System Forensics, Investigation, and Response
|
|
|
- Rosalind Lambert
- 10 years ago
- Views:
Transcription
1 JONES AND & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES System Forensics, Investigation, and Response JOHN R. VACCA AND K RUDOLPH
2 World Headquarters Jones & Bartlett Learning 40 Tall Pine Drive Sudbury, MA Jones & Bartlett Learning Canada 6339 Ormindale Way Mississauga, Ontario L5V 1J2 Canada Jones & Bartlett Learning International Barb House, Barb Mews London W6 7PA United Kingdom Jones & Bartlett Learning books and products are available through most bookstores and online booksellers. To contact Jones & Bartlett Learning directly, call , fax , or visit our website, Substantial discounts on bulk quantities of Jones & Bartlett Learning publications are available to corporations, professional associations, and other qualified organizations. For details and specific discount information, contact the special sales department at Jones & Bartlett Learning via the above contact information or send an to Copyright 2011 by Jones & Bartlett Learning, LLC All rights reserved. No part of the material protected by this copyright may be reproduced or utilized in any form, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the copyright owner. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional service. If legal advice or other expert assistance is required, the service of a competent professional person should be sought. Production Credits Chief Executive Officer: Ty Field President: James Homer SVP, Chief Operating Officer: Don Jones, Jr. SVP, Chief Technology Officer: Dean Fossella SVP, Chief Marketing Officer: Alison M. Pendergast SVP, Chief Financial Officer: Ruth Siporin SVP, Business Development: Christopher Will VP, Design and Production: Anne Spencer VP, Manufacturing and Inventory Control: Therese Connell Editorial Management: High Stakes Writing, LLC, Editor and Publisher: Lawrence J. Goodrich Reprints and Special Projects Manager: Susan Schultz Associate Production Editor: Tina Chen Director of Marketing: Alisha Weisman Sernior Marketing Manager: Andrea DeFronzo Cover Design: Anne Spencer Composition: Sara Arand Cover Image: ErickN/ShutterStock, Inc. Chapter Opener Image: Rodolfo Clix/Dreamstime.com Printing and Binding: Malloy, Inc. Cover Printing: Malloy, Inc. ISBN: Printed in the United States of America
3 Contents Preface xiii Acknowledgments xv PART one The System Forensics Landscape 1 CHAPTER 1 System Forensics Fundamentals 2 Understanding System Forensics 3 Who Uses Forensics? 4 How Computers Are Used in Crimes 6 System Forensics Specialists and What They Do 8 Tasks of a Forensic Specialist 8 How a Forensic Specialist Begins an Investigation 10 System Forensics Evidence: Its Use and Handling 11 Digital Evidence Challenges 12 Protecting Evidence 12 Testing Forensic Evidence 12 Applying Forensic Analysis Skills 13 Following Proper Forensic Procedures 14 Types of System Forensics Analysis 14 Examples of Forensic Investigations 15 CHAPTER SUMMARY 16 KEY ConCEPTS And TERMS 16 CHAPTER 1 ASSESSMEnT 17 CHAPTER 2 overview of Computer Crime 18 Types of Cybercrime 19 DoS and DDoS Attacks 19 Intellectual Property Theft 20 Child Exploitation, Abuse, and Pornography 20 Identity Theft 20 Fraud 21 Extortion 22 Cyberstalking 22 iii
