The Importance of Data Retention
|
|
|
- Elwin Parks
- 5 years ago
- Views:
Transcription
1 Section 2 Information Systems Security & Web Technologies and Security Abstract Information Security Leakage: A Forensic Analysis of USB Storage Disks A.Adam and N.L.Clarke Centre for Information Security and Network Research, University of Plymouth, Plymouth, United Kingdom e mail: [email protected] Mobile devices have become immensely popular and people are now frequently storing sensitive data on them. The cheap, handy and small USB Storage Disks are endorsed by people to carry, transfer and backup data. Unfortunately, the users of such devices are not fully aware of the importance to protect their data and how to securely wipe them prior to selling them second-hand. For this project, ten USB keys have been bought on an auction website. Then they have been forensically imaged, analysed and the amount of data has been classified according to its sensitivity. Six out of ten of the keys contained sensitive data such as names, addresses, invoices and health records. The sensitivity of the information retrieved and the potential threats they could have lead to seem to indicate that it is of importance to educate users about how to best protect their data. Keywords Information Leakage, Data Breach, Computer Forensic, Evidence Recovery, USB Storage Disks 1 Introduction The reality and importance of the data leakage problem has been highlighted by several surveys. According to a study made by the company PGP (2007) on the cost of data breaches, the primary cause of a data breach is at 49% lost laptops and other mobile devices including USB storage disks. Due to their small size and their price regularly decreasing, USB keys are a device likely to be easily lost or stolen. Thus, the UK Ministry of Defence recently admitted that a hundred of their USB storage disks have been lost or stolen since 2004; devices that sometimes contained secret information (BBC, 2008). If those devices can be stolen or acquired following a loss, they can as well be freely bought second-hand for a small amount of money, generally between 1 and 10. Some academic studies (Jones et al., 2005) have highlighted the fact that people did not erase properly their data prior to disposing of their hard disk drives. If people have not taken the habit to erase securely their HDD, it can be wondered if the other computer devices they sell second-hand can become a source of data leakage due to a lack of secure erasing. This project s objectives were three in number: to investigate whether it is possible to retrieve data from USB storage disks bought second-hand, to try to evaluate the 171
2 Advances in Networks, Computing and Communications 6 sensitivity of the retrieved data and finally to understand the consequences of a possible disclosure of the restored data. The second section of this paper will give some background literature. Academic research projects and studies done by companies specialised in security will be detailed in this section. The third section will focus on the methodology that has been built for the project. In the fourth section, the results obtained during the examination of the keys following the steps described in the methodology will be detailed. A discussion on these results will be given in the fifth section of the paper. Among other topic, the discussion will focus on the threats the data retrieved during the keys examination could have lead to. The sixth and final section will conclude this paper and give some thoughts about possible future work. 2 Background literature In this section on the background literature, four studies will be described. Two of them were conducted by academic researchers while the two others were leaded by companies specialised in security. Most of these studies have been focusing on analysing data leakage coming from hard disk drives sold second-hand. However two of them pushed their study a little further towards mobile devices by analysing laptops and flash memory devices. The University of Glamorgan in association with the Australian University Edith Cowan conducted a study (Jones et al., 2005) whose purpose was to determine whether hard disk drives sold second hand were efficiently wiped prior to their selling. After having bought a hundred HDD from Australia, Germany, North America and the UK, those were imaged using either EnCase Forensic or Linux based Knoppix software prior to be examined. The examination of the disks was done in two steps. They firstly determined the presence of data, and then, they tried to find data likely to tie the disk either to an individual or to a company. Following their investigation, 57% of the disks revealed to which company they belonged and 53% contained one or more identifiable usernames. The Canadian University of Ottawa conducted a similar study (El Emam et al., 2007) buying 60 hard disk drives coming from several Canadian vendors. However their interest was in a particular kind of data: private health information. To recover the files on the drives bought second-hand, the researchers used the commercial software program Recover my files. Results showed that data could be retrieved from 67% of the disks among which 26 disks contained the address of their owner. Concerning their domain of interest, they found out that 18% of the disks contained private health information. For the first part of their study on data leakage, Pointsec Mobile Technologies (Ahlberg, 2004) bought a hundred hard drives and laptops from auction websites and public auctions. They conducted a study similar to the two previously detailed, leading to the finding of data on seven disks out of ten. The second part of their study was a slightly different approach of the data leakage problem and concerned the lifecycle of a lost laptop. They followed the steps through which a lost laptop is going when forgotten in public places such as London airports. Unclaimed laptops 172
