Improving Cyber Forensics & Cybersecurity through Block Chain Technology with Truth Based Systems
|
|
|
- Lizbeth Robinson
- 9 years ago
- Views:
Transcription
1 Improving Cyber Forensics & Cybersecurity through Block Chain Technology with Truth Based Systems Interna(onal Symposium on Forensic Science Error Management Ken Zatyko July 23, 2015
2 Introductions Experience: National federal labs and cyber center design expertise 28 Years experience in cyber crime, fraud investigations, counterterrorism and consulting Fortune 100 companies and US Government (former USAF Lt Colonel and Special Agent) Led world s largest accredited digital forensics lab (DCFL), co-chair FBI Regional Computer Forensics Lab, US Secret Service national lab consultant Education and certifications Master of Science in Crime In Commerce George Washington University (AF scholarship) Master of Arts Military Operational Art and Science Air Command & Staff College (AF scholarship) Dual Bachelor of Science degrees Computer Information Science & Business Administration Certified Cyber Forensics Professional and Distinguished Panelist Certified Information Systems Security Professional and Exam Developer 2
3 Data Breaches on the rise and many evidence systems are connected to the Internet. How do we ensure integrity? 3
4 Recent trusted insider threats to evidence in the news January 13, 2015: Missing police evidence includes thousands in cash, Providence, RI. A search warrant affidavit from a missing evidence investigation reveals that a shade under $12,000 in cash and two diamond rings are unaccounted for, and a now-suspended police officer was the one who logged the evidence into a storage locker. March 13, 2015: Cash missing from Springfield police evidence room Investigation launched last month when cash could not be located February 11, 2015: District Attorney launches investigation into evidence missing from Upper Darby police station. One of two people responsible for the evidence room discovered that an envelope, which contained drugs and cash, was missing May 15, 2015: Evidence Missing from Sheriff s Office. To get inside the evidence room, those with authorization to enter are equipped with a key fob to activate the door. Then they must submit a fingerprint with their right index finger to open the door. "It's all electronic and magnetic," Fisher said. Cameras, operating on a 90-day loop, continuously record inside and outside of the evidence room. Augusta County. Explanation given, $4000 fell in trash can.
5 Digital Forensics This scientific process contains the following eight steps: 1. Search authority 2. Chain of custody 3. Imaging/hashing function 4. Validated tools 5. Analysis 6. Repeatability 7. Reporting 8. Possible expert presentation Why data centric security? It is unique and ideal for forensics readiness! It performs hash validation with a block chain and timestamp. It also ensures a forensics workstation s clean state integrity and repeatability preventing contamination and inaccurate results with unique information on location, who had access, and when. (Source: Zatyko, Forensic Magazine) 5
6 Seven Rings of Threat Good Opera(ng Prac(ces and an Adequate Budget Physical Security Personnel Opera(ng Systems input/output Communica(ons Data
7 The digital forensics imaging process. Work with the duplicate and not the original, validate with a hash. 7
8 KSI is Based on Cryptographic Hash Functions A hash function takes arbitrarily-sized data as input and generates a unique fixed-size bit INPUT DATA HASH FUNCTION HASH VALUE ONE-WAY ONLY. REVERSING IMPOSSIBLE sequence as output. The output is known as the hash value, message digest, or digital 1.6 MB PDF CONTRACT SHA256 HASH FUNCTION 256-BIT HASH VALUE 41ADE674F7AF728AF83 fingerprint of the input. A hash value is often used as 2 GB VM IMAGE SHA256 HASH FUNCTION 256-BIT HASH VALUE FDA DFA/F representative of the input data. # 168 BYTES LOG FILE ENTRY SHA256 HASH FUNCTION 256-BIT HASH VALUE DFA/FDA77476
9 Chain of Custody: Where is the continuous integrity check for this file? 9
10 Value proposition Harnessing industrial data centric security block chain to support forensics activities bringing clear chain of custody on an examiner s interaction with the victim and/or any data or images/objects 10
11 Forensics services Traditionally, after the fact investigations upon alert of an incident Moving toward proactive approach or cyber crime diagnostics others call it hunting. New issue is the cloud as the crime scene New need: Cloud computing as a platform for forensics 11
12 Key discriminators for Data Centric Security: security, contamination prevention, and integrity safeguards Keyless Security Infrastructure (KSI) used to ensure validation of virtual machine gold copy operating system and forensics toolkit KSI used to ensure forensic workstation calibration KSI used to ensure no change to client data during exam process KSI used for chain of custody integrity KSI used to ensure lab workstation reset for next case 12
13 Turning Individual Hash Values into Hash Trees A hash tree takes hash Xroot = h(x14 X58) values as inputs and, via repeated hash function application, aggregates them into a single root hash value. The construct can be viewed as a special kind of hash function, and it has some very useful properties. X14 = h(x12 X34) X58 = h(x56 X78) X34 = h(x3 X4) X12 = h(x1 X2) X78 = h(x7 X8) INPUT VALUES X1 X2 X3 X4 X5 X6 X7 X8
14 Geographically Distributed Hash Trees A distributed hash tree is AGGREGATORS built by a hierarchy of geographically separate computational units called aggregators. Each aggregator operates asynchronously. It receives hash values from its children, generates its own hash tree, then sends its root hash value to multiple parents. This root hash value becomes a leaf at each connected parent.
