0% found this document useful (0 votes)
21 views7 pages

Cyber Unit-4

The document outlines essential internet security policies that organizations should implement to protect their data and systems from cyber threats, including Access Control, Network Security, Data Protection, Incident Response, and Acceptable Use Policies. It also covers email security policies that safeguard email communications and prevent unauthorized access, phishing, and data loss. Additionally, the document introduces digital forensics, detailing its tools, methods, and challenges in investigating digital crimes, particularly in the context of Indian cyber laws.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views7 pages

Cyber Unit-4

The document outlines essential internet security policies that organizations should implement to protect their data and systems from cyber threats, including Access Control, Network Security, Data Protection, Incident Response, and Acceptable Use Policies. It also covers email security policies that safeguard email communications and prevent unauthorized access, phishing, and data loss. Additionally, the document introduces digital forensics, detailing its tools, methods, and challenges in investigating digital crimes, particularly in the context of Indian cyber laws.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

UNIT- 4

PART-1
Internet Security Policies

Internet security policies are essential guidelines to protect an organization's data, network
infrastructure, and systems from cyber threats. These policies help maintain the confidentiality,
integrity, and availability of sensitive information, ensuring that the organization’s resources are used
appropriately and protected against misuse or unauthorized access. Below are the key internet
security policies that organizations should implement:

1. Access Control Policy

Purpose

The Access Control Policy ensures that only authorized users can access certain systems and data
within an organization.

Key Components

• Authentication: Verifying the identity of users through methods like usernames, passwords,
biometrics, or multi-factor authentication.

• Authorization: Granting users specific access rights based on their roles and responsibilities
within the organization.

• Accountability: Monitoring user activity to track actions taken within the system, ensuring
that users are accountable for their behaviour.

Best Practices

• Implement least privilege: Users should only have access to the resources they need for
their job.

• Regularly review and update user access rights to ensure compliance with security policies.

2. Network Security Policy

Purpose

This policy protects an organization’s network infrastructure from unauthorized access, misuse, or
cyberattacks.

Key Components

• Firewalls: Use firewalls to filter incoming and outgoing traffic and block unauthorized access.

• Intrusion Detection and Prevention Systems (IDPS): Monitor network traffic for unusual or
malicious activities and take action to prevent potential attacks.
• VPNs (Virtual Private Networks): Secure communication for remote users by encrypting data
transmitted over the internet.

Best Practices

• Keep firewalls and other network security devices updated to protect against the latest
threats.

• Use network segmentation to isolate sensitive systems and reduce the risk of attacks
spreading.

3. Data Protection and Privacy Policy

Purpose

The Data Protection and Privacy Policy focuses on safeguarding sensitive and personal data from
unauthorized access, modification, or loss.

Key Components

• Data Encryption: Encrypt data both when stored (at rest) and while being transmitted (in
transit) to protect its confidentiality.

• Data Retention: Define how long data will be stored and when it should be deleted or
archived to avoid unnecessary risks.

• Data Masking: Obscure sensitive data to prevent unauthorized individuals from accessing it
in a usable form.

Best Practices

• Comply with relevant data privacy regulations such as GDPR (General Data Protection
Regulation) or CCPA (California Consumer Privacy Act).

• Conduct regular audits to ensure data protection measures are being followed.

4. Incident Response Policy

Purpose

The Incident Response Policy ensures that the organization is prepared to handle security breaches
or attacks effectively and efficiently.

Key Components

• Incident Detection: Implement systems to detect incidents in real-time, such as Security


Information and Event Management (SIEM) tools.

• Incident Handling: Define clear roles and procedures for managing incidents, including steps
for identifying, containing, and recovering from the attack.

• Post-Incident Review: After an incident, conduct a review to understand what happened and
improve future responses.
Best Practices

• Regularly update and test the incident response plan to keep it effective.

• Hold periodic drills or tabletop exercises to simulate potential security incidents.

5. Acceptable Use Policy (AUP)

Purpose

The Acceptable Use Policy sets guidelines on how the organization’s IT resources, including the
internet, email, and devices, should be used.

Key Components

• Permitted Activities: Specify what is allowed on the network (e.g., work-related activities).

• Prohibited Activities: Define activities that are not allowed (e.g., accessing harmful or illegal
content, using resources for personal business).

• Monitoring and Enforcement: The organization’s right to monitor users’ activities to ensure
compliance with the policy.

