Computer Forensics Basics, First Responder, Collection of Evidence
|
|
|
- Esther Allen
- 9 years ago
- Views:
Transcription
1 May 7, Computer Forensics Basics, First Responder, Collection of Evidence Omveer Singh Joint Director / Scientist D [email protected] Indian Computer Emergency Response Team (CERT-In) Department of Information Technology Ministry of Communications & Information Technology Government of India New Delhi
2 Agenda Computer Forensics First Responder Computer Forensics Tools Volatile data collection Digital Evidence Handling at Crime Site Best Practices & Guidelines Disk Imaging References May 7,
3 May 7, Some Cyber Crimes Bank Accounts / Demat Accounts with online transaction facility login user id & password compromised Payment Card (credit / debit / ATM / Prepaid Smart) frauds Net Extortion Phishing Vishing Nigerian Advance Fee Scam : Fraud Lottery Advance Scams Money laundering and unlawful Banking transactions.
4 Computer as the instrument of crime The processes of the computer and not the contents of computer files, facilitate the crime. Fraudulent use of automated teller machine (ATM) cards and accounts Theft of money from accrual, conversion, or transfer account Credit card frauds Fraud from computer transactions (stock transfers, sales, or billings) and Telecommunications fraud. May 7,
5 Cyber Forensics Computer Forensics Network Forensics Mobile Forensics May 7,
6 May 7, Subcategories of Cyber Forensic Analysis Media Analysis Examining physical media for evidence Code Analysis Review of software for malicious signatures Network Analysis Scrutinize network traffic and logs to identify and locate the suspicious system
7 Computer Forensics why? Some of the common practices may destroy digital evidence. Direct analysis will make it unacceptable in a court of law - tempered evidence Digital Evidence is - Latent, like fingerprints or DNA Extremely fragile & resilient, can be altered, damaged or destroyed easily Can transcend borders with ease & speed (networked systems) May 7,
8 May 7, Computer Forensics : Definition Computer Forensics is the use of scientifically derived, proven and legally acceptable methods towards the identification, seizure, preservation, retrieval, validation, analysis, interpretation, documentation, and presentation of digital evidence derived from digital sources and processed electronically for the purpose of facilitating the reconstruction of events found to be criminal, or helping to anticipate unauthorised actions shown to be disruptive to planned operations.
9 Computer Forensics Analysis of evidence is carried out virtually at any physical location (lab). Search for some direct information from the evidence that may have significance in the case. Computer Forensics traditionally rely upon the data inadvertently left on disk by the SW application programs / tools. May 7,
10 Computer Forensics - Objectives To identify the digital evidence (should be acceptable in a court of law) To investigate and analyse the digital evidence & find the relevant data / documents To reconstruct the chain of events To identify the computer & user responsible for the crime. May 7,
11 May 7, Computer Forensics - Process For investigation of Financial frauds, we do the following: Identify Collect Authenticate Preserve Analyse Interpret the digital evidence and document the findings for preparing the report and reconstruct the chain of events
12 Computer Forensics Myths & Realities Myth : Investigation can identify the person, who carried out the cyber crime. Reality : No, investigation will only identify the system & user-id through which the cyber crime was performed. Solution : Follow security policy strictly(login id & Password) Have physical access controls Have video recording & monitoring facility for the systems with critical importance May 7,
13 Computer Forensic Investigation First Responder 2 roles record the site scene collect volatile evidence image the disks (non volatile evidence) contain intrusion protect preserve transport for analysis Digital Evidence Computer Forensics Examiner (Investigator) May 7,
14 May 7, Duties of First Responder To coordinate with Law enforcement Agencies (Police) Organisation, management Forensic Investigator Court of Law
15 First Responder s Toolkit Log Book To record all actions /events with date & time chronologically Safe Boot CD / Floppy Digital camera (or cellphone with digicam) Tools for Imaging of media (non volatile data collection) Volatile data collection May 7,