4 iv Contents Transmission of Malware 22 Hacking 22 Spamming 22 Sale and Purchase of Narcotics Over the Internet 24 Gambling 24 Sources of Cybercrime Threats 25 Nation-States 25 Cyberterrorists 25 Other Threats 26 Means, Motives, and Opportunities of Cybercriminals 27 Means: Tools and Techniques of Cybercriminals 27 Motives of Cybercriminals 28 Opportunities for Cybercriminals 30 Reporting Cybercrimes 30 What to Report 31 Where to Report Computer Crimes 32 Applicable Laws 35 The Role of System Forensics in Solving Crimes 36 CHAPTER SUMMARY 38 Key Concepts and Terms 38 Chapter 2 Assessment 39 CHAPTER 3 Challenges of System Forensics 40 Difficulties in Obtaining Forensic Digital Evidence 41 What Is Digital Evidence? 41 Data Access 43 Technical Data Collection Considerations 45 Obscured Data and Anti-Forensics 46 The Role Evidence Dynamics Plays in System Forensics 47 Scope-Related Challenges to System Forensics 49 Large Volumes of Data 50 System Complexity 51 Distributed Crime Scenes 52 Growing Caseload and Limited Resources 52 The Need for Professionalization 54 CHAPTER SUMMARY 55 Key Concepts and Terms 55 Chapter 3 Assessment 56
5 Contents v CHAPTER 4 Forensics Methods and Labs 57 Forensic Soundness 58 Forensic Frameworks and Processes 60 The DFRWS Framework 60 An Event-Based Digital Forensic Investigation Framework 60 Building a Business Case for Creating a Forensics Lab 62 Setting Up a Forensics Lab 64 The Duties of a Lab Manager and Staff 65 Planning a Forensics Lab Budget 65 Determining Physical Requirements for a Computer Forensics Lab 69 Stocking a Forensics Lab 74 Policies, Processes, and Procedures for Maintaining a Lab 77 Creating a Disaster Recovery Plan 77 Planning for Equipment Upgrades 78 CHAPTER SUMMARY 79 KEY ConCEPTS And TERMS 79 CHAPTER 4 ASSESSMEnT 80 PART TWo Technical Overview: System Forensics Tools, Techniques, and Methods 81 CHAPTER 5 System Forensics Technologies 82 How the Military Uses System Forensics 83 Which Technologies Law Enforcement Agencies Use 83 Evidence Preservation 84 Trojan Horse Programs 84 Documentation of Methodologies and Findings 85 Disk Structure 85 File Slack Searching 85 Data-Hiding Techniques 85 Fuzzy Logic Tools for Identifying Unknown Text 88 Data Encryption 88 Disk-to-Computer Matching 88 Data Compression 88 Recovery of Erased Files 89 Internet Abuse Identification and Detection 89 The Boot Process and Memory-Resident Programs 89 Flash Memory Media Processing 89
6 vi Contents How Businesses Use System Forensics Technologies 89 Remote Monitoring of Target Computers 92 Trackable Electronic Documents 92 Theft Recovery Software for Laptops and PCs 92 Handling Evidence 93 Encryption Methods and Vulnerabilities 95 Security and Wireless Technologies 98 Firewall Forensics 100 Commonly Used System Forensics Tools 102 EnCase 102 Forensic Toolkit (FTK) 102 Helix 102 AnaDisk Disk Analysis Tool 103 CopyQM Plus Disk Duplication Software 103 TextSearch Plus 103 Filter_G Intelligent Forensic Filter 104 UFED 104 Device Seizure 104 The Zdziarski Technique 105 CHAPTER SUMMARY 106 Key Concepts and Terms 106 Chapter 5 Assessment 106 CHAPTER 6 Controlling a Forensic Investigation 108 Preserving a Digital Crime Scene 109 Considerations in Collecting Evidence 111 Securing the Physical Evidence 112 Volatile Data: Two Schools of Thought 112 Determining How Much to Duplicate 113 Making a Bit Stream Backup 114 Booting a Computer 116 Examining Evidence 116 Physical Analysis and Logical Analysis 118 Physical Analysis 118 Logical Analysis 121 Legal Aspects of Acquiring Evidence 122 The Fourth Amendment 123 Processing and Logging Evidence 124 The Computer Evidence Collection Process 126 CHAPTER SUMMARY 128 Key Concepts and Terms 128 Chapter 6 Assessment 129
7 Contents vii chapter 7 Collecting, Seizing, and Protecting Evidence 130 Collecting Forensic Evidence 131 Obstacles to Data Collection 132 Types of Forensic Evidence 133 The Rules of Evidence 133 Do s and Don ts of Data Collection 134 Logging and Monitoring 136 Methods of Data Collection: Freezing the Scene and Honeypotting 136 The Steps in Seizing Forensic Evidence 138 Shutting Down the Computer 138 Documenting the Hardware Configuration of the System 139 Transporting the Computer System to a Secure Location 139 Mathematically Authenticating Data on All Storage Devices 139 Making a List of Key Search Words 140 Searching Files, File Slack, and Unallocated