...Computer Intrusion Forensics Research Paper Nathan Balon Ronald Stovall Thomas Scaria CIS 544 Abstract The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throughout the world. Because of this the law must be follow precisely when conducting a forensics investigation. It is not enough to simple know an attacker is responsible for the crime, the forensics investigation must be carried out in a precise manner that will produce evidence that is amicable in a court room. For computer intrusion forensics many methodologies have been designed to be used when conducting an investigation. A computer forensics investigator also needs certain skills to conduct the investigation. Along with this, the computer forensics investigator must be equipped with an array of software tools. With the birth of the Internet and networks, the computer intrusion has never been as significant as it is now. There are different preventive measures available, such as access control and authentication, to attempt to prevent intruders. Intrusion detection systems (IDS) are developed to detect an intrusion as it occurs, and to execute countermeasures when detected...
Words: 9608 - Pages: 39
...…………………………………………………………….5 Hypothesis ………………………………………………………………………..5 CHAPTER 2 ……………………………………………………………………...6 LITERATURE REVIEW …………………………………………………………6 Overview of Rootkit Technology ……………………………………………….6 How a Rootkit Functions ….……………………………………………………6 Functionality Approaches of Rootkit ……………………………….…………..7 Types of Rootkit ………………………………………………………………….8 CHAPTER 3 …………………………………………………………………….11 DISCUSSION ………………………………………………………………….11 Rootkit Detection & Prevention ……………………………………………….11 Rootkit Prevention & Removal Approaches …………………………………12 Rootkit Detection & Prevention Tools ………………………………………..13 CHAPTER 4 …………………………………………………………………….14 CONCLUSION……………………………………………………………..……14 CHAPTER 5 ………………………………………………………….…………15 REFERENCES …………………………………………………………………15 EXECUTIVE SUMMARY This research paper is divided into 5 main chapters like introduction, literature review, discussion, conclusion and references. The major points of this detailed research are summarized as below. * Rootkit technologies cause severe security attacks in today’s cyber world. This research discusses the significance of effective security strategies that should be formulated against security attacks. * Detailed analysis of rootkit technologies and functionalities are done. Different rootkit types, attack tools and approaches are analyzed. * Several rootkit detection & prevention systems are evaluated for preventing these security attacks effectively. Various rootkit prevention tools...
Words: 2465 - Pages: 10
...Report#1 Denial of Service as a Service - Asymmetrical Warfare at Its Finest Introduction Denial of service attack becomes a major problem against computers connected to the Internet. DoS attacks involves exploiting any bugs in such an operating system or any existed vulnerabilities in TCP/IP implementation. Tracking this attack becomes very serious problem, because the attacker uses many machines in order to lunch this kind of attack. On the other hand, since the attackers are human being at least one mistake will occurred by them, once the investigators discover such mistake will be very helpful to track such attacker. The attacker goal is to prevent the legitimate users from accessing their resources by taking down such a server. This report will discuss “Denial of Service as a Service Asymmetrical Warfare at Its Finest” which was given by Robert Masse, CEO of Swipe Identity Company. Robert Masse has explained the process of capturing the attacker who performed Denial of server attack (DoS) against mid-sized internet server provider (ISP). Actually, the attacker was working at Mid-sized ISP, which is considered to be the largest ISP in Canada. In addition, the attacker was one of the employees who’s working at the targeted ISP, which make the investigation process very difficult to identify him or to stop this attack. On November 25th 2012 the ISP received this attack for one week and then eventually escalate quickly. As a result, this attack cause to shut down the emergency...
Words: 3055 - Pages: 13
...Acknowledgements I would like to appreciate God Almighty for his faithfulness and for the strength, without him I am nothing. I would like to thank my supervisor Dr Hatem Ahriz for his guidance throughout the writing of this report. I would like to thank Richboy and Ete Akumagba for their guidance and for proof reading this report. I would like to thank my family for their support and love. ii Abstract This era of explosive usage of networks have seen the rise of several opportunities and possibilities in the IT sector. Unfortunately, cybercrime is also on the rise with several forms of attack including, but not limited to botnet attacks. A Botnet can simply be seen as a network of compromised set of systems that can be controlled by an attacker. These systems are able to take malicious actions as needed by the attacker without the consent of the device owner and can cause havoc. This paper is the first part of a two-part report and discusses on several reportedly known botnets and describes how they work and their mode of infection. Several historic attacks and the reported damage have been given to give a good picture and raise the bar on the capabilities of botnets. Several existing tools have been considered and examined which are useful for detecting and terminating botnets. You would find that each tool has its own detection strategy, which may have an advantage on some end than others. iii Table of Contents Declaration ..........................