15 KSI Scalability AT: Core sites Each parent aggregator can support up to 1000 children. This gives capacity of 10 3n signatures per round where n is the number of aggregation layers. KSI currently contains four aggregation layers. Up to signatures per second can be generated when the system is fully built out. AN: Na(onal AS: Regional The top-level cluster beats once per second i.e. there is one top level root hash value generated each second. CLIENT 1 CLIENT 2 CLIENT N AL: Local
16 High Availability & Resiliency CORE Aggregators run in redundant clusters. Each logical aggregator is implemented as a cluster of fully redundant servers, hosted at independent locations. Each request is sent to each member of the upstream aggregation cluster. First correct response is accepted. This ensures there is no single point of failure. Re-routing around network and server failures is transparent, since there are multiple paths from each leaf to the root. CUSTOMER CUSTOMER
17 Introducing the Calendar Block Chain This Second The global aggregation Hash... Calendar infrastructure operates asynchronously. Hash values are submitted to the tree and unique hash Federated Hash Tree Subnet Subnet Subnet chains are returned. The same tree is never rebuilt. Only the root hashes are kept in a public calendar Hash Values Keyless Signatures Hash Values Keyless Signatures Hash Values Keyless Signatures database.
18 The Core Cluster Keeps the Hash Calendar DATABASE CORE SYSTEM Ag VERIFIER 1 2 n 1 2 n Ag Ag Ag VERIFIER VERIFIER VERIFIER 1 2 n 1 2 n Ag Ag Ag VERIFIER VERIFIER VERIFIER
19 Distributed Consensus The top of the hash tree would be a single point of failure; therefore we use a cluster of N servers. Selecting a single hash value from multiple nodes is a variation of the Byzantine Fault Tolerance problem. We use majority voting to ensure uniqueness of the top. Therefore, N / 2 sites can fail. Sites run as a synchronized state machine. Each core node is synchronized to UTC and contains an atomic clock.
20 Going further makes forensics native - eliminates costly ediscovery imaging and hashing Provide a ready environment for the remote incident response by the forensics technicians and examiners through hash enabled time stamped files, ease of timeline analysis, and secure forensics artifact storage with flawless chain of custody procedures. Moreover it provides for remote cyber forensics through cloud forensics increasing the speed of results and overcoming current cloud challenges. In a KSI enabled environment with signature tokens on each file, one could simply conduct hash set comparisons to find known good, known bad, and unknown or questionable files for further investigation speeding up incident response and investigations. This forensics ready environment is well suited for prompt investigative response and pre-defined data reduction techniques. 20
21 Today versus tomorrow: Slow Incident Response versus KSI Forensics Readiness A KSI enabled Cloud environment provides a forensics ready environment in which the time consuming task of Forensic hashes exists and forensics imaging is not required. This saves critical time during incident response for eradication and remediation. 21
22 Summary: Improving Cyber Forensics and Cybersecurity through Block Chain Technology with Truth Based Systems Cyber threats are dramatically on the rise. Its not just data ex-filtration, but data integrity is a growing concern Cyber forensics is maturing Hashing is improving with time stamps and block chaining Forensics workstations and systems integrity could be improved with block chain technologies Evidence control systems could be made forensics ready for improved security and validation 22
