Incident Response and Forensics



Similar documents
Information Technology Audit & Forensic Techniques. CMA Amit Kumar

The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices

Overview of Computer Forensics

Incident Response and Computer Forensics

INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

MSc Computer Security and Forensics. Examinations for / Semester 1

Incident Response Plan for PCI-DSS Compliance

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

Computer Forensics as an Integral Component of the Information Security Enterprise

Hands-On How-To Computer Forensics Training

Live View. A New View On Forensic Imaging. Matthiew Morin Champlain College

How to Encrypt your Windows 7 SDS Machine with Bitlocker

EC-Council Ethical Hacking and Countermeasures

Getting Physical with the Digital Investigation Process

Standard: Information Security Incident Management

Incident Response. Six Best Practices for Managing Cyber Breaches.

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Digital Forensics. Larry Daniel

plantemoran.com What School Personnel Administrators Need to know

Collecting Electronic Evidence After a System Compromise

Computer Forensic Capabilities

Computer Forensics Basics, First Responder, Collection of Evidence

CERIAS Tech Report GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS. Brian Carrier & Eugene H. Spafford

Computer Hacking Forensic Investigator v8

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Operating Systems Forensics

IT Networking and Security

DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Where is computer forensics used?

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 13 Business Continuity

System Security Policy Management: Advanced Audit Tasks

An overview of IT Security Forensics

Data Management & Protection: Common Definitions

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

University of Colorado at Denver and Health Sciences Center HIPAA Policy. Policy: 9.2 Latest Revision: 04/17/2005 Security Incidents Page: 1 of 9

Digital Forensics Tutorials Acquiring an Image with FTK Imager

Computing forensics: a live analysis

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

The Protection Mission a constant endeavor

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

Digital Forensics. Tom Pigg Executive Director Tennessee CSEC

Information Systems Access Policy

OCR s Anatomy: HIPAA Breaches, Investigations, and Enforcement

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

Course Title: Computer Forensic Specialist: Data and Image Files

EnCase Portable. Extend Your Forensic Reach with Powerful Triage & Data Collection

COMPUTER FORENSICS (EFFECTIVE ) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE CATE STUDENT REPORTING PROCEDURES MANUAL)

Impact of Digital Forensics Training on Computer Incident Response Techniques

Information Technology Acceptable Use Policy

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Master of Science in Information Systems & Security Management. Courses Descriptions

INCIDENT RESPONSE CHECKLIST

Cyber Security Response to Physical Security Breaches

KEY STEPS FOLLOWING A DATA BREACH

Sample Data Security Policies

Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Data Privacy and Gramm- Leach-Bliley Act Section 501(b)

Computer Forensics Processing Checklist. Pueblo High-Tech Crimes Unit

Digital Forensics for Attorneys Overview of Digital Forensics

information security and its Describe what drives the need for information security.

introducing COMPUTER ANTI FORENSIC TECHNIQUES

Introduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014

How To Secure An Rsa Authentication Agent

Investigation Techniques

INFORMATION SECURITY TRAINING CATALOG (2015)

Design and Implementation of a Live-analysis Digital Forensic System

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

Forensics on the Windows Platform, Part Two

Digital Forensics & e-discovery Services

(Instructor-led; 3 Days)

Scene of the Cybercrime Second Edition. Michael Cross

Data Security Incident Response Plan. [Insert Organization Name]

What is Digital Forensics?

AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN Siskiyou Boulevard Ashland OR 97520

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Understanding ediscovery and Electronically Stored Information (ESI)

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Freeware Live Forensics tools evaluation and operation tips

Digital Forensics, ediscovery and Electronic Evidence

UNISOL SysAdmin. SysAdmin helps systems administrators manage their UNIX systems and networks more effectively.

Information Security Basic Concepts

Certified Digital Forensics Examiner

State of the art of Digital Forensic Techniques

Transcription:

Incident Response and Forensics Yiman Jiang, President and Principle Consultant Sumus Technology Ltd. James Crooks, Manager - Advisory Services PricewaterhouseCoopers LLP UBC 2007-04-12

Outline Computer Forensic Principles Incident Response Recommended Practice Copyright 2007 Sumus Technology Limited 2

Disclaimer Many thorny legal issues Consult legal counsel as necessary BEFORE using tools / techniques We are NOT lawyers. Copyright 2007 Sumus Technology Limited 3

Newsreel TXJ (TJ Max, Winners. etc.) admits to losing credit + debit cards Jan 2007, the attack was discovered in Dec 2006 but not disclosed. Further disclosures indicated the attackers were in TXJ systems for an extended period. April 2007 TXJ admits over 45 million cards were stolen. Julie Amero (Connecticut substitute teacher) may get 40 years for exposing kid to porn in a classroom (a victim of flawed prosecution forensics and / or bad legal work) Utah man sentenced to 24 months in prison for bringing down wireless Internet services (December 2006) California man sentenced for recklessly damaging a protected computer owned by his former employer. (October 2006) Copyright 2007 Sumus Technology Limited 4

What is Computer Forensics Computer forensics is the collection, preservation, analysis, and presentation of computer evidence related to an incident that may or may not be a crime. Live data capture using system commands Capture disk / other media images (system, open source and commercial tools) Offline analysis Document entire process (significant effort) Copyright 2007 Sumus Technology Limited 5

Rules of Evidence Digital evidence is like any other evidence, it must follow the rules of evidence, Admissible: It must conform to certain legal rules before it can be put before a court. Authentic: It must be possible to positively tie evidentiary material to the incident. Complete: It must tell the whole story and not just a particular perspective. Reliable: There must be nothing about how the evidence was collected and subsequently handled that casts doubt about its authenticity and veracity. Believable: It must be readily believable and understandable by a court. Copyright 2007 Sumus Technology Limited 6

Computer Forensic Principles No different than non-computer forensics Collect and preserve evidence without altering or damaging original Authenticate that copy is identical to original Maintain chain-of-custody Perform analysis of data (without modifying it) Documentation of findings Copyright 2007 Sumus Technology Limited 7

Volatility of Digital Evidence Digital evidence is fragile and can easily be altered and destroyed through normal operation of the computer, networks, software, malware Order of Volatility CPU cache and register content (no forensic value) routing table, arp cache, process table, kernel statistics memory temporary file systems / swap space disk remote logging and monitoring data archival media Copyright 2007 Sumus Technology Limited 8

Lifecycle of Incident Response NETWORK VULNERABILITY ASSESSMENT APPLICATION ASSESSMENT HOST HARDENING FORENSIC READINESS POLICY WRITING INTRUSION DETECTION INCIDENT RESPONSE PLANNING INCIDENT FORENSIC ACQUISITION INCIDENT RESPONSE FORENSIC IDENTIFICATION PROSECUTION INTRUDER TRACKING An incident happens at a particular time and place Planning and preparedness must come before an incident happens Adopted from @stake. Copyright 2007 Sumus Technology Limited 9

Incident Response Methodology 1. Pre-incident preparation 2. Detection of incidents 3. Initial response 4. Response strategy formulation 5. Forensic collection and investigation 6. Recovery and security measure enhancement 7. Reporting 8. Follow-up Copyright 2007 Sumus Technology Limited 10

Common Mistakes in Evidence Handling Inappropriately dealing with the state of the victim system Running commands that change the file system Using commands and programs on the victim systems Not understanding all the implications of what you are doing Not maintaining and documenting chain of custody Not having an incident response plan, appropriate tools or trained staff. Copyright 2007 Sumus Technology Limited 11

Best Practice for Evidence Handling Secure the scene, Identify all evidence, Preserve the state the suspect computer, Document the hardware configuration of the system, Make bit-level copies of hard drives, floppy disks, Mathematically authenticate data on all storage devices Document the system BIOS date and time, Transport the computer system to a secure location Copyright 2007 Sumus Technology Limited 12

Two Primary Modes of Investigations Live Response Performed on the victim systems or relevant systems while they are live and running Offline Analysis Victim systems or relevant systems have been turned off, official forensic copy for record and working copy or copies made for analysis Copyright 2007 Sumus Technology Limited 13

When and Why Live Response? To collect volatile information Volatile information: active information temporarily reflecting the machine s current state, which will disappear completely upon system shutdown To collect information on systems that cannot be turned off Copyright 2007 Sumus Technology Limited 14

Best Practice for Collecting Volatile Information Determine live response strategy (if / what / how) Create toolkit on CD containing tested tool collections Avoid tools that use a GUI interface. Command line tools are best here minimize impact Perform as few operations as possible Document all commands performed Capture info best way (e.g. netcat/cryptcat, floppy) Copy all memory Copy all disk (if system can t go down) Copyright 2007 Sumus Technology Limited 15

Offline Analysis Using a forensic workstation, mount a working copy of the duplicated image drive in read-only mode Areas to search for evidence Logical File System Complete, undeleted files Unallocated (free) space Complete deleted files & file fragments Slack space File fragments Swap space: file fragments, working memory, passwords Less Difficult More Difficult Copyright 2007 Sumus Technology Limited 16

Forensic Analysis Details 1. Initial low-level analysis 2. Obtaining Modification, Access and Creation (MAC) times of all files 3. Review all pertinent logs 4. Perform keyword searches 5. Review relevant files (Application /Email messages) 6. Identify unauthorized user accounts or groups 7. Identify rogue processes / Trojans 8. Look for unusual or hidden files Copyright 2007 Sumus Technology Limited 17

Forensic Analysis Details Cont d 9. Check for unauthorized access applications / nonstandard ports 10. Examine pre-scheduled jobs 11. Analyze trust relationships 12. Review Security ACLs Copyright 2007 Sumus Technology Limited 18

Conclusion Practical investigations tend to rely on multiple sets of evidence which corroborate each other each evidence set may have its weaknesses, but taken together may point to a single conclusion Disk forensics may remain for some time the single most important form of digital evidence Copyright 2007 Sumus Technology Limited 19

Questions? Yiman Jiang Sumus Technology Ltd. (www.sumusltd.com) Tel: 604-838-7088 Email: yjiang@sumusltd.com James Crooks PricewaterhouseCoopers LLP (www.pwc.com) Tel. 604-806-7027 Email: james.crooks@ca.pwc.com Copyright 2007 Sumus Technology Limited 20

A Series of Forensic Courses BCIT FSCT 8570 13 week credit course Yiman and James are planning to offer a series of oneday, hands-on forensic courses, sponsored by CIPS Vancouver Security SIG Course #1: Computer Forensic Principles and Data Acquisition Course #2: Investigating Windows Course #3: Investigating *NIX Course #4: Advanced Topics (Network Forensics, Data Hiding, Encryption, E-mail, etc.) Copyright 2007 Sumus Technology Limited 21