0% found this document useful (0 votes)
26 views

Chapter 1 DF

The document discusses digital forensics and cybercrime. It defines cybercrime and outlines categories of cybercrimes such as crimes against people, property, and government. It describes types of cybercrimes including hacking, denial of service attacks, Trojan attacks, and credit card fraud. The document also discusses how the internet has led to new types of crimes and outlines additional cybercrime types such as cyber pornography, software piracy, and cyber stalking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views

Chapter 1 DF

The document discusses digital forensics and cybercrime. It defines cybercrime and outlines categories of cybercrimes such as crimes against people, property, and government. It describes types of cybercrimes including hacking, denial of service attacks, Trojan attacks, and credit card fraud. The document also discusses how the internet has led to new types of crimes and outlines additional cybercrime types such as cyber pornography, software piracy, and cyber stalking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 27

DIGITAL FORENSICS

DR. NILAKSHI JAIN


Email ID: [email protected]
1.1 Cybercrime
1.2 Categories of Cybercrimes
1.3 Types of Cybercrimes
1.4 Internet Spawns Crime Chapter One
1.5 Worms Versus Viruses
1.6 Computer’s Role in Crimes
1.7 Cybercrime Statistics

Introduction
1.8 Prevention of Cybercrime
1.9 Hacker
1.10 Crackers
1.11 Phreakers
To
1.12 Ethical Hacking Computer Crimes
1.13 Hacking & Ethical Hacking
1.14 Steps of Ethical Hacking
And
1.15 Tools for Ethical Hacking Ethical Hacking
1.16 What to Do if Been Hacked?
1.1 Cybercrime
1.2 Categories of Cybercrimes Introduction to Cybercrime
1.3 Types of Cybercrimes
The term cybercrime refers to crimes
1.4 Internet Spawns Crime committed using computer.
1.5 Worms Versus Viruses
Traditionally, cybercrime
1.6 Computer’s Role in Crimes refers to the crime involving computer
1.7 Cybercrime Statistics and computer network.

