SlideShare una empresa de Scribd logo
1 de 27
© FISE
Building A Cybercrime Case
Introduction
• The growing danger from crimes committed against
computers, or against information on computers, is beginning
to claim attention in national capitals. In most countries
around the world, however, existing laws are likely to be
unenforceable against such crimes. This lack of legal
protection means that businesses and governments must rely
solely on technical measures to protect themselves from
those who would steal, deny access to, or destroy valuable
information.
Types of Cyber Crimes:
Data crimes.
• Data Interception: Interception of data in
transmission.
• Data Modification: Alteration, destruction, or
erasing of data.
• Data Theft: Taking or copying data, regardless of
whether it is protected by other laws, e.g.,
copyright, privacy, etc.
Types of Cyber Crimes:
Network crimes
• Network Interference: Impeding or preventing access for others.
The most common example of this action is instigating
• a distributed denial of service (DDOS) attack, flooding Web sites or
Internet Service Providers. DDOS attacks are often launched from
numerous computers that have been hacked to obey commands of
the perpetrator.
• Network Sabotage: Modification or destruction of a network or
system.
Types of Cyber Crimes:
Related crimes.
• Aiding and Abetting: Enabling the commission of
a cyber crime.
• Computer-Related Forgery: Alteration of data
with intent to represent as authentic.
• Computer-Related Fraud: Alteration of data with
intent to derive economic benefit from its
misrepresentation.
Bodies Of Law
THREE bodies of law :
(1) Criminal law, or penal law
• Is the body of rules with the potential for severe
impositions as punishment for failure to comply.
Criminal punishment, depending on the offense and
jurisdiction, may include execution, loss of liberty,
government supervision (parole or probation), or
fines.
Bodies Of Law
• There are some archetypal (example) crimes, like
murder, but the acts that are forbidden are not
wholly consistent between different criminal codes,
and even within a particular code lines may be
blurred as civil infractions may give rise also to
criminal consequences. Criminal law typically is
enforced by the government, unlike the civil law,
which may be enforced by private parties.
Bodies Of Law
(2) Civil law
• As opposed to criminal law, is the branch of law
dealing with disputes between individuals and/or
organizations, in which compensation may be
awarded to the victim. For instance, if a car crash
victim claims damages against the driver for loss or
injury sustained in an accident, this will be a civil law
case.
Bodies Of Law
(3) Administrative law
• Is the body of law that governs the activities of
administrative agencies of government. Government
agency action can include rulemaking, adjudication,
or the enforcement of a specific regulatory agenda.
Administrative law is considered a branch of public
law.
Bodies Of Law
• As a body of law, administrative law deals with the decision-
making of administrative units of government (e.g., tribunals,
boards or commissions) that are part of a national regulatory
scheme in such areas as police law, international trade,
manufacturing, the environment, taxation, broadcasting,
immigration and transport. Administrative law expanded
greatly during the twentieth century, as legislative bodies
worldwide created more government agencies to regulate
the increasingly complex social, economic and political
spheres of human interaction.
Security Incident:
The attempted or successful
unauthorized access, use
disclosure, modification, or
destruction of information or
interference with system
operations in an information
system
Examples
• Bombings, explosions, fire,
flood, storm, power outage,
hardware/software failure
• Cyber-theft, identity-theft,
intellectual property theft,
regular theft (involving
information), virus, worm,
network intrusions,
unauthorized use, denial of
service, etc
} Contingency
Plan
} Incident
response
Goals
• Provide an effective and efficient means of dealing with the
situation
• in a manner that reduces the potential impact to the
organization.
• Provide management with sufficient information in order to
decide on
• an appropriate course of action.
• Maintain or restore business continuity.
• Defend against future attacks.
• Deter attacks through investigation and prosecution.
Incident Handling Steps
• Preparation
• Identification
• Containment
• Eradication
• Recovery
• Lessons learned
Incident Handling Steps
• Preparation - The organization educates users and IT staff of the
importance of updated security measures and trains them to respond
to computer and network security incidents quickly and correctly.
• Identification - The response team is activated to decide whether a
particular event is, in fact, a security incident. The team will tracks
Internet security activity and has the most current information on
viruses and worms.
• Containment - The team determines how far the problem has spread
and contains the problem by disconnecting all affected systems and
devices to prevent further damage.
Incident Handling Steps
• Eradication - The team investigates to discover the origin of
the incident. The root cause of the problem and all traces of
malicious code are removed.
• Recovery - Data and software are restored from clean backup
files, ensuring that no vulnerabilities remain. Systems are
monitored for any sign of weakness or recurrence.
• Lessons learned - The team analyzes the incident and how it
was handled, making recommendations for better future
response and for preventing a recurrence.
Why Need Structure Handling
• Structure/Organization
– Dealing with incidents can be chaotic
– Simultaneous incidents occur
– Having a predefined methodology lends structure to the chaos
• Efficiency
– Time is often of the essence when dealing with incidents
– Incidents can be costly both financially and organizationally
• Process oriented approach
– Breaks incidents into small manageable chunks
– Logical order of dealing with issues
– Includes methods for improving the overall process
Why Need Structure Handling
• Dealing with the unexpected
– Provides a mental framework for dealing with incidents in
general
– Promotes flexible thinking to deal with novel situations
• Legal Considerations
– Can demonstrate due care or due diligence
– May limit liability
– May reduce insurance premiums
Evidence Management
• During an incident, evidence may be collected during any of
the 6 steps.
• In early stages we may not know what the final outcome
might be (e.g., Job Termination, Civil or Criminal Litigation).
• Network/Computer Forensics may become an issue
• Must collect data in a “Forensically Friendly” manner
• Must maintain the chain of custody
• Important to understand the evidence lifecycle
Forensics
• Computer Forensics: The study of computer
technology as it relates to the law.
• Forensic Analysis: Examination of material and/or
data to determine its essential features and their
relationship in an effort to discover evidence in a
manner that is admissible in a court of law; post-
mortem examination.
Forensics
• Electronic Evidence:
Evidence relating to the
issue that consists of
computer files, or data, in
their electronic state.
• Electronic Media
Discovery: The
discoverability of electronic
data or files.
Forensics
• Chain of Custody: A means of
accountability, that shows who
obtained the evidence, where
and when the evidence was
obtained, who secured the
evidence, who had control or
possession of the evidence.
• Rules of Evidence: Evidence
must be competent, relevant,
and material to the issue.
Evidence Life Cycle
• Collection & identification
• Storage, preservation, and
• transportation
• Presentation in court
• Return to victim or court
Case Study:
MALAYSIAN CYBERLAWS AND THEIR IMPLE

