Forensics. Learning Objectives Definition of Forensics Be able to understand process in building legally sound case Identify forensic capabilities you.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Information Sharing and Cross-System Collaboration John Petrila, J.D., LL.M. Professor, University of South Florida
Protecting Personal Information Guidance for Business.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
We’ve got what it takes to take what you got! NETWORK FORENSICS.
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Legal, Regulations, Compliance and Investigations.
Security Controls – What Works
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Technology for Computer Forensics by Alicia Castro.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Guide to Computer Forensics and Investigations, Second Edition
Securing Information Systems
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
General Awareness Training
Proving Your Case - Computer Security Terrence P. Maher Abrahams Kaslow & Cassman
Do you Know Where your Data is? Gregory P. Silberman, CISSP Technology Intellectual Property & Outsourcing Group Kaye Scholer LLP May 10, 2005.
ISMS for Mobile Devices Page 1 ISO/IEC Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Investigating Cybercrime DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Chapter 17 E-Commerce and Digital Law
Computer Forensics Principles and Practices
© Copyright 2011, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers. ® CISO Executive Network Executive Breakfast.
The Accomplished Connoisseur: Professional Expertise in Support for the Corporate Law Department Presented by: Lisa Daulby Canadian Association of Law.
Lecture 11: Law and Ethics
Lesson 5-Legal Issues in Information Security. Overview U.S. criminal law. State laws. Laws of other countries. Issues with prosecution. Civil issues.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Chapter 2 Securing Network Server and User Workstations.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Cybercrime What is it, what does it cost, & how is it regulated?
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Legal and Ethical Issues in Computer Security Csilla Farkas
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Chapter 4: Laws, Regulations, and Compliance
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
FBI Phoenix Computer Crime Squad SA Tom Liffiton 10/23/2003 Maricopa Association of Governments Telecommunications Advisory Group.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Law and Ethics INFORMATION SECURITY MANAGEMENT
E&O Risk Management: Meeting the Challenge of Change
Chapter 7: Investigating Theft Acts
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Legal, Regulations, Compliance and Investigations
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Chapter 3: IRS and FTC Data Security Rules
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
CompTIA Security+ Study Guide (SY0-401)
Health Care: Privacy in a Digital Age
Exam Information CSI5107 Network Security.
Security week 1 Introductions Class website Syllabus review
Presentation transcript:

Forensics

Learning Objectives Definition of Forensics Be able to understand process in building legally sound case Identify forensic capabilities you will need in a typical corporate environment

Definition Forensic: –“…a characteristic of evidence that satisfies its suitability for admission as fact and its ability to persuade based upon proof (or high statistical confidence).” The aim of forensic science is: –“…to demonstrate how digital evidence can be used to reconstruct a crime or incident, identify suspects, apprehend the guilty, defend the innocent, and understand criminal motivations.” Ref: Casey, “Digital Evidence and Computer Crime”, 2nd ed., section 1.6, p20.

The Goal of Forensics Forensics seeks to provide an accurate representation of extracted data: find out the truth –How was it lost? –What was lost? –What are my obligations concerning the loss?

Forensics vs. Incident Handling Closely tied together, but different Data collection starts immediately as a part of incident handling Data analysis is not a part of incident handling The incident can sometimes be closed before forensic analysis is complete

Legally Sound Data Collection Security in Computing, chapter 9.5 Goals –Build a solid case –Find out what was lost –Find out the truth

Privacy Issues Generally apply principles from the physical world –Can you: Read my mail? Listen to my phone call? Obtain a copy of my phone bill?

Applicable Statutes Computer fraud and abuse act, 18USC1030 –Protects against unauthorized access (privacy intrusion)

Applicable Statutes (2) Federal Wiretap Act (18USC ) –Protect data in transit (real-time) –Three key exceptions: Provider Consent Trespasser

Applicable Statutes (3) Pen Registers and Trap and Trace Devices, 18USC –Pen/trap or Trap & Trace –Real-time collection of header information What is header information?

Applicable Statutes (4) The Electronics Communications Privacy Act –ECPA –Protects stored data (both headers and content) –What is the difference between read voice mail and unread voice mail?

Applicable Statutes (5) Patriot Act –Patches up ECPA and others by clearly defining how Law Enforcement can gather data –Renewed in early 2006 with only minor changes

Applicable Statutes (6) Other traditional statutes may apply –Trade secrets –Harassment –Copyright Infringement

Applicable Statutes (7) Summary –Headers vs. content –Real-time vs. stored –Complex and changing Acting under the cover of law –What information can you share with law enforcement?

Employee Rights Bannering –What should be in an acceptable use policy? –Is bannering sufficient? Pseudo-employees –Contractors –Consultants –Temps –Interns –Auditors –…

Case Study(1) Acceptable Use Violation –Indications –Initial course of action –What are you certain you can do? –What are you certain you can not do? –Where do you go for guidance?

Regulatory Issues Gramm-Leach-Bliley Act of 1999 (GLBA) –Protect consumer personal financial data Health Insurance Portability and Accountability Act of 1996 (HIPAA) –Federal privacy protection for individually identifiable health information Public Firms –SEC, NASD requirements for document retention

Data Collection Make copies of everything Only work on copies Create MD5 checksums

Data Collection Toolkit Software –Static binaries –Linux-based Hardware –Cables, adapters –Very large drives Chain of custody forms Calibration procedure

Case Study(2) Bringing the evidence to court –Do you really have to explain an MD5 checksum of a hard drive to the jurors?

Lost when machine is powered off Lost if you wait too long Data on the Computer Real-time only In files In log files Browser history Windows prefetch area Slack space Open network connections Virtual memory Physical memory Network traces

Data on Other Computers Infrastructure logs –Web servers, mail servers Archival systems Network / Firewall logs Intrusion detection systems Everything that logs

Data in Unexpected Places Anti-virus alerts, real-time anti-virus scans License enforcement / application metering [anything]Management Software –Patch management –Software management –Configuration management –Asset management

Case Study(3) You receive a workstation anti-virus alert –Where do you expect to find log data?

Case Study(4) Data on someone else’s computer

Gathering Data from People Interviews –With others –With the suspect Interview Techniques –Never reveal what you do or do not know Did you ever ask a first grader what happened in school today?

Data Sources – Summary Defense in depth == forensics in depth Only you know all the potential data sources –It is always your responsibility to help identify and present the data

Corporate Forensics

The Big Question Can you ever imagine this event/incident leading to a court case? –Yes: legally sound collection –No: more flexibility but fewer resources; often a good training execrcise –Always consider the costs: Prosecution Damage to reputation Loss of corporate secrets

Case Study(5) A routine anti-virus alert (revisited)

Preparations Pre-planning Training Consider outsourcing –Managed cost –Impartial results –Add an addendum to your MSSP contract

Decisions, Decisions CSo, CIO, CEO, CLO What decisions need to be made? When and how do you receive elevated authority? –Admin rights –Right to monitor How do you proceed when there is no decision?

Case Study(6)

What can we learn from: – logs –Web server logs –Interviews –Human resources Who would be involved in making decisions? What are some possible outcomes?

Law Enforcement FBI FTC US Postal Inspectors US Secret Service Local law enforcement Task forces and other institutions

Law Enforcement Build relationships beforehand Cooperation leads to resource sharing Law Enforcement does not know your network topology

Conclusion Definition of Forensics –Tell the story: what was lost, how it was lost Be able to understand process in building legally sound case –Complex issues Identify forensic capabilities you will need in a typical corporate environment –Only you know your topology