Overview of Digital Forensics
|
|
|
- Elizabeth Welch
- 9 years ago
- Views:
Transcription
1 Overview of Digital Forensics Cybersecurity Digital Forensics Cyberincidents are fast moving and increasing in number and severity. When a cyberincident occurs, the attacked enterprise responds with a set of predetermined actions. Applying digital forensics to aid in the recovery and investigation of material on digital media and networks is one of these actions. Digital forensics is the process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally acceptable in any legal proceedings (i.e., a court of law). The purpose of this white paper is to provide an overview of digital forensics as it applies to cybersecurity.
2 Cybersecurity Digital Forensics Cyberincidents are fast moving and increasing in number and severity. When a cyberincident occurs, the attacked enterprise responds with a set of predetermined actions. Applying digital forensics to aid in the recovery and investigation of material on digital media and networks is one of these actions. Digital forensics is the process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally acceptable in any legal proceedings (i.e., a court of law). 1 The purpose of this white paper is to provide an overview of digital forensics as it applies to cybersecurity. The methods that digital forensics uses to handle digital evidence are very much grounded in the field s roots in the scientific method of forensic science. Every forensic science certification requires a code of conduct of an unbiased and ethical approach to examinations. BRIEF HISTORY OF DIGITAL FORENSICS Digital forensics is nearly 40 years old, beginning in the late 1970s as a response to a demand for service from the law enforcement community (see figure 1). Most of the first criminal cases that involved computers were for financial fraud. 2 In the 1980s, digital forensics training courses were developed by organizations such as the Association of Certified Fraud Examiners, the National Consortium for Justice Information and Statistics, and the High Technology Crime Investigation Association (HTCIA); the first digital forensics company, Access Data, was formed; and the International Association of Computer Investigative Specialists (IACIS) was formed. 3 Today, students can earn a Bachelor of Science degree in Computer Forensics and Digital Investigations. FIGURE 1 Digital Forensics Time Line Ad Hoc Structured Phase Enterprise Phase Golden Age International Organization on Computer Evidence formed 1 st International Conference on Computer Evidence Financial Cases 1 st Forensics Company Access Data Search, FLETC, HTCIA, FBI CART Team Association of Certified Fraud Examiners Scientific Working Group UK National Hi-Tech Crime Unit Budapest Convention on Cybercrime ISO publishes standard ISO SWGD publishes Best Practices for Computer Forensics Paper DOJ/FBI Technical Working Group Digital Evidence (SWGDE) 1 Mohay, George M.; Alison Anderson; Byron Collie; Rodney D. McKemmish; Olivier de Vel; Computer and Intrusion Forensics, Artech House, USA, Ibid. 3 The International Society of Forensic Computer Examiners, Certified Computer Examiner, 2
3 Early forensic tools, like MACE and Norton, provided basic recovery abilities, such as undelete and unformat. Most investigations were on a single workstation that was used by one individual. The open-source, community-driven model that is used today for digital forensic tool development makes tool evolution modular, extensible, robust and sustainable, across various platforms. Software and standards baselines provide a foundation that focuses on extensions, plug-ins and digital evidence bag (DEB) metaformat for development. Government involvement in standardizations began in 1984, when the FBI established the Computer Analysis and Response Team (CART) to meet the growing demands of law enforcement for a more structured approach to examine evidence. By the early 1990s, the FBI was assisting the US Postal Service in creating its own computer forensics unit. A group of federal crime laboratory directors, which became the Scientific Working Group on Digital Evidence (SWGDE), began meeting twice a year to discuss areas of mutual interest. After Mark Pollitt, Unit Chief of CART, spoke to the directors about digital evidence and Scott Charney, CCIPS, discussed legal aspects of computer evidence and search warrant requirements for seizing digital evidence, another technical working group (TWG) was formed to address the forensic issues that are related to digital evidence. 4 In the United Kingdom, the needs of law enforcement led to the creation of the National Hi-Tech Crime Unit in 2001, with resources that are centralized in London. The unit became the Serious Organised Crime Agency (SOCA) in Following are further developments in digital forensics: 1993 The first International Conference on Computer Evidence was held in the United States The International Organization on Computer Evidence (IOCE) was formed G8 appointed IOCE to create international principles, guidelines and procedures for digital evidence and the INTERPOL Forensic Science Symposium, to respond to issues in computer forensics. With the advent of cases admitting digital evidence in court, there was a need for standardization The SWGDE published Best practices for Computer Forensics The Budapest Convention on Cybercrime, which was signed in 2001, became effective. The convention worked to reconcile national computer crime laws, investigative techniques and international cooperation. The Convention was the first international treaty on crimes committed via the Internet and other computer networks, focusing on infringements of copyright, computer-related fraud, child pornography, hate crimes and violations of network security. 6 The United States was the sixteenth country to ratify the Convention in The International Organization for Standardization (ISO) published ISO 17025, General requirements for the competence of testing and calibration laboratories. 4 Morgan Whitcomb, Carrie; An Historical Perspective of Digital Evidence: A Forensic Scientist s View, International Journal of Digital Evidence, Spring 2002, Volume 1, Issue 1, 5 Scientific Working Group on Digital Evidence, Best Practices for Computer Forensics v1.0, 15 November 2004, Best%20Practices%20for%20Computer%20Forensics%20v1.0 6 Council of Europe, Convention on Cybercrime, Budapest, 23 November 2001, 7 Anderson, Nate; World s Worst Internet Law ratified by Senate, arstechnica.com, 4 August 2006, 3