Más contenido relacionado

La actualidad más candente

Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Cehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackingCehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackinganonymousrider
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Hannah Jane del Castillo
 
Cyber security
Cyber securityCyber security
Cyber securityEduonix
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - ExplainedGunjan Panara
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-securityStephen Cobb
 
How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threatsAkankshaPathak27
 
Web Application Security Session for Web Developers
Web Application Security Session for Web DevelopersWeb Application Security Session for Web Developers
Web Application Security Session for Web DevelopersKrishna Srikanth Manda
 
What is Importance of Cyber Security
What is Importance of Cyber Security What is Importance of Cyber Security
What is Importance of Cyber Security Wee Tang
 
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewSam Bowne
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 

La actualidad más candente (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackingCehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hacking
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical Hacking - Explained
Ethical Hacking - ExplainedEthical Hacking - Explained
Ethical Hacking - Explained
 
Cyber security
Cyber security Cyber security
Cyber security
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threats
 
Cyber security
 Cyber security Cyber security
Cyber security
 
Web Application Security Session for Web Developers
Web Application Security Session for Web DevelopersWeb Application Security Session for Web Developers
Web Application Security Session for Web Developers
 
What is Importance of Cyber Security
What is Importance of Cyber Security What is Importance of Cyber Security
What is Importance of Cyber Security
 
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking Overview
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 

Destacado

Installing driver
Installing driverInstalling driver
Installing driverOnline
 
Business etiquette
Business etiquetteBusiness etiquette
Business etiquetteOnline
 
Note taking
Note takingNote taking
Note takingOnline
 
An introduction to cost terms and purposes
An introduction to cost terms and purposesAn introduction to cost terms and purposes
An introduction to cost terms and purposesOnline
 
Process losses
Process lossesProcess losses
Process lossesOnline
 
Network servers
Network serversNetwork servers
Network serversOnline
 
Client server system and remote connectivity
Client server system and remote connectivityClient server system and remote connectivity
Client server system and remote connectivityOnline
 
Managers & global information technology
Managers & global information technologyManagers & global information technology
Managers & global information technologyOnline
 
Factor market
Factor marketFactor market
Factor marketOnline
 
Philosophy of early childhood education 2
Philosophy of early childhood education 2Philosophy of early childhood education 2
Philosophy of early childhood education 2Online
 