1.8 Prevention of Cybercrime 1. Advanced cybercrime/high-


1.9 Hacker tech crime:
Attacks against computer hardware and
1.10 Crackers software.
1.11 Phreakers
2. Cyber-enabled crime:
1.12 Ethical Hacking
Numerous ‘traditional’ crimes have
1.13 Hacking & Ethical Hacking taken a new turn with the arrival of
internet, such as crimes against
1.14 Steps of Ethical Hacking
youngsters, monetary crimes, and even
1.15 Tools for Ethical Hacking acts of terrorism.
1.16 What to Do if Been
1.1 Cybercrime
1.2 Categories of Cybercrimes 1. Cybercrimes Against People :
Cybercrimes committed against people
1.3 Types of Cybercrimes include crimes such as cyber porn,
1.4 Internet Spawns Crime transmission of child pornography,
harassment of an individual through email,
1.5 Worms Versus Viruses false legal agreement scams, etc.
1.6 Computer’s Role in Crimes
2. Cybercrimes Against Property :
1.7 Cybercrime Statistics Crimes in this category include computer
1.8 Prevention of Cybercrime devilry, meaning destruction of others
property and transmission of harmful
1.9 Hacker viruses, worms, or programs.
1.10 Crackers
1.11 Phreakers
3. Cybercrimes AgainstGovernment
Cyber terrorism is a distinct crime in
1.12 Ethical Hacking this category. The spread of internet
1.13 Hacking & Ethical Hacking has shown that this medium is used by
people and teams to threaten the
1.14 Steps of Ethical Hacking
international governments conjointly
1.15 Tools for Ethical Hacking to terrorize the voters of a rustic.
1.16 What to Do if Been
1.1 Cybercrime
1.2 Categories of Cybercrimes
Types of Cybercrimes :
1.3 Types of Cybercrimes
1.4 Internet Spawns Crime A. Violent or potentially violent
cybercrimes: Violent or potentially
1.5 Worms Versus Viruses violent cybercrimes are those that
1.6 Computer’s Role in Crimes pose a physical risk to some character or
people.
1.7 Cybercrime Statistics
1.8 Prevention of Cybercrime B. Non-violent cybercrimes: Non-
violent cybercrimes are those that do not
1.9 Hacker directly pose a physical risk
1.10 Crackers to some character or persons, but
indirectly they do pose a risk.
1.11 Phreakers
1.12 Ethical Hacking 1. Hacking : Do not hack, but when you
do, it should be ethical!
1.13 Hacking & Ethical Hacking
1.14 Steps of Ethical Hacking
1.15 Tools for Ethical Hacking
1.16 What to Do if Been
1.1 Cybercrime
1.2 Categories of Cybercrimes
Types of Cybercrimes :
1.3 Types of Cybercrimes
1.4 Internet Spawns Crime 2. Denial-of-Service Attacks :
A Denial-of-Service
1.5 Worms Versus Viruses (DoS) attack is a trial to make an
1.6 Computer’s Role in Crimes online service unavailable by
overloading the network
1.7 Cybercrime Statistics traffic from multiple sources.
1.8 Prevention of Cybercrime DoS targets a large variety of
resources
1.9 Hacker
1.10 Crackers
1.11 Phreakers
1.12 Ethical Hacking
1.13 Hacking & Ethical Hacking
1.14 Steps of Ethical Hacking
1.15 Tools for Ethical Hacking
1.16 What to Do if Been
1.1 Cybercrime
1.2 Categories of Cybercrimes
Types of Cybercrimes :
1.3 Types of Cybercrimes
1.4 Internet Spawns Crime 3. Trojan Attacks :
Trojans are small
1.5 Worms Versus Viruses particles of malware that allow
1.6 Computer’s Role in Crimes the hacker to either gain or obtain
remote access to any
1.7 Cybercrime Statistics computer.
1.8 Prevention of Cybercrime
4. Credit Card Frauds :
1.9 Hacker Credit card frauds
1.10 Crackers usually occur when an individual
discloses his/her confidential data
1.11 Phreakers such as credit card
1.12 Ethical Hacking number, CVV number, secret
code for transaction, expiry date,
1.13 Hacking & Ethical Hacking etc.
1.14 Steps of Ethical Hacking
1.15 Tools for Ethical Hacking
1.16 What to Do if Been
1.1 Cybercrime
1.2 Categories of Cybercrimes Types of Cybercrimes :
1.3 Types of Cybercrimes
5. Cyber Pornography : Cyber pornography refers to distributing pornography over
