computer security fundamentals by chuck easttom chapter 13 cyber detective

16
Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective

Upload: lorin-fletcher

Post on 01-Jan-2016

223 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective

Computer Security Fundamentals

by Chuck Easttom

Chapter 13 Cyber Detective

Page 2: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 2

Chapter 13 Objectives

Find contact information on the web Locate court records on the web Locate criminal records on the web Use Usenet newsgroups to gather

information

Page 3: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 3

Introduction

Preceding chapters have examined these topics: Identity theft Hacking Investigating potential employees

Page 4: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 4

Introduction (cont.)

Identity theft Criminals use a small amount of information

to garner more. Look at Internet techniques for finding

additional information. Security personnel need to know how this is

done to defend against it.

Page 5: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 5

Introduction (cont.)

Hacking Obtain information to social engineer or to

guess passwords. Investigating potential employees

Calling references may not be enough. Hiring a private detective may be

impractical.

Page 6: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 6

Introduction (cont.)

Network administrators in particular must be investigated. The network cannot keep out the person who

set it up. Information about his past from a source other

than supplied references may affect the hiring decision.

Page 7: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 7

Introduction (cont.)

The Internet is a valuable investigative tool. Useful for finding out about potential

employees, babysitters, and so forth. Much of the information is free. States have court records online.

Page 8: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 8

Introduction (cont.)

Information is a two-edged sword. An innocent person may use it for legitimate

investigations. A less scrupulous person may use it for identity

theft or stalking. Invasion of privacy has ethical, moral, and

legal ramifications. Practice searches on your own name unless

you have written consent.

Page 9: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 9

General Searches

Search to find addresses, phone numbers, or e-mail addresses www.yahoo.com www.infobel.com www.smartpages.com www.theultimates.com/white www.bigfoot.com www.whowhere.com www.switchboard.com

Page 10: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 10

Court Records and Criminal Checks Sex offender registries

www.fbi.gov/hq/cid/cac/registry.htm You may not be able to base employment

decisions on certain information. Check with an attorney first.

Page 11: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 11

Court Records and Criminal Checks (cont.)

Civil court records Civil issues, as well as crimes, may make a

person unsuitable for a particular job. No centralized Web site for these issues. Many states and Federal courts offer online

records, for example: www.oscn.net/applications/oscn/casesearch.asp

Page 12: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 12

Court Records and Criminal Checks (cont.) Other resources

The National Center for State Courts www.ncsconline.org/

The Law School at Emory University www.law.emory.edu/FEDCTS/

Public record finder www.freeprf.com/

Page 13: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 13

Court Records and Criminal Checks (cont.) Other resources

Pacer www.pacer.psc.uscourts.gov/

The Boost www.theboost.net/court_records/

State public access ctl.ncsc.dni.us/publicaccess/

Page 14: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 14

Court Records and Criminal Checks (cont.)

Other resources Prison searches

www.ancestorhunt.com/prison_search.htm Federal prison records

www.bop.gov Public records

www.searchsystems.net/ United Kingdom public records

www.pro.gov.uk

Page 15: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 15

Usenet

Newsgroups on many subjects. Use Google “Groups” option. Anyone can post anything . Search for potential employees. Can be an important investigative tool. Information must be verified elsewhere.

Page 16: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective

© 2012 Pearson, Inc. Chapter 13 Cyber Detective 16

Summary

The Internet is a valuable investigative resource To hackers and identity thieves To employers of network administrators as

well as babysitters Periodically check your own identity to see

what information is available.