Module 6: Computer Crime and Computer Forensics

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/52

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

53 Terms

1
New cards

How BTK taunted the police?

Floppy disk sent to media to continue to taunt police.

2
New cards

BTK linked to…

Lutheran Church in Wichita, Kansas and church council president, Dennis Rader

3
New cards

How was BTK tracked down

Pap smear of daughter, DNA link to crimes

4
New cards

How big of a problem is computer crime?

No one knows for sure • Much of it is unreported

5
New cards

As much malware being written as…

legitimate programs

6
New cards

National Cyber Threat Assessment highlights ______ as key operators in influencing/disrupting Canadian people and institutions

China (political and espionage), Russia (destabilize West/NATO) and Iran (political)

7
New cards

National Cyber Threat Assessment highlights _______ as top threat

ransomware

8
New cards

Social engineering

tactic via psychological manipulation to trick people into revealing sensitive information or actions compromising security.

9
New cards

Voice phishing

use phone calls/ messages to deceive people into revealing sensitive personal or financial information.

10
New cards

AI generated articles used to:

-amplify opposing narratives

-spread via trusted sources (sometimes even official sources) to appear legitimate

-target time sensitive situations where limited time to check sources

11
New cards

Deepfakes - can confuse….

facial/voice recognitions; influence employees/followers

12
New cards

Subject to Scamming USA vs Canada:

70% of USA experienced scam vs 56% of canadians

13
New cards

Rootkits

computer software, typically malicious, designed to enable access to a computer or areas of its software otherwise not allowed

14
New cards

Phishing

attempt to acquire sensitive information (usernames, passwords, and credit card details) by pretending to be a trustworthy entity in an electronic communication

15
New cards

Spyware:

software gathers information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer

16
New cards

Trojan horse

any malicious computer program which misrepresents itself as useful, routine, or interesting to persuade a victim to install it

17
New cards

Spamming

electronic messaging systems to send unsolicited messages (spam), especially advertising, as well as sending messages repeatedly on the same site.

18
New cards

A computer worm is a…

standalone malware computer program that replicates itself in order to spread to other computers

19
New cards

Adware, or advertising-supported software:

automatically displays advertisements to generate revenue for its author. Advertisements may be in user interface of software or on a screen presented during the installation process. Functions may be designed to analyze which Internet sites user visits and to present advertising pertinent to the types of goods or services featured there.

20
New cards

Four broad types of computer crime

Crimes where computers are the target, computer is an instrument of crime, computer is incidental to the crime, Crimes associated to the prevalence of computers

21
New cards

Crimes where computers are the target

Distributed Denial of Service Attack (DDoS; over network capacity limits), network intrusion, alteration of data

22
New cards

Crimes where the computer is an instrument of crime (rather than a pick or crowbar)

Theft, fraud, cyberstalking

23
New cards

Crimes where the computer is incidental to the crime (computer facilitates crime)

Money laundering, child pornography, organized crime

24
New cards

Crimes associated to the prevalence of computers

Piracy, identity theft

25
New cards

Who commits these computer crimes?

Hackers, crackers, phreakers, white hats, gray hats, black hats

26
New cards

Phreaking

hacking into secure telecommunication networks.

27
New cards

Phreaking: Originally exploiting…

phone networks by mimicking dialing tones to trigger the automatic switches

28
New cards

Phreaking: Modern phreaking:

: involves computer-based, digital telecommunication attacks

29
New cards

Why do people do these computer crimes?

– Prestige in hacker community

– To get a job

– As part of their job

– Terrorism

– Profit

30
New cards

Basic concerns of investigators are (4)

Are given websites bogus?, Who owns the domain name of the web site?, Where did a given email come from?, Who sent an email?

31
New cards

Avoiding Detection (4)

Encryption, Blending in, Uncommon Programming languages, dual ransomware attacks

32
New cards

Carson Cleland (2023)

12-year-old boy from Prince George, B.C., died by suicide after falling victim to an online sextortion scheme. His family/police spoke out to raise awareness about the crisis

33
New cards

Daniel Lints (2022):

A 17-year-old in Ontario took his own life after coerced into sending an explicit image to someone on Snapchat.

34
New cards

Amanda Todd (2012)

teenager from Port Coquitlam, B.C., died by suicide after being tormented and blackmailed by an anonymous attacker who had intimate images of her.

35
New cards

Rehtaeh Parsons (2013):

17-year-old from Halifax died by suicide after an intimate photo was circulated without her consent, leading to extensive cyberbullying

36
New cards

What can be done? abt computer crime (5)

Recover hidden, damaged or deleted data – Search slack space: unused space in file allocation block or memory page that hold residual data – Check swap drive (local drive/SSD temporary storage). – Check Steganography (concealed file, message, image, or video within another file, message, image, video) – Check old storage devices – Check email servers

37
New cards

Live data acquisition – can alter…

computer data, but may be required if encryption suspected or if critical data is in RAM only

38
New cards

Pull the plug – might lead to…

data encryption though, but limits contamination/alteration of information

39
New cards

Computer Acquisition: Decisions based on an…

“order of volitility

40
New cards

Order of Volitility

• Type of case

• Type of evidence sought

• Maximize data capture/minimize contamination

41
New cards

Image of computer data: - often remove….

hard drive to avoid interactions with OS; use write blocker to avoid data being transmitted back to computer under investigation - forensic software images HDD (FTK, Forensic Autopsy, EnCase)

42
New cards

Visible Data

All data easily accessed/viewed • Data/work product files: created by software

43
New cards

Latent Data

Data hidden or not directly visible to user • Often requires software to examine data at hexadecimal level (000100001111100)

44
New cards

Latent Data: Slack Space

“empty” space on HDD; less relevant on SSD - “deleted” data not physically erased from HDD until written over

45
New cards

Latent Data: Unallocated space:

as files are saved/deleted fragments of data can be left in the unallocated space

46
New cards

Latent Data: Defragmenting:

tries to consolidate data after lots of file saving/deleting to optimize space on HDD, can leave data fragments

47
New cards

Latent Data: Swap files:

continuous creation of temporary files leaves data fragments

48
New cards

Latent Data: Deleted files:

not really deleted until written over (physically)

49
New cards

Internet Cache

– most browsers (Chrome/Firefox) use cache system, stores part of webpage on HDD, data transfer more efficient.

- can often recreate entire web page visited from these data

- new browsers often delete these files for security, but difficult to completely erase them from HDD

50
New cards

Cookies

- files placed on HDD by webpage to track user preferences

- user name, passwords, habits, # of visits

- can link a user to an activity as evidence

51
New cards

Internet History

- URLs and dates of access

- can include names of files accessed via network too

52
New cards

IP (Internet Protocol) Address

-identifies computer connecting to internet -challenge is to link IP to individual -IP stamps on internet (email) commuciations -Firewalls have log files of IPs, avoid/track hacking attempts

53
New cards

Email/Chat/Instant Messaging

- Email easier to search - Chat and Instant messaging often in RAM and not stored, erased when computer off - Keep computer on in this instance as slack files or space files of RAM often fragmented