THE HACKERS MEET-UP — April Event
“The Hackers Meet-up” is a monthly must attend Meet-up which features in the calendars of security researchers, hackers and professionals around the nation.
The event aims to bring together primarily security researchers, hackers, business leaders, entrepreneurs but also includes practitioners from academia, industry, government organizations as well as students to elaborate and discuss the IT Security challenges that we are facing today and also about the next generation computer security issues.
This month’s meetup was on the topic of Cyber Crime, Cyber Criminal & Digital Forensics. The meetup was held at DevX , Vastrapur, Ahmedabad, From 10:00 am to 3:00pm. Our honourable speakers were Mr. Devansh Soni , Adv. Liza Vanjani and the director of Comexpo Cyber Security Foundation Mr. Viral Parmar. The event brought together tech enthusiasts, professionals, and experts to delve into crucial topics surrounding cybercrime, cyber law, and digital forensics.
Session on Digital Forensics by Devansh Soni
We had an enlightening session on digital forensics conducted by Devansh Soni, an expert in the field who completed his education from NFSU Gandhinagar and currently works with law enforcement agencies and corporate sectors. The session delved into various aspects of digital forensics, providing valuable insights into this crucial field.
About Digital Forensics
The session began with an overview of digital forensics, highlighting its importance in investigating cybercrimes and analyzing digital evidence. Devansh Soni shared his experiences working with law enforcement agencies and corporates, emphasizing the critical role of digital forensics in modern investigations.
Digital Forensics Process
He detailed the digital forensics process, which consists of several key phases:
1. Search: Identifying potential sources of digital evidence.
2. Collect Evidence: Gathering relevant digital data for analysis.
3. Secure Evidence: Ensuring the integrity and security of collected evidence.
4. Data Acquisition: Extracting data from various digital devices and sources.
5. Data Analysis: Examining and interpreting the acquired data for insights.
6. Documentation and Reporting: Documenting findings and preparing reports for legal or investigative purposes.
Understanding Hash Values:
One of the key topics covered was the difference between hash values and their uses. Participants gained a deeper understanding of how hash values serve as unique identifiers for data, used for integrity verification, digital signatures, and password storage in digital forensics investigations.
Chain of Custody:
The concept of chain of custody was also discussed in detail. Participants learned about the importance of maintaining a clear chain of custody, including documentation and procedures to ensure the integrity and admissibility of digital evidence in legal proceedings. Chain of custody forms and best practices were explored to highlight the meticulous nature of evidence handling in digital forensics.
Imaging, Backup, Clone, and Copy:
The differences between imaging, backup, clone, and copy in digital forensics:
Imaging: Creating exact copies of storage devices for forensic analysis.
Backup: Making duplicate copies of data for recovery or archival purposes.
Clone: Replicating entire storage devices, including data and structure.
Copy: Duplicating files or data without replicating the entire device.
Physical vs Logical Imaging:
Participants gained insights into the distinction between physical and logical imaging in digital forensics. Physical imaging involves copying entire storage devices, including deleted data, while logical imaging focuses on active files and directories, excluding deleted data and unallocated space.
Mobile Phone Forensics and Incognito Mode
The session also touched upon mobile phone forensics, covering techniques for investigating digital evidence on mobile devices such as call logs, messages, apps, and files. Additionally, the concept of incognito mode in web browsing was explored, highlighting its impact on digital footprints and forensic investigations.
Overall, the session provided a comprehensive overview of digital forensics, equipping participants with valuable knowledge and insights into the intricate world of cyber investigations and evidence analysis. We extend our gratitude to Devansh Soni for sharing his expertise and making the session informative and engaging for all attendees.
Session 2 by Viral Parmar: Cyber Criminal Modus Operandi
Our recent session with Viral Parmar, Director at ComExpo Cyber Security Foundation and a multifaceted expert in cybersecurity, delved into critical aspects of cybercrime, particularly focusing on the rise of cyber threats in India and the motives driving these criminal activities. Here’s a summary of the insightful topics covered during the session:
Increase in Cybercrime in India:
Viral Parmar provided a comprehensive overview of the escalating cybercrime landscape in India. Participants gained valuable insights into the various types of cyber threats affecting individuals, businesses, and organizations across the country.
Motives Behind Cybercrime:
The session delved into the motives driving cybercriminals, shedding light on the reasons behind their malicious activities. Viral Parmar shared real-life cases and experiences, offering a firsthand understanding of the motivations that lead to cybercrimes.
Different Crimes on Social Media:
With the help of examples and case studies, Viral Parmar explored the diverse range of cybercrimes occurring on social media platforms. Participants gained insights into the tactics used by cybercriminals to exploit vulnerabilities and target individuals and businesses on social media channels.
Real-Life Case Studies:
The session included in-depth analyses of real-life cybercrime cases, including incidents such as fake computer lock scams and debit card fraud. Viral Parmar provided detailed insights into the methodologies employed by cybercriminals in these cases, highlighting the significance of cybersecurity measures and awareness among individuals and organizations.
Key Takeaways
- Understanding the current landscape of cyber threats in India.
- Recognizing the motives and strategies of cybercriminals.
- Exploring different types of cybercrimes on social media platforms.
- Learning from real-life case studies to enhance cybersecurity awareness and preparedness.
Session 3: THM Core Team Online Quiz and Rewards
Session organized by the THM Core Team was an engaging online quiz that brought together participants for a fun and competitive learning experience. Here’s a summary of the session:
Online Quiz Format:
The session featured an online quiz with questions covering a range of topics relevant to the community’s interests, Cyber Crime, Cyber Law Participants had the opportunity to test their knowledge and problem-solving skills in a dynamic quiz environment.
Rewards for Top Performers:
At the end of the quiz, the top three winners were announced based on their scores and performance. These top performers were rewarded with exciting goodies as a token of appreciation for their knowledge, dedication, and active participation in the session.
The THM Core Team’s initiative to organize such engaging and rewarding sessions contributes significantly to the community’s learning and growth, fostering a collaborative environment where members can learn, share, and excel together.
Session 4: Data Privacy and Cybersecurity with Liza
In our fourth session, we were honored to have Liza, a practicing Advocate at the High Court of Gujarat, and a specialist in Cyber Laws, AI, FinTech, and Data Privacy. Here are the highlights of what we discussed:
Bridging the Gap between Policy and Implementation
Liza emphasized the crucial need to bridge the gap between policy frameworks and their effective implementation in the realm of data privacy and cybersecurity.
Cybersecurity and AI
We delved into the intersection of cybersecurity and artificial intelligence, discussing their roles, challenges, and the evolving landscape of digital security.
Importance of Cybersecurity in the Digital Age
Liza highlighted the paramount importance of cybersecurity in today’s digital age, where data breaches and cyber threats pose significant risks to individuals and organizations.
Parties in Digital Privacy
We explored the roles of various parties involved in digital privacy, including data principals, data controllers, data fiduciaries, data processors, and third-party providers.
Data Mapping and Privacy by Design
The session also covered the concept of data mapping and the principle of privacy by design, essential strategies in safeguarding sensitive information.
National Data Governance Framework Policy and IDMO Roles
Liza shed light on the National Data Governance Framework Policy and the crucial roles played by the Indian Data Management Office (IDMO) in ensuring data protection and governance.
Case Studies: Malware Attack and WhatsApp’s Tracing Originator
We analyzed real-world case studies, including a malware attack on Kundankulam Nuclear Power Plant and the implications of WhatsApp threatening to exit India due to new IT rules on tracing originators.
Digital Legacy and Succession
The discussion extended to the complexities of digital legacy and succession planning in the context of data privacy and cybersecurity.
Reporting Cybercrimes
Finally, we explored the procedures and best practices for reporting cybercrimes, empowering individuals and businesses to take proactive measures against digital threats.
Our session with Liza provided valuable insights into navigating the intricate landscape of data privacy and cybersecurity in India. As we continue to adapt to evolving technologies, understanding these concepts and implementing robust security measures are paramount for a safer digital future.
Pannel Discussion
At the conclusion Session our event, we hosted an open discussion where participants had the invaluable opportunity to engage directly with esteemed experts in the field. Viral Parmar, Devansh Soni, Adv. Liza Vanjani, and Prashant Bhavsar graciously fielded questions from the audience, providing deeper insights into data privacy, cybersecurity, legal implications, and practical strategies for safeguarding digital assets.
Conclusion
At the culmination of a day filled with insightful sessions and engaging discussions, participants were treated to a delicious lunch, providing a well-deserved break and an opportunity to network with peers and speakers. The relaxed atmosphere during lunch also encouraged further discussions and informal exchanges of ideas, reinforcing the collaborative spirit of the event.
Attend this monthly event and become part of this amazing journey.
Official Communication accounts of THM
- Facebook page — https://www.facebook.com/HackersMeetup/
- Twitter page — https://twitter.com/hackers_meetup
- Instagram page — The Hackers Meetup (@thehackersmeetup) • Instagram photos and videos
- LinkedIn page — The Hackers Meetup: Overview | LinkedIn
- Medium Profile — https://medium.com/@thehackersmeetup
Written by: Deepak S Rodge