Introduction to Forensics 101. Joseph A. Juchniewicz Security Analyst AmeriCredit
|
|
|
- Claude Doyle
- 10 years ago
- Views:
Transcription
1 Introduction to Forensics 101 Joseph A. Juchniewicz Security Analyst AmeriCredit
2 The Game s Afoot..
3 Today s Topics What is Forensics Is it right for your company s What are your company s needs Internal group vs. external contractor Training levels Available tools Computer Emergency Response Team
4 Forensics Forensic adj [< Latin / forensis, public, of a forum] 1. Relating to, used in, or appropriate for courts of law or for public discussion or argumentation. 2. Of, relating to, or use in debate or argument; rhetorical.
5 Modern Forensics The examination of material and or data. To determine essential features and their relationship. A manner that is admissible in a court of law; post-mortem examination.
6 What is Forensics? History? China 700? China 1248? France 1609? Paris 1813
7 History.?1784 first documented use?1835 Scotland Yard's original Bow Street Runners?1860 Jack the Ripper
8 How to fight crime from TV
9 TV and Culture? The Nightly News? Quincy? Law and Order? Homicide? CSI? 24
10 Different Names for Computer Forensics? Computer forensic analysis? Electronic discovery? Electronic evidence discovery? Digital discovery? Data discovery? Computer analysis? Computer examination
11 Computer Crime Computer Assisted Crime Computer Specific or Targeted Crime Incidental
12 What Are Your Company s Needs Big, Small, Mom and Pop One building, Multiple campuses Continental US, International
13 What s Right for Your Company The size of your organization should not determine whether or not you use computer forensics.
14 Education Education of management Education of employees/team members Don t use scare tactics
15 Internal Group vs. External Contractor
16 Finding the Right Person for the Job Right person Background Training Equipment Cost
17 Pro s for Internal Personnel? A trusted individual? Always Available? Flexible schedule? Local law enforcement contacts
18 Pro s for Internal Personnel? Part of training certification? Knowledge of company network? Knowledge of company s policy and procedures? Quick response time? Able to use as needed for other tasks
19 Con s for Internal Personnel? Costly setup? Have to purchase equipment? Have to keep up certification? Limited networking (at first)? Have to play office politics? Peer or management pressure
20 Pro s for Contract Personnel? Don t have to pay for training? Don t have to keep up certification? Don t have to play office politics? Don t have to purchase equipment
21 Pro s for Contract Personnel? Have access to other specialized team members, or associations for additional help? No peer or management pressure? Software Knowledge
22 Con s for Contract Personnel? Does not know the network? Will have to relearn your systems every time? Response time? Limited use
23 Con s for Contract Personnel? Cost for service (per incident or on call)? Restrictive time schedules? Company software knowledge
24 Costs Classes $3,000 $5,000 Software $25,000 Certifications and testing $150 - $1000 Start up equipment $10,000 - $20,000 External contractor $125-$200 an hour
25 Training Traditionally, limited to law enforcement and special government agencies. A limited number of individuals in the corporate sector allowed to participate. Currently opened up to the corporate world.
26 (The Dummies series of books is a trademark of IDG)
27 Windows vs. Unix (Spy vs. spy is a trademark of Mad Magazine)
28 A Dr. Seuss Computer Story? (Cat in the Hat is a trademark of Dr. Seuss)
29 Accrediting Organization and Accredited Classes Your handout has a list of the different organizations.
30 Education John Hopkins University The University of Texas at Dallas Capital College University of Central Florida
31 Available Tools A best of the best list in your handout.
32 Computer Emergency Response Team Friend or Foe?????????
33 Guidelines vs. Standards Establish a guideline and not standard. Standards are followed in a specific order (example items 1-10). Guideline is just that a guide, and you are not bound to follow them in any specific order.
34 Summary Sun Tzu states if you know both the enemy and yourself, you will fight a hundred battles, without danger of defeat; if you are ignorant of the enemy but only know yourself, your chances of winning and losing are equal; if you know neither the enemy nor yourself, you will certainly be defeated in every battle. (Sun Tzu, The Art of War p. 41)