3 Section 2 Information Systems Security & Web Technologies and Security are sold in auctions where potential buyers have the possibility to have a look at it prior to buying it. Their study highlights that this way it is easy for ill-intentioned people to evaluate how they could use the remnant data of those devices. The German security company O&O Software conducted several times a study (Kehrer, 2007) on second-hand hard disk drives leakages. However, the new part of the last edition of this study was that they also considered memory cards, cameras and USB sticks. 115 storage media were bought via online auctions coming both from Germany and from the USA. If 32 devices were securely deleted, 72.2% of the other disks presented recoverable data. Among the data found, a lot of pictures were available and other sensitive data that used to be backed up on the storage devices that were examined. 3 Methodology At the beginning of this project it has been decided that a clear methodology was mandatory prior to taking any attempt at analysing the keys. Effectively, the data handled during the investigation are electronic evidence which require an appropriate care in order not to compromise them. Therefore, the ACPO Guidelines (Association of Chief Police Officers, 2003) describing data collection and evidence recovery have been used to build the following methodology. The process starts with the collection procedure. During this step, it has been decided to buy the second hand devices via the auction website ebay and to examine the keys with the help of the forensic software EnCase. Once the keys have been ordered and received, a number has been assigned to each of them and they were gathered with the packages they came with. The second phase is the examination procedure during which forensic images of each of the keys were produced. Electronic evidences can be easily corrupted; as a result there is a need not to work on the initial data but on an exact copy of it (Feldman, 2005). The images are named after the number assigned to the key it comes from and MD5 hashes are produced to ensure the integrity of the data (Scientific Working Group on Digital Evidence, 2006). The third step is the analysis procedure. During this step, several techniques have been used. Firstly, the information given by the key and its package were collected. Then a time analysis was performed to determine when the key was used. Given the relatively small size of a USB storage disk, a file-by-file analysis could be performed, opening and reading all the files that were not too damaged. Finally, keyword searches were used. This powerful technique allowed by EnCase generally lead quickly to an owner name. The last step of the evidence recovery is the reporting procedure during which reports on the keys were produced (Ashcroft et al., 2004). 4 Results A set of ten USB storage disks has been bought for this experiment via the auction website ebay whose storage capacity distribution can be seen on Table 1. Given the storage capacity of the key bought for this project, it can be seen that the investigation has been conducted on a total capacity of 8,192 Mb of data. 173
4 Advances in Networks, Computing and Communications 6 Storage Capacity 128 Mb 256 Mb 512 Mb 1 Gb 2 Gb Number of keys Table 1 - Storage Capacity Distribution However, all the keys did not contain data. As a result, the useful devices for the study were quickly narrowed to eight because two of them did not present any data. Likewise, two other keys have been considered useless for the purpose of the project which is to evaluate the amount of sensitive data presented by the bought devices. The reason why those two other keys could not be exploited is that they were filled with impersonal data such as movie and music files preventing the investigator to retrieve sensitive data on them. The remaining six USB storage disks all presented either personal or private data. The presence or absence of data on the keys and its sensitivity degree is given in Table 2. Private Data Personal Data Not sensitive No Data KEY-01 KEY-02 KEY-03 KEY-04 KEY-05 KEY-06 KEY-07 KEY-08 KEY-09 KEY-10 Table 2 - Data presence on the USB storage disks It has been decided that sensitive data would be split in two different categories. The first one is personal data; in this category, the data allowing identifying the owner of a key will be considered. However, this type of data is often given away by the user and do not constitute the most sensitive data. Along the investigation several examples of personal data were found such as: Names Addresses addresses Phone numbers Links to personal websites Education and work experiences The second category of data is more likely to cause harm in case of a disclosure: it is private data. During the investigation, this type of data has been including: 174
