Unit10
Unit10
Computer Crime
• Computer crime refers to any crime that involves
a computer and a network.
• The computer may have been used in the
commission of a crime, or it may be the target.
• EG:-downloading illegal music files, to stealing
millions of dollars from online bank accounts,
Cybercrime also includes non-monetary offenses,
such as creating and distributing viruses on other
computers or posting confidential business
information on the Internet.
1
6/5/2022
Stakeholders
• National security
• National institutions
– Customs
– Police
– Civil and criminal courts
– NGOs
– Academia
– Schools
• Businesses
– Corporate crime
– Compliance
– Insurance companies
• International security
• Individuals/personal level
2
6/5/2022
Cyber Crime
• Cybercrime is criminal activity done using computers and the Internet.
• Cyber crime encompasses any criminal act dealing with computers and
networks.
• It also includes traditional crimes conducted through the Internet. For
example; hate crimes, telemarketing and Internet fraud, identity theft,
and credit card account thefts are considered to be cyber crimes when the
illegal activities are committed through the use of a computer and the
Internet.
• It includes anything from downloading illegal music files to stealing
millions of dollars from online bank accounts etc.
• Cybercrime also includes non-monetary offenses, such as creating and
distributing viruses on other computers or posting confidential business
information on the Internet.
3
6/5/2022
4
6/5/2022
Computer security
• Informational assets remain in the appropriate state
of assurance by demonstrating
– Confidentiality
– Integrity
– Availability
– Authenticity
Computer security
• Informational assets remain in the appropriate state of
assurance by demonstrating
– Confidentiality
– Integrity
– Availability
– Authenticity
• Countermeasures for protection
– Preventive
– Mitigating
– Transferring (outsourcing)
– Recovery
10
5
6/5/2022
11
Computer/data/cyber forensics
• The lawful and ethical seizure, acquisition,
analysis, reporting and safeguarding of data
and meta-data derived from digital devices
which may contain information that is notable
and perhaps of evidentiary value to the trier
of fact in managerial, administrative, civil and
criminal investigations (L. Leibrock, 1998)
12
6
6/5/2022
Digital Evidence
• What is evidence?
– Evidence in its broadest sense includes everything that
is used to determine or demonstrate the truth of an
assertion
• What is digital evidence?
– Digital evidence or electronic evidence is any
information stored or transmitted in digital form that a
party to a court case may use at trial.
– Before accepting digital evidence a court will determine
if the evidence is relevant, whether it is authentic, if it is
hearsay and whether a copy is acceptable or the original
is required
13
Types of Evidence
• Intuitive
• Scientific
• Personal
• Legal
14
7
6/5/2022
Forensic elements
• Material
– Physical
– Electronic (digital)
• Relevance
– Stakeholders (victims, private individuals,
government, insurance companies, legal
institutions, law enforcement agencies)
• Validity (close to relevance and the process of
authentication)
15
Investigative procedures
• 3As [Kruse and Heiser]
– Acquiring the evidence
– Authenticating the validity of the extracted or
retrieved data
– Analyzing the data
16
8
6/5/2022
Categories of Evidence
• Impressions (fingerprints, tool marks,
footwear marks)
• Bioforensics (blood, body fluids, hair, nail
scrapings, and blood stain patterns)
• Trace evidence (residue of the things used for
committing the crime like arson accelerant,
paint, glass, fibers).
• Material evidence (letters, folders, scrapped
paper – in a way a hard copy stuff)
17
18
9
6/5/2022
19
Handling evidence
• Includes extraction and establishment of a
chain-of-custody, which also involves
packaging, storage, and transportation
• Who extracted the evidence and how?
• Who packed it?
• Who stored the evidence, how and where?
• Who transported it?
20
10
6/5/2022
Handling evidence
• Case
– Number
– Investigator/institution/organization
– Nature of the case
• Equipment
– For all computers and devices involved – manufacturer, vendor, model,
and serial number
• Evidence
– Location
– Recording entity
– Time and date of recording
All of this sometimes is qualified as a chain-of-evidence.
21
Evidence recovery
• Extraction depends on the nature of the incident and
the type of equipment or system involved (computer,
operating environment, network)
• Rule of thumb – extract and collect as much as you
can (avoid going back – most of the time it is
impossible)
• Compress the evidence with lossless compression
tools
• Some hashing (MD5, CRC, or SHA-1/2/3) should be
done for integrity after storage and transportation
22
11
6/5/2022
Preserving evidence
• No single standard
• Packaging and extra storage measures – digital
evidence may be a disappearing act
• Back-ups
• Document
• Control access
• Validate and/or authenticate data based on
standard procedures
23
Transporting evidence
• One has to protect the chain-ofcustody
• Strong data hiding techniques – encryptions,
passwords, steganography
• Assurance of the preserved content
• Test possible changes and modifications
24
12
6/5/2022
Analysis of evidence
• Fairly long and painstaking process
• Diversified
– From shortcuts to recycle bins and registries
– Every data medium and data type
– All encrypted and archived files
• Hard drive physical analysis
• Hard drive logical analysis
• Depends on the platforms and the tools used
25
Intellectual Property
• Intellectual property (IP) is a controversial
term referring to a number of distinct types of
creations of the mind(intangible property
created by individuals or organization) for
which a set of rights are recognized under the
corresponding fields of law.