Words: 13171 - Pages: 53
...Review Questions ACG 4401 Spring 2008 Final MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) A part of a program that remains idle until some date or event occurs and then is activated to cause havoc in the system is a 1) _______ A) trap door. B) logic bomb. C) data diddle. D) virus. 2) Perhaps the most striking fact about natural disasters in relation to AIS controls is that 2) _______ A) disaster planning has largely been ignored in the literature. B) losses are absolutely unpreventable. C) many companies in one locale can be seriously affected at one time by a disaster. D) there are a large number of major disasters every year. 3) The US Justice Department defines computer fraud as 3) _______ A) an illegal act in which knowledge of computer technology is essential. B) an illegal act in which a computer is an integral part of the crime. C) any act in which cash is stolen using a computer. D) any crime in which a computer is used. 4) A __________ is similar to a __________, except that it is a program rather than a code segment hidden in a host program. 4) _______ A) worm; virus B) virus; worm C) worm; Trojan horse D) Trojan horse; worm 5) Researchers have compared the psychological and demographic...
Words: 1533 - Pages: 7
...Joe Johnson Table of Contents Work in progress… Executive Summary 2econd2n0ne.com is a newly developed motorcycle parts and apparel store created by my good friend Mr. Brockton Gardner. Mr. Gardner is a motorcycle enthusiast, and is in tune with the motorcycle industry with a great number of people who are also enthusiasts that he’s networked with; qualities that can spell success for his website as soon as it goes live. There are many factors to consider before going live with one of those factors being security. My project proposal is a security plan that will protect Mr. Gardner, and his website, from the variety of Internet and physical security threats. This security plan is not a complete overhaul of current systems and methods used, but a plan to harden current security measures. An environmental scan conducted on the website, and Mr. Gardner, has shown that although security measures are being taken there can be some improvements to further protect his investment, and reduce the chances of a malicious attack. Internet threats aren’t the only concerns. Physical security must be considered because mobile devices, to include laptops, are lost and stolen on a daily basis. Most mobile devices carry considerable amounts of sensitive or private information giving all the more reason to protect these items. Although the site will be hosted on Yahoo.com servers, which provide their own forms of security, there are still areas outside those servers...
Words: 2765 - Pages: 12
...DISSERTATION.doc DownloadSign up for Dropbox * Sign in ------------------------------------------------- Top of Form Email Password Remember me Create an account Bottom of Form 1 CHAPTER I THE PROBLEM AND ITS BACKGROUND Introduction National University was founded on August 1, 1900 by Don Mariano Fortunato Jhocson and was previously known as Colegio Filipino, the first private non- sectarian school in the country. It stood as one of the respected institution for engineering, architecture, education, and business. In 1998, National University met a great ordeal, a great fire burned the original main building to ashes, crippling one of the pioneer universities in Manila. Nevertheless, National U proved its commitment by continuing to strive for quality education. In late 2008, majority of its share was acquired by the SM Group of Companies, paving way to the erection of a new Main Building. Along with the joint venture were new improvements in facilities and a better perspective as a higher education institution. 2 Currently, National U has eleven colleges, a basic education department, and a graduate studies department. This Legarda-based institution annually serves more than one thousand and three hundred tertiary students, new and old, and more than five hundred elementary and high school students. The campus is currently composed of three buildings, the New Main Building, the Jhocson Memorial Building (JMB) and the Pharmacy-Dentistry Building...
