Computer Forensics in a LAN Environment



Similar documents
Computer Forensics Preparation

Computer Forensics US-CERT

CYBER FORENSICS (W/LAB) Course Syllabus

DATA SECURITY MANAGEMENT. Michael J. Corby INSIDE

Disaster Recovery. 1.1 Introduction. 1.2 Reasons for Disaster Recovery. EKAM Solutions Ltd Disaster Recovery

5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS

Data Backup Options for SME s

A review of BackupAssist within a Hyper-V Environment

Page 1 of 5 Position Code #P Forensic Identification - Technological Crimes Unit ASSOCIATION: Civilian LOCATION: Headquarters

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

IT Support & Maintenance Contract

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

Yiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1

Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA

Which Backup Option is Best?

Information Security Policy

Course 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

Support & Field Services

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Perform-Tools. Powering your performance

Computer Forensics Today

BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT

A review of BackupAssist within a Hyper-V Environment. By Brien Posey

Countering and reducing ICT security risks 1. Physical and environmental risks

ADRI. Advice on managing the recordkeeping risks associated with cloud computing. ADRI v1.0

The Importance of a Data Backup and Disaster Recovery Plan

Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking

DATA BREACH COVERAGE

Abhi Rathinavelu Foster School of Business

Information Resources Security Guidelines

Unit 3 Cyber security

Planning and Implementing Disaster Recovery for DICOM Medical Images

Backup Software? Article on things to consider when looking for a backup solution. 11/09/2015 Backup Appliance or

Brainloop Cloud Security

The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices

Feature. How to Maximize Evidential Weight of Electronically Stored Information Recommendations of BS 10008

Business Continuity and Disaster Survival Strategies for the Small and Mid Size Business.

Paragon Drive Backup Server Edition

Integrating Project Management and Service Management

Autodesk PLM 360 Security Whitepaper

The Microsoft Large Mailbox Vision

CURRICULUM VITAE. David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC

VOLICO. Backup Service Solutions. Enterprise Hosting Solutions

How To Backup Your Hard Drive With Pros 4 Technology Online Backup

SERVICE LEVEL AGREEMENT

JOB DESCRIPTION CONTRACTUAL POSITION

How To Get A Computer Hacking Program

Information Security Specialist Training on the Basis of ISO/IEC 27002

Digital Forensics. Tom Pigg Executive Director Tennessee CSEC

Online/Cloud Services Trust challenges & eidentity-aspects

Safe, secure data recovery services for any media or operating system. Innovative solutions for new technologies. Service centres worldwide.

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

WDL RemoteBunker Online Backup For Client Name

ICT Damage Assessment and Recovery Plan after Cyclone Heta in Niue Islands

Overview of Computer Forensics

SVA Backup Plus Features

Leveraging Virtualization for Disaster Recovery in Your Growing Business

Cyber Security & Compliance Briefing

Business Continuity Planning (BCP) / Disaster Recovery (DR)

THREE UNTAPPED SOURCES OF BUSINESS CONTINUITY REVENUE

Information Technology Engineers Examination. Network Specialist Examination. (Level 4) Syllabus. Details of Knowledge and Skills Required for

Online Backup Solution Features

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them

Standard: Information Security Incident Management

Financial Services Need More than Just Backup... But they don t need to spend more! axcient.com

Business Virtualization

Tk20 Backup Procedure

Which Backup Option is Best?

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

Data Privacy, Security, and Risk Management in the Cloud

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Transcription:

Computer Forensics in a LAN Environment Michael J. Corby, CCP, CISSP M Corby & Associates, Inc. Audience: Security Knowledgeable with varying backgrounds The industry has, at long last, accepted Computer Security as a key component of any organization s operating and strategic plan. There can be no doubt that preventing unwanted access to systems, files and the computer environment is a good thing. Furthermore, the accurate and data storage, retrieval and processing is crucial for success. But what happens if somewhere, somehow a chink in the armor is revealed. Do you have the procedures in place to identify that an event has occurred, how you can prevent future occurrences and how the situation was caused. Tracking the source of the problem and in some cases, establishing corrective measures and providing reliable and usable evidence for legal proceedings (if necessary) can pose a new challenge. Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use in apprehending and prosecuting security violators. The first part of this session will identify some of key elements in building an effective Computer Forensics program within the Computer Security practice area. Many areas will be covered including procedures, career issues, legal processes and financial justification. The second part will focus on specific ways to configure clients and servers in a LAN environment to facilitate forensic data collection and establish proper evidence collection procedures. Platforms covered will include: Novell and Windows/NT servers; DOS, Windows 3.x, 95, 98 and NT clients. Attendees will review a checklist of parameters to specify and methods to use that maximize data collection and preservation. Speaker Biography Mr. Corby is CEO and Consulting Director for M Corby & Associates, Inc. a US Consultancy founded in 1989. He has been an IT Professional for over 30 years specializing in systems technology management and computer security. As a Technology Specialist, Systems Manager and CIO for large international corporations, and as Consulting Director of hundreds of Systems and Technology projects for several diverse companies, he has put many theories and creative ideas into practice. Prior to his term as the Consulting Director for M Corby & Associates, Inc., he was practice director for the IT Consulting Practice of Ernst & Young, CIO for a division of Ashland Oil and the Bain & Company Consulting Group. He is a Certified Information Systems Security Professional (CISSP) and Certified Computer Professional (CCP). In 1994, the Computer Security Institute awarded Mike the Lifetime Achievement Award. Speaker Contact Info: Michael J. Corby, CCP, CISSP 255 Park Avenue Worcester, MA 01609 Phone (508) 792-4320 Fax: (508) 792-4327 E-Mail: mcorby@mcorby.com

Introduction to Computer Forensics Michael J. Corby, CISSP M Corby & Associates, Inc. USA

Abstract The industry, at long last, accepted Computer Security as a key component of any organization s operating and strategic plan. There can be no doubt that preventing unwanted access to systems, files and the computer environment is a good thing. Furthermore, accurate data storage, retrieval and processing is crucial for success. But, what happens if somewhere, somehow, a chink in the armor is revealed. Do you have the procedures in place to identify that an event has occurred, determine how you can prevent future occurrences and how the situation was caused? Tracking the source of the problem and in some cases, establishing corrective measures and providing reliable and usable evidence for legal proceedings (if necessary), can pose a new challenge to the security professional. Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use in apprehending and prosecuting security violators. This session will identify some of the key elements in building an effective Computer Forensics program within the Computer Security practice area. Many areas will be covered, including procedures, career issues, legal processes and financial jurisdiction.