23 Questions?
The Virtual Digital Forensics Lab: Expanding Law Enforcement Capabilities
Briefing Paper The Virtual Digital Forensics Lab: Expanding Law Enforcement Capabilities Sean A. Ensz University of Oklahoma 200 Felgar Street, Norman, Oklahoma 73019 405.325.3954 Office 405.325.1633 Fax
Digital Evidence Search Kit
Digital Evidence Search Kit K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K. H. Pun, W.W. Tsang, H.W. Chan Center for Information Security and Cryptography Department of Computer Science The University
Fight fire with fire when protecting sensitive data
Fight fire with fire when protecting sensitive data White paper by Yaniv Avidan published: January 2016 In an era when both routine and non-routine tasks are automated such as having a diagnostic capsule
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
Incident Response. Six Best Practices for Managing Cyber Breaches. Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software
Incident Response Six Best Practices for Managing Cyber Breaches Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software www.encase.com 2014 Guidance Software Inc., All Rights
Endpoint Threat Detection without the Pain
WHITEPAPER Endpoint Threat Detection without the Pain Contents Motivated Adversaries, Too Many Alerts, Not Enough Actionable Information: Incident Response is Getting Harder... 1 A New Solution, with a
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT OVERVIEW The National Institute of Standards of Technology Framework for Improving Critical Infrastructure Cybersecurity (The NIST Framework) is a
Cyber Security Response to Physical Security Breaches
Cyber Security Response to Physical Security Breaches INTRODUCTION Physical break-ins and other unauthorized entries into critical infrastructure locations, such as electrical power substations, have historically
Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
Getting Physical with the Digital Investigation Process
Getting Physical with the Digital Investigation Process Brian Carrier Eugene H. Spafford Center for Education and Research in Information Assurance and Security CERIAS Purdue University Abstract In this
CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS. Brian Carrier & Eugene H. Spafford
CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS Brian Carrier & Eugene H. Spafford Center for Education and Research in Information Assurance and Security, Purdue University,
Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013
Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013 Outline Genesis - why we built it, where and when did the idea begin Issues
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
Persistence Mechanisms as Indicators of Compromise
Persistence Persistence Mechanisms as Indicators of Compromise An automated technology for identifying cyber attacks designed to survive indefinitely the reboot process on PCs White Paper Date: October
Practical Performance Understanding the Performance of Your Application
Neil Masson IBM Java Service Technical Lead 25 th September 2012 Practical Performance Understanding the Performance of Your Application 1 WebSphere User Group: Practical Performance Understand the Performance
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...
Merkle Hash Trees for Distributed Audit Logs
Merkle Hash Trees for Distributed Audit Logs Subject proposed by Karthikeyan Bhargavan [email protected] April 7, 2015 Modern distributed systems spread their databases across a large number
Design and Implementation of a Storage Repository Using Commonality Factoring. IEEE/NASA MSST2003 April 7-10, 2003 Eric W. Olsen
Design and Implementation of a Storage Repository Using Commonality Factoring IEEE/NASA MSST2003 April 7-10, 2003 Eric W. Olsen Axion Overview Potentially infinite historic versioning for rollback and
Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
Fault Tolerant Servers: The Choice for Continuous Availability
Fault Tolerant Servers: The Choice for Continuous Availability This paper discusses today s options for achieving continuous availability and how NEC s Express5800/ft servers can provide every company
NEXT GENERATION ARCHIVE MIGRATION TOOLS
NEXT GENERATION ARCHIVE MIGRATION TOOLS Cloud Ready, Scalable, & Highly Customizable - Migrate 6.0 Ensures Faster & Smarter Migrations EXECUTIVE SUMMARY Data migrations and the products used to perform
Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath
ebook Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath Protecting against downstream fraud attacks in the wake of large-scale security breaches. Digital companies can no longer trust static login
2.0. Quick Start Guide
2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished
CALIFORNIA SOFTWARE LABS
; Digital Signatures and PKCS#11 Smart Cards Concepts, Issues and some Programming Details CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite
Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security
Raytheon Oakley Systems
Raytheon Oakley Systems Michael Crouse VP, Sales & Marketing Daniel Velez Director, Program Operations Cleared for release. #IIS2013-226. Page 1 Raytheon Oakley Systems About us Founded as Oakley Networks
Unified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle
Designing a Cloud Storage System
Designing a Cloud Storage System End to End Cloud Storage When designing a cloud storage system, there is value in decoupling the system s archival capacity (its ability to persistently store large volumes
Standard: Event Monitoring
Standard: Event Monitoring Page 1 Executive Summary The Event Monitoring Standard defines the requirements for Information Security event monitoring within SJSU computing resources to ensure that information
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
Big data management with IBM General Parallel File System
Big data management with IBM General Parallel File System Optimize storage management and boost your return on investment Highlights Handles the explosive growth of structured and unstructured data Offers
1/26/15. Chapter 2 Crime Scene
Chapter 2 Crime Scene Chapter 2 Crime Scene By the end of this chapter you will be able to: By the end of this chapter you will be able to: Investigation and Evidence Collection 1 Investigation and Evidence
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
How To Solve A Violent Home Invasion With A United Force
Use Case SOLVING VIOLENT CRIMES WITH A UNIFIED WORKFLOW In a Violent Home Invasion Investigation, the UFED Series Seamlessly Unifies Workflows from Field to Lab A series of violent home invasions has everyone
Performing Advanced Incident Response Interactive Exercise
Performing Advanced Incident Response Interactive Exercise Post-Conference Summary Merlin Namuth Robert Huber SCENARIO 1 - PHISHING EMAILS... 3... 3 Mitigations... 3 SCENARIO 2 - IDS ALERT FOR PSEXEC...