16 Documentation Incident Profile How was the incident detected? What is the scenario of the incident? What time did the incident occur? Who or what reported the incident? What hardware & software are involved? Who are contacts for the involved personnel? How critical is the suspicious computer? May 7,
17 May 7, First Responder s Log Book Timeline of events Audit trail during collection of evidence Who is performing the forensic collection? History of executed forensic tools and commands Generated output from forensic tools & commands Date & time of executed commands & tools Expected system changes or effects due to use of tools
18 Computer Forensically Sound Manners : Date & time of all the systems on LAN should be synchronised with the standard local time & internet time server. System users should not be given privilege / right to modify date & time. May 7,
19 May 7, Tools for - Volatile data collection Non-volatile data (digital evidence) collection Listing running Software / processes on system Imaging the Digital Evidence Checking the integrity of Digital Evidence Analysis of Digital Evidence s Image Network configuration details System Hardware configuration details User s details Analysis of Log Files Discovery / Cracking of Passwords
20 Digital Evidence - Types Volatile storage / Non-persistent data Memory that loses its contents when the power is turned off. RAM (except the CMOS RAM used for the BIOS) contents are volatile. Non-volatile storage / Persistent data data stored on tape or disk (magnetic / optical storage), ROM; no change in contents, if power turned off. May 7,
21 Volatile Digital Evidence (may be in main memory) Order of Volatility : 1. Registers & Cache 2. Routing tables 3. ARP Cache 4. Process Table 5. Kernel statistics & modules 6. Main memory (RAM) 7. Temporary System files 8. Secondary Memory 9. Router Configuration 10.Network Topology May 7,
22 Volatile Data Collection Tools systeminfo.exe (win): system profile psinfo.exe (dos) : sw installed cat (linux) : system profile uname (linux) : machine s profile Psuptime (win) : system uptime info Net statistics (win) : system uptime info Uptime, w (linux) : user uptime info May 7,
23 Tools for Running Processes Netstat ab : process & pid info Listdlls.exe <process> : cmd line & dll(s) Pslist <process> : duration of process Pslist me <process> : virtual memory usage Pulist : active processes (running) Pmdump : active process memory dump May 7,
24 Tools for Running Processes Task Manager (Win) Process Explorer (Sysinternals) ps (Linux) Check for rogue processes? Svchost1.exe Svch0st.exe May 7,
25 Some useful Tools Msconfig Autoruns, autorunsc Ls (linux) Chkconfig -- list (linux) Inittab (linux) : run level Netusers PsLoggedOn (win) : local/remote logged users May 7,
26 Tools for network user details Net user : local / remote users NTLast <session> : login attempts logs Who all : all local+remote logged users Last : history of logged on users Lastlog : last login time Cat /etc/passwd : user a/c info May 7,
27 Tools for HW Config n Fport (win) : open ports Netstat anb (win) : TCP/IP connections Net share (win) : network shares Netstat anp (linux) Ifconfig (linux) : NIC config n Netstat r (win) : routing info n Arp a : IP Addr, MAC Addr of NIC Netstat rn (linux) : routing info n May 7,
28 May 7, At the Computer Crime Site - 1 Seize the suspected system Label all the connecting cables and have photographs of the suspected system, its connectivity & crime site Identify the Evidence & Authenticate it through 32/64 bit Hash (CRC, MD5 checksum) Consult with the case investigator Interact with SA, users & employees Explore the remote storage locations Explore all the potential digital evidences Capture accurate bit image of the seized Hard Disks (org. evidence)
29 At the Computer Crime Site - 2 Explore the accounts / addresses, aliases, network configuration & users, system logs, ISP, user ids & passwords Record OS (Ver.), System date & time (also difference, if any), H/w & S/w Configuration, IP / MAC address Power off the Computer System by pulling the power cable Never shutdown system before collecting volatile evidence Proceed the data collection from volatile to non-volatile evidence Never run any application on the suspected system Record the chain of custody in the log register To preserve, always keep the org. evidence in a magnetically shielded evidence storage bag May 7,