35 Questions???
Dangerous Minds: The Art of Guerrilla Data Mining Mark Ryan del Moral Talabis
Dangerous Minds: The Art of Guerrilla Data Mining Mark Ryan del Moral Talabis Background Security Analytics : Concept of using data mining and AI in security Presented techniques and theories that we could
NATIONWIDE CREDIT CARD FRAUD PREVENTION. Hendi Yogi Prabowo *
NATIONWIDE CREDIT CARD FRAUD PREVENTION Hendi Yogi Prabowo * Recent global payment fraud statistics indicate the seriousness of the credit card fraud problem. In the United Kingdom, in 2009 alone, losses
Checklist for Breach Readiness. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @
Checklist for Breach Readiness Enabling a Resilient Organization Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @ Agenda Facts about breach violation impact
Organizational Structure What Works
Organizational Structure What Works Evan Wheeler Director, Omgeo Session ID: PROF-001 Session Classification: Professional Development Once you have gotten past the first few months, you will be presented
Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age
Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age Southern California Association for Financial Professionals February 14, 2014 Stan Stahl, Ph.D.
Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: What do large enterprises need in order to address increasingly
Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security
Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @ Agenda Review the
The Definitive Guide to Credit Card Surcharging
The Definitive Guide to Credit Card Surcharging (for Merchants) Merchant surcharging made easy. American merchants pay the highest merchant fees in the world, fees that are many times higher than the fees
Financial Strategy for Divorce
Financial Strategy for Divorce A step-by-step guide to divorce and money Lee D. Sanderson, CPA, ABV, CFF, CVA, MST Web download version Copyright 2009 www.financialstrategyfordivorce.com Page 1 Legal Disclaimer
Practice before the U.S. Tax Court
Practice before the U.S. Tax Court Presented to Southern AZ Chapter of Enrolled Agents in Tucson, AZ June 18, 2013 monthly meeting Overview of Presentation Admission to practice Why take the exam? Costs
SUMMARY SELECTED EXAMPLE ENGAGEMENTS. Jerry Hatchett
SUMMARY Mr. Hatchett consults in the areas of digital forensics and electronic providing assistance to law firms, businesses of all sizes, federal and state courts, and foreign and domestic governmental
Classroom Activities Post Mortem: This Is Not Your CSI
Classroom Activities Post Mortem: This Is Not Your CSI VIDEO OVERVIEW Watch Chapter One of the FRONTLINE film Post Mortem "This Is Not Your CSI (http://www.pbs.org/frontline/teach/post-mortem). Every day
Mad Hatter Drive Official Rules
Mad Hatter Drive Official Rules Thank you for your interest in the Hats Off For Cancer Mad Hatter Drive! We re excited for you and we re here to help you along the way. These rules will help you shape
4200 West Vickery Blvd., Second Floor Fort Worth, Texas 76107 817-928-4222 (phone) 817-385-6715 (fax) Greg Westfall greg@westfallfirm.
4200 West Vickery Blvd., Second Floor Fort Worth, Texas 76107 817-928-4222 (phone) 817-385-6715 (fax) Greg Westfall [email protected] Practice: State and Federal Criminal Defense (Trials and Appeals);
Quality Digital Forensics - the Frontier
Quality Digital Forensics - the Frontier Mark M. Pollitt Asst. Professor University of Central Florida Bachelor of Science Engineering Technology (BSET) BSET- Design BSET- Operation BSET- GeomaticsBSET-
You will see a giant is emerging
You will see a giant is emerging Let s Talk Mainstream Sports More than 290 million Americans watch sports (90% of the population) Billion dollar company with less - 72% (18-29 years old), 64% (20-49 years
The Rules of Business Planning for Successful Business Growth. Jack Derby [email protected]
The Rules of Business Planning for Successful Business Growth Jack Derby [email protected] Availability The Wicked Commute Call or email me anytime Cell: 617-504-4222 Email [email protected]
The Nuclear Weapons Debate
Scottish CND - Education Pack The Nuclear Weapons Debate Scottish CND s educational resource Nuclear Weapons: Yes or No is aimed at late primary to early secondary school pupils. It has 4 units: The Nuclear
How CNCERT/CC fighting to Botnets. Dr.Mingqi CHEN CNCERT/CC March 31, 2006. Beijing
How CNCERT/CC fighting to Botnets Dr.Mingqi CHEN CNCERT/CC March 31, 2006. Beijing Part 1 Content New security threats Part 2 How to detect and handle BotNets Part 3 Fighting BotNets Activities Part 4
Words to Know before You Go!
