0% found this document useful (0 votes)
17 views8 pages

Cyber Forensic Analytics Notes Expanded

The document provides an overview of Cyber Forensic Analytics, covering topics such as cyber crime, cyber forensics, cyber investigation, and evidence management. It discusses various forms of cyber crime, the psychology of cybercriminals, and the challenges of jurisdiction and legal inconsistencies. Additionally, it outlines techniques for digital evidence collection, analysis, and the importance of proper documentation in legal contexts.

Uploaded by

Abhishek Yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views8 pages

Cyber Forensic Analytics Notes Expanded

The document provides an overview of Cyber Forensic Analytics, covering topics such as cyber crime, cyber forensics, cyber investigation, and evidence management. It discusses various forms of cyber crime, the psychology of cybercriminals, and the challenges of jurisdiction and legal inconsistencies. Additionally, it outlines techniques for digital evidence collection, analysis, and the importance of proper documentation in legal contexts.

Uploaded by

Abhishek Yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Cyber Forensic Analytics - Notes

Unit 1: Cyber Crime

Unit I: Cyber Crime

Cyber Space:

A virtual environment that consists of interconnected digital networks. It enables communication, commerce,

and social interaction through the internet.

Cyber Crime:

Crimes committed using computers or the internet, including hacking, identity theft, and online fraud. Types

include financial crimes, cyberbullying, cyberstalking, and more.

Criminal Behaviour:

Understanding the psychology behind cybercriminals. Motivation may include financial gain, revenge, or

political ideology.

Jurisdictional Concerns:

Cybercrimes often cross national boundaries, creating legal challenges for prosecution and investigation.

Jurisprudential Inconsistency:

Different countries have varying laws on cybercrime, making international cooperation difficult.

eCash Security:

Deals with the secure handling of digital money, ensuring encryption and preventing double spending.

Page 1
Cyber Forensic Analytics - Notes

Prepaid Cards & Stored Value Cards:

Can be exploited for anonymous transactions and money laundering.

Mobile Payments & Internet Services:

Vulnerable to fraud and require strong authentication mechanisms.

Cyber Stalking, Extortion, Terrorism, Warfare:

Use of internet to harass, threaten, cause terror, or damage to national security.

Cyber Weapons, ATM Frauds, Phreaking, Gambling:

Various digital tools used for criminal activities.

Cyber Weapons, ATM Frauds, Phreaking, Gambling:

Various digital tools used for criminal activities.

Cyber Weapons, ATM Frauds, Phreaking, Gambling:

Various digital tools used for criminal activities.

Page 2
Cyber Forensic Analytics - Notes

Unit 2: Cyber Forensics

Unit II: Cyber Forensics

Digital Device Analysis:

Examination of computers, phones, and other electronics to find evidence.

Hard Disk & Disk Imaging:

Copying the exact content of a disk for investigation purposes.

Data Carving:

Recovering deleted files or data from unallocated disk space.

Anti-Piracy, Soft Lifting:

Protection against unauthorized software copying.

Steganography:

Concealing messages within images or files.

Network Analysis:

Examining network traffic to detect malicious activity using tools like Wireshark.

Port Scans, pcap Analysis:

Used to monitor data packets and identify vulnerabilities.

Page 3
Cyber Forensic Analytics - Notes

Malware Analysis:

Studying viruses, worms, trojans, botnets, DoS, DDoS, and honeypots.

Malware Analysis:

Studying viruses, worms, trojans, botnets, DoS, DDoS, and honeypots.

Malware Analysis:

Studying viruses, worms, trojans, botnets, DoS, DDoS, and honeypots.

Page 4
Cyber Forensic Analytics - Notes

Unit 3: Cyber Investigation

Unit III: Cyber Investigation

Investigation Techniques:

Methods used to trace and gather cybercrime evidence.

Audit Logs:

Used to track user activity and identify unauthorized access.

Web Attacks:

Investigation of XSS, SQL injection, and other attack vectors.

Computer Intrusions:

Illegal access to systems and ways to trace it.

Criminal Profiling:

Building profiles based on digital behavior.

Stylometric Techniques:

Using writing style analysis to identify cybercriminals.

Warranted/Warrantless Searches:

Legal considerations during digital investigations.

Page 5
Cyber Forensic Analytics - Notes

Undercover Techniques:

Spying on suspect activity while maintaining anonymity.

Undercover Techniques:

Spying on suspect activity while maintaining anonymity.

Undercover Techniques:

Spying on suspect activity while maintaining anonymity.

Page 6
Cyber Forensic Analytics - Notes

Unit 4: Evidence Management

Unit IV: Evidence Management

Types of Evidence:

Digital, physical, real, and circumstantial evidence.

Digital Evidence Collection:

Ensuring data is collected without alteration.

Evidence Analysis:

Interpreting collected data to reconstruct the crime.

Contextual Information:

Understanding the situation and relevance of data.

On-Scene Activities:

Collecting evidence from the crime scene.

Report Preparation:

Documenting findings clearly for legal presentation.

Report Preparation:

Documenting findings clearly for legal presentation.

Page 7
Cyber Forensic Analytics - Notes

Report Preparation:

Documenting findings clearly for legal presentation.

Page 8

You might also like