1.4 Internet Spawns Crime
the internet. People create and distribute porn or obscene materials over the internet.
1.5 Worms Versus Viruses
1.6 Computer’s Role in Crimes 6. Online Betting : Online betting is also called online gambling or internet gambling
and takes place over the internet. Online gambling is the basic term used for gambling
1.7 Cybercrime Statistics over the internet.
1.8 Prevention of Cybercrime
7. Software Piracy : Software piracy refers to the act of distributing licensed or paid or
1.9 Hacker copyrighted software for free or at a minimal cost over the internet.
1.10 Crackers
1.11 Phreakers 8. E-mail Spoofing : Email spoofing refers to sending emails from an unknown or false
source. Spoofing means that the hacker sends an email from your email address.
1.12 Ethical Hacking
1.13 Hacking & Ethical Hacking 9. Forgery/Falsification : Forgery refers to the action of forging a copy or imitation of
a document, signature, or banknote. It is done to earn a huge profit by selling the forged
1.14 Steps of Ethical Hacking resource.
1.15 Tools for Ethical Hacking
1.16 What to Do if Been
1.1 Cybercrime
1.2 Categories of Cybercrimes Types of Cybercrimes :
1.3 Types of Cybercrimes
10. Phishing : Phishing is a fraud type wherein the hacker tries to get personal
1.4 Internet Spawns Crime information, including login credentials or any bank account information, by pretending
1.5 Worms Versus Viruses to be a genuine entity in email, messages, or other communication
channels.
1.6 Computer’s Role in Crimes
1.7 Cybercrime Statistics 11. Cyber Terrorism : Cyber terrorism is a planned activity in the cyber space via
computer networks. It includes the use of email as a communication medium.
1.8 Prevention of Cybercrime
1.9 Hacker 12. Salami Attacks : Salami attack is a combination of many small attacks that can go
undetected due to the nature of cybercrime.
1.10 Crackers
1.11 Phreakers 13. Defamation : Internet is an integral part of our life. It acts as a medium for
interacting with people across the globe. Defamation implies causing harm to a reputed
1.12 Ethical Hacking individual in front of others.
1.13 Hacking & Ethical Hacking
14. Cyber Stalking : Cyber stalking refers to the use of an electronic medium to threaten
1.14 Steps of Ethical Hacking someone or an individual or a group of people or certain organization.
1.15 Tools for Ethical Hacking
1.16 What to Do if Been
1.1 Cybercrime
1.2 Categories of Cybercrimes
The Internet Spawns Crime :
1.3 Types of Cybercrimes
1.4 Internet Spawns Crime
The internet is a network of communication and content services that is
1.5 Worms Versus Viruses
1.6 Computer’s Role in Crimes
globally accessible. As internet provides a lot of options for buying and
1.7 Cybercrime Statistics selling, crimes are on the rise in this environment. A computer represents a
1.8 Prevention of Cybercrime tool of crime as in murder or fraud, the object of crime as in stealing of
1.9 Hacker
processor chips, or the theme of crime as in hacking and spreading
1.10 Crackers
viruses.
1.11 Phreakers
1.12 Ethical Hacking
1.13 Hacking & Ethical Hacking
1.14 Steps of Ethical Hacking
1.15 Tools for Ethical Hacking
1.16 What to Do if Been
1.1 Cybercrime
1.2 Categories of Cybercrimes Worms Versus Viruses :
1.3 Types of Cybercrimes
Worms and viruses are malicious
1.4 Internet Spawns Crime programs that can cause harm to our
1.5 Worms Versus Viruses system. However, both these terms
are very different.
1.6 Computer’s Role in Crimes
1.7 Cybercrime Statistics 1. Worms : A worm (write once read
many) is similar to a computer virus by
1.8 Prevention of Cybercrime design. It is considered to be a secondary
1.9 Hacker category of virus. A worm spreads from
computer to computer, but unlike virus it
1.10 Crackers has the capability to travel without any
1.11 Phreakers human action.

