiality and privacy Save as otherwise provided
in this Act or any other law for the time being in force, any person who, in pursuance of any
of the powers conferred under this Act, rules or regulations made there-under, has secured
access to any electronic record, book, register, correspondence, information, document or other
material without the consent of the person concerned discloses such electronic record, book,
register, correspondence, information, document or other material to any other person shall be
punished with imprisonment for a term which may extend to 2 years, or with fine which may
extend to 1 lakh rupees (` 1,00,000), or with both.
6. Section 73: Penalty for publishing Digital Signature Certificate false in certain particulars
(1) No person shall publish a Digital Signature Certificate or otherwise make it available to any
other person with the knowledge that:
(a) Th e Certifying Authority listed in the certificate has not issued it; or
(b) the subscriber listed in the certificate has not accepted it; or
(c) the certificate has been revoked or suspended, unless such publication is for the purpose of
verifying a digital signature created prior to such suspension or revocation.
(2) Any person who contravenes the provisions of subsection (1) shall be punished with
imprisonment for a term which may extend to 2 years, or with fine which may extend to 1 lakh
rupees (` 1,00,000), or with both.
7. Section 74: Publication for fraudulent purpose Whoever knowingly creates, publishes or
otherwise makes available a Digital Signature Certificate for any fraudulent or unlawful
purpose shall be punished with imprisonment for a term which may extend to 2 years, or with
fine which may extend to 1 lakh rupees (` 1,00,000), or with both.
Digital Signature
• According to section 2(1)(p) of the Information Technology Act, 2000 digital
signature means the authentication of any electronic record by a person who has
subscribed for the digital signature in accordance to the procedure mentioned
under section 3 of the same act.
• Section 5 of the Information Technology Act, 2000 gives legal recognition to digital
signatures.
Rule 4 of the Information Technology(Certifying Authorities) Rules, 2000, explains the
procedure of digital signature as:
• To sign an electronic record or any other item of information, the signer first applies
the hash function in the signer’s software. A hash function is a function which is
used to map data of arbitrary size onto data of a fixed size. The values returned by
a hash function are called hash values, hash codes, digests, or simply hashes
• The hash function computes a hash result of standard length, which is unique to the
electronic record.
• The signer’s software transforms the hash result into a Digital Signature using the
signer’s private key.
• The resulting Digital Signature is unique to both electronic record and private key
which is used to create it.
• The Digital Signature is attached to its electronic record and stored or transmitted
with its electronic record.
• Section 66A gave authorities the power to arrest anyone accused of posting content on
social media that could be deemed ‘offensive’.
• This amendment was passed in the Parliament without any debate.
• As per the said section, a person could be convicted if proved on the charges of sending
any ‘information that is grossly offensive or has menacing character’.
• It also made it an offence to send any information that the sender knows to be false, but
for the purpose of annoyance, inconvenience, danger, obstruction, insult, injury,
criminal intimidation, enmity, hatred or ill-will, through a computer or electronic
device.
• The penalty prescribed for the above was up to three years’ imprisonment with fine.
Arguments against Section 66A
• Experts stated that the terms ‘offensive’, ‘menacing’, ‘annoyance’, etc. were vague and
ill-defined or not defined at all.
• Anything could be construed as offensive by anybody.
• There was a lot of scope for abuse of power using this provision to intimidate people
working in the media.
• This also curbed the freedom of speech and expression enshrined as a fundamental right
in the Constitution.
• The section was used most notably to arrest persons who made any uncharitable
remarks or criticisms against politicians.
Section 69A
• Section 69A empowers the authorities to intercept, monitor or decrypt any information
generated, transmitted, received or stored in any computer resource if it is necessary or
expedient to do so in the interest of the sovereignty or integrity of India, defense of
India, the security of the State, friendly relations with foreign states or public order or
for preventing incitement to the commission of any cognizable offence or for
investigation of any offence.
• It also empowers the government to block internet sites in the interests of the nation.
The law also contained the procedural safeguards for blocking any site.
• When parties opposed to the section stated that this section violated the right to privacy,
the Supreme Court contended that national security is above individual privacy. The
apex court upheld the constitutional validity of the section. Also read about privacy
laws and India.
• Section 79(2)(c) of the Act states that intermediaries must observe due diligence while
discharging their duties, and also observe such other guidelines as prescribed by the
Central Government.
• Online Intermediaries:
o An intermediary is a service that facilitates people to use the Internet, such as
Internet Services Providers (ISPs), search engines and social media platforms.
o There are two categories of intermediaries:
▪ Conduits: Technical providers of internet access or transmission
services.
▪ Hosts: Providers of content services (online platforms, storage services).
• Information Technology Intermediary Guidelines (Amendment) Rules were first
released in 2011 and in 2018, the government made certain changes to those rules.
• In 2018, there was a rise in the number of mob lynchings spurred by fake news &
rumours and messages circulated on social media platforms like Whatsapp.
• To curb this, the government proposed stringent changes to Section 79 of the IT Act.
What do the Rules say?
• According to the 2018 Rules, social media intermediaries should publish rules and
privacy policy to curb users from engaging in online material which is paedophilic,
pornographic, hateful, racially and ethnically objectionable, invasive of privacy, etc.
