You are on page 1of 5

Faculty of Engineering and Technology

STUDENT NAME: Seinio Tweulongelwa Ndeiluka

STUDENT NUMBER: 2126922

STUDY PROGRAMME: Bachelor of Science (Honours) in Network Security and


Computer Forensics

LECTURE’S NAME: Bertha Karimbika (Mrs. Nkomo)

SUBJECT: Computer Forensics and Data recoveryC6-CFD-13

ASSIGNMENT: One (1)

Mention and explain comprehensively 10 computer crimes that has been occurring in
day to day?
Describe in detail how to plan for a digital forensic investigation ?.

1
1. Botnets

A botnet is a type of cybercrime where the attacker has taken over lots of different
computers and connected them together to conduct malicious activity.

2. Identity Theft

Identity theft occurs when someone gains access to your personal information and makes
purchases with stolen credit cards or uses the same device for identity fraud.

3. Cyberstalking

Cyberstalking is considered more dangerous than traditional stalking because it gives


criminals quick and easy access to their victims even when they are hundreds of miles
away. It does involves the use of Internet, email, or other electronic communications to
stalk someone.

4. Online Scammers

The act of fooling strangers into transferring money, making purchases, or disclosing
personal information online.

Types of online scams

a) Ransomware – When a criminal takes control of your computer system or


device to block access until the victim pays a ransom fee using Bitcoin
cryptocurrency.
b) Account takeover – The impersonation scam where an individual pretends
they have been locked out of their account and requests the victim to send
money or give out confidential information.
c) Lottery/sweepstakes scam – Posing as a representative from an online lottery,
the criminal tricks people into paying fees for nonexistent prizes.
d) Romance Scam – A person pretends they are in love with you over email or
social media and eventually asks for money.

2
e) Impersonation scam – Where someone pretends to be a friend, family
member, or coworker in order to get personal information like passwords or
credit card numbers.

5. Potentially Unwanted Programs (PUPs)


PUPs) are a type of software that, while not inherently malicious software, may contain
some undesirable characteristics. An example of a PUP could be when a user’s
experience is downgraded to adware or other annoying content without their consent.
6. DDOS Attacks
A Distributed Denial of Service Attack is where multiple compromised systems are
used to flood the network bandwidth or network resources of a targeted system, usually
starting at the router as the point of entry, and then attacking one or more web servers.
7. Malware
Developed and deployed by the so-called “malware authors,” malware is a general
name for any malicious software deliberately designed to perform some harmful
actions on someone else’s computer.
8. Social Engineering
Social engineering is the act of exploiting people’s emotions to obtain information,
access, or anything else where sensitive data is involved. It can also be defined as the
act of cyber-engineering somebody for personal or political gain.
9. Phishing/ Smishing
Phishing is a cybercrime in which criminals try to steal something from internet users,
often their money.
10. AI-Powered Attacks
AI-powered cybercrime attacks are a form of cybercrime that utilizes artificial
intelligence to attack a person.

1. Create digital Forensic Plan.

3
The final step is to initiate a forensic approach is to create a digital forensic plan. The
digital forensic plan template can be used to record the information obtained through the
initial contact and the preliminary investigation discussion. These basic facts will guide the
investigator’s actions. The template narrative is designed to refresh the memory and form a
checklist of actions to be performed. The basic investigation information can be
documented on the provided blank, numbered pages. The basic format easily allows for the
summary format to be recorded and tracked. An area has been designated for actions,
tasks, and comments. This will allow the template to assist in tracking key information and
actions to be performed throughout the entire investigation. The contents of the template
should be reviewed for appropriateness to the current proposed approach. The template is a
tool to be used and modified by the investigator for their purpose.

I. Digital forensic plan template.

Each section of the template is presented to assist in each phase of the forensic process.
Initially, open the Template and modify the document header and footer fields to record
the organizational affiliation. Insure that the middle section is modified to properly identify
the case number.

II. Utilization of Digital forensic plan template to build Digital forensic plan.

Specific answers to questions can be recorded in the answer section of the document. The
“Action, Task, Description and Comment” field can be used to record actions, tasks, or
comments. The section heading “Forensic Plan” is provided to record specific information
that is needed or should be recorded in the plan. This will include things such as, client-
imposed limitations or search warrant restrictions. The template is not designed to
document all the data associated with a forensic investigation. However, if the template is
used in conjunction with the provided forms, information and evidence can easily be
managed. It is strongly suggested that evidence should be recorded in the Case Log and
identified on the Evidence Collection Log. Investigative leads or tasks should be
documented on the Forensic Lead and Task Assignment Sheet. When evidence is
collected, an Evidence Form or Evidence Tag is completed and the Evidence Form number
and item number are recorded in the Forensic Plan Template Error! Bookmark not defined.
Error! Bookmark not defined... As leads are worked, their results are recorded on the
Evidence Fact Sheet. This form number should be documented on the Forensic Lead and

4
Task Assignment Sheet. All forms and documents should be assigned case numbers and
document numbers that are unique to each case. This information must be recorded in the
Case Log (Gerald L & King J , 2006).

11. Reference

 Gerald L. King,June 12, 2006,Global Information Assurance Certification Paper,


retrived from https://www.giac.org/paper/gcfa/283/forensic-investigation-plan-
cookbook/108356.
 Ma'Cheries Harding, July 11, 2022,17 Different Types of Cybercrime: 2022 List
with Examples, retrieved from https://cuetolawgroup.com/types-of-cybercrime/.
 Cyber Talents , January 01 , 2023, What is Cybercrime? Types, Examples, and
Prevention, retrieved from https://cybertalents.com/blog/what-is-cyber-crime-
types-examples-and-prevention.

You might also like