5 Photos Date of birth Invoices Nationality Credentials Section 2 Information Systems Security & Web Technologies and Security Network configurations Software serial numbers Health records Bank and credit card details Client and account numbers Considering the eight keys returning data after the investigation, more than four thousand files could be retrieved by the forensic software. However, due to the damaged nature of many of those files, only a few of them could be entirely restored. Nevertheless, the possibility of retrieving the files allowed the investigator to consider what sort of files the owners of the USB storage disks were used to store. Thus, it has been found that pictures were the most commonly stored files on those disks, followed by multimedia files (music and video files for instance). The following categories, nearly equivalent in number, are software and document files. The rest of the results on the nature of the files retrieved on the keys can be seen on Figure 1. Figure 1 - Nature of the files retrieved on the keys During the examination of the keys, three of them happened to contain a very large amount of sensitive data. Details on those three keys can be found in this section of this paper. Data retrieved on Key-02 included the owner s contact details: full name, an and two postal addresses, his phone number. In addition, what the owner looks like could be determined thanks to photos stored on the keys and entitled with me or with his name. Private documents have been restored from the key such as a couple of invoices and a request to obtain a domain name on the Internet. Apart from finding his contact details, those documents allowed the investigator to obtain the owner s signature and serial numbers of software bought on the Internet. Credentials to access a YouTube account were also stored on the key, unencrypted. The most worrying finding was to discover that the owner of this key kept a lot of files giving details on his network. Not only was the kind of network hardware used by the 175
6 Advances in Networks, Computing and Communications 6 owner described on the key but also the configurations of this network were available. Thus, unencrypted IP and MAC addresses, credentials to access the router and a WEP key were found. To finish, the key conducted to two personal website owned by the owner, one of them describing his work activity and the other, a weblog giving a lot of details about his life. The majority of the personal details found on the owner of Key-06 came from remnant parts of his Curriculum Vitae stored on the device. Effectively, his full name, a permanent postal address, four other postal addresses with the corresponding phone numbers, an address and education and work information were found. In addition more private information was also revealed such as his date of birth, his marital status and his nationality. Unprotected documents also contained credit card numbers and details on a bank account belonging to the owner of this key. If this owner did keep information on him, the analysis revealed that he possessed a large amount of sensitive information on other people. As a result, databases of students applying for the College where the owner worked were found on the key. Among the information contained in this database, names, addresses, phone numbers and sometimes even passport numbers belonging to the students were available. Used as a backup device by its user, key-08 revealed the owner s most important files. As a result personal information found included a full name, a current postal address and ten previous ones, mobile and phone numbers, an address and information on work and education. The owner s medical history could be found on the storage disk including his doctor s contact details, his daily medication and his latest hospital admissions. The owner of the key also stored letters he wrote to a number of creditors on which account numbers and client references are specified. Backup files from the web browser Firefox allowed the investigator to access stored credentials of about forty online accounts such as Paypal, ebay and The Carphone Warehouse. To finish, the key conducted to two personal websites created by the owner, the credentials to access the ftp hosting one of the website were found on the device. 5 Discussion Compared to other research about data leakage, this study has been focusing on the involvement of USB storage drives alone. Studying USB keys often means that no operating system will be available. As a matter of fact, there is less chances to find traces of information automatically recorded by the operating system without the knowledge of the user. For instance, temporary internet files could lead to information a user would not want to disclose but which is automatically kept by the OS. On the contrary, on a USB stick, usually only files and directories are available and in addition the user of the key is likely to have chosen to write the files on his/her device. As a result, if the key is used to transfer music files it will not contain sensitive data. However, when it is used to carry work files or as a backup tape, it is possible that sensitive data can be retrieved. Threats the data could have lead to have been investigated. Depending on the nature and amount of the data retrieved on each device, the previous owners of the second- 176
