Site Loader
Rock Street, San Francisco

Introduction

Computer
forensics is very young discipline of study. I would like to start my computer
forensics report from meaning in digital world what is this computer forensic
science and how I understand it after read information. Computer forensics
starts from time when personal computers became more available for ordinary
people as many sources saying it’s around 1980’s that’s the year when PC became
more accessible to consumers. And that’s the edge when was “developed” new
types of  “computer crimes” first one was
mentioned from different sources was “cracking”. Software Cracking – is the modification of software to remove or
disable features which are considered undesirable by the person cracking the
software, especially copy protection features, example: when u cracking
antiviruses and you can use this software on many numbers of computer with a
same ID.  Computer forensics – is a branch of digital forensic science
pertaining to evidence found in computers and digital storage media. Main aim
of this study/science is to preserving, recovering, analyzing and presenting
facts and opinions about the digital information. Why it’s important, because
it’s touching every field of our modern world, almost everything nowadays is
digitalized and computerized. Problem of digitalization or any other aspect of
humanity if human can use it for some good aspects anyway he will find also how
to use it against other humans for there own benefits examples: steeling
information, steeling money, intrusion, shadowing and a lot of many other
aspects. Here is example of just one aspect viruses witch one is damaging every
day a lot of PC and other devices not only PC are subject of viruses

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

So on this graph
we can see tendency of how  malware
attacks increasing every year, so that’s a reason why we need regulations, for
me computer forensics first of all seems like regulation and rules for
controlling humans and there habits because without that people bad influence
of our modern world will increase much more faster. But not only malware is a
field of study and regulations it also discipline involves data recovery.

 

 

Methods

Hardware and software

First of all
inside methods part I would like to start from Computer Forensic Laboratory
witch one is attaching also Hardware and Software privacy. Computer Forensic
Laboratory should be stable and available in any time, have a good internet
connection(Gigabit Network) that’s needed for analyzing a huge amount of
information, holding it and processing with it. Symmetrical power that’s means
stability because you can face with issues like jumps of intention here is the
picture how it looks like:

DVD printers and
many other tools. Laboratory should be powerful not only in hardware and
software aspect, but also it should be room with locked door. Only few workers
of laboratory should have access to this room in order to limit and to control
access to this place. Here is more detailed example of what kind of hardware
and software it should have:

–         
Forensic
Examiners need to have a workstation with RAM

–         
DDR3
ECC 12GB, two 20″ monitors, USB mouse, two 256GB

–         
SSD,
two 3TB HD, webcam, headset, ?ash memory readers,

–         
Windows
8 Pro, Microsoft Office, Firewall, antivirus, external

–         
HD
connection, blu-ray recorder, and four 3TB SATA II HD.

With this workstation, forensic examiners can
make their examination and issue the forensic report.

Computer Forensic Laboratory: Aims, Functionalities, Hardware and Software
(PDF Download Available). Available from: https://www.researchgate.net/publication/268458795_Computer_Forensic_Laboratory_Aims_Functionalities_Hardware_and_Software accessed Dec 19 2017.

 

Internet applications and data security

This part mostly
I was researching how to create/design secure web application for better data
security, because in my opinion when you understand basics on how create it you
will understand better how it works, so first of all web application it’s a complex
set of security issues for architects, designers and developers. Best secured
application witch one was created with a idea that they should be secured
that’s basic and simple idea should be in your mind from beginning. Designers
and developers will faced with a lot of problems/challenges. You should check a
lot of aspects as example architecture of your system, witch protocols involved
in your program.

Some
of the top issues that must be addressed with secure design practices are shown
on a next picture :

Also you should
include Security Policies and Procedures that’s means what your allowing to
user or some one who have access to any system/program should follow what are
permitted to do. They are defining what are they not allowed to do. As an
example identify and use within the framework defined by corporate security
policy while you create your application to be sure you don’t breach policy
that might prevent the application being deployed. But here is still existing
problem that’s doesn’t matter how is good your system people can break anything
that’s the basic rule. That’s why you creating program/application you should
give it as many people as you can because they will break it some how. That’s
one of the most important aspects of designing/creating any system.

 

How to find the
victim or culprit who does crime in computers

Before start to explaining
how to find who did a cybercrime, need to understand witch basic types of it is
existing:

–         
Phishing – The aim is to trick people into handing over their card details or
access to protected systems. Emails are sent out that contain either links or
attachments that either take you a website that looks like your bank’s, or
installs malware on your system.

 

–         
Identity theft – According to fraud protection agency Cifas, the
number of victims rose by 31per cent to 32,058 in the first three moths of
2015. Criminals use online ‘fraud forums’ to buy and sell credit cards, email
addresses and passports.

 

–         
Hacking – In a Verizon study of security breaches there were 285
million data exposures, which works out to about 9 records exposed every
second.26% of these attacks were executed internally within organizations.

 

–         
Online harassment – Over half of adolescents and teens have been bullied
online, while 73% of adult users have seen someone harassed in some way online
and 40% have experienced it.

 

So main
question, how do cybercriminals get caught? Actually it’s a huge process, it
takes a lot of hours in research and cyber forensic analysis, inside witch one
is included identifying, analyzing, preserving, and presenting data as a form
of evidence. For different type of crimes is used different methods how to
catch or find cybercrime, who did it where, when and why. For this analysis you
need skills/ability to decrypt encrypted files, recover deleted information or
logs, cracking passwords. For those special tasks also needed a lot of
training, need groups of talented people witch one will be possible to train,
so it’s a huge amount of money for government to invest for this tasks, but in
our digitalized world without this kind of specialist is not possible to
survive for government. So basically it’s requires a lot of resources a lot of
time to find some one who did cybercrime. And in our days still a lot of people
witch one don’t understand that if with them happened something in network they
need to report to police about this, that’s one of the biggest problems, that’s
a lot of cybercrimes are not reported.

 

Forensics is requirement in intrusion Detection system

Intrusion
detection system or shortly IDS is a tool witch one can be software application
or device witch one is checking some systems or internet for dangerous malicious
activities. Need fore use Intrusion Detection System is growing every year,
because every year everything becomes more technological, as example: smart
houses, smart cars, virtual reality etc. Every year amount of technical devices
in every houses are increasing. And that’s the reason why we need IDS every year,
every month more and more. These systems can help a lot, it is very important
to safeguard the huge distributed computing environment that specific organization
controls and manages. It’s existing different types of IDS for different needs
here is the types of them:

1.     
Signature based detection – monitors packets in the network and match with
patterns witch one was configured and determined before.

2.     
Statistical anomaly based detection – this
IDS which one is based on monitoring anomaly  network traffic and compare it against an
established baseline. The baseline will check what is “acceptable” for that
network – what sort of bandwidth is generally used and what protocols are used.

3.     
Stateful protocol analysis detection –

Post Author: admin

x

Hi!
I'm Velma!

Would you like to get a custom essay? How about receiving a customized one?

Check it out