Legal, Regulations, Compliance and Investigations

Slides:



Advertisements
Similar presentations
Practical Application of Computer Forensics Lisa Outlaw, CISA, CISSP, ITIL Certified.
Advertisements

IT Security Policy Framework
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Legal, Regulations, Compliance and Investigations.
Security Controls – What Works
Forensic and Investigative Accounting
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Internal Auditing and Outsourcing
Chapter Two Ethical & Legal Issues.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Legal, Regulations, Investigations and Compliance.
11/13/2012ISC329 Isabelle Bichindaritz1 Professional, Legal, and Ethical Concerns in Data Management.
Professional, Legal and Ethical Issues CPSC 356 Database Ellen Walker Hiram College (Includes figures from Database Systems by Connolly & Begg, © Addison.
Computer Forensics Principles and Practices
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
Lecture 11: Law and Ethics
ISA Domain 10: Legal, Regulations, Compliance, & Investigations ISA 562 Internet Security Theory & Practice.
Lesson 5-Legal Issues in Information Security. Overview U.S. criminal law. State laws. Laws of other countries. Issues with prosecution. Civil issues.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 5 Intellectual Property.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
每时每刻 可信安全 1 Since disks and other magnetic media are only copies of the actual or original evidence, what type of evidence are they are often considered.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
PwC Informations- gold assets. 2 Introduction 3 Central and Eastern EuropeGlobal Number of companies that have been victims of economic crime in the.
Implementation of the Personal Data Protection law of Georgia Giorgi Giorganashvili Head of IT department of the Office of the personal data protection.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Chapter 4: Laws, Regulations, and Compliance
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Forensic and Investigative Accounting Chapter 13 Computer Forensics: A Brief Introduction © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago,
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
CyberLaw. Assignment Review Cyber LawCyberLaw 6/23/2016 CyberLaw 3 Securing an Organization  This Chat: CyberLaw and Compliance –Forensics –Privacy.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
Digital Single Market Valentinas KVIETKUS Baltic Assembly, Ryga
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Law and Ethics INFORMATION SECURITY MANAGEMENT
Safeguarding CDI - compliance with DFARS
Creighton Barrett Dalhousie University Archives
PhD Oral Exam Presentation
Ogletree, Deakins, Nash, Smoak & Stewart PC
Protection of CONSUMER information
E&O Risk Management: Meeting the Challenge of Change
Chapter 3: IRS and FTC Data Security Rules
IS4680 Security Auditing for Compliance
U.S. Department of Justice
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
Confidentiality and Privacy Controls
Chapter 4 Law, Regulations, and Compliance
Employee Privacy and Privacy of Employee Information
CompTIA Security+ Study Guide (SY0-401)
Health Care: Privacy in a Digital Age
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Ad Hoc Phase Structured Phase Enterprise Phase
IS4680 Security Auditing for Compliance
Evidence in an Electronic Age – What is admissible?
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
Introduction to the PACS Security
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Legal, Regulations, Compliance and Investigations Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2012 Legal, Regulations, Compliance and Investigations

Domain Objectives International Legal Issues Incident Management Forensic Investigation Compliance

Jurisdiction Law, economics, beliefs and politics Sovereignty of nations

International Cooperation Initiatives related to international cooperation in dealing with computer crime The Council of Europe (CoE) Cybercrime Convention

Computer Crime vs. Traditional Crime Violent Property Public Order Computer Crime Real Property Virtual Property

Intellectual Property Protection Organizations must protect intellectual property (IP) Theft Loss Corporate espionage Improper duplication Intellectual property must have value Organization must demonstrate actions to protect IP

Intellectual Property: Patent Definition Advantages

Intellectual Property: Trademark Purpose of a trademark Characteristics of a trademark Word Name Symbol Color Sound Product shape

Intellectual Property: Copyright Covers the expression of ideas Writings Recordings Computer programs Weaker than patent protection

Intellectual Property: Trade Secrets Must be confidential Protection of trade secret

Import and Export Law Strong encryption No terrorist states

Liability Legal responsibility Penalties Negligence and liability

Negligence Acting without care Due care

Transborder Data Flow Political boundaries Privacy Investigations Jurisdiction

Personally Identifiable Information (PII) Identify or locate Not anonymous Global effort

Privacy Laws and Regulations Rights and obligations of: Individuals Organizations

International Privacy Organization for Economic Co-operation and Development (OECD) 8 core principles

Privacy Law Examples Health Insurance Portability and Accountability Act (HIPAA) Personal Information Protection and Electronics Document Act (PIPEDA) European Union Data Protection Directive

Employee Privacy Employee monitoring Training Authorized usage policies Internet usage Email Telephone Training

Domain Objectives International Legal Issues Incident Management Forensic Investigation Compliance

Incident Management Prepare, sustain, improve Protect infrastructure Prepare, detect respond

Collection of Digital Evidence Volatile and fragile Short life span Collect quickly By order of volatility Document, document, document!

Chain of Custody for Evidence Who What When Where How

Investigation Process Identify suspects Identify witnesses Identify system Identify team Search warrants

Investigation Techniques Ownership and possession analysis Means, opportunity and motives (MOM)

Behavior of Computer Criminals Computer criminals have specific MO’s Hacking software / tools Types of systems or networks attacked, etc. Signature behaviors MO and signature behaviors Profiling

Interviewing vs. Interrogation General gathering Cooperation Seek truth Specific aim Hostile Dangerous

Evidence: Hearsay Hearsay Business records exception Second hand evidence Normally not admissible Business records exception Computer generated information Process of creation description

Reporting and Documentation Law Court proceedings Policy Regulations

Communication About the Incident Public disclosure Authorized personnel only

Domain Objectives International Legal Issues Incident Management Forensic Investigation Compliance

Computer Forensics: Evidence Potential evidence Evidence and legal system

Computer Forensics Key components Crime scenes Digital evidence Guidelines

Computer Forensics: Evidence Identification of evidence Collection of evidence Use appropriate collection techniques Reduce contamination Protect scene Maintain the chain of custody and authentication

Computer Forensics: Evidence Scientific methods for analysis Characteristics of the evidence Comparison of evidence Presentation of findings Interpretation and analysis Format appropriate for the intended audience

Forensic Evidence Procedure Receive media Disk write blocker Bit for bit image Cryptographic checksum Store the source drive

Forensic Evidence Analysis Procedure Recent activity Keyword search Slack space Documented

Media Analysis Recognizing operating system artifacts File system Timeline analysis Searching data

Software Analysis What it does What files it creates

Network Analysis Data on the wire Ports Traffic hiding

Domain Objectives International Legal Issues Incident Management Forensic Investigation Compliance

Compliance Knowing legislation Following legislation

Regulatory Environment Examples Sarbanes-Oxley (SOX)) Gramm-Leach-Bliley Act (GLBA) Basel II

Compliance Audit Audit = a formal written examination of controls Auditor role = 3rd party evaluator Continuous auditing = automation

Audit Report Format Introduction Executive summary Background Audit perspective Scope and objectives Executive summary Internal audit opinion Detail report including auditee responses Appendix Exhibits

Key Performance Indicators (KPI) Illegal software Privacy Security related incidents

Domain Summary This domain reviewed the areas a CISSP candidate should know regarding : International legal issues Incident management Forensic investigation Compliance