7 Section 2 Information Systems Security & Web Technologies and Security hand USB keys could have faced three different threats: identity theft, fraud and hacking attacks. Four of the ten keys, presenting an important amount of sensitive data, could have lead to an identity theft scenario. Among them, the three of the keys detailed in the previous section could have been a target for ID theft. In addition to their owner s contact details; Key-02 revealed the signature of its owner, information that could have been useful to falsify documents more easily while impersonating the identity of the owner of this key; Key-06 provided its owner s full profile from his identity to his hobbies passing by his educational and work experience due to stored CVs; Key- 08 contained its owner s National Insurance Number and his date of birth information that criminals look for to perform an Identity theft. The large amount of data on four of the keys among the ten bought could also have lead to fraud scenario. Effectively, Key-06 and Key-08 contained banking details that could have allowed a criminal to perform a banking fraud. The owner of Key-06 stored credit cards numbers and a bank account details. The owner of Key-08 made a back up of a software program he used to access his online banking account that would have provided a criminal the necessary credentials to access the accounts. Finally, the owners of two of the keys could have faced a hacking attack. The details on both the hardware and the configurations the owner of key-02 used would have facilitated a hacking attack of his home network; moreover, the details given on his modem router could have incited somebody to misuse his Internet access. The owner of key- 08 would have allowed a criminal to access forty of his online accounts by storing files containing his credentials that could be easily decrypted. To finish, it is of importance to highlight that, according to the results of this investigation, too few people seems aware that formatting their device or erasing the files will not result in a secure wiping of all their data. If the data found during the investigation had been bought by ill-intentioned people they could have been misused and the repercussions could have been serious for the previous owners of those devices. If the Operating System often gives to understand that formatting a USB storage disk will erase ALL data contained by the device, it should be stressed that a lot of the data the owner thought he had wiped are still available when using forensic tools to recover it as it has been proven in this investigation. 6 Conclusion and future work Evidences of the problem of data leakage have been found in the news, surveys and research. Given some recent data breach incidents, even the UK government decided to take countermeasures about this phenomenon (House of Commons, 2007). In this problem, some sources seem to indicate that mobile devices are a major vector of information leakage. Among those mobile devices, this project has been focusing on handy, cheap and immensely popular USB storage disks. From the ten USB keys bought second-hand on an auction website for this study, six of them revealed who their previous owners were, providing at least their first and last names. As a result, the risk of leakage appeared to be real and its importance needed to be investigated. Therefore the risks, the owners of the USB disks could have faced, have been considered, depending on the amount and nature of both personal and private data provided by the keys. Alarmingly, the data could have been misused in a number of 177
8 Advances in Networks, Computing and Communications 6 fraud, hacking or ID theft scenarios. Such results seem to point out that it is of importance to carry on educating the users of computer hardware, raise their awareness on how important their sensitive data can be and how to protect them. Among the possibilities of future work concerning this research, it has been thought that the set of keys could be extended. Effectively, the study has been considering ten keys which can be considered as a limited number. Conducting this study again or buying additional devices could allow the investigators to confirm the results or to extend the findings. For instance, instead of having USB keys belonging to individuals, it can be expected that USB storage disks belonging to companies could be found. USB storage disks being not the only flash devices, it could be envisaged to extend the study to other mobile devices such as flash cards and mp3 players. 