1.12 Ethical Hacking 2. Viruses : A virus (vital information


1.13 Hacking & Ethical Hacking resources under siege) is a software that
is designed to duplicate itself. This is
1.14 Steps of Ethical Hacking done by replicating itself into various
1.15 Tools for Ethical Hacking programs that are stored in the computer.

1.16 What to Do if Been


1.1 Cybercrime
1.2 Categories of Cybercrimes
1.3 Types of Cybercrimes Computer’s Role in Crimes :
1.4 Internet Spawns Crime
Computers can play a vital role in
1.5 Worms Versus Viruses
crimes as shown in Figure . They
1.6 Computer’s Role in Crimes can extract evidences,
1.7 Cybercrime Statistics instrumentality, illegal imports,
1.8 Prevention of Cybercrime or the fruit of a crime.
1.9 Hacker
1. They can act as a
1.10 Crackers
communication tool.
1.11 Phreakers
1.12 Ethical Hacking 2. They can be the target of the
1.13 Hacking & Ethical Hacking attacker for criminal activity.
1.14 Steps of Ethical Hacking
3. They can also be tangential to
1.15 Tools for Ethical Hacking crime.
1.16 What to Do if Been
1.1 Cybercrime
1.2 Categories of Cybercrimes Cybercrime Statistics in India :
1.3 Types of Cybercrimes
Total cybercrimes, including fishing malicious code, website intrusion, denial of
1.4 Internet Spawns Crime service, scanning, etc., that occurred in the last eight years are given in Table
1.5 Worms Versus Viruses
1.6 Computer’s Role in Crimes
1.7 Cybercrime Statistics
1.8 Prevention of Cybercrime
1.9 Hacker
1.10 Crackers
1.11 Phreakers
1.12 Ethical Hacking
1.13 Hacking & Ethical Hacking
1.14 Steps of Ethical Hacking
1.15 Tools for Ethical Hacking
1.16 What to Do if Been
1.1 Cybercrime
1.2 Categories of Cybercrimes
1.3 Types of Cybercrimes Prevention of Cybercrime :
1.4 Internet Spawns Crime
Prevention is always better than cure. It is always better to take certain
1.5 Worms Versus Viruses precautions while working on the internet.
1.6 Computer’s Role in Crimes The 5P’s mantra for online security are as follows:
1.7 Cybercrime Statistics
1.8 Prevention of Cybercrime
1. Precaution
1.9 Hacker 2. Prevention
1.10 Crackers 3. Protection
1.11 Phreakers 4. Preservation
5. Perseverance
1.12 Ethical Hacking
1.13 Hacking & Ethical Hacking
1.14 Steps of Ethical Hacking
1.15 Tools for Ethical Hacking
1.16 What to Do if Been
1.1 Cybercrime
1.2 Categories of Cybercrimes
1.3 Types of Cybercrimes Definition of Hacker :
1.4 Internet Spawns Crime
The one who is curious
1.5 Worms Versus Viruses about the workings of any
1.6 Computer’s Role in Crimes computer software is
1.7 Cybercrime Statistics termed a hacker. Very
often, the hackers are a
1.8 Prevention of Cybercrime
unit of smart
1.9 Hacker programmers.
1.10 Crackers
1.11 Phreakers Hackers have advanced
1.12 Ethical Hacking
knowledge of operative
systems and programming
1.13 Hacking & Ethical Hacking
languages.
1.14 Steps of Ethical Hacking
1.15 Tools for Ethical Hacking
1.16 What to Do if Been
1.1 Cybercrime
1.2 Categories of Cybercrimes Definition of Cracker :
1.3 Types of Cybercrimes
1.4 Internet Spawns Crime People who break into
different systems with
1.5 Worms Versus Viruses
malicious intentions are
1.6 Computer’s Role in Crimes referred to as crackers.
1.7 Cybercrime Statistics
1.8 Prevention of Cybercrime Crackers cause issues to
victims by an
1.9 Hacker
unauthorized access,
1.10 Crackers destroying necessary
1.11 Phreakers information, stopping
1.12 Ethical Hacking services provided by the
1.13 Hacking & Ethical Hacking
server, and more.
1.14 Steps of Ethical Hacking
1.15 Tools for Ethical Hacking
1.16 What to Do if Been
1.1 Cybercrime
1.2 Categories of Cybercrimes Definition of Phreakers :
1.3 Types of Cybercrimes
1.4 Internet Spawns Crime
Phreaker is the one who
gains illegal access to the
1.5 Worms Versus Viruses
telephone system as shown
1.6 Computer’s Role in Crimes in Figure.
1.7 Cybercrime Statistics Phreakers are considered the
1.8 Prevention of Cybercrime original computer hackers
and they are those who break
1.9 Hacker
into the telephone network
1.10 Crackers illegally, typically to make
1.11 Phreakers free long distance phone
1.12 Ethical Hacking calls or to tap phone lines.
Phreakers are people who
1.13 Hacking & Ethical Hacking
specialize in attacks on the
1.14 Steps of Ethical Hacking telephone system.
1.15 Tools for Ethical Hacking
1.16 What to Do if Been Hacked?
1.1 Cybercrime
1.2 Categories of Cybercrimes Ethical Hacking :
1.3 Types of Cybercrimes Hacking is typically done to
1.4 Internet Spawns Crime achieve unauthorized access
to a system or an electronic