Words to Know before You Go! American Revolution Neutral Patriot Loyalist Traitor Conspiracy Petticoat Rebel Betray Fun Facts John Jay was the eighth of ten children. Today King s College, the school where
Nancy W. Peterson Forensic Biology Consultants, LLC July 7, 2011
Nancy W. Peterson Forensic Biology Consultants, LLC July 7, 2011 My Qualifications 20 years : Forensic Serology and DNA cases at the FDLE 30+ years: Training Forensic DNA Technologists & DNA Analysts 30+
Speaker Info Tal Be ery
Battlefield Network Speaker Info Tal Be ery Senior Security Research Manager @Microsoft Former VP for Research @Aorato (Acquire by Microsoft) 15 years of security research Author of the TIME attack on
Activity 1A: Perceptions of Crime and Justice
Activity 1A: Perceptions of Crime and Justice Students create and share poems that reflect their perceptions of crime and justice. They are introduced to the components and goals of the criminal justice
VivintSolar. Steve Hellman 1-844-217-7010 phone/fax [email protected]
VivintSolar Steve Hellman 1-844-217-7010 phone/fax [email protected] BY DOING THIS: My job is Super Simple. I do 3 things: 1. First, I explain the Program to you. 2. Second, I Answer All of
CURRICULUM VITAE (updated 3/11/13)
CURRICULUM VITAE (updated 3/11/13) NAME: PROFESSION: ADDRESS: Deandra M. Grant DWI Trial Attorney, 1994-present DWI Forensic Consultant, 2010-present Vice President, International Legal & Forensic Science
INTRODUCTION DO YOU NEED A LAWYER?
INTRODUCTION The purpose of this handbook is to provide answers to some very basic questions that inmates or inmates families might have regarding the processes of the criminal justice system. In no way
ACLU Advisory: Bond Hearings for Certain Immigrants Subject to Prolonged Immigration Detention Under Rodriguez v. Robbins
ACLU Advisory: Bond Hearings for Certain Immigrants Subject to Prolonged Immigration Detention Under Rodriguez v. Robbins This advisory discusses a recent federal court decision ordering bond hearings
Know your enemy. Class Objectives Threat Model Express. and know yourself and you can fight a hundred battles without disaster.
Know your enemy and know yourself and you can fight a hundred battles without disaster. Sun Tzu Class Objectives Threat Model Express Create quick, informal threat models 2012 Security Compass inc. 2 1
Threat Modeling. Deepak Manohar
Threat Modeling Deepak Manohar Outline Motivation Past Security Approaches Common problems with past security approaches Adversary s perspective Vs Defender s perspective Why defender s perspective? Threat
Introduction to Forensic Science and the Law. FBI Building Washington, DC
FBI Building Washington, DC 1 Objectives You will understand: How crime labs in the United States are organized and what services they provide. The growth and development of forensic science through history.
Lance Eliot Sloves. Computer Forensic Services, Inc. 2807 Allen St. #743 E-mail: [email protected]
Lance Eliot Sloves Certified Computer Examiner (CCE, EnCE) Licensed Private Investigator, TX Testifying Expert Independent Government Contractor Active Top Secret/SSBI US Government Clearance Computer
Contact: Gloria Allred Phone: 323-653-6530 Email: [email protected]. Statement of Gloria Allred Regarding the NFL
Contact: Gloria Allred Phone: 323-653-6530 Email: [email protected] Statement of Gloria Allred Regarding the NFL Last Friday, September 26, 2014, I delivered a letter to the NFL Commissioner Roger Goodell
William A. Lugo, PhD
William A. Lugo, PhD Department of Sociology, Anthropology, and Social Work Eastern Connecticut State University 83 Windham St. Willimantic, CT 06226 860-465-0163 [email protected] www.easternct.edu/~lugow
ACCIDENT & INCIDENT INVESTIGATION FOR UPSTREAM OIL & GAS
COURSE ACCIDENT & INCIDENT INVESTIGATION FOR UPSTREAM OIL & GAS Houston Marriott West Loop by The Galleria is authorized by IACET to offer 0.7 CEUs for the course. Media Sponsor 1 OVERVIEW There is seldom
U. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
How To Market Your Law Firm Through Social Media
A Social Media Primer for Lawyers Introduction What Is Social Media and Should You Be Using It? Many lawyers have questions about the new social media phenomena. What is it? Should they use it? What is
Digital Forensics for Attorneys - Part 2
Lars Daniel, EnCE Digital Forensics for Attorneys - Part 2 Experts, Analysis, Challenging Evidence Digital Forensics For Attorneys Part I Overview of Digital Forensics Types of Digital Evidence Acquisition
Sniper Forensics v3.0 Hunt
Sniper Forensics v3.0 Hunt Presented by: Christopher Pogue, CISSP, CEH, CREA, GFCA, QSA Managing Consultant SpiderLabs Incident Response and Digital Forensics Who Am I? Managing Consultant for the Trustwave
Introduction. What is campaigning?
