Forensic Readiness. Presented by: Jack J. Murphy, Ph.D.



Similar documents
EC-Council Ethical Hacking and Countermeasures

MSc Computer Security and Forensics. Examinations for / Semester 1

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

Course Title: Computer Forensic Specialist: Data and Image Files

Computer Hacking Forensic Investigator v8

Incident Response. Six Best Practices for Managing Cyber Breaches.

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

How To Get A Computer Hacking Program

The Role of Digital Forensics within a Corporate Organization

Hands-On How-To Computer Forensics Training

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

Digital Forensics Tutorials Acquiring an Image with FTK Imager

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

Certified Cyber Security Analyst VS-1160

Chapter 7 Securing Information Systems

information security and its Describe what drives the need for information security.

Scene of the Cybercrime Second Edition. Michael Cross

2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

GEARS Cyber-Security Services

Incident Response and Forensics

Ten Deadly Sins of Computer Forensics

Certified Digital Forensics Examiner

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

Overview of Computer Forensics

Certified Digital Forensics Examiner

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

e-discovery Forensics Incident Response

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

(Instructor-led; 3 Days)

Where is computer forensics used?

Digital Forensics. Tom Pigg Executive Director Tennessee CSEC

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix

Incident Response and Computer Forensics

Certified Digital Forensics Examiner

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION

The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices

Session 334 Incident Management. Jeff Roth, CISA, CGEIT, CISSP

Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC

AN INTRODUCTION TO FORENSIC READINESS PLANNING TECHNICAL NOTE 01/2005

CERTIFIED DIGITAL FORENSICS EXAMINER

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Computer Forensics Today

Standard: Information Security Incident Management

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

AN INVESTIGATION INTO COMPUTER FORENSIC TOOLS

CYBER FORENSICS. KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad.

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

An overview of IT Security Forensics

Guide to Computer Forensics and Investigations, Second Edition

Forensic Certifications

Cyber Security Response to Physical Security Breaches

Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)

ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT

DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,

Guide to Computer and Network Data Analysis: Applying Forensic Techniques to Incident Response

COMPUTER FORENSICS (EFFECTIVE ) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE CATE STUDENT REPORTING PROCEDURES MANUAL)

Build Your Own Security Lab

Getting Physical with the Digital Investigation Process


Certified Cyber Security Analyst VS-1160

Impact of Digital Forensics Training on Computer Incident Response Techniques

Computer Forensics Basics, First Responder, Collection of Evidence

Fundamentals of Network Security - Theory and Practice-

CDFE Certified Digital Forensics Examiner (CFED Replacement)

Modern Digital Forensics!!

Case Study: Hiring a licensed Security Provider

CERIAS Tech Report GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS. Brian Carrier & Eugene H. Spafford

Information Security Basic Concepts

What is Digital Forensics?

Digital Forensics for IaaS Cloud Computing

Client Security Risk Assessment Questionnaire

How a Company s IT Systems Can Be Breached Despite Strict Security Protocols

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Supplier Information Security Addendum for GE Restricted Data

IT Security Management 100 Success Secrets

Design and Implementation of a Live-analysis Digital Forensic System

PRINCIPLES AND PRACTICE OF INFORMATION SECURITY

Certified Information Systems Auditor (CISA)

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Guideline on Auditing and Log Management

C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Computer Forensics Standards:

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 13 Business Continuity

introducing COMPUTER ANTI FORENSIC TECHNIQUES

Loophole+ with Ethical Hacking and Penetration Testing

IT Networking and Security

Digital Forensics. Larry Daniel

How To Manage Security On A Networked Computer System

DATA BREACH COVERAGE

Transcription:

Forensic Readiness Presented by: Jack J. Murphy, Ph.D.

Corporate Capabilities Advanced Network Technologies IPV6, MPLS/VPLS, VoIP, DWDM Micromuse Netcool Certified Government Integrator Enterprise Security Network, Host, Application Security Solutions International Information System Security Certification Consortium (ISC)2 Resources (CISSP) Infrastructure Applications Network, Host, Application Monitoring & Management Desktop/Server Software Management/Provisioning 8/20/2007 2

Background Forensic Science The application of science to the law Digital Forensic The application of science to the identification, collection, analysis, and examination of digital evidence (DFI) while preserving the integrity of the information and maintaining a strict chain of custody for the evidence Types of Digital Forensic Investigation (DFI) Computer Network Others 8/20/2007 3

Background (Cont.) Forensic Readiness The ability of an organization to maximize its potential to use digital evidence while minimizing the cost of an investigation Anti-forensics The application of tools and techniques to conceal or destroy information so that others cannot access it. Benign uses: Donating used equipment to charity, removing data on public (kiosk) computers to preserve the users privacy, equipment disposal Nefarious uses: Confounding incident responders data analysis activities 8/20/2007 4