Enterprise Cybersecurity: Building an Effective Defense
: Building an Effective Defense Chris Williams Scott Donaldson Abdul Aslam 1 About the Presenters Co Authors of Enterprise Cybersecurity: How to Implement a Successful Cyberdefense Program Against Advanced
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
Building Reliable, Scalable AR System Solutions. High-Availability. White Paper
Building Reliable, Scalable Solutions High-Availability White Paper Introduction This paper will discuss the products, tools and strategies available for building reliable and scalable Action Request System
Solution Brief for ISO 27002: 2013 Audit Standard ISO 27002. Publication Date: Feb 6, 2015. EventTracker 8815 Centre Park Drive, Columbia MD 21045
Solution Brief for ISO 27002: 2013 Audit Standard Publication Date: Feb 6, 2015 8815 Centre Park Drive, Columbia MD 21045 ISO 27002 About delivers business critical software and services that transform
Automation Suite for. GPG 13 Compliance
WHITEPAPER GPG 13 Compliance Automation Suite for GPG 13 Compliance GPG 13 Compliance Assurance with LogRhythm Protective Monitoring for HMG ICT Systems is based on CESG s Good Practice Guide no.13 (GPG
Overview. Timeline Cloud Features and Technology
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
Computer Forensic Capabilities
Computer Forensic Capabilities Agenda What is computer forensics? Where to find computer evidence Forensic imaging Forensic analysis What is Computer Forensics? The preservation, identification, extraction,
Usher Mobile Identity for Higher Education Institutions. Rebecca Parks Associate Product Manager, MicroStrategy
Usher Mobile Identity for Higher Education Institutions Rebecca Parks Associate Product Manager, MicroStrategy Agenda Overview of Mobile Identity Verify Personal ID Login to University Systems Unlock Doors
Industrial Ethernet How to Keep Your Network Up and Running A Beginner s Guide to Redundancy Standards
Redundancy = Protection from Network Failure. Redundancy Standards WP-31-REV0-4708-1/5 Industrial Ethernet How to Keep Your Network Up and Running A Beginner s Guide to Redundancy Standards For a very
ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper
ADVANCED THREATS IN THE ENTERPRISE Finding an Evil in the Haystack with RSA ECAT White Paper With thousands of workstations and servers under management, most enterprises have no way to effectively make
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed
Things To Do After You ve Been Hacked
Problem: You ve been hacked! Now what? Solution: Proactive, automated incident response from inside the network Things To Do After You ve Been Hacked Tube web share It only takes one click to compromise
Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST
Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods
Cloud Computing. Chapter 1 Introducing Cloud Computing
Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization
High Availability Essentials
High Availability Essentials Introduction Ascent Capture s High Availability Support feature consists of a number of independent components that, when deployed in a highly available computer system, result
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2.