4 In 2013, US President Obama issued Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity, which calls for a voluntary risk-based cybersecurity framework (the Cybersecurity Framework, or CSF) that is prioritized, flexible, repeatable, performance-based, and cost-effective. The National Institute of Standards and Technology (NIST) led the development of the CSF through an international partnership of organizations, including owners and operators of the nation s critical infrastructure and ISACA. Key principles from the ISACA COBIT 5 business framework, which helps enterprises to govern and manage their information and technology, are embedded into the CSF. Implementing the NIST Cybersecurity Framework guide implements the CSF using ISACA s COBIT 5 processes. In the CSF, digital forensics is a subcategory in the Respond function and Analysis category of the Framework Core. 8 The study guide for the ISACA Cybersecurity Fundamentals Certificate discusses digital forensics in the incident responses topic. 9 TYPES OF INVESTIGATIONS Although cybercrime activity and security breaches continue to rise, business requirements often take precedence over security requirements. This precedence leaves applications, systems and networks vulnerable to intrusion. When a breach occurs, the forensic analyst must locate the point of compromise. The mission criticality of the compromised application, system or network determines the level of investigation. A full forensic examination is less likely on a highly critical system because the system cannot be shut down or slowed down to do a full backup. The two types of computer crime investigations are computer-based crime and computer-facilitated crime. In a computer-based crime, a computer or computers are used as the vehicle to commit a crime. In computerfacilitated crime, a computer is the target of a crime (e.g., a hacking incident or theft of information). 10 Computer-based crimes are activities such as child pornography, cyberbullying, cyberstalking, spamming or cyberterrorism. Typically, computers and/or hard drives are seized as evidence and provided to a forensic expert to analyze. When a computer has been the target of a crime, usually the information system is compromised, and information on the system or network is stolen, or fraudulent documents are created. Digital forensics is used to capture volatile information from random access memory (RAM) and other running processes, including networks. 11 It is important for the forensics expert to consider the following four areas of analyses: Storage media Hardware and operating systems Networks Applications 8 ISACA, Implementing the NIST Cybersecurity Framework, USA, 2014, 9 ISACA, Cybersecurity Fundamentals Study Guide, USA, Hailey, Steve; What is Computer Forensics?, Cybersecurity Institute, 19 September 2003, 11 Ibid. 4
5 RELEVANT LAWS In any investigation, it is important to consult with a legal counsel on the applicability of local, regional, national and international laws. In the United States, the Computer Fraud and Abuse Act of 1986, 18 U.S.C. 1030, criminalizes conduct that abuses computer systems. The statute protects computers that have a federal interest, i.e., federal computers, financial systems and computers that are used in interstate and foreign commerce. The statute protects computer systems from trespass, threats, damage, espionage and being used as tools of fraud. Other statutes that may apply follow: 12 The Interception of Communications: 18 U.S.C. 2511(1)(a) & (b); the disclosure of intercepted communications, 18 U.S.C. 2511(1)(c) & (e); and the use of intercepted communications, 18 U.S.C. 2511(1)(d). These prohibitions are subject to a number of exceptions, most of them detailed in section 18 U.S.C. 2511(2). Unlawful Access to Stored Communications: 18 U.S.C. 2701; Section 2701 focuses on protecting and voice mail from unauthorized access. Aggravated Identity Theft: 18 U.S.C. 1028A, The Identity Theft Penalty Enhancement Act, which took effect July 15, 2004, established a new offense of aggravated identity theft. Section 1028A applies when a defendant knowingly transfers, possesses, or uses, without lawful authority, a means of identification of another person. Access Device Fraud: 18 U.S.C Ten separate activities relating to access devices are criminalized in 18 U.S.C The term access device is defined as any card, plate, code, account number, electronic serial number, mobile identification number, personal identification number, or other telecommunications service, equipment, or instrument identifier, or other means of account access that can be used, alone or in conjunction with another access device, to obtain money, goods, services, or any other thing of value, or that can be used to initiate a transfer of funds (other than a transfer originated solely by paper instrument). CAN-SPAM Act: 18 U.S.C The CAN-SPAM Act of 2003, Pub. L. No , 117 Stat (2003), which became effective on January 1, 2004, provides a means for prosecuting those responsible for sending large amounts of unsolicited commercial (a.k.a. spam ). Wire Fraud: 18 U.S.C provides: Whoever, having devised or intending to devise any scheme or artifice to defraud, or for obtaining money or property by means of false or fraudulent pretenses, representations, or