Space for Keywords 141 Documenting Filenames, Dates, and Times 142 Identifying File, Program, and Storage Anomalies 142 Evaluating Program Functionality 143 Documenting Findings 143 Retaining Copies of Software Used 143 Protecting Evidence: Controlling Contamination 143 Creating a Timeline 144 Forensic Analysis of Backups 145 Reconstructing an Attack 145 CHAPTER SUMMARY 146 Key Concepts and Terms 146 Chapter 7 Assessment 147 CHAPTER 8 Understanding Information-Hiding Techniques 148 History of Data Hiding 149 Alternate Data Streams (ADS) 151 Risks Associated With ADS 151 Executing Code From ADS 153 Rootkits 154 Steganography Concepts and Tools 155 Types of Steganography 155 Steganography Algorithms 156 Steganography Software 158
8 viii Contents Defeating Steganography 161 Detecting the Use of Steganography Software 161 Strengths and Weaknesses of Today s Detection Methods 163 Steganalysis 164 Extracting Hidden Information 165 Steganalysis Software 166 CHAPTER SUMMARY 167 Key Concepts and Terms 168 Chapter 8 Assessment 168 CHAPTER 9 Recovering Data 170 What Is Data Recovery? 171 Disk Structure and Recovery Techniques 172 Recovering Data After Physical Damage 172 Recovering Data After Logical Damage 174 Data Backup and Recovery 176 Obstacles to Data Backup 177 Key Elements of Data Backup 178 The Role of Backups in Data Recovery 182 Data Recovery Today 183 Handling Failures 184 Critical Thinking and Creative Problem Solving 184 Preparing for Recovery 185 CHAPTER SUMMARY 187 Key Concepts and Terms 187 Chapter 9 Assessment 188 CHAPTER 10 Investigating and Scrutinizing 189 The Roles of Mail Servers and Clients 190 Understanding Headers 192 Viewing an Header 193 Interpreting an Header 194 Tracing 195 Faking Tracing in Forensic Investigations 200 An Tracing Example 201 Legal Considerations in Investigating 203 The Fourth Amendment to the U.S. Constitution 204 The Electronic Communications Privacy Act 204
9 Contents ix CHAPTER SUMMARY 205 Key Concepts and Terms 205 Chapter 10 Assessment 206 CHAPTER 11 Performing Network Analysis 207 Network Basics 208 Wireless Networks 209 Common Network Protocols 211 Types of Network-Related Attacks 211 Types of Router Attacks 213 DoS Attacks 213 Web Attacks 214 Investigating Network Traffic 215 Using Log Files as Evidence 216 Firewall Forensics 217 Using Sniffers and Other Traffic Analysis Tools 221 Investigating Router Attacks 221 Collecting Router Evidence 223 Router Logs 224 CHAPTER SUMMARY 226 Key Concepts and Terms 226 Chapter 11 Assessment 227 CHAPTER 12 Searching Memory in Real Time with Live System Forensics 228 The Need for Live System Forensics 229 Live System Forensics Versus Dead System Analysis 230 Problems with Dead System Forensics 231 Live Forensic Acquisition 232 Benefits and Limitations of Live Acquisition 235 Live System Forensics Consistency Issues 237 Understanding the Consistency Problem 238 Locating Different Memory Segments in UNIX 240 Tools for Analyzing Computer Memory 240 Live Response 241 Volatile Memory Analysis 243 Analysis of Live Response Versus Volatile Memory Analysis 245 CHAPTER SUMMARY 247 Key Concepts and Terms 248 Chapter 12 Assessment 248
10 x Contents PART THREE Incident Response, Future Directions, and Resources 249 CHAPTER 13 Incident and Intrusion Response 250 Minimizing Incidents 251 Events and Incidents 253 Assembling an Incident Response Team 254 Establishing Team Roles 255 Coordinating a Response 256 Defining an Incident Response Plan 257 Assessment 258 Communication 259 Containment 260 Evaluation 262 Recovery 266 Document and Review 267 CHAPTER SUMMARY 268 KEY ConCEPTS And TERMS 268 CHAPTER 13 ASSESSMEnT 269 CHAPTER 14 Trends and Future directions 270 Hardware Trends 271 What Moore s Law Means to System Forensics 272 Device Overload 273 Software Trends 274 Proliferation of Software Products 274 Software as a Service 275 Forensic Support Software 275 Proliferation of Software Development Models 276 The Changing Uses of Technology 276 Collaborative Investigations 278 The Changing Legal Environment 278 The Computer Fraud and Abuse Act (1984) 278 Computer Trespass or Intrusion 280 Theft of Information 281 Interception of Communications Laws 281 Spam and Phishing Laws 282 Cybersquatting 283 Malicious Acts 284 Evolving Cybercrime Laws 285 Trends in Professionalization and Certification 285
