SlideShare una empresa de Scribd logo
1 de 19
Field of digital forensics: legislative & academic
       perspectives in the UAE and generally in GCC
       Cyber forensics   Slide#13

       Cloud Forensics Slide#32

       Virtualization and Forensics Slide#64

       Adobe Photoshop/Content Forensics Slide#139

       Social Media Forensics             Slide#143

       Mobile Phone Forensics Slide#181
       Digital forensics lab: Crime Scene Investigation CSI &
       policies, procedures and processes Slide#189-229
12/5/2011                           asif@babariqbal.com         2
12/5/2011   asif@babariqbal.com   3
• Dubai Police statistics reveal a 17 % increase in crimes
  involving internet bullying and verbal abuse.

• The Police statistics showed that in 2009 there were 62
  reported crimes involving internet bullying and verbal abuse.

• The number increased to 73 cases in the year 2010
    Usually these cases involve social Networks such as
     Facebook & Twitter



12/5/2011                  asif@babariqbal.com                4
• Russian computer security company Kaspersky said 56 % of
  cyber attacks within the region are directed at the UAE

• The UAE ranks 36th in the world for being a source of
  malicious internet activity

• Within the EMEA (Europe, Middle East and Africa), the UAE
  ranks No 18 for being a source of malicious activity.



12/5/2011                 asif@babariqbal.com                 5
• The Interpol, lists financial fraud among the top cyber-crimes
  in the Gulf region.

• People in the Gulf have lost an estimated Dh735 million to
  cyber criminals in 2007 alone .




12/5/2011                 asif@babariqbal.com                  6
• Cases
• Dh121,000 was swiped from the account of Pravin Bakliwal,
  a 51-year-old Indian resident of Dubai in a phone recharge
  scam.
• Another Dh7,500 was charged to his credit card for a total of
  135 phone recharges.
• The amount was taken incrementally at Dh500and Dh1,000
  per transaction.
• Mr. Bakliwal said he never used the direct debit service and
  recharged his mobile through a pay-as-you-go scheme.
• He took an extended leave to dispute the transactions but
  his employer fired him.

12/5/2011                 asif@babariqbal.com                 7
• Cases:
• Mahmoud Mohammad, of Abu Dhabi, found that
  Dh27,500 had disappeared from his account in a phone
  recharge scam.
• None of the 40 numbers that appeared on his bank
  statement worked when he called them.
• The Indian PR officer faces Dh1,200 in bank fees and
  has filed a case with the Abu Dhabi Judicial
  Department.
• He lodged a formally complaint with his bank to dispute
  the transactions, but the banks’ customer care staff told
  him the bank was not obligated to give a refund.

12/5/2011               asif@babariqbal.com               8
• The Digital Security programs in the UAE
  universities are very limited.

• Most of the universities provide 1 to 2
  courses, which are introductory to the field of
  Digital Security.


12/5/2011           asif@babariqbal.com             9
Percentage of educational Security Programs provided in
                               UAE Universities

                               10%
                                                          Dedicated Security
                                                          Programs


                       90%                                Does not provide a
                                                          dedicated security
                                                          program




12/5/2011                        asif@babariqbal.com                      10
• The Forensics Field in the UAE Education is in it is
  beginning.

• The number of Universities providing courses
  concentrated on Digital Forensics is very limited.

• Most of the Universities in the UAE provide
  courses for Digital Forensics in their Master
  programs.

12/5/2011             asif@babariqbal.com              11
Percentage of Digital Forensics concentrated Programs
                        provided in UAE Universities


                          6%
                                                      Provide a Digital Forensics
                                                      concentrated programs

                                                      Does Not Provide a Digital
                    94%                               Forencsics concentrated
                                                      programs




12/5/2011                       asif@babariqbal.com                            12
12/5/2011   asif@babariqbal.com   13
A few of the selected among others are:

•   Forensics Timeline Visualizer
•   Forensics Data-miner
•   E-mail Extracter
•   Anti-Forensics Tools/Wipers

            Team with Software Architect: Babar Iqbal

12/5/2011                 asif@babariqbal.com       224
12/5/2011   asif@babariqbal.com   225
12/5/2011   asif@babariqbal.com   226
12/5/2011   asif@babariqbal.com   227
12/5/2011   asif@babariqbal.com   228
E Crime Session The Field Of Digital Forensics In The Middle By Asif Iqbal

Más contenido relacionado

Destacado (10)

Academic Document[1]
Academic Document[1]Academic Document[1]
Academic Document[1]
 
Great Buddy
Great BuddyGreat Buddy
Great Buddy
 
Trucos de skate
Trucos de skateTrucos de skate
Trucos de skate
 
Mobile only b2b июнь
Mobile only b2b июньMobile only b2b июнь
Mobile only b2b июнь
 
unit :7 my favourites
unit :7 my favouritesunit :7 my favourites
unit :7 my favourites
 