1.5 Worms Versus Viruses network, either to hurt the
1.6 Computer’s Role in Crimes systems or to steal sensitive
data out there on the pc.
1.7 Cybercrime Statistics Hacking is typically legal as
1.8 Prevention of Cybercrime long as
it is being done to seek out
1.9 Hacker weaknesses in a pc or network
1.10 Crackers system for testing purpose.
This type of hacking is what
1.11 Phreakers we have a tendency to
1.12 Ethical Hacking decision moral hacking or in
other words Ethical Hacking.
1.13 Hacking & Ethical Hacking
1.14 Steps of Ethical Hacking
1.15 Tools for Ethical Hacking
1.16 What to Do if Been Hacked?
1.1 Cybercrime
1.2 Categories of Cybercrimes Difference between Hacking & Ethical Hacking :
1.3 Types of Cybercrimes
1.4 Internet Spawns Crime
1.5 Worms Versus Viruses
1.6 Computer’s Role in Crimes
1.7 Cybercrime Statistics
1.8 Prevention of Cybercrime
1.9 Hacker
1.10 Crackers
1.11 Phreakers
1.12 Ethical Hacking
1.13 Hacking & Ethical Hacking
1.14 Steps of Ethical Hacking
1.15 Tools for Ethical Hacking
1.16 What to Do if Been Hacked?
1.1 Cybercrime
1.2 Categories of Cybercrimes
Steps of Ethical
1.3 Types of Cybercrimes
Hacking :
1.4 Internet Spawns Crime
1. Reconnaissance :
1.5 Worms Versus Viruses
Reconnaissance is the
1.6 Computer’s Role in Crimes phase where the attacker
gathers information about
1.7 Cybercrime Statistics
a target using active or
1.8 Prevention of Cybercrime passive
means as shown in Figure.
1.9 Hacker
The tools that are widely
1.10 Crackers used in this process are
NMAP, Hping, Maltego,
1.11 Phreakers
and Google Dorks
1.12 Ethical Hacking
1.13 Hacking & Ethical Hacking
1.14 Steps of Ethical Hacking
1.15 Tools for Ethical Hacking
1.16 What to Do if Been
1.1 Cybercrime
1.2 Categories of Cybercrimes
Steps of Ethical
1.3 Types of Cybercrimes
Hacking :
1.4 Internet Spawns Crime
2. Scanning :
1.5 Worms Versus Viruses
In scanning, the attacker
1.6 Computer’s Role in Crimes begins to actively probe a
target machine or network
1.7 Cybercrime Statistics
for vulnerabilities that can
1.8 Prevention of Cybercrime be exploited as shown in
Figure .
1.9 Hacker
The tools used in this
1.10 Crackers process are Nessus,
Nexpose, Wireshark, and
1.11 Phreakers
NMAP
1.12 Ethical Hacking
1.13 Hacking & Ethical Hacking
1.14 Steps of Ethical Hacking
1.15 Tools for Ethical Hacking
1.16 What to Do if Been
1.1 Cybercrime
1.2 Categories of Cybercrimes
Steps of Ethical
1.3 Types of Cybercrimes
Hacking :
1.4 Internet Spawns Crime
3. Gaining Access :
1.5 Worms Versus Viruses
In this process, the
1.6 Computer’s Role in Crimes vulnerability is located
and you attempt to exploit
1.7 Cybercrime Statistics
it in order to enter into the
1.8 Prevention of Cybercrime system as
shown in Figure.
1.9 Hacker
The primary tool that is
1.10 Crackers used in this process is
Metasploit.
1.11 Phreakers
1.12 Ethical Hacking
1.13 Hacking & Ethical Hacking
1.14 Steps of Ethical Hacking
1.15 Tools for Ethical Hacking
1.16 What to Do if Been
1.1 Cybercrime
1.2 Categories of Cybercrimes
Steps of Ethical
1.3 Types of Cybercrimes
Hacking :
1.4 Internet Spawns Crime
4. Maintaining Access :
1.5 Worms Versus Viruses
It is the process where the
1.6 Computer’s Role in Crimes hacker has already gained
access into a system as
1.7 Cybercrime Statistics
shown in Figure. After
1.8 Prevention of Cybercrime gaining access, the hacker
installs some backdoors in
1.9 Hacker
order to enter into the
1.10 Crackers system when he/she needs
access in this owned
1.11 Phreakers
system in future.
1.12 Ethical Hacking Metasploit is the preferred
tool in this process.
1.13 Hacking & Ethical Hacking
1.14 Steps of Ethical Hacking
1.15 Tools for Ethical Hacking
1.16 What to Do if Been
1.1 Cybercrime
1.2 Categories of Cybercrimes
Steps of Ethical
1.3 Types of Cybercrimes
Hacking :
1.4 Internet Spawns Crime
5. Clearing Tracks :
1.5 Worms Versus Viruses
This process is actually an
1.6 Computer’s Role in Crimes unethical activity. It has to
do with the deletion of
1.7 Cybercrime Statistics
logs of all the activities
1.8 Prevention of Cybercrime that take place during the
hacking process as shown
1.9 Hacker
in Figure.
1.10 Crackers
1.11 Phreakers
1.12 Ethical Hacking
1.13 Hacking & Ethical Hacking
1.14 Steps of Ethical Hacking
1.15 Tools for Ethical Hacking
1.16 What to Do if Been
1.1 Cybercrime
1.2 Categories of Cybercrimes
Exploring some Tools for Ethical Hacking
1.3 Types of Cybercrimes
1. Reconnaissance Tools :
1.4 Internet Spawns Crime a. Nmap : Nmap or “Network Mapper” is one of the most popular and widely
1.5 Worms Versus Viruses used security auditing tools.