promises, transmits, or causes to be transmitted by means of wire, radio, or television communication in interstate or foreign commerce, any writings, signs, signals, pictures, or sounds for the purpose of executing such scheme or artifice, shall be fined under this title or imprisoned not more than 20 years, or both. If the violation affects a financial 110 Prosecuting Computer Crimes institution, such person shall be fined not more than $1,000,000 or imprisoned not more than 30 years, or both. Communication Interference: 18 U.S.C Where a compromised computer is owned or used by the United States for communications purposes, 18 U.S.C may provide an alternative or additional charge. Title 18: United States Code, Section 1362 provides: Whoever willfully or maliciously injures or destroys any of the works, property, or material of any radio, telegraph, telephone or cable, line, station, or system, or other means of communication, operated or controlled by the United States, or used or intended to be used for military or civil defense functions of the United States, whether constructed or in process of construction, or willfully or maliciously interferes in any way with the working or use of any such line, or system, or willfully or maliciously obstructs, hinders, or delays the transmission of any communication over any such line, or system, or attempts or conspires to do such an act, shall be fined under this title or imprisoned not more than ten years, or both. 12 Office of Legal Education Executive Office for US Attorneys, Prosecuting Computer Crimes, 5
6 For a more comprehensive reading of applicable US federal laws, Prosecuting Computer Crimes is available for download from the Department of Justice. 13 State statutes should also be considered, and consulting with a legal counsel is advised. Additional US laws 14 include the following: Health Insurance Portability and Accountability Act (HIPAA) Gramm-Leach-Bliley Act (GLBA) Sarbanes-Oxley Act (SOX) Consumer Credit Protection Act Telephone Records and Privacy Protection Act Internationally, the European Union (EU) developed a working document that pertains to the identification and handling of electronic evidence. The EU/Council of Europe (COE) Joint Project on Regional Cooperation against Cybercrime: Electronic Evidence Guide is a basic guide for law enforcement and judges. 15 US law enforcement personnel who search and seize computers during an investigation should be aware of the requirements in the Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations manual, from the Department of Justice Computer Crime and Intellectual Property Section. 16 DIGITAL FORENSICS POLICIES AND SET OF CONTROLS The enterprise cybersecurity program should have policies that address all forensics considerations, such as contacting law enforcement, monitoring, and conducting regular reviews of forensics policies, guidelines and procedures. Good practice requires that policies are part of an overall governance and management framework, such as COBIT 5, from ISACA, which provides a hierarchical structure into which all policies should fit and link clearly to the underlying principles. 17 Policies should be aligned with the enterprise risk appetite, which is determined in the risk governance activities, and are a key component of the enterprise system of internal control. 18 Policies should allow authorized personnel to monitor systems and networks and perform investigations for legitimate reasons in appropriate circumstances. The policies should clearly define the roles and responsibilities of all people who perform or assist with the enterprise forensic activities. 19 Policies, guidelines and procedures should clearly identify the tools that may be used in a forensic review and provide reasonable guidance on the use of those tools under various circumstances. Note: Information security and cybersecurity require a comprehensive set of controls. The set of controls, audit category and reviews for cybersecurity investigations and forensics are explained in detail in the ISACA publication Transforming Cybersecurity. 20 This publication applies the COBIT 5 framework and its component publications to transforming cybersecurity into a business process in a systemic way. 13 Ibid. 14 Bosworthy, Seymour; M.E. Kabay, M.E.; Computer Security Handbook Fourth Edition, John Wiley & Sons, Inc., October Council of Europe, Electronic Evidence Guide, 2013, 16 Cybercrime.gov, Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations, Office of Legal Education Executive Office for United States Attorneys, 2009, 17 ISACA, COBIT 5 for Assurance, USA, 2013, 18 Ibid. 19 Kent, Karen; Suzanne Chevalier; Tim Grance; Hung Dang; NIST SP , Guide to Integrating Forensic Techniques into Incident Response, Recommendations of the National Institute of Standards and Technology, National Institute of Standards and Technology (NIST), August 2006, 20 ISACA, Transforming Cybersecurity, USA, 2013, 6
7 Many cyberincidents can be handled more efficiently and effectively if forensics considerations are incorporated into the information system life cycle. Examples of such considerations follow: Perform regular backups of systems and maintain previous backups for a specific period of time. Enable auditing on workstations, servers and network devices. Forward audit records to secure centralized log servers. Configure mission-critical applications to perform auditing and include the recording of all authentication attempts. Maintain a database of file hashes for the files of common operating system and application deployments, and use file integrity checking software on particularly important assets. Maintain records (e.g., baselines) of network and system configurations. Establish data retention policies that support the performance of historical reviews of system and network activity, comply with requests or requirements to preserve data that are related to ongoing litigation and investigations, and destroy data that are no longer needed. 