Posts

Introduction to host to host communications (OSI Model and TCP/IP Model)

Image
Host-to-host communications require a consistent model. Two different types of host-to-host models: 1) Older model:    a) Proprietary    b) Applications and combinations of software controlled by one vendor. 2) Standard based model:    a) Multivendor software    b) Layered approach    c) Exampl e: OSI, TCP/IP 1) OSI Model: a) Physical Layer: The electrical, mechanical, procedural, and functional specifications for activating, maintaining and deactivating the physical link for bit transmission between end devices. b) Data Link Layer : How data is formatted for transmission and access media is controlled. c) Network Layer: Connection and path selection between two hosts. d) Transport Layer: Segment, transfer and reassemble data between devices. e) Session Layer: Establish, manages, terminates communication between hosts. f) Presentation Layer: Information sent from one host is readable by another ho...

basic introduction about networking and its components.

Image
Network: Network is connected collection of devices (computer, routers, switches and interconnections)that communicates with each other by providing the means for users to share hardware and applications. LAN: LAN Stands for Local Area Network. LAN is a network that is located in limited area with the computers and other components, that are part of this network, located relatively closed together. Ethernet Switches: Ethernet switches divides the collision domains and reduce the number of devices that are competing for bandwidth. Ethernet switches selectively forward individual frames from a receiving port to the destination port. Optical Fiber: Optical fiber permits transmission over longer distances and higher data rates. Switch: Switch creates and maintains MAC address table by using the source MAC address of incoming frames and port number through which the frames entered the switch. Components of Network: 1) Endpoints: Send and receive data. 2) Interc...

Fraud Detection and Prevention

What is prevention? Prevention controls are designed to keep fraud from occurring.. What is detection? Detection controls are designed to detect frauds. What is fraud? An illegal act involving the obtaining of something of value through willful misrepresentations. What are the common myths about fraud? It won't happen to me. Its not big deal. We have our controls in place. Someone else will take the loss. What are the types of frauds? Check Fraud Cyber Crimes ACH Fraud Wire Fraud Types of Cyber Crime? Hacking Trojan Horse Phishing Spyware Keylogger What is hacking ? Illegal intrusion into a computer systems without the permission of the owner. Virus Dissemination Virus, Key-logger, Trojan Horse Email High school friends, unknown senders Hyperlink They know what you like  Software download Games, screen savers. What is Trojan horse? Virus hidden in file or a program Downloaded from internet Downloaded from emails...

Tools for cyber forensic investigation and analysis

Which are the tools useful for forensic investigation and analysis? Here we have listed some important tools which will be useful in forensic investigation as well as crime scene while seizing the evidences, also helps in analysis and reporting of cyber crimes. NMAP: NMAP stand for Network Mapper. It is most popular tool for mapping networks and security system auditing. It also support for all operating systems like Windows, Linux, Red Hat, Mac OS. Forensic Investigator: Forensic investigator is best tool in cyber forensics. It is helpful in many types likes WHOIS/GeoIP lookup, ping, port scanner, banner grabber, URL decoder/parser, XOR/HEX?base64 converter, SMB Share/Net-BIOS viewer, virus-total lookup. Hash Calculator: Hash calculator is software useful for calculating hash values for any files as well as any folder. It generates MD5 and SHA-1 hash value. USB write blocker: USB write blocker is most important tool in prevention of data altering in our systems withou...

Introduction to Cyber Forensic

What is Cyber Forensic? Cyber forensic is a branch of forensic science. Cyber forensic also known as computer forensic. Cyber forensic is nothing but the collection or acquisition , analysis and reporting of the digital evidences. The evidence includes following  computers , hard disks, pen-drives , CD, DVD, memory cards, mobile phones, etc.  There are some SOP's (Standard Operating Procedures) for cyber forensic which must be follow in every digital evidences. Verification Identification and Description Preservation, collection and  Acquisition Use forensic  toolkit Live Acquisition  is best Bit stream imaging Make no changes Take Hash Value Log  Everything Record and Preserve Chain of Custody Processing and Review Analysis Productions Presentation Reporting