Skip to main content

Posts

Showing posts from April, 2020

Cyberspace awareness during COVID-19

This COVID – 19 pandemic the usage of internet is increased. This pandemic situation became a great opportunity to cybercriminals. To protect our self from the cybercriminals, we need to follow some precautions. Hackers mostly use social engineering techniques to hack your devices.                              Here are some precautions measures to stay secure in this pandemic situations. 1) Banks are not going to ask the customers to pay the loans or bills through emails. As the  government of India cleared order the banks to the postponement of taking bills for three months. Even though if you're paying your debts to please pay the bills by going to the official website of the bank. If you receive any phone call or email stating that they are from the bank and asking to share your card details or PIN or UPI details, please ignore them and report to the bank. 2) Pay the subscription money in Netflix, Amazon Prime or Hotstar only when you receive a payment

Sherlock’s First Digital Case

In this blog, Sherlock is going solve his first cases by using a concept called live analysis of a computer Constable Clark:  Hello Mr.Sherlock!! We had a case for you. Sherlock:  Hmm!! Go on Clark.                            Constable Clark:  A company XYZ reported a data breach that happens to them, we are trying to solve this case but we are unable to find any clue we need your help Mr.Sherlock. Sherlock:  Watson!!! 1.      I need all the IDS records of the company In Digital forensics analysis plays a major role to get culprits. The major part of cases is done in IDS record analysis. 2. I want you to take the details of Previous pen-testing audit records and system repair details of the past few months. Watson :  What does an IDS record consists? Sherlock :  An Intrusion Detection System (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. Sherlock:  Clark, I want to

What if Sherlock Holmes is a Digital Detective?

In this series of the blog, I’m going to put Windows Forensics with Sherlock Holmes. In this series, Sherlock Holmes is going to teach you how to solve the cases in the Digital world. John Watson:  Hey, Sherlock how you are going to start your first digital case? Sherlock Holmes:  Let me explain you the style of investigation that I follow to solve a digital case Main Part of Forensic investigation is Collection of Scientific evidence ·         Rule 1 : Maintain Integrity. ·         Rule 2 : Maintain the chain of custody.  ·         Rule 3:  Document everything ·         Rule 4:  Follow standard practices. Phases of Investigation ·         Evidence Preservation. ·         Evidence Searching. ·         Event reconstruction. Watson:  Where you are going to do all this, do we have proper setup? Sherlock:  Don’t worry Pal, it just requires a simple setup Response kit ·         CD-ROM and USB. ·         Hardware: Write Blocker. ·         Li

The Defense Against the Dark Arts

The Defense against the dark arts refers to defending yourself in the world Cyber against the Dark arts like hacking, data theft and social engineering attacks. Professor Snape for Hogwarts School of Witchcraft and Wizardry and Ilvermorny School of Witchcraft and Wizardry will teach the subject Defense against the Darks arts; ie Professor will teach how to protect your self from the Cyberworld. “Your defences must, therefore, be as flexible and inventive as the arts you seek to undo”    -Professor Snape Rule 1: “Don’t click unwanted links that you receive by E-Mails or by forwarded messages in Whats App” Once a student of Hogwarts came to know about the chamber of secrets, We all know the curiosity that the students of Hogwarts had They started digging into mystery while searching for the mystery they found something like what they want without knowing they started reading the spell and that resulted in huge damage. Rule 2: “Don’t connect to public WI-FI’s