26
13
6/5/2022
Intellectual Property
• Intellectual property (IP) is a controversial term
referring to a number of distinct types of creations of
the mind(intangible property created by individuals or
organization) for which a set of rights are recognized
under the corresponding fields of law.
• IP is divided into two categories:
– Industrial property, which includes inventions (patents),
trademarks, industrial designs, etc.
– Copyright, which includes literary and artistic works such
as novels, poems and plays, films, musical works, drawings,
paintings, photographs ,architectural designs, etc
27
28
14
6/5/2022
Copyrights
• the exclusive right of the author or creator of a literary or artistic
property (such as a book, movie, or musical composition) to print,
copy, sell, license, distribute, transform to another medium,
translate, record or perform or otherwise use (or not use) and to
give it to another by will.
• As soon as a work is created and is in a tangible form (such as
writing or taping) the work automatically has federal copyright
protection
• stating the word copyright, or copy or "c" in a circle, with the name
of the creator, and the date of copyright
• Copyright is protection for creators of "original works of
authorship," including musical, dramatic, literary, architectural, and
other works
• author's life + 70 years in U.S.
29
Trademark
• A trademark is a distinctive sign that identifies certain goods or services
produced or provided by an individual or a company.
• The system helps consumers to identify and purchase a product or service
based on whether its specific characteristics and quality – as indicated by
its unique trademark – meet their needs.
• Trademark protection ensures that the owners of marks have the exclusive
right to use them to identify goods or services, or to authorize others to
use them in return for payment.
• The period of protection varies, but a trademark can be renewed and
Trademark protection is legally enforced by courts.
• Trademark protection also hinders the efforts of unfair competitors, such
as counterfeiters, to use similar distinctive signs to market inferior
• or different products or services
• drawings, symbols, color and non-visible signs (sound, smell or taste) etc.
30
15
6/5/2022
Patent
• A patent is an exclusive right granted for an invention
which can be a product or process that provides a new
way of doing something, or that offers a new technical
solution to a problem.
• A patent provides patent owners with protection for
their inventions.
• A patent owner has the right to decide who may – or
may not – use the patented invention for the period
during which it is protected.
• Protection is granted for a limited period, generally 20
years.
• the iPhone (patents held by Apple),
31
Licenses
32
16
6/5/2022
Agreements
• A meeting of minds with the understanding and acceptance of
reciprocal legal rights and duties as to particular actions or
obligations, which the parties intend to exchange; a mutual assent
to do or refrain from doing something; a contract.
• The writing or document that records the meeting of the minds of
the parties. An oral compact between two parties who join
together for a common purpose intending to change their rights
and duties.
• An agreement is not always synonymous with a contract because it
might lack an essential element of a contract, such as consideration.
• any meeting of the minds, even without legal obligation.
• in law, another name for a contract including all the elements of a
legal contract: offer, acceptance, and consideration (payment or
performance), based on specific terms.
33
Plagiarism
34
17
6/5/2022
Cyber Law
• IT Law is a set of legal enactments, which governs the digital
dissemination of both (digitalized) information and software itself. IT Law
covers mainly the digital information (including information security and
electronic commerce) aspects and it has been described as "paper laws"
for a "paperless environment“.
• Cyberlaw or Internet law is a term that encapsulates the legal issues
related to use of the Internet. It is less a distinct field of law than
intellectual property or contract law, as it is a domain covering many areas
of law and regulation.
• Cyber law is a term used to describe the legal issues related to use of
communications technology, particularly "cyberspace", (Internet).
• It is less a distinct field of law in the way that property or contract are, as it
is an intersection of many legal fields, including intellectual property,
privacy, freedom of expression, and jurisdiction. In essence, cyber law is
an attempt to apply laws designed for the physical world to human activity
on the Internet.
35
36
18
6/5/2022
Introduction to E-government
• The employment of the Internet and the world-wide-web for
delivering government information and services to the citizens.
• The utilization of IT, ICTs, and other web-based telecommunication
technologies to improve and/or enhance on the efficiency and
effectiveness of service delivery in the public sector.
• E-government describes the use of technologies to facilitate the
operation of government and the disbursement of government
information and services.
• E-government, short for electronic government, deals heavily with
Internet and non-internet applications to aid in governments.
• E-government includes the use of electronics in government as
large-scale as the use of telephones and fax machines, as well as
surveillance systems, tracking systems such as RFID tags, and even
the use of television and radios to provide government-related
information and services to the citizens.
37
Introduction to E-government
• E-Government (short for electronic government, also
known as e-gov, digital government, online government, or
connected government) is digital interactions between a
government and citizens (G2C), government and
businesses/Commerce (G2B), government and employees
(G2E), and also between government and governments
/agencies (G2G).
• The e-Government delivery models are
– G2C (Government to Citizens)
– G2B (Government to Businesses)
– G2E (Government to Employees)
– G2G (Government to Governments)
– C2G (Citizens to Governments)
38
19