Cyber Forensic Analytics - Notes
Unit 1: Cyber Crime
Unit I: Cyber Crime
Cyber Space:
A virtual environment that consists of interconnected digital networks. It enables communication, commerce,
and social interaction through the internet.
Cyber Crime:
Crimes committed using computers or the internet, including hacking, identity theft, and online fraud. Types
include financial crimes, cyberbullying, cyberstalking, and more.
Criminal Behaviour:
Understanding the psychology behind cybercriminals. Motivation may include financial gain, revenge, or
political ideology.
Jurisdictional Concerns:
Cybercrimes often cross national boundaries, creating legal challenges for prosecution and investigation.
Jurisprudential Inconsistency:
Different countries have varying laws on cybercrime, making international cooperation difficult.
eCash Security:
Deals with the secure handling of digital money, ensuring encryption and preventing double spending.
Page 1
Cyber Forensic Analytics - Notes
Prepaid Cards & Stored Value Cards:
Can be exploited for anonymous transactions and money laundering.
Mobile Payments & Internet Services:
Vulnerable to fraud and require strong authentication mechanisms.
Cyber Stalking, Extortion, Terrorism, Warfare:
Use of internet to harass, threaten, cause terror, or damage to national security.
Cyber Weapons, ATM Frauds, Phreaking, Gambling:
Various digital tools used for criminal activities.
Cyber Weapons, ATM Frauds, Phreaking, Gambling:
Various digital tools used for criminal activities.
Cyber Weapons, ATM Frauds, Phreaking, Gambling:
Various digital tools used for criminal activities.
Page 2
Cyber Forensic Analytics - Notes
Unit 2: Cyber Forensics
Unit II: Cyber Forensics
Digital Device Analysis:
Examination of computers, phones, and other electronics to find evidence.
Hard Disk & Disk Imaging:
Copying the exact content of a disk for investigation purposes.
Data Carving:
Recovering deleted files or data from unallocated disk space.
Anti-Piracy, Soft Lifting:
Protection against unauthorized software copying.
Steganography:
Concealing messages within images or files.
Network Analysis:
Examining network traffic to detect malicious activity using tools like Wireshark.
Port Scans, pcap Analysis:
Used to monitor data packets and identify vulnerabilities.
Page 3
Cyber Forensic Analytics - Notes
Malware Analysis:
Studying viruses, worms, trojans, botnets, DoS, DDoS, and honeypots.
Malware Analysis:
Studying viruses, worms, trojans, botnets, DoS, DDoS, and honeypots.
Malware Analysis:
Studying viruses, worms, trojans, botnets, DoS, DDoS, and honeypots.
Page 4
Cyber Forensic Analytics - Notes
Unit 3: Cyber Investigation
Unit III: Cyber Investigation
Investigation Techniques:
Methods used to trace and gather cybercrime evidence.
Audit Logs:
Used to track user activity and identify unauthorized access.
Web Attacks:
Investigation of XSS, SQL injection, and other attack vectors.
Computer Intrusions:
Illegal access to systems and ways to trace it.
Criminal Profiling:
Building profiles based on digital behavior.
Stylometric Techniques:
Using writing style analysis to identify cybercriminals.
Warranted/Warrantless Searches:
Legal considerations during digital investigations.
Page 5
Cyber Forensic Analytics - Notes
Undercover Techniques:
Spying on suspect activity while maintaining anonymity.
Undercover Techniques:
Spying on suspect activity while maintaining anonymity.
Undercover Techniques:
Spying on suspect activity while maintaining anonymity.
Page 6
Cyber Forensic Analytics - Notes
Unit 4: Evidence Management
Unit IV: Evidence Management
Types of Evidence:
Digital, physical, real, and circumstantial evidence.
Digital Evidence Collection:
Ensuring data is collected without alteration.
Evidence Analysis:
Interpreting collected data to reconstruct the crime.
Contextual Information:
Understanding the situation and relevance of data.
On-Scene Activities:
Collecting evidence from the crime scene.
Report Preparation:
Documenting findings clearly for legal presentation.
Report Preparation:
Documenting findings clearly for legal presentation.
Page 7
Cyber Forensic Analytics - Notes
Report Preparation:
Documenting findings clearly for legal presentation.
Page 8