WE VoIP под Android и iOS
WE VoIP под Android и iOSWE VoIP под Android и iOS
WE VoIP под Android и iOS
 
Resume
ResumeResume
Resume
 
Корпоративные Voip сети в системах Samsung OfficeServ
Корпоративные Voip сети в системах Samsung OfficeServКорпоративные Voip сети в системах Samsung OfficeServ
Корпоративные Voip сети в системах Samsung OfficeServ
 
REGENERATIVE BRAKING IN AN ELECTRIC VEHICLE
REGENERATIVE BRAKING IN AN ELECTRIC VEHICLEREGENERATIVE BRAKING IN AN ELECTRIC VEHICLE
REGENERATIVE BRAKING IN AN ELECTRIC VEHICLE
 
Analysis for Size of Ultra-Capacitor Bank to be Installed on 1.5kV System for...
Analysis for Size of Ultra-Capacitor Bank to be Installed on 1.5kV System for...Analysis for Size of Ultra-Capacitor Bank to be Installed on 1.5kV System for...
Analysis for Size of Ultra-Capacitor Bank to be Installed on 1.5kV System for...
 

Similar a E Crime Session The Field Of Digital Forensics In The Middle By Asif Iqbal

Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South AfricaJacqueline Fick
 
Training Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdfTraining Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdfdotco
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
 
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...IFG Network marcus evans
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategyBright Boateng
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy clubGet up to Speed
 
Countering Cross-Channel Fraud Threats
Countering Cross-Channel Fraud ThreatsCountering Cross-Channel Fraud Threats
Countering Cross-Channel Fraud ThreatsVivastream
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...James Fisher
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9ITpreneurs
 
Computer Hacking Forensic Investigator v9 | EC-Council
Computer Hacking Forensic Investigator v9 | EC-Council Computer Hacking Forensic Investigator v9 | EC-Council
Computer Hacking Forensic Investigator v9 | EC-Council EC-Council
 
Secrets to an Effective Online Safety Curriculum
Secrets to an Effective Online Safety CurriculumSecrets to an Effective Online Safety Curriculum
Secrets to an Effective Online Safety CurriculumLearning.com
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?PECB
 
Balancing Fraud & Customer Experience in a Mobile World
Balancing Fraud & Customer Experience in a Mobile WorldBalancing Fraud & Customer Experience in a Mobile World
Balancing Fraud & Customer Experience in a Mobile WorldComrade
 
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitolTechU
 
Protecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial SystemProtecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial SystemAjay Shibu
 

Similar a E Crime Session The Field Of Digital Forensics In The Middle By Asif Iqbal (20)

Cyber crime 101
Cyber crime 101Cyber crime 101
Cyber crime 101
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
 
Training Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdfTraining Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdf
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
 
DeepNines CIPA Whitepaper
DeepNines CIPA WhitepaperDeepNines CIPA Whitepaper
DeepNines CIPA Whitepaper
 
Information Security in Schools - Recommended Practice (January 2019)
Information Security in Schools - Recommended Practice (January 2019)Information Security in Schools - Recommended Practice (January 2019)
Information Security in Schools - Recommended Practice (January 2019)
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategy
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy club
 
Countering Cross-Channel Fraud Threats
Countering Cross-Channel Fraud ThreatsCountering Cross-Channel Fraud Threats
Countering Cross-Channel Fraud Threats
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9
 
Computer Hacking Forensic Investigator v9 | EC-Council
Computer Hacking Forensic Investigator v9 | EC-Council Computer Hacking Forensic Investigator v9 | EC-Council
Computer Hacking Forensic Investigator v9 | EC-Council
 
Secrets to an Effective Online Safety Curriculum
Secrets to an Effective Online Safety CurriculumSecrets to an Effective Online Safety Curriculum
Secrets to an Effective Online Safety Curriculum
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
 
Balancing Fraud & Customer Experience in a Mobile World
Balancing Fraud & Customer Experience in a Mobile WorldBalancing Fraud & Customer Experience in a Mobile World
Balancing Fraud & Customer Experience in a Mobile World
 
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
 
Protecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial SystemProtecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial System
 

Último

Features of a Call Recorder Spy App for Android.pdf
Features of a Call Recorder Spy App for Android.pdfFeatures of a Call Recorder Spy App for Android.pdf
Features of a Call Recorder Spy App for Android.pdfOne Monitar
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
Neha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and CareerNeha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and Careerr98588472
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Customizable Contents Restoration Training
Customizable Contents Restoration TrainingCustomizable Contents Restoration Training
Customizable Contents Restoration TrainingCalvinarnold843
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSendBig4
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressorselgieurope
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAScathy664059
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Jiastral oracle
 

