Digital Forensics in Computer and Cellular Networks
|
|
|
- Valerie Norris
- 10 years ago
- Views:
Transcription
1 Digital Forensics in Computer and Cellular Networks Pascal Schöttle July 19, 2009 Seminararbeit Ruhr-Universität Bochum Chair for Communication Security Prof. Dr.-Ing. Christof Paar
2 Abstract The goal of this paper is to give an introduction to the field of digital forensics (also known as computer forensics) in computer and cellular networks. Due to the fact that the number of crimes done with electronic devices such as computers or cell phones is increasing the need for more research in this area of investigation is obvious. Even classical crimes like fraud or money laundering leave electronic traces and to safe these traces can hold good evidence against criminals. Instead of classic investigation, which has a long history and good predefined methods, computer crime investigation is a relatively new science with a lot of different approaches and frameworks. First of all the term digital forensic and its use in nowadays science will be explained. The terms digital evidence and digital investigations are introduced. Digital forensics is the main part of computer crime investigation and the question that rises is what kind of information can be used to prove someones guilt. What kind of traces of a possible attacker holds against him and how it can be proved that this data was not changed since the attack. The problem here is clear when considering cases in courtroom. You can not blame someone a crime with speculations and unproven facts. Furthermore you do not want the alleged criminal to argue that maybe the data you are using against him could have been altered. This questions and problems arise in computer and cellular networks as well and are topic of actual discussions. To fully understand where and why criminals or suspected criminals leave traces in networks, this paper gives a short introduction to widespread network technologies before demonstrating how forensic methods can be applied to networks in general first and later specialized with different network protocols and layers of the OSI reference model respectively.
3 Contents 1 Introduction System Preservation Search for Evidence Event Reconstruction Summary and Outlook Network Basics The most widespread network technologies Ethernet IEEE (Wireless) Cellular Networks Connecting Networks Summary General Forensic in Networks Preparation, Identification and Preservation Filtering and Evidence Recovery Reconstruction Phase Summary Forensic Applied to Computer and Cellular networks Ethernet - Data-link and physical layer TCP/IP - Transport and network layer The Internet The World Wide Web Other Networks Positioning in Cellular Networks Summary Conclusion 18
4 1 Introduction The goal of this section is to introduce the terms Computer Crime, Digital Evidence and Digital Forensic Analysis and show their basic concepts. There are two aspects of Computer Crime, which are defined by the worlds leading computer forensic equipment company DIBS [DIB] as follows: A criminal act in which a computer is essential to the perpetration of the crime. A criminal act where a computer, non-essential to perpetration of the crime, acts as a store of information, concerning the crime. This is to say that not only the crimes committed directly with a computer belong to this field of offense but also crimes where evidence could be found on computers or networks without necessarily using those devices to actually commit the crime. CASE EXAMPLE If the police has a certain suspect in a homicide, the investigation of his computer may reveal certain details about his contact to the victim (e.g. s and chats), or even research about how to get rid of a corpse. The analysis of the suspects cell phone may refute his alibi or also give details about contact between suspect and victim. With this definition it becomes obvious which important role digital crime analysis has nowadays and that its role in crime investigation will not decrease but more likely increase in the oncoming years. There is nearly no imaginable crime in which no computer or network can be involved. Therefor, besides the increasing number of electronic fraud or crimes committed directly with a computer, the branch of digital investigation will become more important for classical evidence collection and crime investigation. The term Digital Evidence describes all the information that can be gained from electronic devices. This can be storage media like hard disks, network logs, cell phone logs, s and so on. One of the main problems of Digital Evidences is that most of them are volatile and there is always a possibility for the perpetrator to erase them. Due to this
