Top Banner
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL FORENSICS
56

McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Dec 21, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved.

Extended Learning Module HExtended Learning Module H COMPUTER CRIME AND DIGITAL FORENSICS

Extended Learning Module HExtended Learning Module H COMPUTER CRIME AND DIGITAL FORENSICS

Page 2: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

STUDENT LEARNING OUTCOMES

1. Define computer crime and list three types of computer crime that can be perpetrated from inside and three from outside the organization

2. Identify the seven types of hackers and explain what motivates each group

3. Define digital forensics and describe the two phases of a forensic investigation

Page 3: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

STUDENT LEARNING OUTCOMES

4. Describe what is meant by anti-forensics, and give an example of each of the three types

5. Describe two ways in which corporations use digital forensics

Page 4: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

INTRODUCTION

• Computers are involved in crime in two ways

• Computer crimes can be committed

• Outside the organization

Page 5: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

MODULE ORGANIZATION

1. Computer Crime – Learning Outcomes #1 & #2

2. Digital Forensics– Learning Outcome #3

3. Recovery and Interpretation– Learning Outcome #4

4. Who Needs Digital Forensic Investigators? – Learning Outcome #5

Page 6: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

COMPUTER CRIME

• Computer crime

Page 7: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Examples of Computer Crimes

Page 8: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Crimes in Which Computers Usually Play a Part

Page 9: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Outside the Organization

• In 2006 the greatest financial loss stemmed from

Page 10: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Types of Malware

• Malware – software designed to harm you computer or computer security

• Types of Malware

Page 11: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Viruses

• Computer virus (virus)

• Worm

Page 12: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

The Love Bug Worm

Page 13: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Stand-Alone Viruses

• Spoofing

Page 14: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Trojan Horse Viruses

• Trojan horse virus

• Examples:– Key logger (key trapper) software

– Ping-of-Death DoS attack

Page 15: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Misleading E-mail: Virus Hoax

• Objective is to cause damage to your system

• Virus hoax is an e-mail telling you of a non-existent virus

Page 16: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Denial-of-Service Attacks

• Denial-of-Service (DoS) attack

Page 17: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Distributed DoS

• Distributed denial-of-service attack (DDoS)

Page 18: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Distributed Denial-of-Service Attack

Page 19: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Malware Bots

• Bot

• Malware bots

• Zombies (or drones)

Page 20: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Botnets and Rootkits

• Botnet

• Rootkit

Page 21: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Web Defacing

• Web defacing

Page 22: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Players

• Hackers

• Thrill-seeker hackers

• White-hat (ethical) hackers

Page 23: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Players

• Black hat hackers

• Crackers

– Social engineering

Page 24: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Players

• Hacktivists

• Cyberterrorists

Page 25: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Players

• Script kiddies (or bunnies)

Page 26: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

DIGITAL FORENSICS

• Digital forensics

• Two phases

Page 27: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Phase 1: Collection – Places to look for Electronic Evidence

Page 28: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Phase 1: Preservation

• If possible, hard disk is removed without turning computer on

• Special forensics computer is used to ensure that nothing is written to drive

• Forensic image copy

Page 29: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Phase 1: Authentication

• Authentication process necessary for ensuring that no evidence was planted or destroyed

• MD5 hash value

Page 30: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Forensic Hardware and Software Tools

• Forensics computers usually have a lot of RAM and very fast processors

• EnCase – software that finds all information on disks

• Quick View Plus and Conversions Plus – read files in many formats

• Mailbag Assistant – reads most e-mail

Page 31: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Forensics Hardware and Software Tools

• Gargoyle – software that identifies encrypted files and may decrypt them

• Irfan View – reads image files• Ingenium – semantic analysis software that

searches for meaning rather than an exact match

Page 32: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Cell Phones

• In 2004 - 200 countries with more than 1.5 billion users of GSM cell phones (Cingular and most of Europe)

• Cell phones can be used for

Page 33: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Cell Phones and Other Handheld Devices Files Can Be Recovered

from…

Page 34: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Phase 2: Analysis

• Interpretation of information uncovered• Recovered information must be put into

context• Digital forensic software pinpoints the file’s

location on the disk, its creator, the date it was created and many other features of the file

Page 35: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Where Data is Hiding

Page 36: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

History of Disk Activity

Page 37: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Live Analysis

• Examination of a system while it is still running

• Disadvantage - not possible to get an MD5 hash value

• Advantages include – the ability to retrieve information from RAM

• Helix – program to collect information during live analysis

Page 38: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

RECOVERY AND INTERPRETATION

• Snippets of e-mail, when put into context, often tell an interesting story

Page 39: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

E-Mail between engineers about the Spaceship Columbia

Page 40: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

E-Mail between Enron and Andersen Consulting

Page 41: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

E-Mail from Arresting Officer in the Rodney King Beating

Page 42: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Internal E-Mail from Bill Gates to Microsoft Employee

Page 43: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Places to Look for Useful Information

• Deleted files and slack space– Slack space

• System and registry files

Page 44: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Places to Look for Useful Information

• Unallocated space

Page 45: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Anti-Forensics

• New branch of digital forensics• Set of tools and activities that make it hard

or impossible to track user activity• Three categories

Page 46: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Configuration Settings Examples:

• Use Shift + Delete to bypass the recycle bin• Rename the file with a different extension• Clear out virtual memory• Use Defrag to rearrange data on the hard

disk and overwrite deleted files• Use Disk Cleanup to delete ActiveX

controls and Java applets

Page 47: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Configuration Settings Examples:

• Delete temporary Internet files• Hide information by making it invisible with

Hidden feature in Word or Excel• Redact – black out portions of a document• Protect your files with passwords

Page 48: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Configuration Settings Examples:

• Make the information invisible• Use Windows to hide files• Protect file with password

Page 49: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Third-Party Tools to

• Alter your registry• Hide Excel files inside Word documents and

visa versa• Change the properties like creation date in

Windows• Replace disk contents with 1’s and 0’s –

called wiping programs

Page 50: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Third Party Tools

• Encryption • Steganography

• U3 Smart drive

Page 51: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Forensic Defeating Software

• Software on the market specially designed to evade forensic examination

• Such software would include programs to remove

Page 52: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

WHO NEEDS DIGITAL FORENSICS

INVESTIGATORS?• Digital forensics is used in

Page 53: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Organizations Use Digital Forensics in Two Ways

Page 54: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Proactive Education to Educate Employees

• Proactive Education for Problem Prevention– What to do and not to do with computer

resources such as

Page 55: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

Reactive Digital forensics for Incident Response

• What to do if wrong-doing is suspected and how to investigate it

Page 56: McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.

A Day in the Life…

• As a digital forensics expert you must