Advances in Computer Forensics
|
|
|
- Arron Ward
- 10 years ago
- Views:
Transcription
1 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.2, February Advances in Computer Forensics Mohd Taufik Abdullah 1, Ramlan Mahmod 2, Abdul Azim Ab. Ghani 3, Mohd Zain Abdullah 4, and Abu Bakar Md Sultan 5 1,2,3,5 Faculty of Computer Science and Information Technology Putra University of Malaysia, UPM Serdang, Selangor, Malaysia 4 Faculty of Technology and Information Science National University of Malaysia, UKM Bangi,Selangor, Malaysia Summary Constant developments in information technology and communication have posed challenges for those policing cyber crimes. Due to the application of computer used to investigate computer-based crime has led to development of a new field called computer forensics. This paper discusses the research category in computer forensics and identifies key research issues of each of the category. Hopefully this paper would provide foundation and new ideas for the researcher to better understand the concepts of computer forensic. The outcome presents in this paper came from thoroughly review of recent computer forensic literatures. Keywords: Computer forensics, computer crime, ICT, forensic medicine, digital evidence 1. Introduction The high-tech revolution in ICT such as the Internet and wireless networks, computers become more powerful with greater CPU speed and hard drive capacity has made new avenues of disseminating the information become available. The convergence of that technological advances and the pervasive used of computers worldwide has bring about many advantages to mankind, but as a result of this tremendous highly technical capacity made viable by computer, it provides avenues for misused and opportunities for committing crime. It also created new risks for the users of these computers and increased opportunities for social harm. The users, businesses and organizations worldwide have to live with a constant threat from hackers and hackers, who use a variety of techniques and tools to break into computer systems, steal information, change data and cause havoc. The emergence of highly technical nature of computer crimes was created a new branch of forensic science known as computer forensics in which its root is derived from the practice of forensic medicine(berghel, 2003; Gladyshev, 2004). Computer forensics is a concept and a new field(garber, 2001; Fernandez et al., 2005). According to, the widespread use of computer forensics is resulted from the act of two factors: the increasing dependence of law enforcement on computing and the ubiquity computers that followed from the microcomputer revolution. This paper is organized as follows. Section 2 presents the definition of computer forensics. Section 3 briefly categorized the research issues in computer forensic according to recent review and we concluded in section Definition of Computer forensics Computer forensics is a concept and a new field (Garber, 2001; Fernandez et al., 2005). According to, the widespread use of computer forensics is resulted from the act of two factors: the increasing dependence of law enforcement on computing and the ubiquity computers that followed from the microcomputer revolution. Computer forensics can be summarized as the process of identifying, collecting, preserving, analyzing and presenting the computer-related evidence in a manner that is legally acceptable by court (McKemmish, 1999; Noblett et al., 2000; Robbins, 2000; Borck, 2001; Garber, 2001; Patzakis, 2003; Yasinsac, 2003; Slade, 2004; Bitpipe, 2005). In Digital Forensics Research Workshop (DFRWS) held in 2001 has defined computer forensics as the use of scientifically derived and proven methods towards the preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence derived from digital source for the purpose of facilitating or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations (Palmer, 2001). However, many experts feel that a precise definition is not yet possible because digital evidence is recovered from devices that are not traditionally considered to be computers (Hall and Davis, 2005). Some researchers prefer to expand the definition such as definition by Palmer (2001) to include the collection and examination Manuscript received February 5, 2008 Manuscript revised February 20, 2008
2 216 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.2, February 2008 of all forms of digital data, including that found in cell phones, PDAs, ipods, and other electronic devices. 3. Research category in computer forensics Given the dynamics of form, size and content, predicting how the field of computer forensics will evolve is a difficult task as it is subject to a high degree of uncertainty. Based on various papers and Digital Forensics Research Workshop first technical report that we have reviewed, it seems that research in computer forensics can be categorized into five categories as shown in Figure Framework Generally accepted computer forensics process framework is actively seeking by computer forensics researchers, practitioners, and customers. A framework will provide a common starting point from which established theory, for example, computer science and forensics science theory can be scientifically applied to the computer forensics science discipline. The framework will also enable the development of new theory and identifies the research and development requirements(beebe and Clark, 2005). reliability (authentication, accuracy, and completeness) of remote acquired computer files. Audit logs are important evidence source to support computer forensics and it needs to be secured and sufficiently tamper-resistant. Most of existing tools and methods are allow anyone to alter any attribute associated with digital data. The form of digital data to be analyzed is usually transformed in some way and always processed before scrutiny (Palmer, 2001). The high confidence and trust in the truthfulness of the evidence that allows decision-makers to act especially in courts of law is of great concern(sommer, 1997; Hosmer, 2002). Truthfulness depends on fidelity and fidelity relies on integrity. A number of researches have been done to achieve guarantee integrity and fidelity of digital evidence. Schneier and Kelsey (1999) have developed a general scheme that allows an audit logs and event logs keep on an insecure machine. Combination of physical tamperresistant and periodic inspection of insecure machine could form the basis for highly trusted auditing capabilities. Framework Trustworthiness Category of Computer Forensics Research Computer Forensics in Networked Environment Detection and Recovery Acquisition In order to improve the integrity of digital evidence and provide higher assurance for digital chain of custody, secure and auditable time are introduced (Duren, 2002; Hosmer, 2002; Stone-Kaplan and Roter, 2003). A prototype programmable Hard Disk Interface has developed by Wick et al. (2004) to ensure the reliability of computer forensics tools consistently produce accurate and objective result in the evidence that they produce. Figure 1: The five categories of computer forensics research A number of models and methodologies have been developed in the computer forensics field such as by (McKemmish, 1999; Dittrich and Brezinski, 2000; Ashcroft, 2001; Palmer, 2001; Reith et al., 2002; Kruse and Heiser, 2003; Mandia et al., 2003; Carrier and Spafford, 2004b; Casey, 2004; Ciardhuáin, 2004; Nelson et al., 2004; Beebe and Clark, 2005). Most of models reviewed have element identification, collection, preservation, analysis, and presentation. To make the step more clear and precise, some of them added addition detail steps into the element. 3.2 Trustworthiness Transforming the nature of digital data that views as evidence is difficult in terms of integrity and fidelity. In addition, digital data is more easily to fabricate than physical data. Sommer (1997) has identified various stages of test to meet the conventional test of evidential 3.3 Computer Forensics in Networked Environments Computer forensics in networked environments generally refers to the collection, combination and analysis of information on networks from various intrusion detection, auditing and monitoring (Palmer, 2001; Mohay et al., 2003). It also known as network forensics (Palmer, 2001; Corey et al., 2002; Mohay et al., 2003). Mohay (2003) have outlined several problems in network forensic. The networks may span multiple time zones and multiple jurisdiction, necessitating the use of absolute trusted timestamps (to ensure the authentication and integrity of timestamps for each piece of network evidence) and ensuring that all jurisdictions collaborate. The network data will be available in both off-line and in real-time modes, the latter requiring the ability to capture and analyze data on the fly. The data could involve many different protocols and the amount of data could potentially be very large due to the increasing size of network bandwidth. A protocol
3 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.2, February could also involve multiple layers of signal (e.g., Voice over IP (VoIP), HTTP tunnelling). The current set of computer forensics tools will not be able to handle the real-time and data size/volume. Techniques are required for rapidly tracing a computer criminal s network activities (e.g., IP addresses) and for mapping a network s topology. There needs to be a paradigm shift for network forensic techniques to analyze the rate and size of captured data. A number of researchers have worked on this area such as collect information from computer networks to support forensics investigation. 3.4 Detection and recovery Identify hiding methods and hiding places likely to be employed in digital realms. Detection and recovery is the heart of computer forensics. Data recovering is the result of applying extraordinary measures to extract information from locations in which it is known to reside. The goal of detection and recovery is to recognize the digital objects that may contain information about the incident and document them. The area of this research is including identifying the authorship, recovering digital evidence, classification, event reconstruction, analyzing, tracing and piecing. The existing research on identifying the authorship have been done by (Sallis et al., 1996; Vel, 2000; Corney et al., 2002; Corney, 2003). There exist existing research on event reconstruction such as by (Stephenson, 2003; Carney and Rogers, 2004; Carrier and Spafford, 2004a; Gladyshev and Patel, 2004). The existing research on recovering hidden evidence is done by (Day and Ford, 1997; Casey, 2002; Wolfe, 2002) 3.5 Acquisition The point of the acquisition is to copy and preserve the state of data that could be evidence. The forensic acquisition of media refers to the process of making a bitfor-bit copy, or image file, of a piece of media, which image files frequently used in civil or criminal court proceeding (Kornblum, 2004). Therefore, completeness and accuracy of acquisition process is required. In addition, the source of evidence must remains not altered by attackers or by normal processes innocently. The increasing volume of potential data to search is creating a nationwide problem for law enforcement. Seizing all the computers at a search site, and examining them at the deepest levels are the most significant factors contributing to the examination backlog. In order to alleviate this problem, new data intake and data reduction strategies must be implemented. Data acquisition strategies must be adapted to the case-specific investigative goals, and these strategies must be pragmatic with regards to data volume and time constraints. Failure to recognize that yesterday's computer is not the equivalent of today's computer - and is not even remotely similar to tomorrow's computer - will inevitably result in lost investigative leads, and ineffective prosecutions. A number of existing research have been done on acquisition such as by (Kornblum, 2002; Rose, 2003; Broucek and Turner, 2004; Mandelecha, 2004; Ring and Cole, 2004; Burdach, 2005). 4. Conclusion In this paper, we have reviewed the literatures in computer forensics and identified five main categories of activity research in computer forensics. The five research categories are framework, trustworthiness, computer forensics in networked environments, detection and recovery and acquisition. The advances such as components, approaches, process of each category have been reviewed and discussed. Our future research will focus on event reconstruction. Event reconstruction will become important because digital crime investigators must be able to defend their hypotheses about why evidence exists. The event reconstruction gain major areas of interest topic discussed in DFRWS References [1] Ashcroft, J., Electronic Crime Scene Investigation Guide: A Guide for First Responders. National Institute of Justice. [2] Beebe, N. L. and Clark, J. G A hierarchical, objectives-based framework for the digital investigations process. Digital Investigation, 2 (2) [3] Berghel, H Digital village: The discipline of Internet forensics. Communications of the ACM, 46 (8) [4] Bitpipe Computer forensics. Accessed on December 27, [5] Borck, J Leave the cybersleuthing to the experts. ccounter.html. Accessed on 22/12/2005. [6] Broucek, V. and Turner, P Intrusion Detection: Issues and Challenges in Evidence Acquisition. International Review of Law Computers & Technology, 18 (2) [7] Burdach, M Digital forensics of the physical memory. f_physical_memory.pdf. Accessed on 21/6/2005. [8] Carney, M. and Rogers, M The Trojan Made Me Do It: A First Step in Statistical Based Computer Forensics Event Reconstruction. International Journal of Digital Evidence, 2 (4)
4 218 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.2, February 2008 [9] Carrier, B. and Spafford, E. H. 2004a. Defining Event Reconstruction of Digital Crime Scenes. Journal of Forensic Science, 49 (6) [10] Carrier, B. D. and Spafford, E. H. 2004b. A Digital Investigation Process Model. Available online at osium/2004/posters/pdfs/digital%20investigation%20proces s%20model.pdf. [11] Casey, E Digital Evidence and Computer Crime. Academic Press, San Diego, California, USA. [12] Casey, E Practical Approaches to Recovering Encrypted Digital Evidence. International Journal of Digital Evidence, 1 (3) [13] Ciardhuáin, S. Ó An Extended Model of Cybercrime Investigations. International Journal of Digital Evidence, 3 (1) [14] Corey, V., Peterman, C., Shearin, S., Greenberg, M. S. and Bokkelen, J. V Network forensics analysis. IEEE Internet Computing, 6 (6) [15] Corney, M., Vel, O. d., Anderson, A. and Mohay, G Gender-Preferential Text Mining of Discourse for Computer Forensic. In Proceedings of the 18th Annual Computer Security Applications Conference 2002 (ACSAC 2002) (Las Vegas, NV, USA). [16] Corney, M. W Analysing Text Authorship for Forensic Purposes, Master of Information Technology, School of Software Engineering and Data Communication, Queensland University of Technology, Queensland, 181. [17] Day, S. P. and Ford, S Hard evidence from computers. In Proceedings of the European Conference on Security and Detection (ECOS 97) (Commonwealth Institute, London), IEEE, [18] Dittrich, D. and Brezinski, D Intruder Discovery / Tracking and Compromise Analysis dex.html. Accessed on December 30, [19] Duren, M Can Digital Evidence Endure the Test of Time? In Proceedings of the 2nd Digital Forensics Research Workshop 2002, 1-7. [20] Fernandez, J. D., Smith, S., Garcia, M. and Kar, D Computer forensics: a critical need in computer science programs. Journal of Computing Sciences in Colleges, ACM, 20 (4) [21] Garber, L Computer Forensics: High-Tech Law Enforcement. IEEE Computer