11 Contents xi CHAPTER SUMMARY 287 Key Concepts and Terms 287 Chapter 14 Assessment 288 CHAPTER 15 System Forensics Resources 289 System Forensics Certification and Training 290 International Association of Computer Investigative Specialists (IACIS) 290 High Tech Crime Network (HTCN) 291 EnCase Certified Examiner (EnCE) Certification 291 AccessData Certified Examiner (ACE) 291 Defense Cyber Investigations Training Academy (DCITA) 292 Other Training Programs and Certifications 292 User Groups 293 Online Resources 293 System Forensics Organizations and Information 293 Discussion List Servers 294 Forensic Journals 295 Conferences 295 Forensic Tools 296 CHAPTER SUMMARY 305 Key Concepts and Terms 305 Chapter 15 Assessment 305 Appendix A Answer Key 307 appendix b Standard Acronyms 309 Glossary of Key Terms 311 References 323 Index 329
12
13 Preface Purpose of This book This book is part of the Information Systems Security & Assurance Series from Jones & Bartlett Learning ( Designed for courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area. These titles deliver fundamental informationsecurity principles packed with real-world applications and examples. Authored by Certified Information Systems Security Professionals (CISSPs), they deliver comprehensive information on all aspects of information security. Reviewed word for word by leading technical experts in the field, these books are not just current, but forward-thinking putting you in the position to solve the cybersecurity challenges not just of today, but of tomorrow, as well. Computer crimes call for forensics specialists people who know how to find and follow the evidence. This book begins by examining the fundamentals of system forensics: what forensics is, an overview of computer crime, the challenges of system forensics, and forensics methods and labs. The second part of this book addresses the tools, techniques, and methods used to perform computer forensics and investigation. These include collecting evidence, investigating information-hiding, recovering data, scrutinizing , and searching memory in real time. Finally, the third part explores incident and intrusion response, emerging technologies and future directions of this field, and additional system forensics resources. Learning Features The writing style of this book is practical and conversational. Each chapter begins with a statement of learning objectives. Step-by-step examples of information security concepts and procedures are presented throughout the text. Illustrations are used both to clarify the material and to vary the presentation. The text is sprinkled with Notes, Tips, FYIs, Warnings, and sidebars to alert the reader to additional helpful information related to the subject under discussion. Chapter Assessments appear at the end of each chapter, with solutions provided in the back of the book. xiii
14 xiv Preface Chapter summaries are included in the text to provide a rapid review or preview of the material and to help students understand the relative importance of the concepts presented. Audience The material is suitable for undergraduate or graduate computer science majors or information science majors, students at a two-year technical college or community college who have a basic technical background, or readers who have a basic understanding of IT security and want to expand their knowledge.