Management information system database management
Management information system database managementManagement information system database management
Management information system database managementOnline
 
Wan technologies
Wan technologiesWan technologies
Wan technologiesOnline
 
Fiscal policy
Fiscal policyFiscal policy
Fiscal policyOnline
 
Mergers and acquisitions
Mergers and acquisitionsMergers and acquisitions
Mergers and acquisitionsOnline
 
Introduction to corporate finance
Introduction to corporate financeIntroduction to corporate finance
Introduction to corporate financeOnline
 
New classical analysis of
New classical analysis ofNew classical analysis of
New classical analysis ofOnline
 
Multimedia authoring tools
Multimedia authoring toolsMultimedia authoring tools
Multimedia authoring toolsOnline
 

Destacado (18)

Installing driver
Installing driverInstalling driver
Installing driver
 
Business etiquette
Business etiquetteBusiness etiquette
Business etiquette
 
Note taking
Note takingNote taking
Note taking
 
Tense
TenseTense
Tense
 
An introduction to cost terms and purposes
An introduction to cost terms and purposesAn introduction to cost terms and purposes
An introduction to cost terms and purposes
 
Process losses
Process lossesProcess losses
Process losses
 
Network servers
Network serversNetwork servers
Network servers
 
Client server system and remote connectivity
Client server system and remote connectivityClient server system and remote connectivity
Client server system and remote connectivity
 
Managers & global information technology
Managers & global information technologyManagers & global information technology
Managers & global information technology
 
Factor market
Factor marketFactor market
Factor market
 
Philosophy of early childhood education 2
Philosophy of early childhood education 2Philosophy of early childhood education 2
Philosophy of early childhood education 2
 
Management information system database management
Management information system database managementManagement information system database management
Management information system database management
 
Wan technologies
Wan technologiesWan technologies
Wan technologies
 
Fiscal policy
Fiscal policyFiscal policy
Fiscal policy
 
Mergers and acquisitions
Mergers and acquisitionsMergers and acquisitions
Mergers and acquisitions
 
Introduction to corporate finance
Introduction to corporate financeIntroduction to corporate finance
Introduction to corporate finance
 
New classical analysis of
New classical analysis ofNew classical analysis of
New classical analysis of
 
Multimedia authoring tools
Multimedia authoring toolsMultimedia authoring tools
Multimedia authoring tools
 

Similar a Building a cybercrime case

Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodologyPiyush Jain
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)stevemeltzer
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitKevin Duffey
 
164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.pptharshbj1801
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickJacqueline Fick
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideBlack Duck by Synopsys
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1misecho
 
Thinking Ahead to Litigation While Developing Cybersecurity Plans
Thinking Ahead to Litigation While Developing Cybersecurity PlansThinking Ahead to Litigation While Developing Cybersecurity Plans
Thinking Ahead to Litigation While Developing Cybersecurity PlansJason Glass, CFA, CISSP
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Anpumathews
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf503SaranyaS
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Lisa Abe-Oldenburg, B.Comm., JD.
 
Lecture 8 privacy, security, ergonomics and the environment
Lecture 8   privacy, security, ergonomics and the environment Lecture 8   privacy, security, ergonomics and the environment
Lecture 8 privacy, security, ergonomics and the environment Jenny Coloma
 

Similar a Building a cybercrime case (20)

Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
 
164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt164199724-Introduction-To-Digital-Forensics-ppt.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
The general data protection act overview
The general data protection act overviewThe general data protection act overview
The general data protection act overview
 
Mis
MisMis
Mis
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Thinking Ahead to Litigation While Developing Cybersecurity Plans
Thinking Ahead to Litigation While Developing Cybersecurity PlansThinking Ahead to Litigation While Developing Cybersecurity Plans
Thinking Ahead to Litigation While Developing Cybersecurity Plans
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
File000168
File000168File000168
File000168
 
2. Defence Systems
2. Defence Systems2. Defence Systems
2. Defence Systems
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf
 
Flight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawFlight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the Law
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Mis
MisMis
Mis
 
Lecture 8 privacy, security, ergonomics and the environment
Lecture 8   privacy, security, ergonomics and the environment Lecture 8   privacy, security, ergonomics and the environment
Lecture 8 privacy, security, ergonomics and the environment
 

Más de Online

Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3Online
 
Philosophy of early childhood education 1
Philosophy of early childhood education 1Philosophy of early childhood education 1
Philosophy of early childhood education 1Online
 
Philosophy of early childhood education 4
Philosophy of early childhood education 4Philosophy of early childhood education 4
Philosophy of early childhood education 4Online
 
Operation and expression in c++
Operation and expression in c++Operation and expression in c++
Operation and expression in c++Online
 
Functions
FunctionsFunctions
FunctionsOnline
 
Formatted input and output
Formatted input and outputFormatted input and output
Formatted input and outputOnline
 
Control structures selection
Control structures   selectionControl structures   selection
Control structures selectionOnline
 
Control structures repetition
Control structures   repetitionControl structures   repetition
Control structures repetitionOnline
 
Introduction to problem solving in c++
Introduction to problem solving in c++Introduction to problem solving in c++
Introduction to problem solving in c++Online
 
Optical transmission technique
Optical transmission techniqueOptical transmission technique
Optical transmission techniqueOnline
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Online
 
Lan technologies
Lan technologiesLan technologies
Lan technologiesOnline
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technologyOnline
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocolsOnline
 
Internet protocol
Internet protocolInternet protocol
Internet protocolOnline
 
Application protocols
Application protocolsApplication protocols
Application protocolsOnline
 
Addressing
AddressingAddressing
AddressingOnline
 
Transport protocols
Transport protocolsTransport protocols
Transport protocolsOnline
 
Leadership
LeadershipLeadership
LeadershipOnline
 
Introduction to management
Introduction to managementIntroduction to management
Introduction to managementOnline
 

Más de Online (20)

Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3
 
Philosophy of early childhood education 1
Philosophy of early childhood education 1Philosophy of early childhood education 1
Philosophy of early childhood education 1
 
Philosophy of early childhood education 4
Philosophy of early childhood education 4Philosophy of early childhood education 4
Philosophy of early childhood education 4
 
Operation and expression in c++
Operation and expression in c++Operation and expression in c++
Operation and expression in c++
 
Functions
FunctionsFunctions
Functions
 
Formatted input and output
Formatted input and outputFormatted input and output
Formatted input and output
 
Control structures selection
Control structures   selectionControl structures   selection
Control structures selection
 
Control structures repetition
Control structures   repetitionControl structures   repetition
Control structures repetition
 
Introduction to problem solving in c++
Introduction to problem solving in c++Introduction to problem solving in c++
Introduction to problem solving in c++
 
Optical transmission technique
Optical transmission techniqueOptical transmission technique
Optical transmission technique
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technology
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocols
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Application protocols
Application protocolsApplication protocols
Application protocols
 
Addressing
AddressingAddressing
Addressing
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Leadership
LeadershipLeadership
Leadership
 
Introduction to management
Introduction to managementIntroduction to management
Introduction to management
 

Último

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 

Último (20)