Society's Computer Magazine, 34 (1) [22] Gladyshev, P Formalising Event Reconstruction in Digital Investigation, Phd. Dissertation, Department of Computer Science, University College Dublin. [23] Gladyshev, P. and Patel, A Finite state machine approach to digital event reconstruction. Digital Investigation, 1 (2) [24] Hall, G. A. and Davis, W. P Toward Defining the Intersection of Forensics and Information Technology. International Journal of Digital Evidence, 4 (1) [25] Hosmer, C Proving the Integrity of Digital Evidence with Time. International Journal of Digital Evidence, 1 (1). [26] Kornblum, J Preservation of Fragile Digital Evidence by First Responders. In Proceedings of Digital Forensic Research WorkShop 2002 (Syracuse, NY), International Journal of Digital Evidence, [27] Kornblum, J. D The Linux Kernel and the Forensic Acquisition of Hard Discs with an Odd Number of Sectors. International Journal of Digital Evidence, 3 (2). [28] Kruse, W. G. and Heiser, J. G Computer Forensics: Incident Response Essentials. Addison-Wesley, Boston, MA. [29] Mandelecha, S Forensics Repository, Master of Science, Computer Science, University of New Orleans, New Orleans, Louisiana. Available online at [30] Mandia, K., Prosise, C. and Pepe, M Incident Response & Computer Forensics. McGraw-Hill, USA. [31] McKemmish, R What is forensic computing? Trends and Issues in Crime and Criminal Justices (118) [32] Mohay, G., Anderson, A., Collie, B., Vel, O. d. and McKemmish, R Computer and Intrusion Forensics. Artech House, Boston. [33] Nelson, B., Phillips, A., Enfinger, F. and Steuart, C Guide to computer forensics and investigations. ThomsonCourse Technology, Boston, Mass. [34] Noblett, M. G., Pollitt, M. and Presley, L. A Recovering and Examining Computer Forensic Evidence Forensic Science Communications. Available online at m. [35] Palmer, G., A Road Map for Digital Forensic Research. The MITRE Corporation. [36] Patzakis, J Computer Forensics as an Integral Component of the Information Security Enterprise. [37] Reith, M., Carr, C. and Gunsch, G An Examination of Digital Forensic Models. International Journal of Digital Evidence, 1 (3) [38] Ring, S. and Cole, E Taking a Lesson from Stealthy Rootkits. IEEE Security & Privacy, 2 (4) [39] Robbins, J An Explanation of Computer Forensics. Accessed on 13/6/2005. [40] Rose, C. W Windows Live Incident Response Volatile Data Collection: Non-Disruptive User & System Memory Forensic Acquisition. exif.com/whitepaper.htm. Accessed on 12 March [41] Sallis, P., Aakjaer, A. and MacDonell, S Software forensics: old methods for a new science. In Proceedings of Software Engineering Education and Practice International Conference, IEEE, [42] Schneier, B. and Kelsey, J Secure audit logs to support computer forensics. ACM Transactions on Information and System Security (TISSEC), 2 (2) [43] Slade, R. M Software Forensics: Collecting Evidence from the Scene of a Digital Crime. McGraw Hill, New York. [44] Sommer, P Downloads, Logs and Captures: Evidence from Cyberspace. Journal of Financial Crime, 5JFC [45] Stephenson, P Modeling of Post-Incident Root Cause Analysis. International Journal of Digital Evidence, 2 (2) [46] Stone-Kaplan, K. and Roter, M Date, Time, and Time Zone Examination.
5 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.2, February tutorials.org/ebooks/timezonewpv3.pdf. Accessed on 22/8/2005. [47] Vel, O. d Mining Authorship. In Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (Boston, MA, USA). [48] Wick, C., Avramov-Zamurovic, S. and Lyle, J Hard disk interface used in computer forensic science. In Instrumentation and Measurement Technology Conference (IMTC 04), IEEE, [49] Wolfe, H. B Encountering Encrypted Evidence (potential). In Proceedings of Informing Science Conference, Inforing Science, [50] Yasinsac, A. E., R.F.; Marks, D.G.; Pollitt, M.M.; Sommer, P.M Computer forensics education. Security & Privacy Magazine, 1 (4) Abu Bakar Md Sultan holds a PhD from Putra University of Malaysia. He holds a Master Degree in Software Engineering from UPM. His research interest includes artificial intelligence, scheduling and software agents. Biography Mohd Taufik Abdullah is a PhD student at the faculty of Computer Science and information Technology, Putra University of Malaysia. He holds a Master Degree in Software Engineering from UPM. His research interest includes computer forensics, and security computing. Ramlan Mahmod holds a PhD from University of Bradford, United Kingdom. He is currently an Associate Professor at Faculty of Computer Science and Information Technology, Putra University of Malaysia, His research area is artificial intelligence and security computing. Abdul Azim Ab. Ghani obtained his PhD from University of Strathclyde. Currently he is Associate Professor at the Department of Information System and dean of the Faculty of Computer Science and Information Technology, Putra University of Malaysia. His research interest is software engineering and software measurement. Abdullah Mohd Zain holds a PhD from University. He is currently a Professor at the Department of Industrial Computing and deputy dean of the Faculty of Information Science and Technology, National University of Malaysia. His research interest is software engineering and software agents.
CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS
Chapter 22 CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS April Tanner and David Dampier Abstract Research in digital forensics has yet to focus on modeling case domain information involved in investigations.
Digital Forensics. General Terms Cyber Crime, forensics models, Investigation, Analysis, digital devices.
Digital Forensics Ravneet Kaur, Amandeep Kaur Assistant Professor in Computer Science SDSPM College for Women, Rayya (Asr) Guru Nanak Dev University, India International Journal of Computer Applications
Reconstruction of Events in Digital Forensics
Reconstruction of Events in Digital Forensics M.A.Rama Prasad 1 Y.Naga Satish 2 1,2 Department.of Computer Science and Engineering, 1 Vignan.s Lara Institute of Technology and Science, Vadlamudi 2 BVC
Mapping Process of Digital Forensic Investigation Framework
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.10, October 2008 163 Mapping Process of Digital Forensic Investigation Framework Siti Rahayu Selamat 1, Robiah Yusof 2, Shahrin
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 1A: Introduction to Forensics Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Digital Forensics You will learn in this module: The principals of computer
Survey on Different Phases of Digital Forensics Investigation Models
Survey on Different Phases of Digital Forensics Investigation Models Priya S. Patil 1, Prof. A. S. Kapse 2 P. R. Patil College of Engineering and Technology, Amravati, India ABSTRACT: Most forensics models
COMMON PHASES OF COMPUTER FORENSICS INVESTIGATION MODELS
COMMON PHASES OF COMPUTER FORENSICS INVESTIGATION MODELS Yunus Yusoff, Roslan Ismail and Zainuddin Hassan College of Information Technology, Universiti Tenaga Nasional, Selangor, Malaysia [email protected],
Digital Forensic Model Based On Malaysian Investigation Process
38 Digital Forensic Model Based On Malaysian Investigation Process Sundresan Perumal 1 Faculty Of Science & Technology Islamic Science University Of Malaysia Summary With the proliferation of the digital
Computer Forensics US-CERT
Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further
The Enhanced Digital Investigation Process Model
The Enhanced Digital Investigation Process Model Venansius Baryamureeba and Florence Tushabe [email protected], [email protected] Institute of Computer Science, Makerere University P.O.Box 7062,
ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York
INSTRUCTOR INFORMATION Name: Sanjay Goel Email: [email protected] Phone: (518) 442-4925 Office Location: BA 310b, University at Albany Office Hours: TBD CLASS INFORMATION Time: N/A Location: Online Dates:
Significance of Hash Value Generation in Digital Forensic: A Case Study
International Journal of Engineering Research and Development e-issn : 2278-067X, p-issn : 2278-800X, www.ijerd.com Volume 2, Issue 5 (July 2012), PP. 64-70 Significance of Hash Value Generation in Digital
Data Warehousing Based Computer Forensics Investigation Framework
2015 12th International Conference on Information Technology - New Generations Data Warehousing Based Computer Forensics Investigation Framework Waleed Halboob 2,1, Ramlan Mahmod 2, Muhammad Abulaish 1,
Electronic Forensics: A Case for First Responders
Title: Electronic Forensics: A Case for First Responders by Dr. Henry B. Wolfe Abstract Almost every aspect of our lives is touched or somehow controlled by technology driven processes, procedures and
NEW IMPROVEMENT IN DIGITAL FORENSIC STANDARD OPERATING PROCEDURE (SOP)
NEW IMPROVEMENT IN DIGITAL FORENSIC STANDARD OPERATING PROCEDURE (SOP) Sundresan Perumal 1, and Norita Md Norwawi. 2 1 Universiti Sains Islam Malaysia,[email protected] 2 Universiti Sains Islam Malaysia,
TOWARDS A FORMALIZATION OF DIGITAL FORENSICS
Chapter 3 TOWARDS A FORMALIZATION OF DIGITAL FORENSICS Jill Slay, Yi-Chi Lin, Benjamin Turnbull, Jason Beckett and Paul Lin Abstract While some individuals have referred to digital forensics as an art,
FORENSIC INVESTIGATION PROCESS MODEL FOR WINDOWS MOBILE DEVICES
FORENSIC INVESTIGATION PROCESS MODEL FOR WINDOWS MOBILE DEVICES Anup Ramabhadran Security Group - Tata Elxsi Abstract Windows mobile device forensics is relatively a new field of interest among scientific
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers Brian Carrier Research Scientist @stake Abstract This paper uses the theory of abstraction layers to describe the purpose
COMPARATIVE DIGITAL FORENSIC MODEL
COMPARATIVE DIGITAL FORENSIC MODEL Dr.DhananjayKalbande 1, Nilakshi Jain 2 Head of Department, Dept. Of CSE, SPIT/ Mumbai University, Mumbai, Maharastra, India 1 Assistant Professor, Dept. Of IT, SAKEC/
Technologies based on Cloud Computing Technology
, pp.1-5 http://dx.doi.org/10.14257/astl.2015.82.01 Technologies based on Cloud Computing Technology Huan Ma 1, Gaofeng Shen 2, Ming Chen 1 and Jianwei Zhang 1 1 Software Engineering College, Zhengzhou
Keywords: Digital evidence, forensically sound evidence
Chapter 1 WHEN IS DIGITAL EVIDENCE FORENSICALLY SOUND? Rodney McKemmish Abstract Forensically sound is a term used extensively in the digital forensics community to qualify and, in some cases, to justify
Digital and Cloud Forensics
Digital and Cloud Forensics Stavros Simou Cultural Informatics Laboratory, Department of Cultural Technology and Communication, University of the Aegean, University Hill, GR 81100 Mytilene, Greece [email protected]
An Approach to Understand the End User Behavior through Log Analysis
An Approach to Understand the End User Behavior through Log Analysis Nikhil Kumar Singh Department of Computer Science and Engineering Maulana Azad National Institute of Technology Bhopal, India Deepak
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements Atif Ahmad & Anthonie Ruighaver University of Melbourne, Australia Abstract The design and implementation
Incident Response and Forensics
Incident Response and Forensics Yiman Jiang, President and Principle Consultant Sumus Technology Ltd. James Crooks, Manager - Advisory Services PricewaterhouseCoopers LLP UBC 2007-04-12 Outline Computer
Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix
Honeynet2_bookTOC.fm Page vii Monday, May 3, 2004 12:00 PM Contents Preface Foreword xix xxvii P ART I THE HONEYNET 1 Chapter 1 The Beginning 3 The Honeynet Project 3 The Information Security Environment
An Examination of Digital Forensic Models
An Examination of Digital Forensic Models Mark Reith, Clint Carr, Gregg Gunsch Department of Electrical and Computer Engineering Graduate School of Engineering and Management Air Force Institute of Technology
e-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:
Framework for a Digital Forensic Investigation
Framework for a Digital Forensic Investigation Michael Kohn 1, JHP Eloff 2 and MS Olivier 3 1 [email protected], 2 [email protected], 3 [email protected] Information and Computer Security Architectures
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS. Brian Carrier & Eugene H. Spafford
CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS Brian Carrier & Eugene H. Spafford Center for Education and Research in Information Assurance and Security, Purdue University,
Information Technology Policy
ITP Number ITP-SEC024 Category Security Contact [email protected] Information Technology Policy IT Security Incident Policy Effective Date August 2, 2012 Supersedes Scheduled Review Annual 1. Purpose
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW Gulshan Shrivastava, Kavita Sharma, Akansha Dwivedi Department of Information Technology, Dronacharya College of Engineering, Gr. Noida, U.P., India [email protected],
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected]
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected] SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
Forensic Analysis of Physical Memory and Page File. Hameed Iqbal
Forensic Analysis of Physical Memory and Page File Hameed Iqbal Master s Thesis Master of Science in Information Security 30 ECTS Department of Computer Science and Media Technology Gjøvik University College,
IS 6363 Computer Forensics Spring 2006
Class Information: IS 6363 Computer Forensics Spring 2006 Class Time: 5:30-6:45 p.m. Tue/Thu Class Location: BB 3.03.10 Lab Location & Hours: BB 3.03.10 (Hours as posted. Should mirror APL hours.) Instructor
The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review
The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review Soltan Alharbi 1, 1, Jens Weber-Jahnke 2, Issa Traore 1 1 Electrical and Computer Engineering, University
Internet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
Getting Physical with the Digital Investigation Process
Getting Physical with the Digital Investigation Process Brian Carrier Eugene H. Spafford Center for Education and Research in Information Assurance and Security CERIAS Purdue University Abstract In this
What is Digital Forensics?
DEVELOPING AN UNDERGRADUATE COURSE IN DIGITAL FORENSICS Warren Harrison PSU Center for Information Assurance Portland State University Portland, Oregon 97207 [email protected] What is Digital Forensics?
Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
Feature. How to Maximize Evidential Weight of Electronically Stored Information Recommendations of BS 10008
Feature Haris Hamidovic, CIA, ISMS IA, ITIL, IT Project+, is chief information security officer at Microcredit Foundation EKI Sarajevo, Bosnia and Herzegovina. Prior to his current assignment, Hamidovic
Ingate Firewall/SIParator SIP Security for the Enterprise
Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
Design and Implementation of a Live-analysis Digital Forensic System
Design and Implementation of a Live-analysis Digital Forensic System Pei-Hua Yen Graduate Institute of Information and Computer Education, National Kaohsiung Normal University, Taiwan [email protected]
Comparative Analysis of Digital Forensic Models
Journal of Advances in Computer Networks, Vol. 3, No. 1, March 2015 Comparative of Digital Forensic s Fakeeha Jafari Rabail Shafique Satti process s are: : Evidences can be collected in this phase : on
Carrier B. and Spafford E. (2003). Getting Physical with the Digital Investigation Process. International Journal of Digital Evidence. Volume 2(2).
140 RUJUKAN Agarwal, A. et al. (2011). Systematic Digital Forensic Investigation Model.International Journal of Computer Science and Security (IJCSS),.Volume 5 (Issue 1). Ali, K.M. (2012). Digital Forensics
Future of Digital Forensics: A Survey of Available Training
Future of Digital Forensics: A Survey of Available Training A. Evans, A. Williams, and J. Graham Computer Science Department, Norfolk State University, Norfolk, VA USA Abstract The field of forensics is
EnCase Enterprise For Corporations
TM GUIDANCE SOFTWARE EnCASE ENTERPRISE EnCase Enterprise For Corporations An Enterprise Software Platform Allowing Complete Visibility Across your Network for Internal Investigations, Network Security,
Evaluation and Analysis of a Software Prototype for Guidance and Implementation of a Standardized Digital Forensic Investigation Process
Evaluation and Analysis of a Software Prototype for Guidance and Implementation of a Standardized Digital Forensic Investigation Process Melissa Ingels Department of Computer Science, University of Pretoria
Keywords: Computers, digital evidence, digital evidence bags, forensics, forensics tools
Computer Forensics Procedures, Tools, and Digital Evidence Bags 1 Computer Forensic Tools Keywords: Computers, digital evidence, digital evidence bags, forensics, forensics tools Computer Forensics Procedures,
Framework for Live Digital Forensics using Data Mining
Framework for Live Digital Forensics using Data Mining Prof Sonal Honale #1, Jayshree Borkar *2 Computer Science and Engineering Department, Aabha Gaikwad College of Engineering, Nagpur, India Abstract
Implementing Digital Forensic Readiness for Cloud Computing Using Performance Monitoring Tools
Implementing Digital Forensic Readiness for Cloud Computing Using Performance Monitoring Tools F.R. Van Staden and H.S. Venter University of Pretoria Abstract Cloud computing is a scalable, distributed
Computer Forensics as an Integral Component of the Information Security Enterprise
Computer Forensics as an Integral Component of the Information Security Enterprise By John Patzakis 10/28/03 I. EXECUTIVE SUMMARY In addition to fending off network intrusions and denial of service attacks,
COMPUTER FORENSICS IN THE BUSINESS ENVIRONMENT
COMPUTER FORENSICS IN THE BUSINESS ENVIRONMENT Neven Bratranek, Boris Bereček Teched Consulting Services Radnička cesta 80/VII, 10000 Zagreb, Croatia {nevenb, borisb}@teched.hr Robert Kopal Visoka poslovna
Computer Hacking Forensic Investigator v8
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer
Scene of the Cybercrime Second Edition. Michael Cross
Scene of the Cybercrime Second Edition Michael Cross Chapter 1 Facing the Cybercrime Problem Head-On 1 Introduction 2 Defining Cybercrime 2 Understanding the Importance of Jurisdictional Issues 3 Quantifying
Network Security: Policies and Guidelines for Effective Network Management
Network Security: Policies and Guidelines for Effective Network Management Department of Electrical and Computer Engineering, Federal University of Technology, Minna, Nigeria. [email protected], [email protected]
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
An Integrated CyberSecurity Approach for HEP Grids. Workshop Report. http://hpcrd.lbl.gov/hepcybersecurity/
An Integrated CyberSecurity Approach for HEP Grids Workshop Report http://hpcrd.lbl.gov/hepcybersecurity/ 1. Introduction The CMS and ATLAS experiments at the Large Hadron Collider (LHC) being built at
Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.
Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention. I m not going to get more money. I m not going to get more cops. I have
California State University, Chico. Information Security Incident Management Plan
Information Security Incident Management Plan Version 0.8 January 5, 2009 Table of Contents Introduction... 3 Scope... 3 Objectives... 3 Incident Management Procedures... 4 Roles and Responsibilities...
Master of Science in Information Systems & Security Management. Courses Descriptions
Master of Science in Information Systems & Security Management Security Related Courses Courses Descriptions ISSM 530. Information Security. 1 st Semester. Lect. 3, 3 credits. This is an introductory course
Identification of File Integrity Requirement through Severity Analysis
Identification of File Integrity Requirement through Severity Analysis Zul Hilmi Abdullah a, Shaharudin Ismail a, Nur Izura Udzir b a Fakulti Sains dan Teknologi, Universiti Sains Islam Malaysia, Bandar
Automatic Timeline Construction For Computer Forensics Purposes
Automatic Timeline Construction For Computer Forensics Purposes Yoan Chabot, Aurélie Bertaux, Christophe Nicolle and Tahar Kechadi CheckSem Team, Laboratoire Le2i, UMR CNRS 6306 Faculté des sciences Mirande,
Introduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014
Introduction to Data Forensics Jeff Flaig, Security Consultant January 15, 2014 WHAT IS COMPUTER FORENSICS Computer forensics is the process of methodically examining computer media (hard disks, diskettes,
Digital Forensics for IaaS Cloud Computing
Digital Forensics for IaaS Cloud Computing June 26, 2012 The views expressed in this presentation are mine alone. Reference to any specific products, process, or service do not necessarily constitute or
https://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820
Page 1 of 5 DAKOTA COUNTY Employee Relations Administration Center, 1590 Highway 55 Hastings, MN 55033-2372 651.438.4435 http://www.dakotacounty.us INVITES APPLICATIONS FOR THE POSITION OF: Electronic
Digital Forensics. Larry Daniel
Digital Forensics Larry Daniel Introduction A recent research report from The Yankee Group found that 67.6 percent of US households in 2002 contained at least one PC The investigators foresee three-quarters
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices Introduction As organizations rely more heavily on technology-based methods of communication, many corporations
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
CYBER FORENSICS (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 CYBER FORENSICS (W/LAB) Course Syllabus Course Number: CSFS-0020 OHLAP Credit: Yes OCAS Code: 8134 Course Length: 130 Hours Career Cluster: Information
CDFE Certified Digital Forensics Examiner (CFED Replacement)
Course: CDFE Certified Digital Forensics Examiner (CFED Replacement) Description: Price: $3,450.00 Category: Popular Courses Duration: 5 days Schedule: Request Dates Outline: COURSE OVERVIEW Computer Forensics
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
A Common Process Model for Incident Response and Digital Forensics
A Common Process Model for Incident Response and Digital Forensics IMF 2007, Stuttgart, September 2007 Felix C. Freiling Laboratory for Dependable Distributed Systems University of Mannheim, Germany Bastian
INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION
" - * INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION CHRIS PROSISE KEVIN MANDIA McGraw-Hill /Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
Mining Frequent Sequences for Emails in Cyber Forensics Investigation
Mining Frequent Sequences for Emails in Cyber Investigation Priyanka V. Kayarkar NIRT, RGPV, Bhopal Prashant Ricchariya NIRT, RGPV, Bhopal Anand Motwani NIRT, RGPV, Bhopal ABSTRACT The goal of Digital