21 DIGITAL FORENSICS SCIENTIFIC PROCESS Ken Zatyko, the former director of the Defense Computer Forensics Laboratory, defined the following eight-step digital forensics scientific process: Obtain search authority In a legal investigation, legal authority is required to conduct a search or seizure of data. 3. Image and hash When digital evidence is found, it should be carefully duplicated and then hashed to validate the integrity of the copy. 4. Validate tools When possible, tools that are used for forensics should be validated to ensure reliability and correctness. 5. Analyze Forensic analysis is the execution of investigative and analytical techniques to examine the evidence. 6. Repeat and reproduce (quality assurance) The procedures and conclusions of forensic analysis should be repeatable and reproducible by the same or other forensic analysts. 7. Report The forensic analyst must document his/ her analytical procedure and conclusions for use by others. 8. Possibly present expert testimony In some cases, the forensic analyst will present his/her findings and conclusions to a court or another audience. The process involves more than intrusion-related security incidents. Zatyko defines scientific digital forensics as: The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation. 23 As the process steps indicate, the digital forensic analyst meticulously handles, analyzes and reports on the evidence obtained, to present an objective opinion on the facts of a case without prejudice. 2. Document chain of custody In legal contexts, chronological documentation of evidence handling is required to avoid allegations of evidence tampering or misconduct. 21 Ibid. 22 Zatyko, Ken; Commentary: Defining Digital Forensics, Forensic Magazine, 2 January 2007, 23 Ibid. 7
8 APPLYING VARIATIONS OF THE SCIENTIFIC METHOD Scientists often use variations of the scientific method to solve problems. Deductive reasoning applies broad principles to predict specific answers (see figure 2). Conversely, inductive reasoning uses a series of specific pieces of information to extrapolate a broad conclusion. For example, forensic analysts might use inductive reasoning to determine where a cyberincident started. Because physical evidence may never depict all the events that happened, inductive reasoning has a greater level of uncertainty. The conclusions are based on limited information rather than on a more solid scientific principle, but inductive reasoning can be useful when no broad principle can be applied. The forensic analyst identifies the best tools and approach for each case. 24 FIGURE 2 Variations of the Scientific Method of Forensic Science Inductive Reasoning Deductive Reasoning Observation Experiment Generalizations Predictions Paradigm/Theory Source: Forensics: Examining the Evidence, Understanding the Scientific Method, Digital forensics follows a rigorous scientific process to present findings of fact to prove or disprove a hypothesis in a court of law, civil proceeding or another action. Zatyko s eight-step process can be grouped into three basic steps: acquisition, analysis and reporting, which are discussed in the following paragraphs and shown in figure Forensics: Examining the Evidence, Understanding the Scientific Method, 8
9 FIGURE 3 Digital Forensics Process Data Collection Obtain search authority. Document chain of custody. Duplicate digital evidence and validate using hash function. Examination and Analysis Validate forensic tools. Analyze evidence using investigative and analytical techniques. Repeat and reproduce forensic analysis procedures and conclusions. Reporting Report analytical procedures and conclusions. Present experts testimony about findings and conclusions. Data from: Zatyko, Ken, Commentary: Defining Digital Forensics, Forensic Magazine, 2 January 2007, DATA COLLECTION The acquisition of data begins with seizure, imaging or collection of digital evidence to capture suspect media or network traffic and logs, post breach. Enterprises typically assume that they have the right to monitor their internal networks and investigate their own equipment as long as they observe the privacy right of the employee. Employee privacy rights and the enterprise rights should be in written policies that are communicated to employees. In the United States, the Fourth Amendment covers seizures. Federal warrants are issued under Title 18 of the US Code for probable cause of a crime. However, exceptions allow data collection without a warrant for reasons such as consent, hot pursuit or plain view. In the United Kingdom, a magistrate issues warrants to a constable under Section 18 of the Police and Criminal Evidence Act. In the US, no one should ever go on site until after they read the search warrant to review the seizure authority and the affidavit for the reasoning and the items to be seized. Regardless of the country, enterprises should understand and follow local and country jurisdiction laws before seizing materials. After digital media are acquired, an exact duplicate image (the forensic image) of the original media evidence is created and validated with hash values that have been calculated for the original digital media and the duplicate image. A hashing function, e.g., MD5, SHA-1 and SHA- 256, applies a mathematical algorithm to the digital data and returns a fixed-size bit string hash value. Any change to the data will change the hash value. Data with the same hash value are identical. The hash value validates that the evidence is still in the original state. The original media evidence is write blocked and stored to prevent any further possible alteration. Hashing may not always be possible. Mobile devices and memory, in particular, may have to be treated differently to maintain evidence. 9
10 EXAMINATION AND ANALYSIS After the duplicate image of the evidence is created, analysis can begin on the image. The digital forensic analyst may use specialized tools to uncover deleted or hidden material. Depending on the forensic request, the analyst can report findings about numerous types of information, e.g., , chat logs, images, hacking software, documents and Internet history. After evidence is collected and analyzed, it is assembled to reconstruct events or actions and provide facts to the requesting party. These facts may identify people, places, items and events and determine how they are related so that a conclusion can be reached. This effort can include correlating data among multiple sources. 25 In some environments, early case assessment (ECA) provides immediate review for the requesting parties, at which time they can ask for more advanced analysis. ECA typically involves imaging, indexing, archiving and an internal reporting mechanism for the requesting party to quickly access needed reconnaissance. ECA typically saves time and is often preferred over analysis. REPORTING After the analysis is complete, a report of the findings is developed, which outlines findings and methodologies. The provided exhibits may include attribution of file ownership, chat logs, images and s; detailed login/ logoff times; entry into facility logs and anything that places the suspect at the device at the same time and location of an event. The findings can be used to confirm or disprove alibis and provided statements. Digital evidence can also be used to prove intent. The completed report is given to the investigator, who is usually from law enforcement in a criminal matter or a designated senior manager in a civil action. Further actions are determined after the report is reviewed. Digital forensic analysts provide facts and impart knowledge to give expert opinion only when they are required to do so in court. They never seek to aid or blame. Instead, analysts provide a scientific basis so that the court, company or other requesting party may use the unbiased evidence and gain a better understanding of events. BRANCHES OF DIGITAL FORENSICS Computer forensics is the oldest and most stable discipline of digital forensics. It concentrates on developing evidence from a computer and associated digital storage devices in a forensically sound manner to preserve, develop, recover when necessary, analyze and present facts in a clear and concise manner. In computer forensics, after the storage device is acquired, it is standard practice for an analyst to create a disk image from which to work. If the original device is confiscated, it is safely stored as evidence. Sometimes a device is not confiscated so that additional evidence can be gathered and future activities can be monitored. The forensic analyst creates a disk image of the device to preserve the original evidence. Today, virtual drives may also be used as way to emulate an entire machine. A number of techniques are used in computer forensics investigations. Cross-drive analysis correlates information that is found on multiple hard drives, which are being used to identify social networks. Live analysis extracts dates using existing system administration or developed forensic tools. Recovering deleted files is often in the news, and it remains a mainstay of forensics for recovering evidence. Because files are not erased, but are overwritten eventually, over a period of time, an analyst has time to reconstruct deleted files. 25 Op cit. Kent 10
11 Network forensics is a relatively new field within digital forensics. Generally, network forensics focuses on monitoring and analyzing computer network traffic to gather evidence of exceeding authorization or detect an intrusion from a party with no authorization to be on that system or network. Because network traffic is volatile and dynamic, analysts must be proactive in their approach to capturing information. Network forensics takes two approaches to gathering information: The more traditional approach catches and stores all data for analysis at a later time (e.g., logging the Internet usage of all users and only reviewing the data after an alert). The second approach scans the data that pass through the network and is selective about the data that are captured (e.g., only logging blocked sites and specific file formats from user activity). The benefit of the first approach is that the analyst has all the information, but the negative aspect is that a large amount of archival storage space is needed and analysis is done later. In the second approach, the analyst does not need to waste time filtering, but the approach requires faster processing speed to manage incoming network traffic. Because data gathering is minimized, the likelihood of private or sensitive information being captured is substantially reduced. Digital forensic analysts can review network communications from obscure sources such as BitTorrent clients, PlayStation and Xbox game consoles, and Raspberry Pi. Network forensics continues to grow, due to the popularity of wireless communication, obfuscated communication (e.g., Tor anonymity software), and mobile devices. Mobile device forensics roots began when mobile devices started to become popular, about Forensics of mobile devices includes cell phones, but can also include Universal Serial Bus (USB) drives, personal digital assistants (PDAs), global positioning systems (GPSs), cameras and tablet devices. From a law enforcement prospective, these data sources may provide a wealth of personal information, such as contacts, s, web browsing information, photos, videos, calendars, geolocation, and social network messages and contacts. Mobile devices present greater challenges in handling due to memory volatility, so proper handling procedures must be followed to protect digital data. Most mobile devices have a basic set of comparable features and capabilities. They house a microprocessor, read-only memory (ROM), random access memory (RAM), a radio module, a digital signal processor, a microphone and speaker, a variety of hardware keys and interfaces, and a liquid crystal display (LCD). The operating system of a mobile device may be stored in either NAND or NOR memory, while code execution typically occurs in RAM. 26 Generally, the information collected comes from internal memory (flash memory) or external memory (subscriber identity module [SIM], Secure Digital [SD], MultiMediaCard [MMC], CompactFlash [CF] cards or memory sticks). Call records and mobile backups can also be obtained through carriers, which provide other information that is useful in developing evidence, especially in cases of encryption. For a more complete understanding of techniques for handling mobile devices, NIST SP , Guidelines on Mobile Device Forensics 27 and the SWGDE Best Practices for Mobile Phone Forensics 28 should be reviewed. Encryption has become the standard on Windows 8.1, Mac OSX 10.9, and will continue to be a challenge in the field. Circumventing encryption can involve a few steps, including memory capture for passwords in RAM, password cracking of a system image, interrogating the suspect or obtaining a search warrant for a mobile backup of a phone from a service provider. There are endless ways to defeat encryption, but forensic analysts must be willing to evolve with technology. This may include the biggest taboo in the field: modifying the user s data in order to obtain said encryption keys. Memory forensics is too large a topic to be discussed here, but previewing applications and obtaining data from RAM leaves a footprint. Having a standardized process and taking copious notes are just two ways to justify actions in the field, but this does not erase the blurred lines. 26 Ayers, Rick; Sam Brothers; Wayne Jansen; NIST SP Rev 1, Guidelines on Mobile Device Forensics, National Institute of Standards and Technology (NIST), May 2014, 27 Ibid. 28 Scientific Working Group on Digital Evidence, SWGDE Best Practices for Mobile Phone Forensics, Version: 2.0, 11 February 2013, 11
12 CONCLUSION Digital forensics is a growing field with much diversity in the technologies in which a professional can specialize. From the early stages of digital forensics, when evidence was collected from a stand-alone machine, to the highly networked cloud and mobile environment of today, digital forensic analysts have always taken great care while handling and preserving electronic information. Developing a step-by-step approach to preserve information for each new type of technology has evolved along with the field. The National Academy of Science recently identified digital forensics as a subfield within cybersecurity. As Scott Charney, head of the Department of Justice, Computer Crimes and Intellectual Property Section (CCIPS), stated, The Internet crime problem is going to get worse. How do I know? Simple. There is always a percentage of the population who are up to no good. As the entire population moves to the Internet, so will the criminals. Note: Because not all aspects of the digital forensics field could be covered in this paper, such as ediscovery and anti-forensics techniques, the reader can explore the field further to gain a wider knowledge of digital forensics. 12
13 3701 Algonquin Road, Suite 1010 Rolling Meadows, IL USA Phone: Fax: Web site: Provide feedback: Participate in the ISACA Knowledge Center: Follow ISACA on Twitter: Join ISACA on LinkedIn: ISACA (Official), Like ISACA on Facebook: ISACA With more than 115,000 constituents in 180 countries, ISACA ( helps business and IT leaders build trust in, and value from, information and information systems. Established in 1969, ISACA is the trusted source of knowledge, standards, networking, and career development for information systems audit, assurance, security, risk, privacy and governance professionals. ISACA offers the Cybersecurity Nexus, a comprehensive set of resources for cybersecurity professionals, and COBIT, a business framework that helps enterprises govern and manage their information and technology. ISACA also advances and validates businesscritical skills and knowledge through the globally respected Certified Information Systems Auditor (CISA ), Certified Information Security Manager (CISM ), Certified in the Governance of Enterprise IT (CGEIT ) and Certified in Risk and Information Systems Control (CRISC ) credentials. The association has more than 200 chapters worldwide. Disclaimer ISACA has designed and created Overview of Digital Forensics white paper (the Work ) primarily as an educational resource for security professionals. ISACA makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of all proper information, procedures and tests or exclusive of other information, procedures and tests that are reasonably directed to obtaining the same results. In determining the propriety of any specific information, procedure or test, security professionals should apply their own professional judgment to the specific circumstances presented by the particular systems or information technology environment. 13