7 References Ahlberg, M. (2004) The lifecycle of a lost laptop info4security [Online] Available: [Accessed 25 January 2008] Ashcroft, J., Daniels, D. J. and Hart, S. V. (2004) 'Forensic Examination of Digital Evidence: A Guide for Law Enforcement' National Institute Justice Association of Chief Police Officers (ACPO) and National Hi-Tech Crime Unit (NHTCU) (2003) Good Practice Guide for Computer based Electronic Evidence Version 3.0 [Online] Available: [Accessed 25 March 2008] BBC (2008) MoD admits loss of secret files [Online] Available: [Accessed 30 July 2008] El Emam, K., Neri, E. and Jonker, E. (2007) An Evaluation of Personal Health Information Remnants in Second-Hand Personal Computer Disk Drives Journal of Medical Internet Research 9(3):e24 [Online] Available: [Accessed 25 January 2008] Feldman, J.E. (2005) 'Ten Steps to Successful Computer-Based Discovery' Computer Forensics Inc. House of Commons (2007) Justice First Report Justice Committee Publications [Online] Available: [Accessed 3 May 2008] Jones, A., Mee, V., Meyler, C. and Gooch, J. (2005) Analysis of Data Recovered from Computer Disks released for Resale by Organisations Journal of Information Warfare 4(2):45-53 Kehrer, O. (2007) Data Data Everywhere O&O Software GmbH, Berlin PGP (2007) Annual Study: Cost of a Data Breach [Online] Available: [Accessed 25 January 2008] Scientific Working Group on Digital Evidence (2006) 'Data Integrity within Computer Forensics' 178
Who is Reading the Data on Your Old Computer?
Who is Reading the Data on Your Old Computer? Vivienne Mee Rits Information Security Citywest Business Campus Co. Dublin [email protected] ABSTRACT Researchers at Rits Information Security performed
Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721
Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721 Electronic Information Security and Data Backup Procedures Date Adopted: 4/13/2012 Date Revised: Date Reviewed: References: Health Insurance Portability
The virtual safe: A user-focused approach to data encryption
The virtual safe: A user-focused approach to data encryption Steganos GmbH, 2008 1 The hard disk: a snapshot of our lives The personal computer has never been more personal. We routinely trust it with
A practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies
INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies REMOVABLE MEDIA: NSW MoH are currently undergoing review with a state-wide working party developing the Draft NSW
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
Policy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Network Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
Forensics on the Windows Platform, Part Two
1 of 5 9/27/2006 3:52 PM Forensics on the Windows Platform, Part Two Jamie Morris 2003-02-11 Introduction This is the second of a two-part series of articles discussing the use of computer forensics in
Cyber and Data Security. Proposal form
Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
Investigations Support
Investigations Support for Fraud and Financial Crimes This document explains how CIFAS information can: support your investigations into any crime type - not just fraud disrupt Organised Criminal Groups
Guidelines on Digital Forensic Procedures for OLAF Staff
Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to
How To Stop A Cybercriminal From Stealing A Credit Card Data From A Business Network
2012 Payment Card Threat Report The second annual study of unencrypted payment card storage Automated Attacks and Card Data Handling In 2011, data breaches increased 42% and as such, last year was reported
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
Chapter 7 Securing Information Systems
1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
Dresden International School Computer and IT Use Policy
Dresden International School Computer and IT Use Policy Overview This document specifies the important ground rules that students must follow when using computers, IT services and IT equipment provided
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
Case study on asset tracing
Recovering Stolen Assets: A Practitioner s Handbook ARNO THUERIG * Case study on asset tracing I. Case study background The client adviser of a Swiss private bank transferred approximately USD 1 million
Protecting personally identifiable information: What data is at risk and what you can do about it
Protecting personally identifiable information: What data is at risk and what you can do about it Virtually every organization acquires, uses and stores personally identifiable information (PII). Most
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Acronis True Image 2015 REVIEWERS GUIDE
Acronis True Image 2015 REVIEWERS GUIDE Table of Contents INTRODUCTION... 3 What is Acronis True Image 2015?... 3 System Requirements... 4 INSTALLATION... 5 Downloading and Installing Acronis True Image
Document Type Doc ID Status Version Page/Pages. Policy LDMS_001_00161706 Effective 2.0 1 of 7 Title: Corporate Information Technology Usage Policy
Policy LDMS_001_00161706 Effective 2.0 1 of 7 AstraZeneca Owner Smoley, David Authors Buckwalter, Peter (MedImmune) Approvals Approval Reason Approver Date Reviewer Approval Buckwalter, Peter (MedImmune)
Management of Hardware Passwords in Think PCs.