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft Applications:
Digital Forensics for IaaS Cloud Computing
Digital Forensics for IaaS Cloud Computing June 26, 2012 The views expressed in this presentation are mine alone. Reference to any specific products, process, or service do not necessarily constitute or
AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst
ESG Lab Spotlight AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst Abstract: This ESG Lab Spotlight details ESG s hands-on testing of
Digital Evidence and Threat Intelligence
Digital Evidence and Threat Intelligence 09 November 2015 Mark Clancy CEO www.soltra.com @soltraedge External Threats Growing 117,339 incoming attacks every day The total number of security incidents detected
SAM Server Utility User s Guide
SAM Server Utility User s Guide Updated May 2012 Copyright 2010, 2012 by Scholastic Inc. All rights reserved. Published by Scholastic Inc. PDF0157 (PDF) SCHOLASTIC, READ 180, SYSTEM 44, SCHOLASTIC EXPERT
CYBER FORENSICS (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 CYBER FORENSICS (W/LAB) Course Syllabus Course Number: CSFS-0020 OHLAP Credit: Yes OCAS Code: 8134 Course Length: 130 Hours Career Cluster: Information
Clustering and Queue Replication:
Clustering & Queue Replication Clustering and Queue Replication: How WatchGuard XCS Provides Fully Redundant Messaging Security Technical Brief WatchGuard Technologies, Inc. Published: March 2011 Introduction
Product Review: James F. Koopmann Pine Horse, Inc. Quest Software s Foglight Performance Analysis for Oracle
Product Review: James F. Koopmann Pine Horse, Inc. Quest Software s Foglight Performance Analysis for Oracle Introduction I ve always been interested and intrigued by the processes DBAs use to monitor
MASTER OF PROFESSIONAL STUDIES IN FORENSIC SCIENCE INVESTIGATE THE POSSIBILITIES.
MASTER OF PROFESSIONAL STUDIES IN FORENSIC SCIENCE INVESTIGATE THE POSSIBILITIES. 3 OUR PROGRAM THE PENN STATE MASTER OF PROFESSIONAL STUDIES With a master of professional studies in Forensic Science
Sensitive Incident Investigations. Digital Risk Management. Forensics Testing.
Sensitive Incident Investigations. Digital Risk Management. Forensics Testing. 2009 Innovation Award Winner Austin Chamber of Commerce 2010 Innovation Award Finalist Austin Chamber of Commerce Only private
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
Synchronization in. Distributed Systems. Cooperation and Coordination in. Distributed Systems. Kinds of Synchronization.
Cooperation and Coordination in Distributed Systems Communication Mechanisms for the communication between processes Naming for searching communication partners Synchronization in Distributed Systems But...
Computer Forensics as an Integral Component of the Information Security Enterprise
Computer Forensics as an Integral Component of the Information Security Enterprise By John Patzakis 10/28/03 I. EXECUTIVE SUMMARY In addition to fending off network intrusions and denial of service attacks,
Eight Essential Elements for Effective Threat Intelligence Management May 2015
INTRODUCTION The most disruptive change to the IT security industry was ignited February 18, 2013 when a breach response company published the first research that pinned responsibility for Advanced Persistent
Analyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
Top Ten Questions. to Ask Your Primary Storage Provider About Their Data Efficiency. May 2014. Copyright 2014 Permabit Technology Corporation
Top Ten Questions to Ask Your Primary Storage Provider About Their Data Efficiency May 2014 Copyright 2014 Permabit Technology Corporation Introduction The value of data efficiency technologies, namely
Certified Digital Forensics Examiner
Cyber Security Training & Consulting Certified Digital COURSE OVERVIEW 5 Days 40 CPE Credits $3,000 Digital is the investigation and recovery of data contained in digital devices. This data is often the
How To Be A Computer Forensics Examiner
Richard A. Peacock 410.346.7288 (Office) 443.398.5246 (Cell) [email protected] EnCase Certified Examiner (EnCE) Access Data Certified Examiner (ACE) Access Data Mobile Phone Certified Examiner
Security + Certification (ITSY 1076) Syllabus
Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and
Deploying System Center 2012 R2 Configuration Manager
Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005
AUDITOR GENERAL S REPORT Protection of Critical Infrastructure Control Systems Report 5 August 2005 Serving the Public Interest Serving the Public Interest THE SPEAKER LEGISLATIVE ASSEMBLY THE PRESIDENT
Advanced Threats: The New World Order
Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China [email protected] 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC
Dr Markus Hagenbuchner [email protected] CSCI319. Distributed Systems
Dr Markus Hagenbuchner [email protected] CSCI319 Distributed Systems CSCI319 Chapter 8 Page: 1 of 61 Fault Tolerance Study objectives: Understand the role of fault tolerance in Distributed Systems. Know
white paper GoodSync Enterprise The Ideal Solution For Corporate File Synchronization and Backup www.goodsync.com/enterprise
white paper GoodSync Enterprise The Ideal Solution For Corporate File Synchronization and Backup www.goodsync.com/enterprise Overview GoodSync Enterprise is a versatile and cost-effective backup and synchronization