15 Acknowledgments The authors would like to thank the following individuals and organizations for granting permission to re-use materials in this book: Matthew Braid, Carnegie Mellon Software Engineering Institute (SEI), Computer Forensic Services, Inc., Andreas Furuseth, Frank Y. M. Law, NTI/Armor Forensics, Dr. Thomas O Connor, and Golden Richard III and Vassil Roussev (through IGI Global). The publisher wishes to extend special thanks to Kitty Wilson, whose yeoman efforts made this book possible. xv
16 About the Authors John R. Vacca is an information technology consultant and internationally known bestselling author based in Pomeroy, Ohio. Since 1982, John has written 62 books and more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA s space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in In addition, John is an independent online book reviewer. He was also one of the security consultants for the MGM movie AntiTrust, which was released in K Rudolph is a Certified Information Systems Security Professional (CISSP) with a degree from Johns Hopkins University. She is the primary author of the chapter on security awareness from the Computer Security Handbook, Vol. 5, and is also the author of the chapter on security awareness in the Handbook of Information Security published in 2006 and K is a named contributor to and participant in the work group that created NIST Special Publication , Information Technology Security Training Requirements: A Role- and Performance-Based Model. K has presented at conferences that include the Computer Security Institute Security Exchange (CSI SX) Conference in 2008, the New York Cyber Security Conference (2006 and 2007), the Annual CSI Computer Security Conferences (2005, 2007), and Information Assurance and Security Conferences held by FISSEA, FIAC, and egov. In March 2006, K was honored by the Federal Information Systems Security Educators Association (FISSEA) as the Security Educator of the Year.
Cybercrime in Canadian Criminal Law
Cybercrime in Canadian Criminal Law Sara M. Smyth, LL.M., Ph. D. Member of the Law Society of British Columbia CARSWELL Table of Contents Preface Table of Cases v xvii PART ONE Introduction to Cybercrime
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Writing Grant Proposals That Win
Writing Grant Proposals That Win FOR SALE OR FOURTH DISTRIBUTION EDITION Deborah Ward, MA, CFRE President Jones & Bartlett Learning, LLC Ward and Associates FOR SALE OR DISTRIBUTION Winona, Minnesota..
Scene of the Cybercrime Second Edition. Michael Cross
Scene of the Cybercrime Second Edition Michael Cross Chapter 1 Facing the Cybercrime Problem Head-On 1 Introduction 2 Defining Cybercrime 2 Understanding the Importance of Jurisdictional Issues 3 Quantifying
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
PRINCIPLES AND PRACTICE OF INFORMATION SECURITY
PRINCIPLES AND PRACTICE OF INFORMATION SECURITY Protecting Computers from Hackers and Lawyers Linda Volonino, Ph.D. Canisius College Stephen R. Robinson Verity Partners, LLC with contributions by Charles
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
Cybercrimes: A Multidisciplinary Analysis
Sumit Ghosh Elliot Turrini Editors Cybercrimes: A Multidisciplinary Analysis fyj Springer Part I Introducing Cybercrimes 1 A Pragmatic, Experiential Definition of Computer Crimes 3 1.1 Introducing Computer
Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC
Digital Forensics: The aftermath of hacking attacks AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC Topics Digital Forensics: Brief introduction Case Studies Case I:
How To Get A Computer Hacking Program
CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator
Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING MODULE A INTRODUCTION TO COMPUTER FORENSICS AND NVESTIGATIONS A1.0 Explain concepts related to computer forensics. A1.1 This module is measured
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge
Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings
Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,
How To Be A Computer Forensics Examiner
Richard A. Peacock 410.346.7288 (Office) 443.398.5246 (Cell) [email protected] EnCase Certified Examiner (EnCE) Access Data Certified Examiner (ACE) Access Data Mobile Phone Certified Examiner
CESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
Cyber Attacks. Protecting National Infrastructure Student Edition. Edward G. Amoroso
Cyber Attacks Protecting National Infrastructure Student Edition Edward G. Amoroso ELSEVIER. AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Butterworth-Heinemann
Simulated Health Records Simplified
