Information Technology Audit & Forensic Techniques. CMA Amit Kumar



Similar documents
Incident Response and Forensics

Overview of Computer Forensics

Computer Forensics as an Integral Component of the Information Security Enterprise

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

Brainloop Cloud Security

information security and its Describe what drives the need for information security.

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Scene of the Cybercrime Second Edition. Michael Cross

BDO CONSULTING FORENSIC TECHNOLOGY SERVICES

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Hands-On How-To Computer Forensics Training

The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

ELECTRONIC INFORMATION SECURITY A.R.

A practical guide to IT security

USM IT Security Council Guide for Security Event Logging. Version 1.1

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Getting Physical with the Digital Investigation Process

Certified Information Systems Auditor (CISA)

(Instructor-led; 3 Days)

Loophole+ with Ethical Hacking and Penetration Testing

SECURITY. Risk & Compliance Services

Three significant risks of FTP use and how to overcome them

What is Digital Forensics?

The Role of Digital Forensics within a Corporate Organization

Information Security Basic Concepts

COMPUTER FORENSICS (EFFECTIVE ) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE CATE STUDENT REPORTING PROCEDURES MANUAL)

CERIAS Tech Report GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS. Brian Carrier & Eugene H. Spafford

Data Security Incident Response Plan. [Insert Organization Name]

With Great Power comes Great Responsibility: Managing Privileged Users

MSc Computer Security and Forensics. Examinations for / Semester 1

R345, Information Technology Resource Security 1

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC

How Drive Encryption Works

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Online Lead Generation: Data Security Best Practices

Incident Response and Computer Forensics

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

Life Cycle of Records

EXIN Information Security Foundation based on ISO/IEC Sample Exam

IBX Business Network Platform Information Security Controls Document Classification [Public]

Incident Response. Six Best Practices for Managing Cyber Breaches.

e-discovery Forensics Incident Response

How To Secure Your Information Systems

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Cisco Advanced Services for Network Security

Computer Forensic Tools. Stefan Hager

Security aspects of e-tailing. Chapter 7

Network Incident Report

Information Technology Cyber Security Policy

Supplier Information Security Addendum for GE Restricted Data

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

INFORMATION SECURITY PROGRAM

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

GE Measurement & Control. Cyber Security for NEI 08-09

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

Guideline on Auditing and Log Management

An overview of IT Security Forensics

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Basics of Internet Security

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

An Integrated CyberSecurity Approach for HEP Grids. Workshop Report.

DRAFT Standard Statement Encryption

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

External Penetration Assessment and Database Access Review

The Value of Physical Memory for Incident Response

Digital Forensics. General Terms Cyber Crime, forensics models, Investigation, Analysis, digital devices.

INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION

That Point of Sale is a PoS

Stay ahead of insiderthreats with predictive,intelligent security

FORBIDDEN - Ethical Hacking Workshop Duration

Case Study: Hiring a licensed Security Provider

Common Cyber Threats. Common cyber threats include:

Management Standards for Information Security Measures for the Central Government Computer Systems

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Cyber Security Response to Physical Security Breaches

security policy Purpose The purpose of this paper is to outline the steps required for developing and maintaining a corporate security policy.

Information Systems and Technology

ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT

Navigating Endpoint Encryption Technologies

Teleran PCI Customer Case Study

Digital Forensics & e-discovery Services

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

Decision on adequate information system management. (Official Gazette 37/2010)

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE

Supplier IT Security Guide

Chapter 7 Information System Security and Control

Transcription:

Information Technology Audit & Forensic Techniques CMA Amit Kumar 1

Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques B-73/B, Sainik Nagar, Nawada, New Delhi-110059. T- 91 9999803612 & 011-2533 0030 E-mail :: akcadvisors@gmail.com

IT Forensic Techniques for Auditors Presentation Focus Importance of IT Forensic Techniques to Organizations Importance of IT Forensic Techniques to Auditors Audit Goals of Forensic Investigation Digital Crime Scene Investigation Illustration of Forensic Tools A Forensic Protocol 3

Forensic Computing Defined Forensic Computing is the process of identifying, preserving, analyzing, and presenting digital evidence in a manner that is legally acceptable in a court of law Our interest is in Identifying and preserving evidence, post-mortem system analysis to determine extent and nature of attack, and the forensic framework 4

Importance of IT Forensic Techniques to Organizations Corporate Fraud Losses in 2004 Cost companies an average loss of assets over $ 1.7 million A 50% increase over 2003 Over one third of these frauds were discovered by accident, making "chance" the most common fraud detection tool. PriceWaterhouseCoopers, Global Economic Crime Survey 2005 5

Importance of IT Forensic Techniques to Organizations The New Corporate Environment Sarbanes-Oxley 2002 COSO and COBIT ISO 9000 and ISO 17799 Gramm-Leach-Bliley Act US Foreign Corrupt Practices Act Companies Act 2013 all of these have altered the corporate environment and made forensic techniques a necessity! 6

Importance of IT Forensic Techniques to Organizations Intellectual Property Losses Rapid increase in theft of IP 323% over five year period 1999-2004 75% of estimated annual losses were to an employee, supplier or contractor Digital IP is more susceptible to theft Employees may not view it as theft 7

Importance of IT Forensic Techniques to Organizations Network Fraud Companies now highly reliant on networks Networks increasingly vulnerable to attacks Viruses, Trojans, Rootkits can add backdoors Social Engineering including Phishing and Pharming Confidential and proprietary information can be compromised Can create a corporate liability 8

Importance of IT Forensic Techniques to Organizations Security Challenges Technology expanding and becoming more sophisticated Processes evolving and integrating with technologies People under trained Policies outdated Organizations at risk People Technology Processes Policies 9

Importance of IT Forensic Techniques to Auditors Majority of fraud is uncovered by chance Auditors often do not look for fraud Prosecution requires evidence Value of IT assets growing Treadway Commission Study Undetected fraud was a factor in one-half of the 450 lawsuits against independent auditors. 10

Importance of IT Forensic Techniques to Auditors Auditor s Knowledge, Skills, Abilities Accounting Auditing IT (weak) Needed Increased IT knowledge Fraud and forensic accounting knowledge Forensic investigative and analytical skills and abilities 11

Importance of IT Forensic Techniques to Auditors Knowledge, Skills, Abilities: Needs Auditor s need KSAs to Build a digital audit trail Collect usable courtroom electronic evidence Trace an unauthorized system user Recommend or review security policies Understand computer fraud techniques Analyze and valuate incurred losses 12

Importance of IT Forensic Techniques to Auditors KSA Needs (cont.) Understand information collected from various computer logs Be familiar with the Internet, web servers, firewalls, attack methodology, security procedures & penetration testing Understand organizational and legal protocols for incident handling Establish relationships with IT, risk management, security, law enforcement 13

Audit Goals of a Forensic Investigation Rules of Evidence Complete Authentic Admissible Reliable Believable 14

Audit Goals of a Forensic Investigation Requirements for Evidence Computer logs Must not be modifiable Must be complete Appropriate retention rules 15

Digital Crime Scene Investigation Problems with Digital Investigation Timing essential electronic evidence volatile Auditor may violate rules of evidence NEVER work directly on the evidence Skills needed to recover deleted data or encrypted data 16

Digital Crime Scene Investigation Extract, process, interpret Work on the imaged data or safe copy Data extracted may be in binary form Process data to convert it to understandable form Reverse-engineer to extract disk partition information, file systems, directories, files, etc Software available for this purpose Interpret the data search for key words, phrases, etc. 17

Digital Crime Scene Investigation Technology Magnetic disks contain data after deletion Overwritten data may still be salvaged Memory still contains data after switch-off Swap files and temporary files store data Most OS s perform extensive logging (so do network routers) 18

Digital Crime Scene Investigation Order of Volatility Preserve most volatile evidence first Registers, caches, peripheral memory Memory (kernel, physical) Network state Running processes Disk Floppies, backup media CD-ROMs, printouts 19

Digital Crime Scene Investigation Digital Forensic Investigation A process that uses science and technology to examine digital objects and that develops and tests theories, which can be entered into a court of law, to answer questions about events that occurred. IT Forensic Techniques are used to capture and analyze electronic data and develop theories. 20

Illustration of Forensic Tools Forensic Software Tools are used for Data imaging Data recovery Data integrity Data extraction Forensic Analysis Monitoring 21

Data Imaging Reduces internal investigation Automated analysis saves time Supports electronic records audit costs Creates logical evidence files eliminating need to capture entire hard drives 22

Data Imaging Previews computers over the network to determine whether relevant evidence exists: Unallocated/allocated space Deleted files File slack Volume slack File system attributes CD ROMs/DVDs Mounted FireWire and USB devices Mounted encrypted volumes Mounted thumb drives 23

Data Integrity MD5 Message Digest a hashing algorithm used to generate a checksum Available online as freeware Any changes to file will change the checksum Use: Generate MD5 of system or critical files regularly Keep checksums in a secure place to compare against later if integrity is questioned 24

Data Integrity MD5 Using HashCalc 25

Data Integrity Private Disk 26

Data Monitoring Tracking Log Files 27

Data Monitoring PC System Log 28

Audit Command Language (ACL) ACL is the market leader in computerassisted audit technology and is an established forensics tool. Clientele includes 70 percent of the Fortune 500 companies over two-thirds of the Global 500 the Big Four public accounting firms 29

Forensic Tools Audit Command Language ACL is a computer data extraction and analytical audit tool with audit capabilities Statistics Duplicates and Gaps Stratify and Classify Sampling Benford Analysis 30

32

33

34

Forensic Tools: ACL Benford Analysis States that the leading digit in some numerical series is follows an exponential rather than normal distribution Applies to a wide variety of figures: financial results, electricity bills, street addresses, stock prices, population numbers, death rates, lengths of rivers Leading Probability Digit 1 30.1 % 2 17.6 % 3 12.5 % 4 9.7 % 5 7.9 % 6 6.7 % 7 5.8 % 8 5.1 % 9 4.6 % 35

36

Data Monitoring Employee Internet Activity Spector captures employee web activity including keystrokes, email, and snapshots to answer questions like: Which employees are spending the most time surfing web sites? Which employees chat the most? Who is sending the most emails with attachments? Who is arriving to work late and leaving early? What are my employees searching for on the Internet? 37

Data Monitoring : Spector Recorded Email 38

Data Monitoring : Spector Recorded Web Surfing 39

Data Monitoring : Spector Recording Keystrokes 40

Data Monitoring : Spector Recorded Snapshots 41

Data Capture : Key Log Hardware KeyKatcher Records chat, e-mail, internet & more Is easier to use than parental control software Identifies internet addresses Uses no system resources Works on all PC operating systems Undetectable by software www.lakeshoretechnology.com 42

Developing a Forensic Protocol The response plan must include a coordinated effort that integrates a number of organizational areas and possibly external areas Response to fraud events must have top priority Key players must exist at all major organizational locations People Technology Processes Policies 43

Developing a Forensic Protocol End-to-End Forensic Analysis First rule of end-to-end forensic digital analysis Primary evidence must always be corroborated by at least one other piece of relevant primary evidence to be considered a valid part of the evidence chain. Evidence that does not fit this description, but does serve to corroborate some other piece of evidence without itself being corroborated, is considered to be secondary evidence. Exception: the first piece of evidence in the chain from the Identification layer 44

A Forensic Protocol Security Exposures Organizations may possess critical technology skills but Skills are locked in towers IT, Security, Accounting, Auditing Skills are centralized while fraud events can be decentralized Skills are absent vacations, illnesses, etc 45

A Forensic Protocol The Role of Policies They define the actions you can take They must be clear and simple to understand The employee must acknowledge that he or she read them, understands them and will comply with them They can t violate law 46

A Forensic Protocol Forensic Response Control Incident Response Planning Identify needs and objectives Identify resources Create policies, procedures Create a forensic protocol Acquire needed skills Train Monitor 47

A Forensic Protocol Documenting the Scene Note time, date, persons present Photograph and video the scene Draw a layout of the scene Search for notes (passwords) that might be useful If possible freeze the system such that the current memory, swap files, and even CPU registers are saved or documented 48

A Forensic Protocol Forensic Protocol First responder triggers alert Team response Freeze scene Begin documentation Auditors begin analysis Protect chain-of-custody Reconstruct events and develop theories Communicate results of analysis 49

A Forensic Protocol Protocol Summary Ensure appropriate policies Preserve the crime scene (victim computer) Act immediately to identify and preserve logs on intermediate systems Conduct your investigation Obtain subpoenas or contact law enforcement if necessary Key: Coordination between functional areas 50

Conclusion IT Forensic Investigative Skills Can Decrease occurrence of fraud Increase the difficulty of committing fraud Improve fraud detection methods Reduce total fraud losses Auditors trained in these skills are more valuable to the organization! 51

Questions or Comments? 52