14 ACKNOWLEDGMENTS Expert Reviewers Jaime Buzzeo, USA Joel Valverde, USA Alexander Applegate, USA ISACA Board of Directors Robert E Stroud CGEIT, CRISC, CA, USA, International President Steven A. Babb CGEIT, CRISC, ITIL, Vodafone, UK, Vice President Garry J. Barnes CISA, CISM, CGEIT, CRISC, BAE Systems Detica, Australia, Vice President Robert A. Clyde CISM, Clyde Consulting LLC, USA, Vice President Ramses Gallego CISM, CGEIT, CCSK, CISSP, SCPM, Six Sigma Black Belt, Dell, Spain, Vice President Theresa Grafenstine CISA, CGEIT, CRISC, CGAP, CGMA, CIA, CPA, US House of Representatives, USA, Vice President Vittal R. Raj CISA, CISM, CGEIT, CRISC, CFE, CIA, CISSP, FCA, Kumar & Raj, India, Vice President Tony Hayes CGEIT, AFCHSE, CHE, FACS, FCPA, FIIA, Queensland Government, Australia, Past International President Gregory T. Grocholski CISA, SABIC, Saudi Arabia, Past International President Debbie A. Lew CISA, CRISC, Ernst & Young LLP, USA, Director Frank K.M. Yam CISA, CIA, FHKCS, FHKIoD, Focus Strategic Group Inc., Hong Kong, Director Alexander Zapata Lenis CISA, CGEIT, CRISC, ITIL, PMP, Grupo Cynthus S.A. de C.V., Mexico, Director Knowledge Board Steven A. Babb CGEIT, CRISC, ITIL Vodafone, UK, Chairman Rosemary M. Amato CISA, CMA, CPA, Deloitte Touche Tohmatsu Ltd., The Netherlands Neil Patrick Barlow CISA, CISM, CRISC, CISSP, Capital One, UK Charlie Blanchard CISA, CISM, CRISC, CIPP/US, CIPP/E, CISSP, FBCS, ACA, Amgen Inc., USA Sushil Chatterji CGEIT, Edutech Enterprises, Singapore Phil J. Lageschulte CGEIT, CPA, KPMG LLP, USA Anthony P. Noble CISA, Viacom, USA Jamie Pasfield CGEIT, ITIL V3, MSP, PRINCE2, Pfizer, UK Ivan Sanchez Lopez CISA, CISM, ISO LA, CISSP, DHL Global Forwarding & Freight, Germany Cybersecurity Task Force Eddie Schwartz CISA, CISM, CISSP, MCSE, PMP, USA, Chairman Manuel Aceves CISA, CISM, CGEIT, CRISC,CISSP, FCITSM, Cerberian Consulting, SA de CV, Mexico Sanjay Bahl CISM, CIPP, India Neil Patrick Barlow CISA, CISM, CRISC, CISSP, Capital One, UK Brent Conran CISA, CISM, CISSP, USA Derek Grocke HAMBS, Australia Samuel Linares CISA, CISM, CGEIT, CRISC, CISSP, GICSP, Industrial Cybersecurity Center (CCI), Spain Marc Sachs Verizon, USA 14
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
Enabling Information PREVIEW VERSION
Enabling Information These following pages provide a preview of the information contained in COBIT 5: Enabling Information. The main benefit of this publication is that it provides COBIT 5 users with a
CLOUD GOVERNANCE: Questions Boards of Directors Need to Ask AN ISACA CLOUD VISION SERIES WHITE PAPER
AN ISACA CLOUD VISION SERIES WHITE PAPER CLOUD GOVERNANCE: Questions Boards of Directors Need to Ask Cloud computing is gaining momentum. As cloud offerings gain maturity, cloud service providers are becoming
Computer Forensics Preparation
Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics
Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
e-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:
State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.
Subject: Authoritative Policy: Procedure Number: Distribution: Purpose: Acceptable Use of Information Technology (former Ad Guide 1460.00) Standard Number 1340.00 Information Technology Information Security
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
Computer Forensics US-CERT
Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further
CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA
CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA Robert Stroud International President, ISACA VP Strategy & Innovation, CA Technologies
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
Information Security Incident Management Guidelines
Information Security Incident Management Guidelines INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu Version #1.0, June 21, 2006 Copyright 2006 by The Regents of The University of
InfoSec Academy Forensics Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
CYBERCRIME LAWS OF THE UNITED STATES Compiled October 2006 by Al Rees, CCIPS
CYBERCRIME LAWS OF THE UNITED STATES Compiled October 2006 by Al Rees, CCIPS Table of Contents Substantive cybercrime laws (e.g., laws prohibiting online identity theft, hacking, intrusion into computer
CYBERCRIME AND THE LAW
CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
Crimes (Computer Hacking)
2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
FKCC AUP/LOCAL AUTHORITY
FKCC AUP/LOCAL AUTHORITY The information contained in this section has its basis in Public Law 93.380. It is further enhanced however, by Florida State Board of Education Administrative Rule 6A-14.51 and
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS
TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS PURPOSE This policy provides the procedures, rules, guidelines and codes of conduct for the use of the technology and information networks at Socorro Consolidated
<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129
Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the
All individuals with access to Twin Falls School District technology and computer networks will:
Twin Falls School District #411 Computer and Network Use Policy 201 Main Avenue West Twin Falls, Idaho 83301 Telephone: 208-733-6900 Fax: 208-733-6987 Technology users responsibilities go beyond general
Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws
Order Code RS20830 Updated February 25, 2008 Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws Summary Charles Doyle Senior Specialist American Law Division The federal computer
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
Acceptable Use Policy ("AUP")
Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while
Guidelines on Digital Forensic Procedures for OLAF Staff
Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to
ACE Advantage PRIVACY & NETWORK SECURITY
ACE Advantage PRIVACY & NETWORK SECURITY SUPPLEMENTAL APPLICATION COMPLETE THIS APPLICATION ONLY IF REQUESTING COVERAGE FOR PRIVACY LIABILITY AND/OR NETWORK SECURITY LIABILITY COVERAGE. Please submit with
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
ITAF. 3 rd Edition. A Professional Practices Framework for IS Audit/Assurance
ITAF 3 rd Edition A Professional Practices Framework for IS Audit/Assurance About ISACA With more than 115,000 constituents in 180 countries, ISACA (www.isaca.org) helps business and IT leaders build trust
Computer Forensics as an Integral Component of the Information Security Enterprise
Computer Forensics as an Integral Component of the Information Security Enterprise By John Patzakis 10/28/03 I. EXECUTIVE SUMMARY In addition to fending off network intrusions and denial of service attacks,
Sensitive Incident Investigations. Digital Risk Management. Forensics Testing.