• The 2018 Rules further provide that whenever an order is issued by the government
agencies seeking information or assistance concerning cybersecurity, then the
intermediaries must provide them the same within 72 hours.
• The Rules make it obligatory for online intermediaries to appoint a ‘Nodal person of
Contact’ for 24X7 coordination with law enforcement agencies and officers to ensure
compliance.
• The intermediaries are also required to deploy such technologies based on automated
tools and appropriate mechanisms for the purpose of identifying or removing or
disabling access to unlawful information.
• The changes will also require online platforms to break end-to-end encryption in order
to ascertain the origin of messages.
• Online Intermediaries are required to remove or disable access to unlawful content
within 24 hours. They should also preserve such records for a minimum period of 180
days for the purpose of investigations.
• The government intends to make legal frameworks in order to make social media
accountable under the law and protect people and intermediaries from misusing the
same.
• The government wants to curb the spread of fake news and rumours, and also pre-empt
mob violence/lynching.
• There is a need to check the presentation of incorrect facts as news by social media,
that instigates people to commit crimes.
There has been criticism of the Rules from certain quarters, that says that the State is intruding
into the privacy of the individual. Some also say that this law widens the scope of state
surveillance of its citizens. These criticisms are notwithstanding the fact that the new Rules are
in line with recent SC rulings.
1. Reliance on terrestrial laws may not be a reliable approach: Despite the progress
being made in many countries, most countries still rely on standard terrestrial law to
prosecute cybercrimes. Most countries are relying on archaic statutes that predate the
birth of cyberspace and have not yet been tested in court.
2. Weak penalties limit deterrence: The weak penalties in most updated criminal
statutes provide limited deterrence for crimes that can have large-scale economic and
social effects.
3. Self-protection remains the first line of defense: The general weakness of statutes
increases the importance of private sector efforts to develop and adopt strong and
efficient technical solutions and management practices for information security.
4. A global patchwork of laws creates little certainty: little consensus exists among
countries regarding exactly which crimes need to be legislated against. In the networked
world, no island is an island. Unless crimes are defined in a similar manner across
jurisdictions, coordinated efforts by law enforcement officials to combat cybercrime
will be complicated.
5. A model approach is needed: Most countries, particularly those in the developing
world, are seeking a model to follow. These countries recognize the importance of
banning malicious.
Explanation about Cybercrime and Punishment:
• The phenomenal rise in computer crime has caught attention around the world. The big
question is whether cybercriminals can be punished and what types of punishments are
in offering for them.
• In most countries around the world, existing laws are likely to be unenforceable against
such crimes, given methods of crime adopted and tools used by cybercriminals.
UNIT-3
A What are the process of Email Recovery in Cyber Forensics? 5 CO3 Analyse
1 Describe the Encryption and Decryption Methods and explain
B 5 CO3 Understand
about different keys used to implement it?
Explain about the steps involved in Search and Seizure of
A 5 CO3 Apply
Computers in Cyber Forensics?
2
Evaluate the importance and process of Recovering Deleted
B 5 CO3 Evaluate
Evidence?
Describe the purpose, process, and classification of Password
A 5 CO3 Remember
3 Cracking?
UNIT-4
Describe the concept of Computer Forensics, and how it is
A 5 CO4 Understand
applied in law enforcement?
1
B What are the phases in the forensics life cycle? Explain in detail 5 CO4 Analyse
about the preparation and identification phase in digital forensic?
Evaluate the need of current Computer Forensics Tools for
A 5 CO5 Evaluate
forensic investigation?
2
Describe about the various Software Tools used in Computer
B 5 CO5 Understand
Forensics?
Describe about the various Hardware Tools used in Computer
A 5 CO5 Analyse
Forensics?
3
What are the procedure need to be followed for Validating and
B 5 CO5 Analyse
Testing Forensics Software,
Explain in detail about Face, Iris and Fingerprint Recognition
A with respect to forensic 5 CO5 Understand
investigation?
4
Define the principles of Audio Video Analysis? Highlights the
B different techniques used 5 CO5 Remember
in the analysis?
What is Operating system forensics? Describe the Linux System
A 5 CO5 Apply
5 Forensics
B Describe the Windows System Forensics in detail? 5 CO5 Apply
Write a detail notes on i) Graphics Forensics and ii) Network
A 5 CO5 Remember
6 Forensics
B How the Cell Phone and Mobile Device Forensics is executed ? 5 CO5 Understand
UNIT-5
Analyse Cybercrimes and their Legal Landscape around the
A 5 CO6 Analyse
World?
1
What is The Indian IT Act? Expalin about the important sections
B 5 CO6 Remember
of The Indian IT Act?
What are the Challenges to Indian Law and Cybercrime
A 5 CO6 Understand
Scenario in India?
2
B What will be the Consequences of not addressing the weakness 5 CO6 Analyse
in Information Technology Act?
What are Digital Signatures? Explain in detail in relation to
A 5 CO6 Apply
Indian IT Act 2000?
3 What are the amendments done in the Indian IT Act 2008?
B Highlight the Information Technology Intermediary Guidelines 5 CO6 Apply
(Amendment) Rules, 2018
What are the real issues in handling Cybercrime and
A 5 CO6 Analyse
Punishment?
4
Explain in detail about Cyberlaw, Technology and Students:
B 5 CO6 Remember
Indian Scenario?