Best Practices

• Ensure users are informed about the policy and acknowledge it.

• Regularly review and update the policy to keep it aligned with technological and
organizational changes.

Email security policies

Email security policies are guidelines and best practices designed to protect the confidentiality,
integrity, and availability of email communications. These policies ensure that email systems are used
safely and that sensitive information is protected from unauthorized access or malicious attacks.
Here are some key elements of email security policies:

1. Authentication and Access Control

• Strong Passwords: Employees should use complex, unique passwords for their email
accounts.

• Multi-Factor Authentication (MFA): Enforce MFA to add an extra layer of security by


requiring multiple forms of verification before accessing email accounts.

• Access Control: Ensure that only authorized personnel can access specific email systems or
confidential information.

• Email Encryption: Use encryption for sending sensitive data or attachments to ensure that
only the intended recipient can read the message.

2. Email Encryption
• End-to-End Encryption: Ensure emails are encrypted from sender to receiver, preventing
unauthorized access during transmission.

• Secure Email Gateways: Utilize secure email gateways to scan emails for malicious content,
including spam and phishing.

3. Phishing Protection

• Employee Training: Regularly train staff to identify phishing emails and malicious links.

• Anti-Phishing Tools: Use software that flags suspicious emails or links.

• Suspicious Email Reporting: Provide clear instructions on how employees can report
phishing attempts.

4. Email Filtering

• Spam Filters: Deploy spam filters to block unwanted or suspicious emails.

• Attachment Scanning: Use antivirus software to scan email attachments for malware and
malicious code before opening.

• Block Known Malicious IPs: Filter out emails from known malicious or untrusted IP
addresses or domains.

5. Data Loss Prevention (DLP)

• Sensitive Information Detection: Configure email systems to detect and block the sharing of
sensitive information such as credit card numbers, social security numbers, or confidential
business data.

• Automatic Redaction: Implement automated tools to redact sensitive information from


emails.

6. Retention and Archiving

• Email Retention Policy: Establish guidelines for how long emails should be kept, ensuring
compliance with legal and regulatory requirements.

• Archiving: Regularly back up email data and store it securely for future retrieval or auditing.

7. Mobile Device Management (MDM)

• Mobile Email Access Security: Use MDM tools to control access to email accounts from
mobile devices and ensure that devices are encrypted and secure.

• Remote Wipe: Ensure the ability to remotely wipe email data from a device if it’s lost or
stolen.

8. Regular Security Audits

• Periodic Audits: Conduct regular audits of email systems to identify vulnerabilities and
ensure compliance with security policies.

• Logging and Monitoring: Maintain logs of email activities for tracking potential security
breaches and suspicious behaviour.

9. Incident Response
• Reporting and Response Protocols: Have clear procedures in place for employees to report
security incidents, such as suspicious emails or compromised accounts.

• Investigation and Remediation: Set up a team or individual responsible for investigating


email security incidents and taking corrective actions.

By implementing a comprehensive email security policy, organizations can better protect against
common threats such as phishing, malware, and unauthorized access, helping to safeguard both
internal and external communications.

PART-2

Introduction to Digital Forensics

Digital forensics is the science of recovering and analysing information from digital devices to solve
crimes. It’s about gathering evidence from computers, phones, and other technology in a way that is
reliable and can be used in court.

Let’s break down some key parts of digital forensics in detail:

1) Forensic Software and Hardware

Forensic software and hardware are the tools used to collect and analyze data from digital devices
without changing the original evidence.

• Forensic Software: These are computer programs that help forensic experts look at data,
recover deleted files, and make reports on what they find. Some key software tools include:

o EnCase: This software is used by forensic experts to look at computers and recover
files, even if they’ve been deleted.

o FTK (Forensic Toolkit): Another popular tool that helps recover lost data and analyze
files on a computer. It also helps create a report with all the details of the
investigation.

o Autopsy: This is a free software tool used to investigate digital devices like hard
drives or smartphones. It helps experts find and analyze digital evidence.

o X1 Social Discovery: This tool is great for collecting and analyzing information from
social media platforms and websites.

• Forensic Hardware: These are physical devices that help collect data from digital media (like
hard drives or smartphones) while keeping the data safe.

o Write Blockers: These are special devices that prevent any changes to the data when
copying it from a hard drive or other storage devices. This ensures that the original
data remains unaltered.
o Forensic Duplicators: These devices create exact copies of hard drives or other
storage media, making sure that the original device is not tampered with.

o Data Acquisition Devices: These devices help forensic experts collect data from
smartphones, tablets, and other digital devices, ensuring the data is preserved
properly.