Lenovo Corporation March 2009 security white paper Management of Hardware Passwords in Think PCs. Ideas from Lenovo Notebooks and Desktops Workstations and Servers Service and Support Accessories Introduction
White Paper: Whole Disk Encryption
How Whole Disk Encryption Works White Paper: Whole Disk Encryption How Whole Disk Encryption Works Contents Introduction to Whole Disk Encryption.....................................................................
The Growing Problem of Data Breaches in America
Continuity Insights The Growing Problem of Data Breaches in America Today s Questions to Cover 1. What is a Data Breach? 2. How Significant is the Problem? 3. How Do Thieves Steal the Data? 4. How Does
CSG & Cyberoam Endpoint Data Protection. Ubiquitous USBs - Leaving Millions on the Table
CSG & Cyberoam Endpoint Data Protection Ubiquitous USBs - Leaving Millions on the Table Contents USBs Making Data Movement Easy Yet Leaky 3 Exposing Endpoints to the Wild. 3 Data Breach a Very Expensive
Hard drives dumped; information isn't DON'T BE SMUG IN THINKING PERSONAL DATA HAS BEEN ERASED By Larry Magid Special to the Mercury News
Erase Your Hard Drive Permanently erase files, emails, & Data from hard drive. Guaranteed! O&O DiskRecovery V3.0 Data Recovery for Windows with DeepScan function - Free Trial Delete porn history files
Presented by Evan Sylvester, CISSP
Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
MFR IT Technical Guides
MFR IT Technical Guides Windows 7 Backup and Recovery Page 1 of 33 Table of Contents 1 Glossary... 3 2 Backup Strategy... 4 3 Windows Backup Options... 5 3.1 Windows Backup... 5 3.2 Windows System Image
Protecting Virtual Servers with Acronis True Image Echo
Protecting Virtual Servers with Acronis True Image Echo IT organizations have discovered that virtualization technology can simplify server management and reduce total operating costs. Despite the technical
Getting Physical with the Digital Investigation Process
Getting Physical with the Digital Investigation Process Brian Carrier Eugene H. Spafford Center for Education and Research in Information Assurance and Security CERIAS Purdue University Abstract In this
Business details. Monday Friday. 10:00am 6:00pm. Saturday 10:00am 5:00pm. Telephone: 020 8315 0005. Email: [email protected].
Business details Services and price list 2010 Monday Friday 10:00am 6:00pm Saturday 10:00am 5:00pm We offer professional IT services for home and business users at a cost effective price. We have a team
INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!
INFOCOMM SEC RITY is INCOMPLETE WITHOUT Be aware, responsible secure! U HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD FASTEN UP!
Keep Your Data Secure in the Cloud Using encryption to ensure your online data is protected from compromise
Protection as a Priority TM Keep Your Data Secure in the Cloud to ensure your online data is protected from compromise Abstract The headlines have been dominated lately with massive data breaches exposing
Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016
Evolved Backup Features 1 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 6 Security File Compression Encryption Transmission
USB flash drive (128MB,256MB,512MB,1GB,2GB,4GB)
USB flash drive (128MB,256MB,512MB,1GB,2GB,4GB) Despite the different brands and names you've heard for USB flash drives JumpDrives, Pocket drives, Pen drives, and Thumb drives they all pretty much operate
Feedback Ferret. Security Incident Response Plan
Feedback Ferret Security Incident Response Plan Document Reference Feedback Ferret Security Incident Response Plan Version 3.0 Date Created June 2013 Effective From 20 June 2013 Issued By Feedback Ferret
ICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
BERKELEY COLLEGE DATA SECURITY POLICY
BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data
Feature. How to Maximize Evidential Weight of Electronically Stored Information Recommendations of BS 10008
Feature Haris Hamidovic, CIA, ISMS IA, ITIL, IT Project+, is chief information security officer at Microcredit Foundation EKI Sarajevo, Bosnia and Herzegovina. Prior to his current assignment, Hamidovic
3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.