1.6 Computer’s Role in Crimes b. Google Dorks : While investigating people or companies, a lot of IT security
1.7 Cybercrime Statistics newbies forget the importance of using traditional search engines for recon and intel
gathering. In this case, Google Dorks can be your best friend.
1.8 Prevention of Cybercrime
1.9 Hacker c. Maltego : It is a tremendous tool to trace down footprints of any target you
wish to match.
1.10 Crackers
1.11 Phreakers
2. Scanning Tools :
1.12 Ethical Hacking a. Nexpose : Nexpose vulnerability scanner, developed by Rapid7, which is an
1.13 Hacking & Ethical Hacking open-source tool is developed by Rapid7
isand is used to scan the vulnerabilities and performs various network checks
1.14 Steps of Ethical Hacking
b. Wireshark : Wireshark is the world’s leading and extensively used network
1.15 Tools for Ethical Hacking protocol analyzer.
1.16 What to Do if Been c. Nessus : Wireshark is the world’s leading and extensively used network
protocol analyzer.
1.1 Cybercrime
1.2 Categories of Cybercrimes
1.3 Types of Cybercrimes What to do if Been Hacked ?
1.4 Internet Spawns Crime
1.5 Worms Versus Viruses
1. Cut-off your internet connection: If you think that you simply are
1.6 Computer’s Role in Crimes being hacked, the primary factor to try to do is to cut-off internet from your
1.7 Cybercrime Statistics system so as to prevent any more intrusion.
1.8 Prevention of Cybercrime
2. Turn on firewall: Typically, we have a tendency to close up windows
1.9 Hacker
firewall so as to put in some package. From a security purpose of read ,
1.10 Crackers forever we must always activate firewalls. Hardware firewall is another
1.11 Phreakers smart choice to install. It acts as an associate isolator between external
1.12 Ethical Hacking network and your internal systems.
1.13 Hacking & Ethical Hacking
3. Contact your internet service supplier: It’s a decent apply to contact
1.14 Steps of Ethical Hacking
your ISP within the case of hacking as a result of they need their own
1.15 Tools for Ethical Hacking policy and pointers for any malicious intrusion.
1.16 What to Do if Been
DR. NILAKSHI JAIN
Email ID : • Thank you
[email protected]

You might also like