Simulated Health Records Simplified 9781284031867_FMXx_i_viii.indd 1 World Headquarters Jones & Bartlett Learning 5 Wall Street Burlington, MA 01803 978-443-5000 [email protected] www.jblearning.com
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer
Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY-274 Privacy, Ethics & Computer Forensics I. Basic Course Information A. Course Number & Title: CISY-274 - Privacy, Ethics, & Computer Forensics B. New
Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix
Honeynet2_bookTOC.fm Page vii Monday, May 3, 2004 12:00 PM Contents Preface Foreword xix xxvii P ART I THE HONEYNET 1 Chapter 1 The Beginning 3 The Honeynet Project 3 The Information Security Environment
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
STATISTICAL APPLICATIONS for. HEALTH INFORMATION MANAGEMENT Second Edition
1290.ChFM 4/21/05 12:59 PM Page i STATISTICAL APPLICATIONS for HEALTH INFORMATION MANAGEMENT Second Edition CAROL E. OSBORN, PhD, RHIA The Ohio State University Health System Assistant Director Documentation
Security Intelligence Services. Cybersecurity training. www.kaspersky.com
Kaspersky Security Intelligence Services. Cybersecurity training www.kaspersky.com CYBERSECURITY TRAINING Leverage Kaspersky Lab s cybersecurity knowledge, experience and intelligence through these innovative
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V
GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V Subject Name: Cyber Security and Forensics (CSF) (Elective-II) Subject Code: 2650008 1. Learning Objectives: To understand
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
Computer Security Literacy
Computer Security Literacy Staying Safe in a Digital World Douglas Jacobson and Joseph Idziorek CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis
Course Title: Computer Forensic Specialist: Data and Image Files
Course Title: Computer Forensic Specialist: Data and Image Files Page 1 of 9 Course Description The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
Network Security: A Practical Approach. Jan L. Harrington
Network Security: A Practical Approach Jan L. Harrington ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann is an imprint of
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
COB 302 Management Information System (Lesson 8)
COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
CYBER FORENSICS (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 CYBER FORENSICS (W/LAB) Course Syllabus Course Number: CSFS-0020 OHLAP Credit: Yes OCAS Code: 8134 Course Length: 130 Hours Career Cluster: Information
Computer Hacking Forensic Investigator v8
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer
External Supplier Control Requirements
External Supplier Control Requirements Cyber Security For Suppliers Categorised as High Cyber Risk Cyber Security Requirement Description Why this is important 1. Asset Protection and System Configuration
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary
Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test
Information Security Policy
Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity
Table of Contents. Introduction. Audience. At Course Completion
Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This four-day, instructor-led course provides students
INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION
" - * INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION CHRIS PROSISE KEVIN MANDIA McGraw-Hill /Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul
ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York
INSTRUCTOR INFORMATION Name: Sanjay Goel Email: [email protected] Phone: (518) 442-4925 Office Location: BA 310b, University at Albany Office Hours: TBD CLASS INFORMATION Time: N/A Location: Online Dates:
Essentials of Public Health
luchschen/shutterstock. Essentials of Public Health Third Edition Bernard J. Turnock, MD, MPH Clinical Professor Division of Community Health Sciences School of Public Health University of Illinois at
Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist
Cyber- Attacks: The New Frontier for Fraudsters Daniel Wanjohi, Technology Security Specialist What is it All about The Cyber Security Agenda ; Protecting computers, networks, programs and data from unintended
The Role of Digital Forensics within a Corporate Organization
May 2006, IBSA Conference, Vienna The Role of Digital Forensics within a Corporate Organization Bruce J. Nikkel IT Investigation & Forensics Risk Control, UBS AG Presentation Summary An overview of digital
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
CYBER SECURITY. II. SCANDALOUS HACKINGS To show the seriousness of hacking we have included some very scandalous hacking incidences.
