Professional Documents
Culture Documents
Cyber Forensics and Privacy Tools: Shantilal Shah Engineering College
Cyber Forensics and Privacy Tools: Shantilal Shah Engineering College
college
Cyber Forensics
and
Privacy tools
Group Information
Name: - Chhatbar Deep Bharatbhai
En.no : -190430116013
Web
Network forensics Data
forensics forensics
System Proactive
forensics forensics
Digital E-mail
forensics forensics
Cyber Enterpris
Computer
forensics forensic e
forensics
s
Cyber forensics investigation
process.
Documentatio
Identification Preservation Analysis Presentation
n
3.Analysis 5.Presentation
1.Identification Identify tool and Process of
to identify the purpose of
technique to use summarization
investigation
Process data and
Identify the resource
Interpret analysis explanation of
required
result. conclusion is
done with the
help of gather
2.Preservation 4.Documentation facts
Data is isolate secure and Documentation of
preserve crime screen along
with photographs,
sketching and crime
scene mapping
Disk Imaging
It is defined as the process and tools used In copying
a physical storage device for conducting
investigations and gathering evidence
Incognito Window
Chrome Indicated by a spy caricature
(fedora, sunglasses, and overcoat) ctrl-shift-n
in the upper-left corner.
InPrivate Browsing
Internet Explorer 10 Indicated by a blue “InPrivate” label to ctrl-shift-p
the left of the address bar.
Private Window
Indicated by a purple menu (as opposed
Mozilla Firefox to the default orange) and a masquerade ctrl-shift-p
mask in the tab.
Private Window (or a Private Tab)
Opera Indicated by an icon in the tab. ctrl-shift-n
Private Browsing
Safari Indicated by a “PRIVATE” label on the
left of the address bar.
Ghostery
Browsers provide some means to control when to accept cookies,
download images, or block pop-up windows, but they do not do so to a
degree that greatly improves privacy.
addresses this shortcoming by monitoring page content
and cookies for indicators of advertising, tracking, and more.
It’s a browser extension that blocks cookies, links, and images based on
privacy-enhancing policies.
Ghostery supports all major browsers. Its protection works consistently across
each
of them
The Onion Router(TOR)
The Tor Project provides a distributed, layered approach to achieving anonymity for
its users.
It strives not only to prevent an end point (such as a web server) from being able to
reliably track a user by their IP address, but also to prevent each node between the
client and server from being able to monitor the user’s traffic—even if that node is
another participant in the distributed Tor network.
Tor routes TCP traffic from a client through a random path of relays, or nodes, up to
a penultimate exit relay that routes the client’s traffic to its intended destination.
Each relay encrypts the client’s message before passing it on
to another relay, which in turn encrypts the message. This layering of encryption
around the original message gives Tor its “onion” metaphor .
this method of encryption is important to
prevent rogue or malicious nodes from copying the original message. It should be
impossible for someone to tap a circuit and be able to determine who is using the
circuit and what traffic they are sending.
GnuPG
Encryption protects the confidentiality of data. The GnuPG project
provides tools that implement encryption and cryptographic
signatures to protect messages (like e-mail) or files.
Encryption prevents others from viewing the plaintext version of a
message.
A cryptographic signature prevents someone from tampering with
the message (which is possible in spite of encryption) and provides
strong guarantees about the identity of the message’s sender (i.e.,
signing inhibits an attacker from spoofing messages)
What are cookies
Cookies are text files with small pieces of data — like a username and
password — that are used to identify your computer as you use a
computer network. Specific cookies known as HTTP cookies are used to
identify specific users and improve your web browsing experience.
When the cookie is exchanged between your computer and the network
server, the server reads the ID and knows what information to
specifically serve to you.
Why cookies can be
dangerous
Since the data in cookies doesn't change, cookies themselves aren't harmful.
They can't infect computers with viruses or other malware. However, some
cyberattacks can hijack cookies and enable access to your browsing
sessions.
The danger lies in their ability to track individuals' browsing histories. To
explain, let’s discuss what cookies to watch out for.
First-Party vs. Third-Party Cookies
Some cookies may pack more of a threat than others depending on where
they come from.
First-party cookies are directly created by the website you are using. These
are generally safer, as long as you are browsing reputable websites or
ones that have not been compromised.
Third-party cookies are more troubling. They are generated by websites
that are different from the web pages users are currently surfing, usually
because they're linked to ads on that page.
Any Questions?