5 1.1 System Preservation 2 Figure 1.1: The three major phases of digital investigation according to [Car05] fact, the time within which the evidences are secured is more important in Digital Investigation than it might be in classic investigation. Digital Forensic Analysis is divided into two main branches. The first one is Physical Storage Media Analysis and the second Network Analysis. This paper focuses on the second branch. However, the two branches cannot be separated completely, so there will always be comments about looking on storage media for evidences which support or refute a hypothesis made. One of the standard works on Digital Forensic Analysis is Brian Carrier s File System Forensic Analysis [Car05]. Although, as the title indicates, its main aspect is the File System there are some basic ideas that can be applied to Network Forensics as well. In Figure 1.1 the three major phases, as indicated in [Car05], can be seen. These are the System Preservation-, Evidence Searchingand Event Reconstruction Phase. As Figure 1.1 indicates these three phases do not need to occur one after another but there are trackbacks from every phase to the previous. 1.1 System Preservation This phase is always the first thing to do once a digital crime is detected or even assumed. As with classic crimes the first act of investigation is to preserve the crime scene. This is the main aspect of this phase. In classic crime investigation you can close of the crime scene, e.g. a house or flat, but it is more difficult to follow this approach in digital investigation. Here it is difficult to shut down a network or computers without altering data. As with classic crime scenes it should be tried to avoid every change of the evidences. It has to be tried to copy and save all informations contained in the network or on physical storage devices without changing them. It is important to have a proof that the data was not changed during the investigation process. One approach to achieve this is to compute a cryptographic hash sum of the data, which would indicate a change of them later. 1.2 Search for Evidence Now, after the crime scene is preserved, the next step is to look for evidences. As a digital crime is assumed the digital investigator creates hypotheses which
6 1.3 Event Reconstruction 3 can either be supported or refuted by evidence found in the data. It is a major aspect not only to look for evidence that supports a specific hypothesis because the hypothesis always could be wrong. The main methods for searching for evidence are: to look at log files, e.g., those of routers or other network components, search for altered data, e.g., again with cryptographic hash sums, looking for root kits, e.g., by checking the low levels of the operating system, search the file system for ominous files. CASE EXAMPLE from [Car05] Consider a server that has been compromised. We start an investigation to determine how it occurred and who did it. During the investigation, we find data that were created by events related to the incident. We recover deleted log entries from the server, find attack tools being installed on the server, and numerous vulnerabilities that existed on the server. Using this data, we develop hypotheses about which vulnerability the attacker used to gain access and what he did afterwards. Later, we examine the firewall configuration and logs and determine that some of the scenarios in our hypotheses are impossible because that type of network traffic could not have existed, and we do not find the necessary log entries. Therefore, we have found evidence that refutes one or more hypotheses. 1.3 Event Reconstruction The third and last phase of the digital investigation process is to use the collected evidences to reconstruct what has happened in the system or network. To do this, it is necessary to correlate various evidence, maybe even from different sources, to get a proof of the one hypothesis that stands last. For this phase it is important to have a knowledge of the operating systems and the network basics of the digital components involved in the crime. To understand how an operating system or the network components work is essential to come to a clue what the hints are indicating. 1.4 Summary and Outlook In summary, the procedure of investigating a digital crime is very similar to the procedure of investigating a classic crime. First of all, there is the crime scene which has to be preserved. Than, there is the search for evidence and finally the result of this search is to reconstruct the events happened at the crime scene. The main difference is the problem of time. In digital networks as well as on standalone systems, the danger of data being altered is more likely than with classical crimes. Usually the perpetrator has to undertake own actions to dispose most
7 1.4 Summary and Outlook 4 of his traces on a classical crime scene whereas in digital crime scenes the traces and evidences are often automatically overwritten by the overlying system after some time. So, if the recognition of a crime takes very long or the preservation of the crime scene is not done right away, there is a good chance for the perpetrator that his traces are gone altered, deleted and thus not useful anymore. Due to this, the first act of every digital investigation has to be to preserve evidences as fast as possible. To fully understand where the traces an attacker may leave are, the investigator has to understand the crime scene. For this, Chapter 2 gives a short overview over network technologies. Chapter 3 shows how forensic methods can be applied to networks in general and Chapter 4 applies methods directly to the different layers of a network. Chapter 5 concludes this paper.
8 2 Network Basics As mentioned in Section 1.3, it is indispensable for a digital investigator to know the field he is investigating in. Hence, it is necessary to give a little background on how digital networks work to review the most important network protocols. 2.1 The most widespread network technologies As it can be seen in Figure 2.1, there are many interfaces and protocols through which Local Area Networks (LANs) can communicate with each other. Nowadays, almost every LAN is connected to the Internet where the definite standard is the TCP/IP language. Due to the fact that the first step of a digital crime investigation is to look for traces in the LAN before extending the search to the Internet, here is a short overview on the most widespread technologies for LANs. Figure 2.1: Dissimilar Networks connected via Internet (see [Cas04]) Ethernet After several stages of development Ethernet is the most widespread technology used in private and corporate LANs. It uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD) to coordinate communication of the different
9 2.2 Connecting Networks 6 hosts in a network. CSMA/CD is a listen before acting access control. This means that every host which wants to communicate over the shared network resource first listens to check that the resource (e.g. networking cable) is not occupied by another host and only sends data if the resource is available. There are a lot of standards for different Ethernet- Revisions, which all have different purposes. The most widespread are 100BaseT and 1000BaseT because they are very cheap and easy to install IEEE (Wireless) The IEEE standard summarizes various standards for Wireless LANs (WLAN). In these standards, the hosts, which do not necessarily have to be computers but also cell phones or PDAs, communicate with the Wireless Access Point (AP) using radio signals. Those APs are connected either to a wired network, e.g., an Ethernet, or directly to the Internet. The limitations of in contrast to the wired networks are distance, speed and interference. There will be problems with the connectivity if a host is not within a certain distance of an AP or if there is a barrier between the host and the AP that blocks radio waves Cellular Networks To overcome the limitations mentioned in the previous section, the use of cellular networks for data communication becomes more widespread and more available. For this, the cellular networks, which were originally intended to establish phoneto-phone connections for telephone calls, now operate more and more as packetswitched networks to connect to the Internet or even directly to LANs. But like with the connections build for telephone calls, the packet-switched connection makes the cellular phone or the PDA to connect to a cell site which is connected to the Internet and is responsible for routing the connections and the packets. Those cell sites keep logs which are used, e.g., for billing and maintenance but are also a good source for digital investigation. 2.2 Connecting Networks Due to the various technologies mentioned in Section 2.1 and the different ways those technologies work, they can not communicate directly with each other. To enable this, the Internet protocol has been introduced to provided a common language for the LANs to communicate with each other. The most common Internet protocols are the Transport Control Protocol (TCP), the User Datagram Protocol (UDP) and the Internet Protocol (IP). Together (with a few supporting protocols) they are known as the TCP/IP internet protocol suite and are the de facto standard for nowadays communication on the Internet.
10 2.3 Summary 7 For a better understanding of TCP/IP and consequential a better idea where to find evidences in digital investigation and digital forensics respectively, it helps to look at the different layers defined in the Open Standard Interconnection (OSI) reference model (Figure 2.2). In this model there are different layers defined and each layer can contain informations, traces and evidences. Figure 2.2: A simplified description of the Open System Interconnection (OSI) layers (see [Cas04]) As it can be seen in Figure 2.3, different applications can be reduced to first TCP or UDP and then to IP. This paper is too short to go into the details of all the layers but an example of how a web browser accesses the Internet, seen with the layers of the OSI model can be seen in Figure 2.4. Network tools (see Chapter 4), that intercept network traffic, can capture all the information that come from each layer and all of these informations can be good evidence for digital forensic. 2.3 Summary It is essential for digital investigation and digital forensic analysis to understand the basics of nowadays networks. The differentiation between local area networks and wide area networks, mainly the Internet, is very important and also to understand the interfaces between those two. The following sections describe how the evidence can be found within the different network technologies presented in this section.
11 2.3 Summary 8 Figure 2.3: The different protocols in the OSI reference model (see [Cas04]). Figure 2.4: A Web browser s access explained by the OSI model (according to [Cas04]).
12 3 General Forensic in Networks As with classical crime scenes, a computer network can contain evidence that indicates that a crime has been committed, shows how a crime was committed, prove or refute hypotheses made by the investigator and disprove or support statements made by witnesses. A good example for the last point are cellular networks, where records are kept, when and where a cell phone was used. With this information the statement of a suspect person where he or she was at a certain time can be proved or disproved. Unlike searching hard drives for evidence, which is relativly well-defined for the different file systems, there arise a lot more problems with searching networks for evidence. Hard drives are permanent storage media where the data can be recovered even if it was deleted. Networks are much more volatile and it is difficult to reconstruct a former state of the network in particular when a large number of different systems are involved. Another big difference is that a hard drive can be analyzed offline but shutting down a network will destroy most of the digital evidence. Furthermore, it is very likely that more than one network contain digital evidence for a crime. This first looks like a problem because there is more than one network which has to be analyzed. But it can also be an advantage because it is harder for the criminal to destroy all the evidence distributed over these networks. As described in Chapter 1, the search for digital evidence is separated in different phases. 3.1 Preparation, Identification and Preservation As mentioned above it is likely that not only one network is involved in a committed crime. So the first step of a digital investigation within networks is to determine which networks are involved in the crime. If those networks are identified, the next step is to contact the persons responsible for this network, e.g., an administrator of a company network. Many administrators collect data routinely to detect performance or security risks and these data can be a good source of evidence. Also the Internet can be a source of evidence concerning s and online platforms such as chats. Here, the digital investigators can contact service providers and ask for information when and maybe from where (with which IP address) a suspect has logged in the last time. providers even may give the investi-
13 3.1 Preparation, Identification and Preservation 10 gators access to the s sent by a suspect person s account (of course only with permission of a court, otherwise the research in the account of a suspect may be an offense by itself). CASE EXAMPLE (BACH v. MINNESOTA 2002) see [BAC] Accused of possessing child pornography, Bach argued that his Fourth Amendment rights were violated because a law enforcement officer was not present when his Internet Service Provider (Yahoo!) collected information relating to his account on their system. Initially, the district court agreed that the warrant was executed outside the presence of a police officer when Yahoo! employees seized from Yahoo! s servers in violation of 18 U.S.C and sections and 626A.06 of the Minnesota Statutes, and thus the Fourth Amendment. The identification process may be separated in several steps like when the suspect used the Internet to commit the crime his IP address may be logged but now the ISP, which holds this address, must be asked which subscriber had this IP address at the given time. In case the subscriber is another network, the logs of this network have to be examined as well. Here, it must be considered that every computer has a network interface card (NIC) which is connected to the physical (or wireless) medium and which has a worldwide-unique MAC address. So sometimes it is more effective to filter data for MAC addresses rather than for IP addresses. But with enough knowledge of networks an attacker may fake his MAC address as well. So it is advisable to search for a combination of IP address and MAC address. Sometimes it is helpful for the investigators to draw a so called digital evidence map displaying all the participating networks. An example of a digital network map can be seen in Figure 3.1. In this map the different Servers of a network with the particular operating system should be listed, as well as the access points to the network. The location of the entry points into a networks and the key servers often leads to the richest source of digital evidence. Having identified all participating networks and entities, it is time for preserving data and log files. As mentioned above, routinely collected data can be a good source of evidence. Log files of network components(e.g., routers) can also provide good indication of what happened at what time in a network. It is very important to save this data before it is overwritten, again, time is a crucial factor. As mentioned in Section 1.1 it is very important to be able to prove later that the data collected was not changed during the investigation, so it is advisable to calculate a cryptographic hash sum(e.g., using SHA-1) of the collected data before starting to analyze them. The International Association of Computer Investigative Specialists (see [IAC]) defines three rules for competent forensic examination:
14 3.2 Filtering and Evidence Recovery 11 Figure 3.1: Example of a digital evidence map (see [Cas04]) Forensically sterile examination media must be used. Forensically sterile means that all media utilized during the examination process is freshly prepared, completely wiped of non-essential data, scanned for viruses and verified before use. The examination must maintain the integrity of the original media. Printouts, copies of data and exhibits resulting from the examination must be properly marked, controlled and transmitted. According to [Moh03] the first step in the preparation process is to generate an authenticated copy of all data found, the so called master copy, and then make another copy to process with. By this, it is possible to work with the data without running the risk to change it irreversibly. 3.2 Filtering and Evidence Recovery Before searching the preserved data for evidence it is helpful to filter it for certain aspects. In most cases the amount of preserved data is very large and a lot of these data is not useful for the digital investigation. For example, if the whole
15 3.3 Reconstruction Phase 12 traffic of a network is captured but there is only one suspect host in the network, all data which are in no way connected with this host can be removed, e.g., by the IP or MAC address of the host. Then the data related to this one host can be examined more closely for evidence it may contain. If this reveals a link to other hosts in the network, the filtering process has to be done again. But due to the master copy mentioned in the last section it is no problem to filter the data more than once. The same applies for time periods. If an attack is suspected in a defined period of time, all data beyond this period can be eliminated. Having reduced the data, the next step is to find evidence related to the suspect. First of all, the preserved and filtered data can be searched for suspicious network traffic which may support the assumptions made after the recognition of the crime. But if the suspected attacker is experienced and knows where he leaves traces, he tries to cover his tracks by deleting logs on network components or systems. Here comes the part of digital network forensic which overlaps with digital file forensic. All these data were on physical storage media and recovering data is often possible with knowledge of the underlying file system. In particular, the fact that a suspect has deleted log files on a system involved in an attack supports the hypothesis of his guilt. 3.3 Reconstruction Phase As mentioned in Section 1.3, the main part of this last phase is to try to correlate the different evidences and thus reconstruct what has happened. For example, while investigating a computer intrusion, the first focus is on the attacker s IP address to determine which hosts were under attack. Then, the log files of these hosts can be compared for similarities in order to get a clue what the attacker tried and what he accomplished. However, this phase of digital network forensic is more difficult than in digital file forensic because an attacker can be at several places, using different IP addresses at the same time, for example in a Distributed Denial of Service attack. Or he can cover his tracks by connecting to different computers all over the world before launching his attack from one of these computers. Therefore, it is necessary not always to believe the obvious but to question every evidence again to be sure it is no bait the attacker left purposely. Figure 3.2 shows how an attacker hides his real location in California by connecting first via VPN to a server in Connecticut and then sending s from there. To track down the attacker s real location, an investigator first has to find the origin of the (in this case the server in California), then trace back the connection to Connecticut and from there try to find the origin of the VPN, again to California.
16 3.4 Summary 13 Figure 3.2: Example how an attacker fakes the origin of an 3.4 Summary Applying forensic technologies to networks is separated in different phases. It is not easy to shut a network down so that it can be examined offline. Due to this, time is an even more crucial factor in forensic network analysis than it is in file system analysis an classical forensic analysis. Many evidences on network components (e.g. routers or firewalls) are overwritten periodical just because of the limited resources those components have. If they are finally overwritten, this source of evidence is mostly lost forever, because it is not only deleted but overwritten, which makes it almost impossible to recover the data. Another difference in network forensic is that there may be more sources of digital evidence which have to be correlated. This is due to the fact that an attacker can attack from several places in the network at the same time and thus leaves traces in more than one place.
17 4 Forensic Applied to Computer and Cellular networks As seen in Section 2.1, there is more than one language for computers to communicate. The goal of this section is to show details where forensic methods can be applied within the different protocols or layers. 4.1 Ethernet - Data-link and physical layer Applying forensic methods on the physical and data-link layer (as seen in Figure 2.2) is done by eavesdropping bit streams with tools called monitoring tools or sniffers. The most common tool on this layer are Wireshark (formerly known as Ethereal), which can be found at [WIR] and Tcpdump, which can be found at [TCP]. They both collect all data on this layer and allow the user to filter for different events. With both tools websites, attachments and more that has been transmitted over the network can be reconstructed. An advantage of collecting this data is that it is directly connected to a host. If, for example the IP address or the MAC address of a host at a certain time is known, all data for or from this IP or MAC address can be filtered. To establish the connection between IP and MAC address, it is useful to take a closer look at auxiliary network protocols. The Address Resolution Protocol (ARP) tables list the MAC addresses with the corresponding IP addresses. To collect data on this layer, network interface cards (NIC) of a host can be put into promiscuous mode. By this, they collect all traffic that comes over the network not only the traffic meant for this special host. However, if an intruder or attacker is aware that his connection might be eavesdropped, he might use encryption to secure his connection. It is almost impossible to break nowadays encryption but the fact that a suspect s connection to another host is all the time encrypted might indicate that the other host is an accomplice of the suspect. Besides raw data for sessions reconstruction, data collection on this layer has another gain. If examining higher layers and being in doubt of how accurate the assumption made are, e.g. whether log files have been altered or not, the data captured on this layer can either corroborate or debilitate the assumptions. The big disadvantage of data collection here is that it will result in very large log
18 4.2 TCP/IP - Transport and network layer 15 files to collect every piece of data. But because disk space becomes cheaper and the important data, like ARP tables, are volatile, more and more companies send at least a part of these logs to a remote storage medium where they are kept a longer time than they would be stored on the network devices. 4.2 TCP/IP - Transport and network layer On the network layer the Internet Protocol (IP) is responsible for directing the packets generated by TCP through the network (e.g., the Internet) by adding source and destination information which can be interpreted by routers all over the network. Cellular digital packet networks, like GPRS, use similar protocols like IP, so the methods described for IP work with them as well. For the correct routing, every intermediate router must have a routing table to know where to send the packet next. These routing tables are one of the best sources of information if investigating a digital crime and trying to track down an attacker. To do this, it is necessary to follow the packets of the attacker, reverse the sending route and find the computer the packet came from (i.e., the attacker). Another source of evidence on this layer are authentication logs. They show which account and which user was associated with an activity and may reveal who was the attacker or at least sets limits to the people who come into consideration of being the attacker. There are other kinds of logs like application logs, operating system logs or network device logs which all keep record of activities on a system. Of special interest are the logs of network devices because they provide an overview over network activities which is much more detailed than other logs. They can either be used to correlate events recorded by logs from other sources or stand alone as evidence for activities which were made during an attack. As with all network components they have limited storage resources and so many companies have configured their network components to send their logs to other servers to store them for a predefined time period. 4.3 The Internet Sometimes the Internet is equalized with the World Wide Web (WWW), which is not quite right. A part of the Internet is the WWW but also services such as , Newsgroups, Synchronous Chat networks and Peer-to-Peer (P2P) networks are part of the Internet. Every one of these categories can be a rich source of digital evidence. The Internet is the one part of digital investigation which not only provides evidence of offenses made directly with computers but almost
19 4.4 Positioning in Cellular Networks 16 every offense made nowadays may leave traces in the Internet The World Wide Web Since 1991 when the Web first became publicly available it has become more and more popular. Web servers logs can indicate that a suspect collected information which he needed for committing a crime and so they can indicate that this person really was the one who committed the crime. Logs of a suspect s web browser can also either ratify or falsify statements made by him A suspect s or victim s s can also provide good evidence of a crime. But it is not always possible to prove that the owner of an account was the one who sent the incriminating . It is too easy to change the sender field of an header to take it as a definite evidence. To prove that an has really been send by a suspect the investigative methods mentioned in the earlier sections of this chapter have to be executed as well. But the headers are a good indication in which direction the investigations should be deepened Other Networks Like mentioned above every activity on the Internet leaves traces. If it becomes clear from a suspect s computer that he was active in chats or P2P networks, the logs of the applications should be reviewed to find out with whom he was in contact. This also includes the search on his computers for logs that the suspect may have deleted on his computer. It depends on the crime suspected if this procedure seems adequate(e.g., it would be justifiable in the case of a homicide but not in the case of fraud). 4.4 Positioning in Cellular Networks Every cell phone has a Subscriber Identity Module, the so called SIM card. The SIM card contains the International Mobile Subscriber Identity (IMSI) which is a worldwide unique number. The IMSI is sent by the phone to the cell towers in its area to identify the phone, so that the calls for that phone are redirected to this cell tower and then to the phone itself. By the connection of the phone to a special cell tower a rough guess where the phone is located can be made. Because the cell phones try to get the best cell tower in their coverage, they search continuously for the cell tower with the strongest signal. To do this they send distance information with their request and if the distances of two, three or more
20 4.5 Summary 17 cell towers are compared the guess about the position of the cell phone gets more and more precise. The accuracy of positioning depends on the concentration of cell towers in the area the suspect is. If he is in an area with a lot of cell towers (e.g., a city) the distances between his cell phone and the single cell towers are less and so the accuracy rises. If the suspect is somewhere in the landscape, where there may be only one cell tower in the range of his cell phone, the only thing that can be said about his position is that he is in this certain distance of this cell tower. Figure 4.1 shows how a phone can be located relative exactly using the information of three different cell towers. This determination of a suspects cell phone is a good information for digital investigators and can be used to prove or disprove a suspects alibi. Figure 4.1: Example of how a cell phone can be located with three cell towers Source: Summary The goal of this section was to demonstrate that evidence occur on every network layer and that the layers cannot be considered separated. The first indication of a crime or an attack may occur on the application layer( e.g. somewhere in the Internet) but it is necessary to follow this indication down to the transport, network, data-link or even physical layer to get definite proofs of someones guilt or innocence. To do all this in an adequate period of time, it is advisable for digital investigators to have a knowledge about how data is send over networks so they know where there have to be traces of the activities. And if there are no traces they may have to admit that their hypothesis was wrong.