2) Indian Cyber Forensics

In India, cyber forensics deals with investigating crimes that involve computers and technology. It’s
used to track down criminals who use digital devices to commit crimes like hacking, online fraud, or
identity theft.

• Indian Cyber Laws: India has laws to deal with cybercrimes. The Information Technology Act
(2000) is the main law that governs online crimes in India. It covers crimes like hacking, cyber
fraud, and identity theft.

o Section 65: This section talks about tampering with digital evidence.

o Section 66: This section deals with hacking and accessing digital data without
permission.

o Section 70: This section protects critical systems, like government websites or
important infrastructure, from cyberattacks.

• Cyber Forensics in India: There are special police teams and organizations in India, like the
Indian Cyber Crime Coordination Centre (I4C), that help investigate and solve cybercrimes.
They work with law enforcement to track down cybercriminals and gather digital evidence.

• Challenges in Indian Cyber Forensics: Some challenges include a lack of trained cyber
forensics professionals and the difficulty of solving international cybercrimes, where the
evidence may come from other countries.

3) Forensic Ballistics and Photography

Forensic ballistics is the study of bullets and firearms used in crimes. Forensic photography, on the
other hand, is about documenting crime scenes and digital evidence through pictures.

• Forensic Ballistics: When a crime involves a firearm, forensic ballistics experts analyze
bullets, cartridge cases (the metal parts of bullets), and firearms to understand how a crime
happened.

o Firearm Identification: This involves comparing bullets found at the crime scene to
the firearm that may have fired them. Each gun leaves unique marks on bullets, so
experts can match the bullet to a specific weapon.

o Gunshot Residue (GSR) Testing: After a shooting, investigators may test a suspect’s
hands or clothing for tiny particles left behind by a gunshot. This is called gunshot
residue, and it can help identify if someone fired a gun.

o Trajectory Analysis: Forensic experts study the path a bullet took to help determine
the position of the shooter during the crime. They look at things like bullet holes,
angles, and distances to understand what happened.
• Forensic Photography: Photography is essential for documenting crime scenes and evidence,
so it can be analysed later. Photos are taken at different angles and distances to make sure all
details are captured.

o Crime Scene Photography: Forensic photographers take wide-angle photos to show


the whole crime scene and close-up shots of important evidence.

o Digital Evidence Photography: When digital devices (like phones or computers) are
found at a crime scene, forensic photographers take pictures of them before they are
moved or analyzed. This ensures that the devices are properly documented.

4) Face, Iris, and Fingerprint Recognition

These are methods used to identify people based on their unique physical traits. Digital forensics
uses biometrics like face recognition, iris scanning, and fingerprint matching to help identify suspects
or verify their identity.

• Face Recognition: This technology analyzes a person’s face and compares it to a database of
images. It’s used to identify people from photographs, video footage, or in real-time
surveillance.

• Iris Recognition: Each person’s iris (the coloured part of the eye) has a unique pattern. Iris
recognition scans this pattern to identify people. It’s very accurate and is used in high-
security environments.

• Fingerprint Recognition: Fingerprints are unique to every person. Forensic experts use
fingerprint scanners to match fingerprints found at a crime scene to those in a database or
from a suspect.

5) Forensics of Handheld Devices

Handheld devices, like smartphones and tablets, are often key pieces of evidence in modern crimes.
Forensic experts use special tools to extract and analyze data from these devices without changing
anything on them.

• Smartphone Forensics: These tools help experts access information from smartphones,
including call logs, text messages, emails, social media activity, photos, videos, and app data.
They make sure that the data is preserved without modifying or deleting it.

• Challenges with Handheld Devices: Since smartphones and tablets are small and portable,
they can be easily hidden or damaged. They often contain a lot of personal data, so experts
need to be very careful to protect privacy and security while extracting evidence.

In summary, digital forensics is all about investigating digital devices to find evidence of crimes. This
involves using special software and hardware tools, understanding laws and challenges in different
countries (like India), studying ballistic evidence, using biometric methods to identify people, and
analyzing data from handheld devices like smartphones. It’s a detailed and complex field that helps
law enforcement solve crimes in today’s technology-driven world.

You might also like