computer security fundamentals by chuck easttom chapter 13 cyber detective
TRANSCRIPT
![Page 1: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective](https://reader036.vdocuments.us/reader036/viewer/2022082408/56649ec65503460f94bd1f60/html5/thumbnails/1.jpg)
Computer Security Fundamentals
by Chuck Easttom
Chapter 13 Cyber Detective
![Page 2: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective](https://reader036.vdocuments.us/reader036/viewer/2022082408/56649ec65503460f94bd1f60/html5/thumbnails/2.jpg)
© 2012 Pearson, Inc. Chapter 13 Cyber Detective 2
Chapter 13 Objectives
Find contact information on the web Locate court records on the web Locate criminal records on the web Use Usenet newsgroups to gather
information
![Page 3: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective](https://reader036.vdocuments.us/reader036/viewer/2022082408/56649ec65503460f94bd1f60/html5/thumbnails/3.jpg)
© 2012 Pearson, Inc. Chapter 13 Cyber Detective 3
Introduction
Preceding chapters have examined these topics: Identity theft Hacking Investigating potential employees
![Page 4: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective](https://reader036.vdocuments.us/reader036/viewer/2022082408/56649ec65503460f94bd1f60/html5/thumbnails/4.jpg)
© 2012 Pearson, Inc. Chapter 13 Cyber Detective 4
Introduction (cont.)
Identity theft Criminals use a small amount of information
to garner more. Look at Internet techniques for finding
additional information. Security personnel need to know how this is
done to defend against it.
![Page 5: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective](https://reader036.vdocuments.us/reader036/viewer/2022082408/56649ec65503460f94bd1f60/html5/thumbnails/5.jpg)
© 2012 Pearson, Inc. Chapter 13 Cyber Detective 5
Introduction (cont.)
Hacking Obtain information to social engineer or to
guess passwords. Investigating potential employees
Calling references may not be enough. Hiring a private detective may be
impractical.
![Page 6: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective](https://reader036.vdocuments.us/reader036/viewer/2022082408/56649ec65503460f94bd1f60/html5/thumbnails/6.jpg)
© 2012 Pearson, Inc. Chapter 13 Cyber Detective 6
Introduction (cont.)
Network administrators in particular must be investigated. The network cannot keep out the person who
set it up. Information about his past from a source other
than supplied references may affect the hiring decision.
![Page 7: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective](https://reader036.vdocuments.us/reader036/viewer/2022082408/56649ec65503460f94bd1f60/html5/thumbnails/7.jpg)
© 2012 Pearson, Inc. Chapter 13 Cyber Detective 7
Introduction (cont.)
The Internet is a valuable investigative tool. Useful for finding out about potential
employees, babysitters, and so forth. Much of the information is free. States have court records online.
![Page 8: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective](https://reader036.vdocuments.us/reader036/viewer/2022082408/56649ec65503460f94bd1f60/html5/thumbnails/8.jpg)
© 2012 Pearson, Inc. Chapter 13 Cyber Detective 8
Introduction (cont.)
Information is a two-edged sword. An innocent person may use it for legitimate
investigations. A less scrupulous person may use it for identity
theft or stalking. Invasion of privacy has ethical, moral, and
legal ramifications. Practice searches on your own name unless
you have written consent.
![Page 9: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective](https://reader036.vdocuments.us/reader036/viewer/2022082408/56649ec65503460f94bd1f60/html5/thumbnails/9.jpg)
© 2012 Pearson, Inc. Chapter 13 Cyber Detective 9
General Searches
Search to find addresses, phone numbers, or e-mail addresses www.yahoo.com www.infobel.com www.smartpages.com www.theultimates.com/white www.bigfoot.com www.whowhere.com www.switchboard.com
![Page 10: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective](https://reader036.vdocuments.us/reader036/viewer/2022082408/56649ec65503460f94bd1f60/html5/thumbnails/10.jpg)
© 2012 Pearson, Inc. Chapter 13 Cyber Detective 10
Court Records and Criminal Checks Sex offender registries
www.fbi.gov/hq/cid/cac/registry.htm You may not be able to base employment
decisions on certain information. Check with an attorney first.
![Page 11: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective](https://reader036.vdocuments.us/reader036/viewer/2022082408/56649ec65503460f94bd1f60/html5/thumbnails/11.jpg)
© 2012 Pearson, Inc. Chapter 13 Cyber Detective 11
Court Records and Criminal Checks (cont.)
Civil court records Civil issues, as well as crimes, may make a
person unsuitable for a particular job. No centralized Web site for these issues. Many states and Federal courts offer online
records, for example: www.oscn.net/applications/oscn/casesearch.asp
![Page 12: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective](https://reader036.vdocuments.us/reader036/viewer/2022082408/56649ec65503460f94bd1f60/html5/thumbnails/12.jpg)
© 2012 Pearson, Inc. Chapter 13 Cyber Detective 12
Court Records and Criminal Checks (cont.) Other resources
The National Center for State Courts www.ncsconline.org/
The Law School at Emory University www.law.emory.edu/FEDCTS/
Public record finder www.freeprf.com/
![Page 13: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective](https://reader036.vdocuments.us/reader036/viewer/2022082408/56649ec65503460f94bd1f60/html5/thumbnails/13.jpg)
© 2012 Pearson, Inc. Chapter 13 Cyber Detective 13
Court Records and Criminal Checks (cont.) Other resources
Pacer www.pacer.psc.uscourts.gov/
The Boost www.theboost.net/court_records/
State public access ctl.ncsc.dni.us/publicaccess/
![Page 14: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective](https://reader036.vdocuments.us/reader036/viewer/2022082408/56649ec65503460f94bd1f60/html5/thumbnails/14.jpg)
© 2012 Pearson, Inc. Chapter 13 Cyber Detective 14
Court Records and Criminal Checks (cont.)
Other resources Prison searches
www.ancestorhunt.com/prison_search.htm Federal prison records
www.bop.gov Public records
www.searchsystems.net/ United Kingdom public records
www.pro.gov.uk
![Page 15: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective](https://reader036.vdocuments.us/reader036/viewer/2022082408/56649ec65503460f94bd1f60/html5/thumbnails/15.jpg)
© 2012 Pearson, Inc. Chapter 13 Cyber Detective 15
Usenet
Newsgroups on many subjects. Use Google “Groups” option. Anyone can post anything . Search for potential employees. Can be an important investigative tool. Information must be verified elsewhere.
![Page 16: Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective](https://reader036.vdocuments.us/reader036/viewer/2022082408/56649ec65503460f94bd1f60/html5/thumbnails/16.jpg)
© 2012 Pearson, Inc. Chapter 13 Cyber Detective 16
Summary
The Internet is a valuable investigative resource To hackers and identity thieves To employers of network administrators as
well as babysitters Periodically check your own identity to see
what information is available.