CYBER SECURITY Mandar Tawde, Pooja Singh, Maithili Sawant, Girish Nair Information Technology, Government Polytechnic Mumbai 49, Kherwadi Ali Yawar Jung Marg, Bandra (E), Mumbai-400051, India [email protected],
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
GFSU Certified Cyber Crime Investigator GFSU-CCCI. Training Partner. Important dates for all batches
GFSU Certified Cyber Crime Investigator GFSU-CCCI 1. Internet Fundamentals 2. Cyber Crime Essentials 3. Cyber Investigation Essentials 4. Digital Evidence in Computer Devices 5. Cyber Forensics Essentials
Fostering Incident Response and Digital Forensics Research
Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel [email protected] September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital
Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE
Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
Network Incident Report
To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850
Network Security Policy
Network Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected]
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected] SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,
Chapter 7 Securing Information Systems
1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Basics of the U.S. Health Care System
Basics of the U.S. Health Care System Nancy J. Niles MS, MPH, PhD Assistant Professor Lander University Greenwood, South Carolina World Headquarters Jones and Bartlett Publishers 40 Tall Pine Drive Sudbury,
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
Computer Forensics Preparation
Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
I N T E L L I G E N C E A S S E S S M E N T
I N T E L L I G E N C E A S S E S S M E N T (U//FOUO) Malicious Cyber Actors Target US Universities and Colleges 16 January 2015 Office of Intelligence and Analysis IA-0090-15 (U) Warning: This document
Managing internet security
Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
AN INVESTIGATION INTO COMPUTER FORENSIC TOOLS
AN INVESTIGATION INTO COMPUTER FORENSIC TOOLS K.K. Arthur 1 H.S. Venter 2 Information and Computer Security Architectures (ICSA) Research Group University of Pretoria Pretoria Department of Computer Science
e-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:
Presented by Evan Sylvester, CISSP
Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
What Data? I m A Trucking Company!
What Data? I m A Trucking Company! Presented by: Marc C. Tucker 434 Fayetteville Street, Suite 2800 Raleigh, NC, 27601 919.755.8713 [email protected] Presented by: Rob D. Moseley, Jr. 2 West
Build Your Own Security Lab
Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers
Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799
Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies
FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.
Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 4A: Forensic Processes Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Forensics Processes - objectives Investigation Process Forensic Ethics Issues Forensic
P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis
Agenda Richard Baskerville P Principles of P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Principles Kim, et al (2004) A fuzzy expert system for
^H 3RD EDITION ITGOVERNANCE A MANAGER'S GUIOE TO OATA SECURITY ANO DS 7799/IS017799 ALAN CALDER STEVE WATKINS. KOGAN PAGE London and Sterling, VA
^H 3RD EDITION ITGOVERNANCE A MANAGER'S GUIOE TO OATA SECURITY ANO DS 7799/IS017799 ALAN CALDER STEVE WATKINS KOGAN PAGE London and Sterling, VA Contents Foreword by Nigel Turnbull How to use this book
Digital Forensic Techniques
Digital Forensic Techniques Namrata Choudhury, Sr. Principal Information Security Analyst, Symantec Corporation Professional Techniques T23 CRISC CGEIT CISM CISA AGENDA Computer Forensics vs. Digital Forensics
Framework for Live Digital Forensics using Data Mining
Framework for Live Digital Forensics using Data Mining Prof Sonal Honale #1, Jayshree Borkar *2 Computer Science and Engineering Department, Aabha Gaikwad College of Engineering, Nagpur, India Abstract
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
INFORMATION SECURITY FOR YOUR AGENCY
INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL)
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL) COURSE DESCRIPTION: Computer Forensics is focused on teaching
Information Security Incident Management Guidelines
Information Security Incident Management Guidelines INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu Version #1.0, June 21, 2006 Copyright 2006 by The Regents of The University of