30 May 7, At the Computer Crime Site - 3 To preserve, always keep the org. evidence in a magnetically shielded evidence storage bag Securely pack the Evidence & transport it to lab Never work on the original evidence Always record all the actions & investigative activities chronologically in Log Book Maintain the integrity of original evidence by its minimum handling Transfer the suspected Computer System & org. evidence to a sealed & secure location Best Practices for Seizing Electronic Evidence Ver. 2.0 may be downloaded from -
31 May 7, Collection Places to look for Electronic Evidence Floppy Disks Hard Disk(s) CDs DVDs Zip Drives Backup Tapes USB Storage PDAs Flash Drives Voice mail Electronic Calendars Scanner Photocopier Fax/Phone/Cellular ipods Cellphone
32 Supplementary Evidence at the crime site Portable / Removable Storage Media Relevant files Relevant deleted files Log files from other systems/servers Record the - Testimonial Evidence by a witness Hearsay Evidence by a indirect witness May 7,
33 Relevant data may be recovered from messages (deleted ones also) Office files Deleted files of all kinds Encrypted Files Compressed Files Temp files Recycle Bin Web history Cache files Cookies Registry Unallocated Space Slack Space Network Server files: System history files Web log files May 7,
34 May 7, File Slack Space RAM slack (blue) and file slack (red) File is green
35 May 7, Digital Evidence Handling : Some Guidelines Trust none - Verify all & everything Never rely on a single tool. Use multiple tools to cross-validate the results Follow the organisation s Security Policy Always backup the discovered information Never exceed your knowledge Always remember that you are required to testify in a court of law Ensure that your actions are repeatable
36 May 7, Digital Evidence It is always ensured that the digital evidence is : 1.Admissible 2.Authentic 3.Complete 4.Reliable 5.Believable (called 5 Rules )
37 May 7, Disk (digital evidence) Imaging Integrity & security of the org. evidence Bit by bit copy; no change in the sequence & location of data exact replica, but may stored in a different type of media Usually done by copying sector by sector Forensically sound copy of org. of the evidence Above means swap file, unallocated space & file slack is also copied Time consuming process
38 May 7, Disk Imaging Tools dd (linux) dd (win) SafeBack (win) SnapBack DatArrest Drive Image Pro R-Drive Image FTK s built-in feature It is better to use HW imaging equipments
39 May 7, Disk Imaging Linux - Creating a disk images : #dd if=/dev/sda1 of=usbdrive.img Demonstration DOS - Creating a disk images : C:\>dd if=\\.\g: of=c:\gdrive.img --progress Demonstration
40 Integrity of Evidence Proof of Integrity of the digital evidence image - Tool : md5sum.exe (win, linux) > md5sum <filename> Demonstration May 7,
41 Processing Evidence from Computer Crime Site Start the Lab Evidence Log Mathematically authenticate the Data Generate Bit stream backup (image) of all crime scene computer hard drives & media Proceed with the Forensic Examination May 7,
42 May 7, References Electronic Fingerprints computer evidence comes of Age by Michael R. Anderson Electronic Crime Scene Investigation A Guide for First Responders by National Institute of Justice, USA; ( Forensic Examination of Digital Evidence : A guide for Law Enforcement by National Institute of Justice, USA; ( Forensics Tools ; Collecting Electronic Evidence After a System Compromise by Matthew Braid, SANS Security Essentials.
43 May 7, References (contd..) Computer Forensics An Overview by Dorothy A. Lunn, SANS Institute; othy_lunn_gsec.pdf Manual for Investigation of Computer Related Crimes by Ashok Dohare Course Contents : SANS SEC508 HoneyNet Project Website Computer Forensics Challenges
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices Introduction As organizations rely more heavily on technology-based methods of communication, many corporations
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
Incident Response and Forensics
Incident Response and Forensics Yiman Jiang, President and Principle Consultant Sumus Technology Ltd. James Crooks, Manager - Advisory Services PricewaterhouseCoopers LLP UBC 2007-04-12 Outline Computer
Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)
s Unix Definition of : Computer Coherent application of a methodical investigatory techniques to solve crime cases. Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM) s Unix
Digital Forensics. Larry Daniel
Digital Forensics Larry Daniel Introduction A recent research report from The Yankee Group found that 67.6 percent of US households in 2002 contained at least one PC The investigators foresee three-quarters
Computer Hacking Forensic Investigator v8
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer
Introduction to Network Security Comptia Security+ Exam. Computer Forensics. Evidence. Domain 5 Computer Forensics
Introduction to Network Security Comptia Security+ Exam Domain 5 Computer Forensics Computer Forensics Forensics relates to the application of scientific knowledge and method to legal problems Investigating
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure
ICPAK ANNUAL FORENSIC AUDIT CONFERENCE Digital Forensics in Fraud & Corruption Investigations 9 October 2014 Leisure Lodge Hotel, Diani Kenya Faith Basiye, CFE Head Group Forensic Services KCB Banking
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
Getting Physical with the Digital Investigation Process
Getting Physical with the Digital Investigation Process Brian Carrier Eugene H. Spafford Center for Education and Research in Information Assurance and Security CERIAS Purdue University Abstract In this
Computing forensics: a live analysis
April 18th, 2005 1 2 3 Objectives Evidence acquisition Recovery and examination of suspect digital evidence (think Warrick Brown on CSI) Hardware: servers, workstations, laptops, PDAs, mobiles, cameras
Best Practices for Incident Responders Collecting Electronic Evidence
Best Practices for Incident Responders Collecting Electronic Evidence rev. April 2013 Prepared by: Rick Clyde Forensic Examiner [email protected] M: (402) 709-6064 Chris Hoke Principal and Owner
CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS. Brian Carrier & Eugene H. Spafford
CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS Brian Carrier & Eugene H. Spafford Center for Education and Research in Information Assurance and Security, Purdue University,
CHAPTER 18 CYBER CRIMES
CHAPTER 18 CYBER CRIMES 18.1 With increased use of computers in homes and offices, there has been a proliferation of computer-related crimes. These crimes include: Crimes committed by using computers as
Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
Chapter 7 Securing Information Systems
1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,
INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION
" - * INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION CHRIS PROSISE KEVIN MANDIA McGraw-Hill /Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul
Open Source and Incident Response
Open Source and Incident Response Joe Lofshult, CISSP, GCIH 1 Agenda Overview Open Source Tools FIRE Demonstration 2 Overview Incident Adverse event that threatens security in computing systems and networks.
Digital Evidence Search Kit
Digital Evidence Search Kit K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K. H. Pun, W.W. Tsang, H.W. Chan Center for Information Security and Cryptography Department of Computer Science The University
Developing Computer Forensics Solutions for Terabyte Investigations
Developing Computer Forensics Solutions for Terabyte Investigations Eric Thompson Corporation Orem, Utah USA www.accessdata.com Overview Computer Forensic Definition, Objectives and Policies History of
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
Freeware Live Forensics tools evaluation and operation tips
Freeware Live Forensics tools evaluation and operation tips Ricci IEONG, Principal Consultant, ewalker Consulting Ltd Abstract Highlighted by a digital forensics investigation specialists from FBI in DFRWS
CDFE Certified Digital Forensics Examiner (CFED Replacement)
Course: CDFE Certified Digital Forensics Examiner (CFED Replacement) Description: Price: $3,450.00 Category: Popular Courses Duration: 5 days Schedule: Request Dates Outline: COURSE OVERVIEW Computer Forensics
Collecting Electronic Evidence After a System Compromise
Australian Computer Emergency Response Team Collecting Electronic Evidence After a System Compromise Matthew Braid, AusCERT, 2001 Collecting forensic evidence for the purposes of investigation and/or prosecution
Certified Digital Forensics Examiner
Cyber Security Training & Consulting Certified Digital COURSE OVERVIEW 5 Days 40 CPE Credits $3,000 Digital is the investigation and recovery of data contained in digital devices. This data is often the
2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.
Acquisition and Tools COMP 2555: Principles of Computer Forensics Autumn 2014 http://www.cs.du.edu/2555 1 Planning Your Investigation! A basic investigation plan should include the following activities:!
Operating Systems Forensics
Operating Systems Forensics Section II. Basic Forensic Techniques and Tools CSF: Forensics Cyber-Security MSIDC, Spring 2015 Nuno Santos Summary! Windows boot sequence! Relevant Windows data structures!
Introduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014
Introduction to Data Forensics Jeff Flaig, Security Consultant January 15, 2014 WHAT IS COMPUTER FORENSICS Computer forensics is the process of methodically examining computer media (hard disks, diskettes,
Ten Deadly Sins of Computer Forensics
Ten Deadly Sins of Computer Forensics Cyber criminals take advantage of the anonymity of the Internet to escape punishment. Computer Forensics has emerged as a new discipline to counter cyber crime. This
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
Computer Forensics CHAPTER
Computer Forensics 17 CHAPTER In this chapter, you will Learn the rules and types of evidence Review the collection of evidence Study the preservation of evidence Discover the importance of a viable chain
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
Chapter 14 Analyzing Network Traffic. Ed Crowley
Chapter 14 Analyzing Network Traffic Ed Crowley 10 Topics Finding Network Based Evidence Network Analysis Tools Ethereal Reassembling Sessions Using Wireshark Network Monitoring Intro Once full content
ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT
ITU Session Four: Device Imaging And Analysis Mounir Kamal Q-CERT 2 Applying Forensic Science to Computer Systems Like a Detective, the archaeologist searches for clues in order to discover and reconstruct
What is Digital Forensics?
DEVELOPING AN UNDERGRADUATE COURSE IN DIGITAL FORENSICS Warren Harrison PSU Center for Information Assurance Portland State University Portland, Oregon 97207 [email protected] What is Digital Forensics?
IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE
IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE IAPE STANDARD SECTION 16.1 DIGITAL EVIDENCE Standard: Digital evidence is a critical element of modern criminal investigation that should be maintained in strict
Keywords: Computers, digital evidence, digital evidence bags, forensics, forensics tools
Computer Forensics Procedures, Tools, and Digital Evidence Bags 1 Computer Forensic Tools Keywords: Computers, digital evidence, digital evidence bags, forensics, forensics tools Computer Forensics Procedures,
KEY STEPS FOLLOWING A DATA BREACH
KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE Vahidin Đaltur, Kemal Hajdarević, Internacional Burch University, Faculty of Information Technlogy 71000 Sarajevo, Bosnia
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING MODULE A INTRODUCTION TO COMPUTER FORENSICS AND NVESTIGATIONS A1.0 Explain concepts related to computer forensics. A1.1 This module is measured
ITU Session Two: Conduct a forensically safe investigation Mounir Kamal [email protected] Q-CERT
ITU Session Two: Conduct a forensically safe investigation Mounir Kamal [email protected] Q-CERT 2 The Importance of Crime Scene One of the main goals in an investigation is to attribute the crime to its
Forensics on the Windows Platform, Part Two
1 of 5 9/27/2006 3:52 PM Forensics on the Windows Platform, Part Two Jamie Morris 2003-02-11 Introduction This is the second of a two-part series of articles discussing the use of computer forensics in
The Growing Problem of Data Breaches in America
Continuity Insights The Growing Problem of Data Breaches in America Today s Questions to Cover 1. What is a Data Breach? 2. How Significant is the Problem? 3. How Do Thieves Steal the Data? 4. How Does
Computer Forensic Capabilities
Computer Forensic Capabilities Agenda What is computer forensics? Where to find computer evidence Forensic imaging Forensic analysis What is Computer Forensics? The preservation, identification, extraction,
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Scientific Working Group on Digital Evidence
Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification by e-mail before or contemporaneous to the introduction of this document, or
CYBER FORENSICS. KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad.
CYBER FORENSICS KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad. 11 DIGITAL EVIDENCE? Cyber crimes Digital evidence Digital evidence is any information of
CYBER FORENSICS (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 CYBER FORENSICS (W/LAB) Course Syllabus Course Number: CSFS-0020 OHLAP Credit: Yes OCAS Code: 8134 Course Length: 130 Hours Career Cluster: Information
Digital Forensics for Attorneys Overview of Digital Forensics
Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
Computer Forensics Processing Checklist. Pueblo High-Tech Crimes Unit
Computer Forensics Processing Checklist Pueblo High-Tech Crimes Unit Cmdr. Dave Pettinari Pueblo County Sheriff's Office [email protected] The purpose of this document is to provide computer forensic technicians
Digital Forensic Tool for Decision Making in Computer Security Domain
Digital Forensic Tool for Decision Making in Computer Security Domain S. K. Khode 1,V. N. Pahune 2 and M. R. Sayankar 3 1, 2, 3 Computer Engineering Department of Bapurao Deshmukh College of Engineering,
Microsoft Technologies
NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use
Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive
Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive This guide explains how to create and use a Rescue USB flash drive to reinstall and recover the ExtraHop system. When booting
Course: Information Security Management in e-governance