Context Criminal activity represents a small fraction of the need for a forensic analysis capability, e.g., Troubleshooting performance anomalies Virus Remediation/Clean-up IDS/Firewall/Operating System Alarm Response But, chain-of-custody formalisms, evidence collection/handling rules, and privacy concerns must be applied in coordination with legal and law enforcement organizations Specialized disciplines require specialized skills e.g., Forensic Accounting, Forensic Engineering, and Software Forensics 8/20/2007 5

Context (cont.) Incident Types 1 Threats and extortion Accidents and negligence Stalking and harassment Commercial disputes Disagreements, deceptions, and malpractice Property rights infringements Economic crime (fraud, money laundering) Content abuse Privacy Invasion and identity theft Employee disciplinary issues 1. A 10 Step Process for Forensic Readiness International Journal of Digital Evidence Winter 2004, Vol. 2, Issue 3 8/20/2007 6

Analysis Process 2 Performed in the context of an enterprise forensic policy Organization Tools and Procedures Roles and Responsibilities 2. NIST Special Publication 800-86 August 2005 (draft) 8/20/2007 7

Acquisition File/Mail/Application Servers System Log Files Phone Log Files Backup/Archive Systems Firewall Audit/Log Records IDS, Antivirus, Spyware logs Hard Disk/Removable Media ISP Log Files Alternative Work Place Adjacent systems persons Interviews and Paper Documents Keystroke monitoring RAM and BIOS content 8/20/2007 8

Acquisition (Cont.) Collecting the Data Step 1 Develop a Plan Likely Value Consider data sources and incident circumstances Volatility Give high priority to volatile sources Effort Consider time & complexity,outside experts, legal advisors, law enforcement, special equipment Step 2 Collect the Data Use Certified Tools for Volatile Data Duplicate non-volatile data locally if possible Use write blockers if possible (e.g., on workstations) Step 3 Verify the Integrity of the Data (SHA-1 and/or MD-5) Source Copy Source Again 8/20/2007 9

Acquisition (Cont.) Heisenberg Uncertainty Principle: If you know where a particle is you can t measure with precision its speed (and vice versa) without altering it! Forensic analyst dilemma: Any attempt to capture data precisely will most likely alter it! Despite write-blockers! And vice versa!! 8/20/2007 10

Examination Requires sophisticated tools for Discovery Selection/Exclusion, Pattern Matching Correlation and comparison (e.g., to a baseline config.) Employs scientific methods to draw conclusions 8/20/2007 11

Examination (cont.) Challenges Recovery of Deleted Files Slack Space (unused space in the last block of a file or memory page) Free Space (unused partition,file system, or memory blocks) Missing/Renamed Files/Alternate Data-streams/File Metadata Exploited File/Protocol Formats (covert channels) Altered Operating System Files, Partition Table, File System, File Headers, File Names, File Extensions, File Modify/Access/Create Attribute Eliminating Safe Files using NSRL Reference Data Set (http://www.nsrl.nist.gov/downloads) 8/20/2007 12

Examination (cont.) Challenges (Cont.) Detecting Steganography Encryption Compression Volatile data Operating network configuration, open ports, running processes, open files, login sessions, operating system time Recovering password hashes before shutdown Rootkit discovery and response 8/20/2007 13

Anti-Forensics Known Hiding Techniques Media Management Layer Hide data in unused partitions, the boot sector, or in the partition table itself File System Layer Hide data in the file system data structure itself, file slack space, inode/data-stream, or socially-engineered file/directory names, removal of open files (volatile data), and other tricky stuff Application Layer Obfuscated/offset loopback filesystems, unused fields in application file formats Exploits of journaling file systems Very tricky 8/20/2007 14

Steganography gif-it-up ( color pallet) Jphs (lossy, e.g.,jpeg) S-Tools (lossless, e.g.,.wav) 8/20/2007 15

Cryptography Kerckhoff's Principle: The security of a cryptosystem shall not be based on keeping the algorithm secret but solely on keeping the key secret. In other words, assume your opponent knows the cryptosystem being used. Encrypted files look a lot like compressed files Need to determine file format (http://www.wotsit.org) Need to recover keys (if possible) from volatile storage/memory (e.g., swap file or memory dump) 8/20/2007 16

Utilization Requires Understanding of the purpose of the investigation Presentation skills and audience analysis Objectivity 8/20/2007 17

Data Utilization Factors Affecting Data Utilization Data Reduction Purpose is to present only the necessary & relevant facts, to the proper people only, to help them understand what occurred and what might need to be done Alternatives In the absence of conclusive data about what happened, fairly consider alternative explanations and present them Audience The CXO needs are different; so are the security, system administrator, and others responsible for daily operations Actionable For prevention, legal/administrative response, and follow-on investigation not forensic related 8/20/2007 18

Review Hot Wash Formal, Structured Review What went right, What went wrong Process/Procedure/Policy Review Training/Tool Improvements Team Peer Review Implement and Validate Changes 8/20/2007 19