21 5 Conclusion This paper gives a short introduction to the field of digital forensics. The main aspect here was the branch of digital investigation which deal with the traces and evidences that can be found in computer or cellular networks. The main sources of this paper were the books about digital forensic by Brian Carrier ([Car05]) and by Eoghan Casey ([Cas04]). The scope of these books is much bigger and they both cover the field of file system analysis as well. This paper shows, that an attacker or perpetrator who uses digital networks, inevitably leaves traces within them. As the Internet and all other networks can be divided into different layers, as defined in the OSI reference model, an investigator in this field has to know the basic functions of these layers and has to know how to correlate evidences found on different layers. Another essential attribute of evidences found in digital networks is that they are often much more volatile than in classical crime scenes. Due to this, the first goal of a digital forensic analysis is to be as fast as possible with collecting data and preserving the crime scene. The main conclusion of the paper is that investigating a digital crime within networks is not completely different from investigating a classical crime. The first step with both is to preserve the crime scene, then comes the search for evidences and in the end conclusions have to be made by reconstructing the events. The big difference with digital investigation is that there is no standardized modus operandi and it is not always clear how courts judge the correctness and the significance of the evidences collected. In [Ste08] Stein demands a standardized routine for common cases, a catalogue of action for difficult cases and an agreement on how digital forensic reports have to be structured. It would make the field of digital investigation and forensic much easier if these things would be realized.
22 List of Figures 1.1 The three major phases of digital investigation according to [Car05] Dissimilar Networks connected via Internet A simplified description of the Open System Interconnection (OSI) layers The different protocols in the OSI reference model A Web browser s access explained by the OSI model Example of a digital evidence map (see [Cas04]) Example how an attacker fakes the origin of an Example of how a cell phone can be located with three cell towers 17
23 Bibliography [BAC] [Car05] [Cas04] Bach v. Minnesotta (2002) Appeals Court, 8th Circuit, Case number Brian Carrier. File System Forensic Analysis. Addison-Wesley Professional, Eoghan Casey. Digital Evidence and Computer Crime. Academic Press, Inc., Orlando, FL, USA, [DIB] Disk Image Backup Systems - DIBS USA Inc. [IAC] The International Association of Computer Investigative Specialists - IACIS. [Moh03] George Mohay. Computer and Intrusion Forensics. Artech House Inc, Norwood, USA, [Ste08] [TCP] [WIR] Stefan Stein. Computer Forensics - Sicherung und Analyse von forensischen Beweisen im IT-Umfeld. VDM Verlag Dr. Müller, Saarbrücken, Germany, TCPdump. Wireshark.
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
Getting Physical with the Digital Investigation Process
Getting Physical with the Digital Investigation Process Brian Carrier Eugene H. Spafford Center for Education and Research in Information Assurance and Security CERIAS Purdue University Abstract In this
CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS. Brian Carrier & Eugene H. Spafford
CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS Brian Carrier & Eugene H. Spafford Center for Education and Research in Information Assurance and Security, Purdue University,
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Network Forensics: Log Analysis
Network Forensics: Analysis Richard Baskerville Agenda P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Two Important Terms PPromiscuous Mode
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network
Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server
Packet Sniffers Submitted in partial fulfillment of the requirement for the award of degree Of MCA
A Seminar report On Packet Sniffers Submitted in partial fulfillment of the requirement for the award of degree Of MCA SUBMITTED TO: www.studymafia.org SUBMITTED BY: www.studymafia.org Preface I have made
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Reconstruction of Events in Digital Forensics
Reconstruction of Events in Digital Forensics M.A.Rama Prasad 1 Y.Naga Satish 2 1,2 Department.of Computer Science and Engineering, 1 Vignan.s Lara Institute of Technology and Science, Vadlamudi 2 BVC
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis
Agenda Richard Baskerville P Principles of P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Principles Kim, et al (2004) A fuzzy expert system for
Own your LAN with Arp Poison Routing
Own your LAN with Arp Poison Routing By: Rorik Koster April 17, 2006 Security is a popular buzzword heard every day throughout our American culture and possibly even more so in our global economy. From
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Network Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
BASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
THE ROLE OF IDS & ADS IN NETWORK SECURITY