Course: Information Security Management in e-governance Day 2 Session 2: Security in end user environment Agenda Introduction to IT Infrastructure elements in end user environment Information security
Policy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
Computer Forensic Specialist. Course Title: Computer Forensic Specialist: Storage Device & Operating Systems
Course Title: Computer Forensic Specialist: Storage Device & Operating Systems Page 1 of 14 Course Description The Computer Forensic Series by EC-Council provides the knowledge and skills to identify,
Digital Forensic Techniques
Digital Forensic Techniques Namrata Choudhury, Sr. Principal Information Security Analyst, Symantec Corporation Professional Techniques T23 CRISC CGEIT CISM CISA AGENDA Computer Forensics vs. Digital Forensics
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
Digital Evidence Collection and Use. CS 585 Fall 2009
Digital Evidence Collection and Use CS 585 Fall 2009 Outline I. II. III. IV. Disclaimers Crime Scene Processing Legal considerations in Processing Digital Evidence A Question for Discussion Disclaimers
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
To Catch a Thief: Computer Forensics in the Classroom
To Catch a Thief: Computer Forensics in the Classroom Anna Carlin [email protected] Steven S. Curl [email protected] Daniel Manson [email protected] Computer Information Systems Department California
Detecting Malware With Memory Forensics. Hal Pomeranz SANS Institute
Detecting Malware With Memory Forensics Hal Pomeranz SANS Institute Why Memory Forensics? Everything in the OS traverses RAM Processes and threads Malware (including rootkit technologies) Network sockets,
Capturing a Forensic Image. By Justin C. Klein Keane <[email protected]> 12 February, 2013
Capturing a Forensic Image By Justin C. Klein Keane 12 February, 2013 Before you Begin The first step in capturing a forensic image is making an initial determination as to the
Guidelines on Digital Forensic Procedures for OLAF Staff
Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to
SAMPLE ELECTRONIC DISCOVERY INTERROGATORIES AND REQUESTS FOR PRODUCTION
Below are SAMPLE interrogatories and requests for production that are meant to be complementary (i.e., any devices or electronic files that are identified in answer to an interrogatory or interrogatories
Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition
APR. 08 Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition Cover photographs copyright 2001 PhotoDisc, Inc. NCJ 219941 Chapter 1. Electronic Devices: Types, Description,
System Security Policy Management: Advanced Audit Tasks
System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that
Computer Forensics US-CERT
Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further
Incident Response. Six Best Practices for Managing Cyber Breaches. Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software
Incident Response Six Best Practices for Managing Cyber Breaches Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software www.encase.com 2014 Guidance Software Inc., All Rights
Impact of Digital Forensics Training on Computer Incident Response Techniques
Impact of Digital Forensics Training on Computer Incident Response Techniques Valorie J. King, PhD Collegiate Associate Professor University of Maryland University College Presentation to AFCEA June 25,
Guideline Model for Digital Forensic Investigation
Guideline Model for Digital Forensic Investigation Salma Abdalla Information Technology Industry Development Agency (ITIDA) [email protected] Sherif Hazem Faculty of Engineering, Arab Academy for Science
Computer Forensics as an Integral Component of the Information Security Enterprise
Computer Forensics as an Integral Component of the Information Security Enterprise By John Patzakis 10/28/03 I. EXECUTIVE SUMMARY In addition to fending off network intrusions and denial of service attacks,
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information
CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 1A: Introduction to Forensics Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Digital Forensics You will learn in this module: The principals of computer
How To Protect The Time System From Being Hacked
WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/21/13 2014 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer
SUMMARIES OF VIDEOS GRADE 11 SYSTEMS TECHNOLOGIES
SUMMARIES OF VIDEOS GRADE 11 SYSTEMS TECHNOLOGIES 1. Case Study - Understanding Computers and Computing A computer is an electronic device that can accept, process and store data by following instructions
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge
Information Technologies and Fraud
Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting Information Technologies for Fraud investigation A.
AN INVESTIGATION INTO COMPUTER FORENSIC TOOLS
AN INVESTIGATION INTO COMPUTER FORENSIC TOOLS K.K. Arthur 1 H.S. Venter 2 Information and Computer Security Architectures (ICSA) Research Group University of Pretoria Pretoria Department of Computer Science
INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies
INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies REMOVABLE MEDIA: NSW MoH are currently undergoing review with a state-wide working party developing the Draft NSW
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer
