MANAGEMENT of INFORMATION SECURITY, Fifth Edition

Slides:



Advertisements
Similar presentations
Rev. 2/05. For Use in Law Enforcement Training Only This training program was developed by the New Jersey Division of Criminal Justice This training program.
Advertisements

Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Criminal.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Guide to Computer Forensics and Investigations, Second Edition
Computer Forensics and Digital Investigation – a brief introduction Ulf Larson/Erland Jonsson.
BACS 371 Computer Forensics
The Corruption and Crime Commission: Threat to organised crime, or to our concept of justice? Malcolm McCusker AO QC The John Curtin Institute of Public.
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
Chapter 17 Videotapes, Photographs, Documents, and Writings as Evidence.
Criminal Justice 2011 Chapter 2: The Crime Scene: Field Notes, Documenting, and Reporting Criminal Investigation The Art and the Science by Michael D.
Legal Aspects of Criminal Investigation: Arrest, Search and Seizure
INTRODUCTION TO THE LAW OF EVIDENCE
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
By Drudeisha Madhub Data Protection Commissioner Date:
Unit Five Lesson 31 How do the Fourth and Fifth Amendments Protect Against Unreasonable Law Enforcement Procedures.
Guide to Computer Forensics and Investigations, Second Edition
Proving Your Case - Computer Security Terrence P. Maher Abrahams Kaslow & Cassman
Forensic Science Types of Evidence. What is Forensic Science? The use of science in the examination of evidence associated with crime.
Management of Information Security, 4th Edition
Arrests and Miranda. 2 Copyright and Terms of Service Copyright © Texas Education Agency, These materials are copyrighted © and trademarked ™ as.
Computer Forensics Principles and Practices
Investigation & Arrest – BIG PICTURE CRIME Police are notified 911 POLICE investigate ensure public safety protect & preserve crime scene collect & identify.
ICU and Forensics. 1.Describe information which should be consistently communicated by healthcare providers for those patients thought to be injured due.
Lecture 11: Law and Ethics
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
The Warrant Process Chapter Three All Images © Microsoft Corporation Written by Karmel Tanner May 2010.
STANKIEWICZ. Essential Questions and Learning What is the purpose of criminal Investigation? What are the basic steps in criminal investigations? What.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Criminal Investigation: An Overview
“ Copyright © Allyn & Bacon 2008 Criminal Evidence Chapter Twelve: Documentary and Scientific Evidence This multimedia product and its contents are protected.
Unit 2 – Legal Issues facing the Investigator.  Agency resources from a federal, state, or local level that could assist the investigator  Legal issues.
2- PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ CRIMINALISTICS An Introduction to Forensic Science, 9/E By Richard Saferstein.
1 Introduction to Forensic Science and the Law Fourth amendment protects citizens against “unreasonable search and seizures” Police and crime scene investigators.
Crime Scene Basics Forensic Science.
Forensic Training 101 Kiyosha N. Malcolm C. Kevin M. Imani W.
Processing the Crime Scene. What is physical Evidence? Any and all objects that can establish that a crime has been committed OR Can provide a link between.
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
Chapter 12: Criminal Justice Process ~ The Investigation Objective: Student should be able to correlate how the constitution relates to an investigation.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Principles of Information Security, Fourth Edition Chapter 1 Introduction to Information Security Part II.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Trial Procedures Business Law Chapter 6. Trial Procedures Civil Cases are brought by individuals Civil Cases are brought by individuals Injured party.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
Crime Scene Management Criminal Investigation Chapter 3.
Law and Ethics INFORMATION SECURITY MANAGEMENT
Criminal Justice Process: The Investigation
PhD Oral Exam Presentation
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Introduction to Computer Forensics
Crime Scene Basics STEM Forensics.
Notre Dame College Police Department
Search warrant Writing an Affidavit.
Forensic Science The Crime Scene.
Introduction to Computer Forensics
Red Flags Rule An Introduction County College of Morris
Entry Into the System Arrests and Miranda.
Personnel Investigations
Fourth Amendment And Probable Cause.
Search and Seizure Concepts
Chapter 17 Videotapes Photographs Documents Writings.
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Once the scene has been secured, a lead investigator will start processing the crime scene area.
Developing an Impartial and Appropriate Factual Record
Once the scene has been secured, a lead investigator will start processing the crime scene area.
On-Site Investigations
Presentation transcript:

MANAGEMENT of INFORMATION SECURITY, Fifth Edition

Testing contingency Plans Management of Information Security, 5th Edition, © Cengage Learning

Testing Contingency Plans Very few plans are executable as initially written; instead, they must be tested to identify vulnerabilities, faults, and inefficient processes There are four testing strategies that can be used to test contingency plans: Desk Check Structured walkthrough Simulation Full interruption Management of Information Security, 5th Edition, © Cengage Learning

Management of Information Security, 5th Edition, © Cengage Learning Final Thoughts on CP Iteration results in improvement A formal implementation of this methodology is a process known as continuous process improvement (CPI) Each time the plan is rehearsed it should be improved Constant evaluation and improvement leads to an improved outcome Management of Information Security, 5th Edition, © Cengage Learning

Managing Investigation in the Organization Management of Information Security, 5th Edition, © Cengage Learning

Managing Investigations in the Organization When - not IF - an organization finds itself having to deal with a suspected policy or law violation, they must appoint an individual to investigate it How the internal investigation proceeds will dictate whether or not the organization has the ability to take action against the perpetrator if in fact evidence is found that substantiates the charge In order to protect the organization, and to possibly assist law enforcement in the conduct of an investigation, the investigator (CISO, InfoSec Manager or other appointed individual) must act to document what happened and how Management of Information Security, 5th Edition, © Cengage Learning

Management of Information Security, 5th Edition, © Cengage Learning Digital Forensics Forensics is the coherent application of methodical investigatory techniques to present evidence of crimes in a court or court-like setting Digital forensics involves the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and/or root cause analysis Like traditional forensics, it follows clear, well-defined methodologies, but still tends to be as much art as science Management of Information Security, 5th Edition, © Cengage Learning

Management of Information Security, 5th Edition, © Cengage Learning Digital Forensics Evidentiary material (EM), also known as an item of potential evidentiary value, is any information that could potentially support the organizations legal- or policy-based case against a suspect An item does not become evidence until it is formally admitted to evidence by a judge or other ruling official Management of Information Security, 5th Edition, © Cengage Learning

Management of Information Security, 5th Edition, © Cengage Learning Digital Forensics Digital forensics can be used for two key purposes: To investigate allegations of digital malfeasance. A crime against or using digital media, computer technology or related components, is referred to as digital malfeasance To perform root cause analysis. If an incident occurs and the organization suspects an attack was successful, digital forensics can be used to examine the path and methodology used to gain unauthorized access, as well as to determine how pervasive and successful the attack was Management of Information Security, 5th Edition, © Cengage Learning

Affidavits and Search Warrants Many investigations begin with an allegation or an indication of an incident In law enforcement, the investigating agent would create an affidavit requesting a search warrant When an approving authority signs the affidavit or creates a synopsis form based on this document, it becomes a search warrant and grants permission to search for EM at the specified location and/or to seize items to return to the investigator’s lab for examination In corporate environments, the names of these documents may change and in many cases may be verbal in nature, but the process should be the same Formal permission is obtained before an investigation occurs Management of Information Security, 5th Edition, © Cengage Learning

Digital Forensics Methodology In digital forensics, all investigations follow the same basic methodology: Identify relevant items of evidentiary value (EM) Acquire (seize) the evidence without alteration or damage Take steps to assure that the evidence is at every step verifiably authentic and is unchanged from the time it was seized Analyze the data without risking modification or unauthorized access Report the findings to the proper authority Management of Information Security, 5th Edition, © Cengage Learning

Digital Forensics Process Management of Information Security, 5th Edition, © Cengage Learning

Evidentiary Policy and Procedures Organizations should develop specific digital forensics procedures, along with guidance on the use of these procedures EM policy should specify: Who may conduct an investigation Who may authorized an investigation What affidavit-related documents are required What search warrant-related documents are required What digital media may be seized or taken offline What methodology should be followed What methods are required for chain of custody or chain of evidence What format the final report should take, and to whom it should it be given Management of Information Security, 5th Edition, © Cengage Learning

Law Enforcement Involvement When an incident violates civil or criminal law, it is the organization’s responsibility to notify the proper authorities Selecting the appropriate law enforcement agency depends on the type of crime committed: Federal, State, or Local Involving law enforcement has both advantages and disadvantages: They are usually much better equipped at processing evidence, obtaining statements from witnesses, and building legal cases However, involvement can result in loss of control of the chain of events following an incident Management of Information Security, 5th Edition, © Cengage Learning