Skip to content

Global-Mithila/cyber-security

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 

Repository files navigation

cyber-security

This is the core zero to hero cyber security repo , for college and beginner friendly.

Let's jump directly into the course :-

What is Cyber Security

Cyber security is the branch of Computer studies where do we research, analyise the digital forensics of cyber world.

Digital Forensic Essentials

Module Objectives

  1. Understanding the fundamentals of computer Forensics
  2. Understanding different Types of Cybercrimes
  3. Overview of Indicators of compromise (IOCs)
  4. Overview of Different Types of Digital Evidence and Rules of Evidence
  5. Understanding Forensic Readiness planning and Business Continuity.
  6. Understanding the Roles and Responsibilities of a Forensic Investigator.
  7. Understanding the legal compliance in computer Forensics.

Module Flow

  1. Undestanding of Fundamentals of computer Forensics
  2. Understanding Digital Evidence
  3. Understanding Forensic Readiness
  4. Indentify the Roles and Responsibilities of a Forensic Investigator
  5. Understand Legal Compliance in Computer Forensics.

Definitions :-

What is Computer Forensics ?

It is a set of methodological procedures and techniques that help identify,gather, preserve,extract,interpret,documentm and present ecidence from computing equipment,such that any discovered evidence is acceptable during a legal & administrative proceeding.

Objectives of Computer Forensics

  1. Identify,gather and preserve the evidence of a cybercrime.
  2. Gather evidence of cyber crimes in a forensically sound manner
  3. Estimate the potential impact of malicious activity on victim and assess the intent of the perpetrator.
  4. Minimize the tangible and intangible losses to the organisation.
  5. Protect the organization from similar incidents in the future.
  6. Support the prosecution of an incident.

Why do we need for Computer Forensics ?

  1. To ensure the overall integrity and continued existence of IT systems and network infrastructure within the organisation.
  2. To extract, process,and interpret the factual evidence such that it proves the attacker's actions in court
  3. To efficiently track down perpetrators from different parts of the world.
  4. To protect the organisation's financial resources and valuable time.

When we do use computer Forensics?

  1. prepare for Incidents by securing and strengthening the defence mechanism as well as closing the loopholes in security.
  2. Identify the actions needed for incident response
  3. Act against copyright & intellectual property theft misuse.
  4. Estimate and minimize the damage to resources in a corporate setup
  5. Set a security parameter and formulate security norms for ensuring forensic readiness.

Types of Cyber Crimes

Cybercrime is defined as any illegal act invloving a computer device,network, its systems or its applications.

These are categorized into two types based on the line of attack

Internal Attack External Attack
Attacker is Entrusted Person from inside the organisation Attacker is from outside of the organisation
Attacker already have authorisation to access to the network They are not authorised to access the n/w. They do gain unauthorised access
Attackers could be former or employees, business partners or contractors These attackers exploit security loopholes or use social engineering techniques to infiltrate the n/w

Examples of Common Cyber Crimes

  1. Espionage
  2. Intellectual property theft
  3. Data Manipulation
  4. Trojan Horse Attack
  5. SQL attack
  6. Brute-force Attack
  7. Phishing/Spoofing
  8. Privilege Escalation Attacks
  9. Denial of Service Attack (DDos)
  10. Cyber Defamation
  11. Cyber terrorism
  12. Cyberwarfare

Impact of Cyber crimes at the Organisational level :-

  1. Loss of confidentiality,integrity and availabilty of information stored in organisational systems.
  2. Theft of sensitive data.
  3. sudden disruption of business activities
  4. Loss of customer and stakeholder trust
  5. substantial reputational damage
  6. Huge financial losses
  7. Penalties arising from the failure to comply with regulations

Now Jump to the 2nd Modulue flow i.e Digital Evidence :-

What is Digital Evidence ?

Any information of probative value that is either stored or transmitted in a digital form is called as Digital Evidence.

Digital evidence is circumstantial and fragile in nature, which makes it difficult for a forensic investigator to trace criminal activities.

What is Locard's Exchange principle?

Anyone or anything,entering a crime scene takes something of the scene with them, and leaves somethings of themselves behind when they leave.

Types of Digital Evidence:-

  • Volatile Data:- Data that are lost as soon as the device is powered off. eg system timeout, process to port mapping, process memory, clipboard contents, service/driver information,command history.

  • Non-volatile Data:- Data that are stored on secondary storage device such as hard disks,memory cards , unallocated clusters, events logs.

The common enemy for both volatile and non volatile Digital evidence are :- Time

Role of Digital Evidence

Digital Evidence may assist the forensic investigator in the prosecution or defense of a suspect

  • Identity theft
  • Malicious attacks on the computer systems themselves
  • Information leakage
  • Unauthorised transmission of information
  • Theft of commercial secrets
  • Use/abuse of the Internet
  • Production of false documents and accounts
  • Unauthorised encryption/password protection of documents
  • Abuse of Systems
  • Email communication between suspects/conspirators.

Source of Potential Evidence

  • user-Created Files
  • Address books
  • Database files
  • Media(Images,graphics,audio,video etc) files
  • Documents (text,spreadsheets) files
  • Internet bookmarks, favourites etc.

User-Protected Files

  • Compressed files
  • Misnamed files
  • Encrypted files
  • Password-protected files
  • Hidden files
  • steganography

Computer-Created Files

  • Backup Files
  • Log Files
  • Configuration Files
  • Printer Spool files
  • Cookies
  • Swap Files
  • System Files
  • History Files
  • Temporary Files

Devices

  • Hard Drive
  • Thumb Drive
  • Memory Card
  • Smart Card
  • Dongle
  • Biometric Scanner
  • Answering Machine
  • Digital camera
  • RAM and Volatile storage
  • Handheld Devices
  • LAN
  • Router,Modem,Hubs,Switches
  • Network cables and Connectors
  • Server
  • Printer
  • IOT and wearables

We have seen a lot more examples of Evidence, now Question is how to consider something as a evidence?

Rules of Evidence

Must have 5 basic rules that make it admissible in a court of law

  1. Understandable : Evidence must be clear and understandable to the judges
  2. Admissible : Evidence must be related to the fact being proved
  3. Authentic : Evidence must be real and appropriately related to the incident
  4. Reliable : There must be no doubt the authenticity or veracity of the evidence
  5. complete: The evidence must prove the attacker's actions or his/her innocence

Forensic Readiness Planning

Forensic readiness planning refers to a set of processes to be followed to achieve and maitain forensics readiness.

  1. Identify the potential evidence required for an incident
  2. Determine the source of evidence
  3. Define a policy to handle and store the acquired evidence in a secure manner
  4. Identify if the incident requires full or formal investigation
  5. Create a process for documenting the procedure
  6. Establish a legal advisory board to guide the investigation process
  7. keep an Incident response Team ready to review the incident and preserve the evidence.

Need for a forensic Investigator

  • Cybercrime Investigation
  • Sound Evidence Handling
  • Incident Handling and Response

Roles and Responsibilities of a Forensics Investigator

  • Determines the extent of any damage done during the crime
  • Recovers data of investigative value from computing devices involved in crimes
  • Create an image of the original evidence withour tampering with it to maintain its integrity.
  • Guide the officials carrying out the investigation
  • Analyses the evidence data found
  • Prepares the analysis report
  • Update the orginazation about various attack methods and data recovery attack methods and data recovery techniques and maintains a record of them
  • Addresses the issue in a court of law and attempts to win the case by testifying in court.

Releases

No releases published

Packages

No packages published