Campaigning toolkit If you require this document in an alternative format, such as large print or a coloured background, please contact [email protected] Introduction A well planned campaign
817-504-6650 1531 Duncanville Road Dallas, TX 75211 [email protected]. Knowledge of regulatory agency rules Supervision experience
Highly accomplished Individual with extensive education and managerial experience. Has strong leadership and motivational skills, proven ability to manage and train both faculty and staff. Recognized for
Computer Forensics Today
L A W, I N V E S T I G A T I O N S, A N D E T H I C S Computer Forensics Today Kelly J. (KJ) Kuchta When people hear the word forensics, it often generates a mental image of the movie series with Jack
Three Hot Tactical War Room Strategies That Will Explode Your Sales
Special Report $29.97 Three Hot Tactical War Room Strategies That Will Explode Your Sales Tactical Strategy No. 1. Emotions vs. Logic in Persuasion I am frequently asked whether emotion or logic is more
Running head: TIME FOR A CHANGE 1. Time for a Change: Legalizing Marijuana in the State of Texas. Ronald Cummings.
Running head: TIME FOR A CHANGE 1 Time for a Change: Legalizing Marijuana in the State of Texas Ronald Cummings Excelsior College TIME FOR A CHANGE 2 Time for a Change: Legalizing Marijuana in the State
Game Theory Syllabus
Game Theory Syllabus Course Description Many events in life are competitive in one way or another, and Game Theory in the past few decades has revolutionized what to look for and how to act when engaged
REPRESENTING THE ACCUSED COP KILLER (Lessons from the Trenches) STATE OF ALABAMA VS. MARIO DION WOODWARD 03-CC-2007-1388-TMH (Mont. Co. Cir.
REPRESENTING THE ACCUSED COP KILLER (Lessons from the Trenches) STATE OF ALABAMA VS. MARIO DION WOODWARD 03-CC-2007-1388-TMH (Mont. Co. Cir. Court) I. PUBLICITY: Joseph P. Van Heest, Esq., Richard K. Keith,
Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE
Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE 9 Cranbrook Road, Sunnyridge, East London, 5201 Cellphone Number: 083 556 7112 E-Mail: [email protected] Professional Summary A multidisciplinary digital
The Insider s Guide to Immigration Attorneys
The Insider s Guide to Immigration Attorneys + Immigration Attorney, Wendy Whitt Presents: How to Choose an Immigration Attorney in 5 Easy Steps Save Money Save Time Avoid Hassle Get Results Feel Confident
News Debate: Atten-Hut!
Non-fiction: News Debate: Atten-Hut! News Debate: Atten-Hut! Should there be restrictions on military recruiters in schools? In San Diego, it s not unusual to see members of the military on high school
INTEGRITY FORENSICS. Where the Evidence Tells the Truth. Charles M. Pruitt 2545 Bellwood Road Richmond, Virginia 23237 chuck@integrity-forensics.
Charles M. Pruitt 2545 Bellwood Road Richmond, Virginia 23237 [email protected] My career began in 1975 with the Newport News Police Department; within four years I was promoted to Detective
Why do so many companies call on McKool Smith?
Why do so many companies call on McKool Smith? What the business community says... McKool Smith has long been my go to firm for important matters throughout the United States, and I continue to be impressed
Firstly, I would like to thank the organizers of this symposium for
Keynote Address by former Prime Minister of Malaysia Are We Really Civilized? Make War a Crime Mahathir bin Mohamad Firstly, I would like to thank the organizers of this symposium for this opportunity
HNC and HND Practical Journalism
HNC and HND Practical Journalism HNC and HND Practical Journalism Journalism can be a great career exciting, rewarding and challenging but it is also hard work and very competitive. With fewer jobs available
THE UNIVERSITY OF TEXAS AT ARLINGTON Department of Criminology and Criminal Justice Online
THE UNIVERSITY OF TEXAS AT ARLINGTON Department of Criminology and Criminal Justice Online Thank you for your interest in the Online Bachelor Degree in Criminology and Criminal Justice offered through
Curriculum Vitae. EDUCATION Bachelor of Science Major: Zoology; Minor Chemistry (1980) South Dakota State University Brookings, SD
Terry L. Robinson Southwestern at Dallas Forensic Chemistry Department 2355 North Stemmons Freeway Dallas, Texas 75207 Office: (214) 920-5965 Fax: (214) 920-5918 [email protected] 2013 Curriculum
Forensics in Nuclear Security. by the Netherlands Forensic Institute
Forensics in Nuclear Security by the Netherlands Forensic Institute Combating the threat of nuclear terrorism In an age when the threat of terrorist violence appears more immediate and more extreme than
How Credit Affects Your Life Episode # 205
How Credit Affects Your Life Episode # 205 LESSON LEVEL Grades 9-12 Key topics Credit Debit Debt Time Needed Preview & Screening: 45 minutes Activity #1: 45-60 minutes Activity #2: 60-90 minutes Episode
Re-Imagining the Cyber Warrior of the Future
CSO Vantage Point : Re-Imagining the Cyber Warrior of the Future Close The Gap Today, Win the Fight Tomorrow Jeff Schilling Chief Security Officer FireHost The War is Real Perhaps James R. Clapper, U.S.
