100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Intro to Cybercrime (Crim 218- Special Topics) CA$8.17
Add to cart

Class notes

Intro to Cybercrime (Crim 218- Special Topics)

 26 views  0 purchase

Lecture notes of 32 pages for the course Crim 218 at SFU (Notes)

Preview 4 out of 32  pages

  • January 9, 2021
  • 32
  • 2019/2020
  • Class notes
  • N/a
  • All classes
All documents for this subject (1)
avatar-seller
jasbhela1
Crim 218 Lecture Summaries

Jan 7th

Computer security is how to protect info, how to prevent wrong things from happening, how to
recover lost info

Digital forensics focused on events happen, how to detect what happens, evidence and provide a
and explanation to how you got from before the event to after the event

Digital forensic analyst
- Prepare evidence for criminal proceedings
- Those working with law enforcement focus on cybercrime

Cybercrime
- Any illegal activity that is computer based networks/devices
 phishing, identity theft, extortion (malware is software that you don’t want, (ransomware),
and encrypts data on a computer, or prevent user from accessing machine at all  has to pay
money in order to gain access).

1-Computer based crime
- Criminal activity based purely on use of computers (ransomware, spam)
2-Computer facilitated crime
- Crime conducted in the ‘real world’ but facilitated by use of computers (can happen
without computers, but makes it easier through computer equipment)

Addressing cybercrime- digital forensic analysts
Major component  following appropriate standard of practice, investigation techniques

Many think that evidence is found and analyzed very quickly, but this is not the case.
- if you know the address form which a communication comes from, they need to find the
service provider, and then identify the IP address relevant. May not be a precise location
- most video evidence is grainy and loses definition when magnified

Computer-based evidence
Digital forensics aims to detect the presence of residual data
 Computer based evidence is info/data of investigation value that is stored/transmitted by a
computer
- you need to have suitable software and equipment to make evidence available
- computer evidence is fragile and can be altered, damage, or destroyed
 special precautions need to be taken to document, collect and preserve the evidence (if
done wrong, it could be inadmissible in court)

ACPO Guidelines
1) no one should change data on computer
2) if necessary to access original data, must be able to explain the relevance of evidence

, 3) audit trial/records of all processes applied to evidence should be created and preserved, so
3rd party can achieve same results
4) person in charge of investigation has overall responsibility that the guidelines are met
xxxzz

Secure and detect evidence
1) securing evidence (first action that is taken, is to make a copy of the data known as
imagined). MD5/SHA-1 hash is created to validate the data. All other searches/work
are done on the copy, never from the original
2) evidence is detected (using software tools, searches may focus on particular info)


Obstacles in digital forensics
1- quality of data
2- passwords
3- hidden data
4- data quantity (deleted data)

Jan 14th

Internet Protocol (IP) suite- supports a wide range of applications (internet, world wide web,
social networking)
 each application has its own protocol ‘on top’ of the transport and network layers

All these applications have similar software operations to support it, and they all rely on TCP/IP.
(Transport Control Protocol) and (Internet Protocol). Is responsible to make sure all the packages
get there, in the right order. These are the standard, set of communication commands. This is the
software level
 these info services use their own set of commands HTTP

HTTP means HyperText Transfer Protocol. HTTP is the underlying protocol used by the World
Wide Web and this protocol defines how messages are formatted and transmitted, and what
actions Web servers and browsers should take in response to various commands.

Internet Standards
Most standards on the internet are peer reviewed, so no single organization has ownership of
such standards.
- Internet standard docs are published as RFCs (referred for comments)

Client-server paradigm
Internet applications are designed to exchange info between local and remote (server) machines
(local machine sends request to remote machine). This is achieved by sending a request from a
suitable local software program to a corresponding remote software program.
The client- local system
The server- remote machine

,There are many different types of client services and client programs are normally specific (a
mail client would use Outlook Express).

Server
- Usually handle multiple requests over the network
- Are not intended for direct operation
- Run on more powerful machines
- Often many clients interact with each server
There is 1 server with many clients


Separate applications provide different info services, with 2 classes. User and Network
User services provide local users with access to remote info
Network services provide local applications with access to remote info

The DNS (Domain Name Service) and NTP (Network Time Protocol)

Routing Information Protocol (RIP)
It’s an example network info service that enables the exchange of info between programs across
a network. It’s used to create and maintain network route info among compliant routers.
 This removes the need for manual updates each time a routing change is required

When a router learns about changes in its route from one of its neighbours (using RIP broadcast),
this info is relayed to other neighbouring routers so they also update their routing tables.
 RIP enables routers to react automatically if a network component fails.
Dynamic routing- it can take account of changes and will try to get there even if there are issues
RIP message is carried in a UDP datagram  if you’re sending a lot of traffic, some of the info
take different routes

Ports and Services
Multiple applications may be supported simultaneously on a networked machine. (One computer
could be running multiple services).
 many network hosts run several network services eg. Sending an email and browsing the web.
Access to these spate services is managed by the network software. Software must identify
correct target serviced for any incoming request and also return the appropriate service response
to the correct client.

Ports (also numbers)- numbers that are used in addition to IP, in order to facilitate software to
software communication.

Managing these multiple services is accomplished by using different ‘ports’ for each service. A
port can be thought of as a channel. So an email request goes to one port, and a web browsing
request goes to another port.
 ports allows the separation of outgoing requests to different remote targets
A request is always IP address and port number  to another IP address and port number
- There can be more than 1 IP address

, A dotted quad- 4 numbers with dots in between- IP addresses  format for IP address, largest
value is 255

Assigned ports- People will use specific port numbers for certain services, these port numbers
are assigned by the Internet Assigned Number Authority (IANA).
 assigned ports use a small range of possible port numbers
For the convenience of knowing what port to use

Domain Name Service
DNS is another network information service that enables the exchange of info between programs
across a network. DNS is a layer that protects end users from IP addresses  is meant to be
more user friendly

Goals: Is a consistent ‘naming scheme’ which will be used for referring to internet hosts. Names
should not be required to contain network addresses, routes etc.

Internet names and addresses- internet domain names have to be registered. DNS software
converts registered names to IP addresses, as with IP numbers, domain names uniquely identify a
network and can also identify specific network hosts (usually have 2 or more parts, separated by
dots).
- Domain names are geographical (first 2 letters indicate country)
- Most internet machines have a local name, and the full name is the local name prefixed
on the domain to which it belongs (fully qualified domain name)

ULP- upper layer protocol

Tutorial Questions:

What carries a RIP Message?
- UDP Datagram

What consists of a communication request?
- IP address and port number

What does RIP mean?
Routing Information Protocol

What consists of a fully qualified domain name?
- Local name and domain name

What is a dotted quad consist of?
- 4 numbers with dots in between, a way to write IP addresses

Do all RIP messages take the same route?
- No

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller jasbhela1. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for CA$8.17. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

47561 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 15 years now

Start selling
CA$8.17
  • (0)
Add to cart
Added