Cybersecurity: Minimizing Risk & Responding to Breaches March 5, 2015 Andy Chambers Michael Kelly Jimmie Pursell Scope of Problem Data Breaches A Daily Phenomenon Anthem JP Morgan / Chase Sony Home Depot
THE HUMAN COMPONENT OF CYBER SECURITY
cybersecurity.thalesgroup.com.au People, with their preference to minimise their own inconvenience, their predictability, apathy and general naivety about the potential impacts of their actions, are the
Information Technologies and Fraud
Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting Information Technologies for Fraud investigation A.
Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG
Database Security Guideline Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Table of Contents Chapter 1 Introduction... 4 1.1 Objective... 4 1.2 Prerequisites of this Guideline...
CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS. Brian Carrier & Eugene H. Spafford
CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS Brian Carrier & Eugene H. Spafford Center for Education and Research in Information Assurance and Security, Purdue University,
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
Information Security Incident Management Guidelines
Information Security Incident Management Guidelines INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu Version #1.0, June 21, 2006 Copyright 2006 by The Regents of The University of
Network Security: Policies and Guidelines for Effective Network Management
Network Security: Policies and Guidelines for Effective Network Management Department of Electrical and Computer Engineering, Federal University of Technology, Minna, Nigeria. [email protected], [email protected]
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
DriveLock and Windows 7
Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
GUIDE TO MANAGING DATA BREACHES
8 MAY 2015 CONTENT PURPOSE OF THE GUIDE 3 INTRODUCTION 4 HOW DATA BREACHES COULD OCCUR 5 RESPONDING TO A DATA BREACH 6 i. DATA BREACH MANAGEMENT PLAN 6 ii. CONTAINING THE BREACH 7 iii. ASSESSING RISK AND
Encryption and Digital Signatures
GreenNet CSIR Toolkit Briefing no.3 How to protect privacy, and your identity, online Written by Paul Mobbs for the GreenNet Civil Society Internet Rights Project, 2002. http://www.internetrights.org.uk/
data recovery specialists
data recovery specialists Last year we helped thousands of clients to recover data from media including hard disk drives, RAID, USB drives, tapes and even mobile phones. This is why clients such as MITIE,
GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.
GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...
How To Get A Computer Hacking Program
CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator
Mobile Devices Security Policy
Mobile Devices Security Policy 1.0 Policy Administration (for completion by Author) Document Title Mobile Devices Security Policy Document Category Policy ref. Status Policy Unique ref no. Issued by GSU
If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses
2 If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses As the Story Goes... At seven pm, I received a distraught phone call on my cellphone...
PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009
PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009 Current Laws: A person commits the offense of identity theft
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
Emerging Security Technological Threats
Emerging Security Technological Threats Jamie Gillespie Training and Education Team Leader, AusCERT About AusCERT Australia s national CERT Collect, monitor, advise on threats and vulnerabilities Incident
(b) slack file space.
Hidden Files A Computer Forensics Case Study Question Paper 1. Outline the meaning of the following terms: (a) cookie, [2 marks] A cookie is data stored locally that is used by some websites for data that
Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
Full Drive Encryption Security Problem Definition - Encryption Engine
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
Open an attachment and bring down your network?
Open an attachment and bring down your network? Many people think this will never happen to them, but virus attacks can come from unlikely sources and can strike when you least expect it. They can wreak
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
Desktop and Laptop Security Policy
Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious
Data Access Request Service
Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
Information Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable
