Forensics involves the investigation and documentation of a given crime to provi
ID: 3842361 • Letter: F
Question
Forensics involves the investigation and documentation of a given crime to provide evidence that is typically used for legal action. E-mail is extensively used in personal and business operations to communicate with individuals in a fast and cost-effective manner. However, more frequently than not, email is used as a platform for fraud, deceit, crime, identity theft, or even information phishing.
1. What are some examples of e-mail scams (e.g., Nigerian scams, false credit or account alerts, dating scams, etc.)?
2. What is the purpose of such an e-mail attack?
3. What is the relevance of IP addresses in e-mail forensics?
4. What challenges arise when attempting to identify the source of a given e-mail message?
Explanation / Answer
1.Urgent-Important Campus Alert!
This type of phishing email trying to get you to enter credentials. We can notice it by,
Link displays it goes to a non-Lehigh address.
It Falsely lists our address in the signature.
Generally these Uses urgency as a scare tactic.
BlackBoard Mail message
This type is likely distribute message to a number of universities.
In this type of mails The sender is not a Lehigh account;
The link in the email is also to a non-lehigh web address.
simply delete type of emails.
Phishing example from consumer Email account
In tis type sender is a generic Email account and the link is not original. The sender is not a Lehigh domain, and the message is sent impersonally to undisclosed recipients.
2.Phishing email messages are used and designed to steal money. Generally cybercriminals can do this by installing malicious software to steal personal data or money. Some times they use social engineering to convince you to install malicious software.
3.Typically we can found the details of IP Address in Log Files, Received Header fields and doing a Whois Query of a Website. If the IP Address has been found, it is imperative to Track.