Words: 1893 - Pages: 8
...absenteeism, poor work performance and the potential of systematic lenience towards criminal activity that can go alongside drug and alcohol abusers in the company’s midst? This is a touchy subject primarily affecting those amongst a company who are most likely to pass it. Employees find comfort in being trusted by their employers. There is an intrinsic satisfaction that comes from feeling valued, accepted and trustworthy by one’s superiors. Given the reputation of drug screenings, many employees will have heard horror stories of jobs lost when employees tested false positive for bona fide prescription drugs or even cough medicine. Further, it has been argued that routine abusers have found ways and will continue to find ways to cheat the system. Combatting that, some employers have implemented “watchers” who stand and watch the employee urinate in the cup. (Staff, 2010) Certainly, most corporations have a right to do many things with impunity, as most Constitutional safeguards only apply to government employees. The options for delving into employees lives are generally limitless, and without even having to build a case, a corporation can require a vista of disclosure from its employees without fear of retribution. As a result, citing safety, productivity and legal...
Words: 1288 - Pages: 6
...are being hacked; emails are read; government secret information are subject to security risks and banks are being hacked and millions stolen. Some of the reasons behind such attacks include the weaknesses inherent in the networks of the companies and government organizations; other reasons include carelessness of users. Whichever the case internet security issues have become one of the major concerns for technologists and users alike. There is a great need for understanding the nature of the attacks, the attackers, the networks, the loop holes and the measures taken to counteract them. The following research identifies the various methods and techniques of attacks online and how they expose the users to information theft; corruption of systems; and loss of funds. The research also identifies the various methods that are being used to counteract these attacks and how effective they are proving for the users. Some suggestions are also...
Words: 10693 - Pages: 43
...deployments, and the Operations and Maintenance (O & M) contractors, who have the knowledge base and the continuity but are on edge due to contract issues and tenuous job security. Added to that tumultuous mix is my small contract of twelve people who are implementing a methodology of best practices for managing a complex Information Technology (IT) organization. This methodology, known as IT Infrastructure Library (ITIL), provides a framework of processes that give shape and order to an IT operation. These three teams, the military, the O & M contractors, and the ITIL improvement team work together to provide network services for the greater Air Force, striving to maintain network availability while keeping the data secure from intrusion or compromise. 2. Problem Statement In the last four or five years collaborative computing and social networking have rapidly increased both in the business environment and in people’s personal lives. On the home front, the internet sites Facebook, MySpace, YouTube, and Twitter have seen phenomenal growth: In 2009 the user growth rate on Facebook was 145% (Corbett, 2010), and other social media sites have shown similar growth rates (Owyang, 2010). In business and of late in the military, collaborative tools that allow users to chat from their desktops, collaborate on documents, and hold...
Words: 1903 - Pages: 8
...Abstract Creative accounting, as a matter of approach, is not objectionable by itself. However, when unethical elements make intrusion, the resultant accounting details become anything but true and fair. Creativity in such context is like referring to a half glass of water as half-full instead of describing it as half empty. While both statements are factually correct, they paint different picture and thus convey different images. Creativity in company accounting may arise under at least three different financial market conditions. The first is when a company floats its shares to attract investors to subscribe to such shares either at par or at a premium, depending on the financial market evaluation of the company’s future prospects. The second is when the company whose shares are already listed in a stock exchange, wants to paint an attractive picture of its financial conditions so that the shares may be quoted at a premium. Finally, a company having its shares listed in the stock exchange may declare and pay high dividends based on inflated profits through overvaluation of assets, undervaluation of liabilities and change in systems of stock valuation that may boost the image of the company at least in the short run. Unethical considerations in creative accounts have developed to such depths that terms like fraud audit and forensic accounting have gained currency and are becoming new professions. Accounting practitioners and auditors are increasingly required to appear...
Words: 3226 - Pages: 13
...Case Studies of Cybercrime and Its Impact on Marketing Activity and Shareholder Value Katherine T. Smith Department of Marketing Texas A&M University 4112 TAMU College Station, TX 77843-4112 Tel: 979-845-1062 Fax: 979-862-2811 Email: Ksmith@mays.tamu.edu L. Murphy Smith, CPA* Mays Business School Texas A&M University 4353 TAMU College Station, TX 77843-4353 Phone: 979-845-3108 Fax: 979-845-0028 Email: Lmsmith@tamu.edu Jacob L. Smith Grace Bible Church College Station, TX 77845 JacobSmith@grace-bible.org *Corresponding author Forthcoming in Academy of Marketing Studies Journal Electronic copy available at: http://ssrn.com/abstract=1724815 CASE STUDIES OF CYBERCRIME AND ITS IMPACT ON MARKETING ACTIVITY AND SHAREHOLDER VALUE Katherine T. Smith, Texas A&M University L. Murphy Smith, Texas A&M University Jacob L. Smith, Grace Bible Church ABSTRACT Cybercrime, also called e-crime, costs publicly traded companies billions of dollars annually in stolen assets and lost business. Cybercrime can totally disrupt a company’s marketing activities. Further, when a company falls prey to cyber criminals, this may cause customers to worry about the security of their business transactions with the company. As a result, a company can lose future business if it is perceived to be vulnerable to cybercrime. Such vulnerability can lead to a decrease in the market value of the company, due to legitimate concerns of financial analysts, investors, and creditors. This study examines...