Sensitive Incident Investigations. Digital Risk Management. Forensics Testing. 2009 Innovation Award Winner Austin Chamber of Commerce 2010 Innovation Award Finalist Austin Chamber of Commerce Only private
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
Enterprise PrivaProtector 9.0
IRONSHORE INSURANCE COMPANIES 75 Federal St Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING FOR A CLAIMS
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING
IS AUDITING GUIDELINE G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply
KEY TRENDS AND DRIVERS OF SECURITY
CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures
IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411
IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING
CHAPTER 124B COMPUTER MISUSE
1 L.R.O. 2005 Computer Misuse CAP. 124B CHAPTER 124B COMPUTER MISUSE ARRANGEMENT OF SECTIONS SECTION PART I PRELIMINARY 1. Short title. 2. Application. 3. Interpretation. PART II PROHIBITED CONDUCT 4.
Acceptable Use Policy
Acceptable Use Policy Department of Information Technology Olivet Nazarene University (815) 939-5302 Published August 2013 Ver. 4.0 Policy Overview 1. Executive Summary This summary is intended to present
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE GENERAL INSTITUTION Chapter 3 Computer Use - Computer and Electronic Communication Systems AP 3720(a) Contents 1.0 Introduction...1 2.0
ARRIS WHOLE HOME SOLUTION PRIVACY POLICY AND CALIFORNIA PRIVACY RIGHTS STATEMENT
ARRIS WHOLE HOME SOLUTION PRIVACY POLICY AND CALIFORNIA PRIVACY RIGHTS STATEMENT INTRODUCTION ARRIS may collect and receive information from you through its websites 1 as well as through the Moxi User
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
HIPAA Privacy & Security White Paper
HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 [email protected] Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected]
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected] SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,
Valdosta State University. Information Resources Acceptable Use Policy
Valdosta State University Information Resources Acceptable Use Policy Date: December 10, 2010 1. OVERVIEW... 3 2. SCOPE... 3 3. DESIGNATION OF REPRESENTATIVES... 3 3.1 UNIVERSITY PRESIDENT... 3 3.2 VICE
CYBERSECURITY: ISSUES AND ISACA S RESPONSE
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services
Acceptable Use of Information Systems Standard. Guidance for all staff
Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not
Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
In an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
Privilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
OLYMPIC COLLEGE POLICY
TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,
An Historical Perspective of Digital Evidence: A Forensic Scientist s View
An Historical Perspective of Digital Evidence: A Forensic Scientist s View Carrie Morgan Whitcomb, Director, National Center for Forensic Science Author s Comments During my tenure as director of the Postal
TECHNOLOGY ACCEPTABLE USE POLICY
Policy Statement TECHNOLOGY ACCEPTABLE USE POLICY Reason for Policy/Purpose The purpose of this policy is to provide guidelines to the acceptable and ethical behavior that guides use of information and
BRIGHAM AND WOMEN S HOSPITAL
BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy
If you have any questions about any of our policies, please contact the Customer Services Team.
Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting
ZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
City of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
POLICIES AND REGULATIONS Policy #78
Peel District School Board POLICIES AND REGULATIONS Policy #78 DIGITAL CITIZENSHIP Digital Citizenship Digital citizenship is defined as the norms of responsible behaviour related to the appropriate use
Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad
Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat
INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL
INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
Acceptable Use Policy
Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive
Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders
Massachusetts Digital Evidence Consortium Digital Evidence Guide for First Responders May 2015 Digital Evidence Guide for First Responders - MDEC A Note to the Reader There are an unlimited number of legal
Legal and Ethical Issues in Computer Security
Legal and Ethical Issues in Computer Security Prepared By: Rusul M. Kanona Supervised By: Dr. Lo a i A.Tawalbeh Arab Academy for Banking & Financial Sciences (AABFS) Fall 2007 :Objectives for this session
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
Privilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally
State HIPAA Security Policy State of Connecticut
Health Insurance Portability and Accountability Act State HIPAA Security Policy State of Connecticut Release 2.0 November 30 th, 2004 Table of Contents Executive Summary... 1 Policy Definitions... 3 1.
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Chapter 7 Securing Information Systems
1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,