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Introduction to Network Security Lab 1 - Wireshark
Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
ΕΠΛ 674: Εργαστήριο 5 Firewalls
ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized
The OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
The Internet and Network Technologies
The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Computer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced
Computer Forensics US-CERT
Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
United States Trustee Program s Wireless LAN Security Checklist
United States Trustee Program s Wireless LAN Security Checklist In support of a standing trustee s proposed implementation of Wireless Access Points (WAP) in ' 341 meeting rooms and courtrooms, the following
... Lecture 10. Network Security I. Information & Communication Security (WS 2014) Prof. Dr. Kai Rannenberg
Lecture 10 Network Security I Information & Communication Security (WS 2014) Prof. Dr. Kai Rannenberg T-Mobile Chair of Mobile Business & Multilateral Security Goethe University Frankfurt a. M. Introduction
CSCI 362 Computer and Network Security
The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol
Connecting Computers Networks Computers use networks to communicate like people use telephones or the postal service Requires either some sort of cable point-to-point links connect exactly 2 computers
1 Introduction to mobile telecommunications
1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized Internet users
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PACKET SNIFFING MS. SONALI A. KARALE 1, MS. PUNAM P. HARKUT 2 HVPM COET Amravati.
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
From Network Security To Content Filtering
Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals
Chapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
A Protocol Based Packet Sniffer
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
Detecting Threats in Network Security by Analyzing Network Packets using Wireshark
1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm,
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Technical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 Wireless LAN security (Reference - Security & Cooperation in Wireless Networks by Buttyan & Hubaux, Cambridge Univ. Press, 2007, Chapter
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security
2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
Scene of the Cybercrime Second Edition. Michael Cross
Scene of the Cybercrime Second Edition Michael Cross Chapter 1 Facing the Cybercrime Problem Head-On 1 Introduction 2 Defining Cybercrime 2 Understanding the Importance of Jurisdictional Issues 3 Quantifying
T.38 fax transmission over Internet Security FAQ
August 17, 2011 T.38 fax transmission over Internet Security FAQ Give me a rundown on the basics of T.38 Fax over IP security. Real time faxing using T.38 SIP trunks is just as secure as sending faxes
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
EAGLE EYE Wi-Fi. 1. Introduction
1. Introduction Internet access has become very popular by the emergence of broadband services, and busy yet unregulated Internet traffic causes challenges to administration and management. When it comes
Kick starting science...
Computer ing (TDDD63): Part 1 Kick starting science... Niklas Carlsson, Associate Professor http://www.ida.liu.se/~nikca/ What do you have in the future? What do you have in the future? How does it keep
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert [email protected] Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
Computer Networking. Definitions. Introduction
Computer Networking Definitions DHCP Dynamic Host Configuration Protocol It assigns IP addresses to client devices, such as desktop computers, laptops, and phones, when they are plugged into Ethernet or
Chapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
Local Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Wireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
WHITE PAPER. Gaining Total Visibility for Lawful Interception
WHITE PAPER Gaining Total Visibility for Lawful Interception www.ixiacom.com 915-6910-01 Rev. A, July 2014 2 Table of Contents The Purposes of Lawful Interception... 4 Wiretapping in the Digital Age...
Business & Finance Information Security Incident Response Policy
Business & Finance Information Security Incident Response Policy University of Michigan http://www.umich.edu/~busfin/ Document Version: 10 Effective Date: 6/1/2006 Review Date: 7/31/2009 Responsible: Approval
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months
FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES SECURITY
Network Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0)
for connecting to a BIM Server GRAPHISOFT 2009 (version 1.0) Basic Vocabulary...3 Local Area Networks...5 Examples of Local Area Networks...5 Example 1: LAN of two computers without any other network devices...5
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
EXIN Information Security Foundation based on ISO/IEC 27002. Sample Exam
EXIN Information Security Foundation based on ISO/IEC 27002 Sample Exam Edition June 2016 Copyright 2016 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks Firewalls Intrusion Detection
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