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 

Building a cybercrime case

  • 1. © FISE Building A Cybercrime Case
  • 2. Introduction • The growing danger from crimes committed against computers, or against information on computers, is beginning to claim attention in national capitals. In most countries around the world, however, existing laws are likely to be unenforceable against such crimes. This lack of legal protection means that businesses and governments must rely solely on technical measures to protect themselves from those who would steal, deny access to, or destroy valuable information.
  • 3. Types of Cyber Crimes: Data crimes. • Data Interception: Interception of data in transmission. • Data Modification: Alteration, destruction, or erasing of data. • Data Theft: Taking or copying data, regardless of whether it is protected by other laws, e.g., copyright, privacy, etc.
  • 4. Types of Cyber Crimes: Network crimes • Network Interference: Impeding or preventing access for others. The most common example of this action is instigating • a distributed denial of service (DDOS) attack, flooding Web sites or Internet Service Providers. DDOS attacks are often launched from numerous computers that have been hacked to obey commands of the perpetrator. • Network Sabotage: Modification or destruction of a network or system.
  • 5. Types of Cyber Crimes: Related crimes. • Aiding and Abetting: Enabling the commission of a cyber crime. • Computer-Related Forgery: Alteration of data with intent to represent as authentic. • Computer-Related Fraud: Alteration of data with intent to derive economic benefit from its misrepresentation.
  • 6. Bodies Of Law THREE bodies of law : (1) Criminal law, or penal law • Is the body of rules with the potential for severe impositions as punishment for failure to comply. Criminal punishment, depending on the offense and jurisdiction, may include execution, loss of liberty, government supervision (parole or probation), or fines.
  • 7. Bodies Of Law • There are some archetypal (example) crimes, like murder, but the acts that are forbidden are not wholly consistent between different criminal codes, and even within a particular code lines may be blurred as civil infractions may give rise also to criminal consequences. Criminal law typically is enforced by the government, unlike the civil law, which may be enforced by private parties.
  • 8. Bodies Of Law (2) Civil law • As opposed to criminal law, is the branch of law dealing with disputes between individuals and/or organizations, in which compensation may be awarded to the victim. For instance, if a car crash victim claims damages against the driver for loss or injury sustained in an accident, this will be a civil law case.
  • 9. Bodies Of Law (3) Administrative law • Is the body of law that governs the activities of administrative agencies of government. Government agency action can include rulemaking, adjudication, or the enforcement of a specific regulatory agenda. Administrative law is considered a branch of public law.
  • 10. Bodies Of Law • As a body of law, administrative law deals with the decision- making of administrative units of government (e.g., tribunals, boards or commissions) that are part of a national regulatory scheme in such areas as police law, international trade, manufacturing, the environment, taxation, broadcasting, immigration and transport. Administrative law expanded greatly during the twentieth century, as legislative bodies worldwide created more government agencies to regulate the increasingly complex social, economic and political spheres of human interaction.
  • 11. Security Incident: The attempted or successful unauthorized access, use disclosure, modification, or destruction of information or interference with system operations in an information system
  • 12. Examples • Bombings, explosions, fire, flood, storm, power outage, hardware/software failure • Cyber-theft, identity-theft, intellectual property theft, regular theft (involving information), virus, worm, network intrusions, unauthorized use, denial of service, etc } Contingency Plan } Incident response
  • 13.
  • 14.
  • 15.
  • 16. Goals • Provide an effective and efficient means of dealing with the situation • in a manner that reduces the potential impact to the organization. • Provide management with sufficient information in order to decide on • an appropriate course of action. • Maintain or restore business continuity. • Defend against future attacks. • Deter attacks through investigation and prosecution.
  • 17. Incident Handling Steps • Preparation • Identification • Containment • Eradication • Recovery • Lessons learned
  • 18. Incident Handling Steps • Preparation - The organization educates users and IT staff of the importance of updated security measures and trains them to respond to computer and network security incidents quickly and correctly. • Identification - The response team is activated to decide whether a particular event is, in fact, a security incident. The team will tracks Internet security activity and has the most current information on viruses and worms. • Containment - The team determines how far the problem has spread and contains the problem by disconnecting all affected systems and devices to prevent further damage.
  • 19. Incident Handling Steps • Eradication - The team investigates to discover the origin of the incident. The root cause of the problem and all traces of malicious code are removed. • Recovery - Data and software are restored from clean backup files, ensuring that no vulnerabilities remain. Systems are monitored for any sign of weakness or recurrence. • Lessons learned - The team analyzes the incident and how it was handled, making recommendations for better future response and for preventing a recurrence.
  • 20. Why Need Structure Handling • Structure/Organization – Dealing with incidents can be chaotic – Simultaneous incidents occur – Having a predefined methodology lends structure to the chaos • Efficiency – Time is often of the essence when dealing with incidents – Incidents can be costly both financially and organizationally • Process oriented approach – Breaks incidents into small manageable chunks – Logical order of dealing with issues – Includes methods for improving the overall process
  • 21. Why Need Structure Handling • Dealing with the unexpected – Provides a mental framework for dealing with incidents in general – Promotes flexible thinking to deal with novel situations • Legal Considerations – Can demonstrate due care or due diligence – May limit liability – May reduce insurance premiums
  • 22. Evidence Management • During an incident, evidence may be collected during any of the 6 steps. • In early stages we may not know what the final outcome might be (e.g., Job Termination, Civil or Criminal Litigation). • Network/Computer Forensics may become an issue • Must collect data in a “Forensically Friendly” manner • Must maintain the chain of custody • Important to understand the evidence lifecycle
  • 23. Forensics • Computer Forensics: The study of computer technology as it relates to the law. • Forensic Analysis: Examination of material and/or data to determine its essential features and their relationship in an effort to discover evidence in a manner that is admissible in a court of law; post- mortem examination.
  • 24. Forensics • Electronic Evidence: Evidence relating to the issue that consists of computer files, or data, in their electronic state. • Electronic Media Discovery: The discoverability of electronic data or files.
  • 25. Forensics • Chain of Custody: A means of accountability, that shows who obtained the evidence, where and when the evidence was obtained, who secured the evidence, who had control or possession of the evidence. • Rules of Evidence: Evidence must be competent, relevant, and material to the issue.
  • 26. Evidence Life Cycle • Collection & identification • Storage, preservation, and • transportation • Presentation in court • Return to victim or court