About the Speaker: Mr. Corby is Consulting Director for M Corby & Associates, Inc., an Information Technology Consulting organization founded in 1989. He has over 30 years of experience in Systems Operations, Technology Management, Application Design and Strategic Planning. His organization specialized in Computer Security, Effective IS Management and developing crisp, responsive IS Strategies. He has managed numerous projects including several with over 100 participants that lasted for up to four years. Previously CIO for Bain & Company and the Riley Stoker division of Ashland Oil, he also was Director of Technology consulting for Ernst & Young (formerly Arthur Young & Co.), and held management and technical positions with Thom McAn shoes and State Mutual (Allmerica) insurance. He is a Certified Computer Professional and Certified Information Systems Security Professional. Mike was the first-ever recipient of the CSI lifetime achievement award, and has spoken at conferences throughout the US, Canada, Mexico and Great Britain.

Objectives After this workshop, you should: understand where computer forensics can be applied understand the scope and relevance of computer forensics learn some techniques for computer forensics build a strategy for incorporating computer forensics into your computer security practice

Agenda Introduction Event identification Prevention/Mitigation Elements of Forensics Financial Implications Career Issues Platform Specifics Summary - Q/A

Introduction What is computer forensics anyway? The application of computer investigations and analysis techniques in the interests of determining potential legal evidence. Computer specialists can draw on an array of methods for discovering deleted, encrypted, or damaged file information (Robbins, 1997).

Event Identification Human Behavior blackmail extortion disgruntled employee obtuse behavior dropping the dime sabotage/corporate espionage

Event Identification (2) Physical Behavior flood, fire, earthquake, etc. mechanical failures physical access prohibited theft/damage

Event Identification (3) Organizational Issues operating system upgrade new hardware new software

Event Identification (4) Operational Issues disk failure backup virus accidental deletions (oops!) overwrite

Prevention/Mitigation Procedural Disaster recovery plan planning by project manager purchasing hardware & software (data security)

Indirect Results of these Loss of service Events Discontinuity of reporting Profit loss

Elements of Forensics Recovery evidence preservation damage control system restoration Causation (problem source) Proof evidence analysis

Objectives of Forensics Prove it in court (legal) Prove it to prevent future incidents (business)

Financial Implications Insurance for theft/loss E & O (???) Purchase of extra hardware for incident potential and response Risk to business Cost of prosecution Loss/new business (e.g., no controls = loss of clientele and sound controls = increase in clientele)

Career Issues Types of careers forensic consultant legal aid computer crime expert/investigator/attorney government agent (High Tech Unit, AG, FBI)

Career Issues (2) Drawbacks education unknown factor (industry lacking knowledge about this area) no uniform standards to establish expert status experts necessary for court cases to offer opinions must have ability to explain process in NON- TECHNICAL MANNER TIME AND LABOR INTENSIVE!!!

Q & A

Summary Computer Forensics is an important element of any Security Program. Problem recovery may be quicker if reactive, but may not yield stability. Weigh the importance of 3 factors: Restoration Prevention Prosecution As with anything else: Stay Current!

Platform Architecture I Windows NT

Platform Architecture II Windows 95/98

Platform Architecture III DOS/Windows 3.1x

Comments and Observations

Bibliography of References Burton, R.F. (1996). Searching for Fraud Behind the Screens, The White Paper, Vol.. 10 (2), The Association for Certified Fraud Examiners Forgione, D. (1994). Recovering Lost Evidence from a Microcomputer, The White Paper, Vol.. 8(3), The Association for Certified Fraud Examiners Clede, Bill (1993). Investigating Computer Crime is Every Department s Concern, Law and Order, July 1993. Available for FTP at: ourworld.compuserve.com/homepages/billc/compcrim.htm Conly, C.H. & McEwen, J.T. (1990). Computer Crime: The New Crime Scene. NIJ Reports No. 218, National Institute of Justice, Office of Justice Programs, U.S. Department of Justice Farwell, W. L. (1997). Stand-alone PC Examinations: Some Basic Forensic Guidelines, High Technology Crime Investigation Association Newsletter, New England Chapter, Vole. 2(1).

Bibliography (2) Howell, F.J., Spernow, W. and Farwell, W.L. (1998). Computer Search & Seizure and Computer Forensics, HTCIA Training Seminar in Boston, MA, April 1998. Robbins, J. (1998). An Explanation of Computer Forensics by Judd Robbins. Available at knock-knock.com Rosenblatt, K.S. (1995). High Technology Crime: Investigating Cases Involving Computers. San Jose: KSK Publications

If You Would Like More: Michael J. Corby, CCP, CISSP M Corby & Associates, Inc. 255 Park Avenue, 8th Floor Worcester, MA 01609-1946 U.S.A. Phone: 1 (508) 792-4320 Fax: 1 (508) 792-4327 Web: www.mcorby.com E-Mail: mcorby@mcorby.com or lpaul@mcorby.com