Preparing for an Investigation Three Aspects: Prevention Detection Response A 30 minute attack required an average of 48 hours of forensic investigation by the best and brightest investigators 3 Only includes examination phase--no acquisition, utilization, or review Doesn t count outages, cleanup, etc. And none of 13 teams found everything! NETWORK VULNERABILITY ASSESSMENT APPLICATION ASSESSMENT HOST HARDENING FORENSIC READINESS POLICY WRITING INTRUSION DETECTION INCIDENT RESPONSE PLANNING INCIDENT FORENSIC ACQUISITION INCIDENT RESPONSE EXAMINATION UTILIZATION REVIEW PROSECUTION INTRUDER TRACKING 3. http://www.honeynet.org 8/20/2007 20

Preparing for an Investigation (cont.) Prevention Implement policies that support cyber forensics Retaining Information Planning the Response Training Accelerating the Investigation Preventing Anonymous Activities Protecting the Evidence Policy Characteristics User Focused Monitoring Acceptable use Organizational Roles/Responsibilities Incident Response Guidelines Forensic Team Closely linked to Business Continuity Plan 8/20/2007 21

Preparing for an Investigation Detection Implement technologies that support cyber forensics NTP, backup, IDS, system logs, unique identification CCTV, RFID, honeypots Implement processes that support cyber forensics Train people on the processes and technologies 8/20/2007 22

Preparing for an Investigation Response Team Composition Forensics Team Subject/Suspect/Staff HR/PR Staff Process/Data Owners Management Claimant Corporate Security IT Staff Legal Follow the analysis process Operating procedures should address quarantine guidelines Follow evidence handling procedures (rules of evidence) Important note: Containment and recovery objectives compete with forensic objectives (the Heisenberg Principle) 8/20/2007 23

Preparing for an Investigation (cont.) Factors affecting the time and cost How logging is done What is logged IDS Forensic Acquisition Phase of Analysis Process Evidence Handling 8/20/2007 24

A 10 Step Approach to Forensics Readiness Define the business scenarios that require digital evidence Identify available sources/types of evidence Establish evidence collection requirements Establish a capability to securely gather legally admissible evidence Establish a policy for storage/handling of evidence Ensure monitoring is targeted to detect/deter major incidents Identify circumstances requiring escalation to full/formal investigation Train staff on incident awareness/roles/law Document incidents and impact base on evidence Ensure legal review to facilitate action in response to an incident 8/20/2007 25

Forensic Readiness Costs Updates to policy Improvements in training Systematic evidence gathering Secure storage of evidence Incident preparation Legal advice Developing an in-house DFI capability 8/20/2007 26

Forensic Readiness Benefits Enterprise defense Deterrent to insider threat Minimal disruption to the business in the event of an incident Reduced cost/time for internal investigation Extends information security to the wider threat from cyber crime Demonstrates due diligence and good enterprise governance Demonstrates compliance with regulatory requirements Improve the prospect for successful legal action Supports employee sanctions based on digital evidence 8/20/2007 27

Other Best Practices Establish a Tools Library consisting of NIST evaluated Forensic Tools AccessData Forensic Toolkit (FTK) (http://www.accessdata.com/) Have a baseline image for each host type Consider certification Certified Cybercrime First Responder (CCFR) Certified Computer Forensics Technician (CCFT) Certified Forensic Computer Examiner (CFCE) Certified Information System Auditor (CISA) 8/20/2007 28

Tools Software-based Disk Imaging Tools Linux dd, EnCase, SafeBack, ILook Hardware-based Disk Imaging Tools SOLO Forensics, Solitaire Software-based Write-blockers PDBlock, Writeblocker XP Hardware-base Write-blockers FastBloc, SCSIBlock Forensic Boot CD Helix/Knoppix 8/20/2007 29

Resources NIST Special Publication 800-86 Guide to Computer and Network Data Analysis-Applying Forensic Techniques to Incident Response (Aug. 2005 draft) NIST Special Publication 800-61 Computer Security Incident Handling Guide Computer Forensic Tool Testing (http://www.cftt.nist.gov) National Software Reference Library (NSRL) Reference Data Set (RDS) (http://www.nsrl.nist.gov/downloads) The Ultimate Collection of Forensic Software (http://www.tucofs.com) File format specifications (http://www.wotsit.org) HoneyNet Project (http://www.honeynet.org) A Ten Step Process for Forensic Readiness, International Journal of Digital Evidence, Vol 2, Issue 3 8/20/2007 30

Services Data Recovery Data Recovery Services, DriveSavers, Ontrack Data Recovery Off-Site Backup SunGard 8/20/2007 31

Contact Info Internet: E-mail: http://www.dexisive.com/ info@dexisive.com Phone: 703-934-2030 Mail: 4031 University Drive Suite 200 Fairfax, VA 22030 8/20/2007 32