Creditor Lawsuits Handbook
Creditor Lawsuits Handbook In Magisterial District Court A Handbook for people dealing with creditor lawsuits, including information on such suits and common defenses. Revised July 2009 Introduction This
Information Technologies and Fraud
Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting Information Technologies for Fraud investigation A.
Free Report. My Top 10 Tips to Betting Like a Pro With Zero Risk
Free Report My Top 10 Tips to Betting Like a Pro With Zero Risk Legal Disclaimer: EVERY EFFORT HAS BEEN MADE TO ACCURATELY REPRESENT THIS PRODUCT AND IT'S POTENTIAL. EVEN THOUGH THIS INDUSTRY IS ONE OF
Superior knowledge. Relentless advocacy.
KYLE AND WES ARE AMONG THE NEXT GENERATION OF GREAT TRIAL LAWYERS. Bruce Kaster, Kaster & Lynch, P.A. Ocala, Florida Superior knowledge. Relentless advocacy. Those words perfectly describe Farrar & Ball
OFFICE OF DAKOTA COUNTY ATTORNEY JAMES C. BACKSTROM COUNTY ATTORNEY
OFFICE OF DAKOTA COUNTY ATTORNEY JAMES C. BACKSTROM COUNTY ATTORNEY Dakota County Judicial Center 1560 Highway 55 Hastings, Minnesota 55033-2392 Phillip D. Prokopowicz, Chief Deputy Karen A. Schaffer,
CURRICULUM VITAE. David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC
CURRICULUM VITAE David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC EDUCATION: Bachelor of Science, University of the State of New York, Albany, NY, 1995 AA, Criminal
Problem Management: The Game Changer The Value Creator
Problem Management: The Game Changer The Value Creator How to successfully generate value from this challenging ITSM process By: Barclay Rae for Cherwell Software Ltd. What is Pro Managemen Problem Management
By Wayne McDonell [email protected] Forex Trading Expo Las Vegas September 12 & 13 2008
STRATEGIC & tactical forex TRADING: By Wayne McDonell [email protected] Risk Warning This is an educational presentation. There are no trade recommendations. Trading and Investing is risky business.
How To Defend Your Network Security
Network Security Philosophy & Introduction Dr. Enis Karaarslan Muğla University Computer Engineering Department Netseclab.mu.edu.tr Dr. Enis Karaarslan 1 2 SECURITY PHILOSPHY 3 Computer & Network Security
W i n n i n g t h e f i g h t f o r y o u r d i s a b i l i t y b e n e f i t s.
WHATEVER IT TAKES W i n n i n g t h e f i g h t f o r y o u r d i s a b i l i t y b e n e f i t s. THIS YEAR 3,000,000 PEOPLE WILL APPLY FOR DISABILITY BENEFITS. (1) (1) STATISTICS FROM SSDI AND THE COUNCIL
The Battlefield. critical infrastructure:
CIP A Business View Rolf Schulz CEO Definition critical infrastructure: 1. Elements of a system that are so vital that disabling any of them would incapacitate the entire system. 2. [In security,] those
Advocates and Officers: Working Together to Address Campus Sexual Violence. www.umn.edu/aurora www.umn.edu/police 612.626.9111 612.624.
Advocates and Officers: Working Together to Address Campus Sexual Violence www.umn.edu/aurora www.umn.edu/police 612.626.9111 612.624.2677 Introductions Kevin Randolph: Investigator, University of Minnesota