Words: 6032 - Pages: 25
...ABSTRACT Technology is use of science in industry to invent useful things or to solve a problem it use to communicate or entertain people. One of the invention for this generation now is playing digital games it is a popular pastime for others and it is a part of people’s daily life. The digital games can further expand the knowledge of users. In this game it is all about four pictures related to a certain anime which the user will guess. The user’s need to recall everything to answer the question and to go to the next level of the game. This is also one way to remember things through this application. It is about using pictures in order to retrieve memories connected to it and one process that makes use of pictures is called picture superiority effect. Most studies of the picture superiority effect have involved tests of memory for the occurrence of individual events, such as recall in which is the main objective of this study. If pictures however, receive complete semantic processing than words, this difference in processing could be an advantage for both memory of the individual pictures and for associations formed between pairs of random pictures. This research also intends to use the Anime and mobile game learning app in order to prevent forgetting what was present at young age. A mobile game applications that helps to exercise their brain to retrieved the information about anime that they are familiar with. Keywords: mobile technology, mobile learning and gaming, anime...
Words: 4339 - Pages: 18
...ISAS 640 9040 – Decision Support Systems and Expert Systems Dr. Ashraf Shirani Literature Review for Group 1 Group Members: Leslie Allen Joe Nimely Oluranti Odofin Gary Turner The topic for the research paper will be business intelligence, most specifically the impact on privacy. The data gathered through various business intelligence technologies, while it may not be personally identifiable information such as name and/or social security number, the data provided to businesses gives them a greater insight into consumer behavior. This provides the businesses with information to leverage additional sales and services. Businesses gather all kinds of data on consumers, often sharing with other related competitors, to obtain a better view of the consumer behavior, including trends and associations. The information obtained through business intelligence may or may not be personally identifiable, it may still be sensitive in nature. Does it cross the line ethically? Are there other techniques to gather this information while maintaining privacy for the consumer? In this paper, the ethical issues of privacy on business intelligence will be explored to determine if the business intelligence outweighs the intrusion on privacy. Key concepts in this review include privacy, big data analytics, business intelligence, ethical awareness framework, data mining, hackers, and the Organization of Economic Cooperation and Development (OECD) guidelines. Data mining is discovering...
Words: 2246 - Pages: 9
...Bangladesh” that you assigned us to prepare has been submitted already. We have tried our best to disscuss the findings. Hope our report will fulfill the purpose and encourage us to do further. We express our gratitude to you for your guidance and we hope that this report will fulfill your requirements. Any short of suggestion regarding this report will be greatly acknowledged and we will feel proud if our paper serves its purpose. Sincerely Yours, Raju Ahmed (Id no. 5) Lima Nath (Id no. 19) Tanzin Ara (Id no. 26) Zuairiyah Mouli (Id no. 43) Syed Arman Ali (Id no. 57) Department of International Business (3rd Batch) University of Dhaka Table of Contents Abstract 4 Executive summary 5 1. Introduction 6 2. Literature Review 7 3. Research Objectives 9 4. Methodology 10 5. Technical Product Used by Bank in Bangladesh 11 5. Findings and Analysis 16 5.1 Technology Driven Services 16 5.2 Top Software vendors 17 5.3 The level of use of technology 18 5.4 Threats and Risk Analysis 19 5.5 Reasons of the Threats 20 5.6 Preventive measures taken by Banks 21 5.7 Policies used by Private Banks in Bangladesh 22 Disaster...
Words: 5178 - Pages: 21