Último (20)

Features of a Call Recorder Spy App for Android.pdf
Features of a Call Recorder Spy App for Android.pdfFeatures of a Call Recorder Spy App for Android.pdf
Features of a Call Recorder Spy App for Android.pdf
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
Neha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and CareerNeha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and Career
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
Customizable Contents Restoration Training
Customizable Contents Restoration TrainingCustomizable Contents Restoration Training
Customizable Contents Restoration Training
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.com
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressors
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAS
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
 

E Crime Session The Field Of Digital Forensics In The Middle By Asif Iqbal

  • 1.
  • 2. Field of digital forensics: legislative & academic perspectives in the UAE and generally in GCC Cyber forensics Slide#13 Cloud Forensics Slide#32 Virtualization and Forensics Slide#64 Adobe Photoshop/Content Forensics Slide#139 Social Media Forensics Slide#143 Mobile Phone Forensics Slide#181 Digital forensics lab: Crime Scene Investigation CSI & policies, procedures and processes Slide#189-229 12/5/2011 asif@babariqbal.com 2
  • 3. 12/5/2011 asif@babariqbal.com 3
  • 4. • Dubai Police statistics reveal a 17 % increase in crimes involving internet bullying and verbal abuse. • The Police statistics showed that in 2009 there were 62 reported crimes involving internet bullying and verbal abuse. • The number increased to 73 cases in the year 2010  Usually these cases involve social Networks such as Facebook & Twitter 12/5/2011 asif@babariqbal.com 4
  • 5. • Russian computer security company Kaspersky said 56 % of cyber attacks within the region are directed at the UAE • The UAE ranks 36th in the world for being a source of malicious internet activity • Within the EMEA (Europe, Middle East and Africa), the UAE ranks No 18 for being a source of malicious activity. 12/5/2011 asif@babariqbal.com 5
  • 6. • The Interpol, lists financial fraud among the top cyber-crimes in the Gulf region. • People in the Gulf have lost an estimated Dh735 million to cyber criminals in 2007 alone . 12/5/2011 asif@babariqbal.com 6
  • 7. • Cases • Dh121,000 was swiped from the account of Pravin Bakliwal, a 51-year-old Indian resident of Dubai in a phone recharge scam. • Another Dh7,500 was charged to his credit card for a total of 135 phone recharges. • The amount was taken incrementally at Dh500and Dh1,000 per transaction. • Mr. Bakliwal said he never used the direct debit service and recharged his mobile through a pay-as-you-go scheme. • He took an extended leave to dispute the transactions but his employer fired him. 12/5/2011 asif@babariqbal.com 7
  • 8. • Cases: • Mahmoud Mohammad, of Abu Dhabi, found that Dh27,500 had disappeared from his account in a phone recharge scam. • None of the 40 numbers that appeared on his bank statement worked when he called them. • The Indian PR officer faces Dh1,200 in bank fees and has filed a case with the Abu Dhabi Judicial Department. • He lodged a formally complaint with his bank to dispute the transactions, but the banks’ customer care staff told him the bank was not obligated to give a refund. 12/5/2011 asif@babariqbal.com 8
  • 9. • The Digital Security programs in the UAE universities are very limited. • Most of the universities provide 1 to 2 courses, which are introductory to the field of Digital Security. 12/5/2011 asif@babariqbal.com 9
  • 10. Percentage of educational Security Programs provided in UAE Universities 10% Dedicated Security Programs 90% Does not provide a dedicated security program 12/5/2011 asif@babariqbal.com 10
  • 11. • The Forensics Field in the UAE Education is in it is beginning. • The number of Universities providing courses concentrated on Digital Forensics is very limited. • Most of the Universities in the UAE provide courses for Digital Forensics in their Master programs. 12/5/2011 asif@babariqbal.com 11
  • 12. Percentage of Digital Forensics concentrated Programs provided in UAE Universities 6% Provide a Digital Forensics concentrated programs Does Not Provide a Digital 94% Forencsics concentrated programs 12/5/2011 asif@babariqbal.com 12
  • 13. 12/5/2011 asif@babariqbal.com 13
  • 14. A few of the selected among others are: • Forensics Timeline Visualizer • Forensics Data-miner • E-mail Extracter • Anti-Forensics Tools/Wipers Team with Software Architect: Babar Iqbal 12/5/2011 asif@babariqbal.com 224
  • 15. 12/5/2011 asif@babariqbal.com 225
  • 16. 12/5/2011 asif@babariqbal.com 226
  • 17. 12/5/2011 asif@babariqbal.com 227
  • 18. 12/5/2011 asif@babariqbal.com 228